Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Enhanced Simultaneous Detection Of Ractopamine And Salbutamol - Via Electrochemical-Facial Deposition Of Mno2 Nanoflowers Onto 3d Rgo/Ni Foam Templates, Mingyan Wang, Wei Zhu, Lin Ma, Juan Juan Ma, Dongen Zhang, Zhi Wei Tong, Jun Chen Jan 2016

Enhanced Simultaneous Detection Of Ractopamine And Salbutamol - Via Electrochemical-Facial Deposition Of Mno2 Nanoflowers Onto 3d Rgo/Ni Foam Templates, Mingyan Wang, Wei Zhu, Lin Ma, Juan Juan Ma, Dongen Zhang, Zhi Wei Tong, Jun Chen

Australian Institute for Innovative Materials - Papers

In this paper, we report a facile method to successfully fabricate MnO2 nanoflowers loaded onto 3D RGO@nickel foam, showing enhanced biosensing activity due to the improved structural integration of different electrode materials components. When the as-prepared 3D hybrid electrodes were investigated as a binder-free biosensor, two well-defined and separate differential pulse voltammetric peaks for ractopamine (RAC) and salbutamol (SAL) were observed, indicating the simultaneous selective detection of both β-agonists possible. The MnO2/RGO@NF sensor also demonstrated a linear relationship over a wide concentration range of 17nM to 962nM (R=0.9997) for RAC and 42nM to 1463nM (R=0.9996) for SAL, with the detection …


Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian Jan 2016

Detecting And Tracing Slow Attacks On Mobile Phone User Service, Brian Cusack, Zhuang Tian

Australian Digital Forensics Conference

The lower bandwidth of mobile devices has until recently filtered the range of attacks on the Internet. However, recent research shows that DOS and DDOS attacks, worms and viruses, and a whole range of social engineering attacks are impacting on broadband smartphone users. In our research we have developed a metric-based system to detect the traditional slow attacks that can be effective using limited resources, and then employed combinations of Internet trace back techniques to identify sources of attacks. Our research question asked: What defence mechanisms are effective? We critically evaluate the available literature to appraise the current state of …