Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- [RSTDPub] (8)
- Digital forensics (7)
- Network forensics (3)
- Analysis (2)
- Biometrics (2)
-
- Communications (2)
- Computer forensics (2)
- Convolutional neural networks (2)
- Deep learning (2)
- Fruit and vegetables classification (2)
- Neuromorphic olfaction (2)
- SNN-based classification (2)
- Visualisation (2)
- (VIPAs) (1)
- 3D Delaunay triangulation (1)
- Abstract syntax tree fingerprinting (1)
- Accelerometer (1)
- Adaboost cnn optimisation (1)
- Adaptive classification margins (1)
- Algorithms (1)
- Android (1)
- Ant Colony Optimization (ACO) (1)
- Artificial intelligence (1)
- Attitudes (1)
- Authentication (1)
- Banking Trojan malware (1)
- BeEF (1)
- Behaviour (1)
- Behavioural change (1)
- Bio-inspired electronic nose systems (1)
- Publication Year
Articles 31 - 52 of 52
Full-Text Articles in Engineering
Towards A Set Of Metrics To Guide The Generation Of Fake Computer File Systems, Ben Whitham
Towards A Set Of Metrics To Guide The Generation Of Fake Computer File Systems, Ben Whitham
Australian Digital Forensics Conference
Fake file systems are used in the field of cyber deception to bait intruders and fool forensic investigators. File system researchers also frequently generate their own synthetic document repositories, due to data privacy and copyright concerns associated with experimenting on real-world corpora. For both these fields, realism is critical. Unfortunately, after creating a set of files and folders, there are no current testing standards that can be applied to validate their authenticity, or conversely, reliably automate their detection. This paper reviews the previous 30 years of file system surveys on real world corpora, to identify a set of discrete measures …
The Impact Of Custom Rom Backups On Android External Storage Erasure, Haydon Hope, Peter Hannay
The Impact Of Custom Rom Backups On Android External Storage Erasure, Haydon Hope, Peter Hannay
Australian Digital Forensics Conference
The Android operating system is the current market leader on mobile devices such as smartphones and tablet computers. The core operating system is open source and has a number of developers creating variants of this operating system. These variants, often referred to as custom ROMs are available for a wide number of mobile devices. Custom ROMs provide a number of features, such as enhanced control over the operating system, variation in user interfaces and so on. The process of installing custom ROMs is often accomplished through the use of a ROM manager application. Such applications often provide mechanisms to back …
Finding Evidence Of Wordlists Being Deployed Against Ssh Honeypots – Implications And Impacts, Priya Rabadia, Craig Valli
Finding Evidence Of Wordlists Being Deployed Against Ssh Honeypots – Implications And Impacts, Priya Rabadia, Craig Valli
Australian Digital Forensics Conference
This paper is an investigation focusing on activities detected by three SSH honeypots that utilise Kippo honeypot software. The honeypots were located on the same /24 IPv4 network and configured as identically as possible. The honeypots used the same base software and hardware configurations. The data from the honeypots were collected during the period 17th July 2012 and 26th November 2013, a total of 497 active day periods. The analysis in this paper focuses on the techniques used to attempt to gain access to these systems by attacking entities. Although all three honeypots are have the same configuration settings and …
Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa
Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa
Research outputs 2014 to 2021
With the all IP based Next Generation Networks being deployed around the world, the use of real-time multimedia service applications is being extended from normal daily communications to emergency situations. However, currently different emergency providers utilise differing networks and different technologies. As such, conversations could be terminated at the setup phase or data could be transmitted in plaintext should incompatibility issues exit between terminals. To this end, a novel security gateway that can provide the necessary security support for incompatible terminals was proposed, developed and implemented to ensure the successful establishment of secure real-time multimedia conversations. A series of experiments …
Indirect Measures Of Learning Transfer Between Real And Virtual Environments, Michael J. Garrett, Mark T. Mcmahon
Indirect Measures Of Learning Transfer Between Real And Virtual Environments, Michael J. Garrett, Mark T. Mcmahon
Research outputs 2013
This paper reports on research undertaken to determine the effectiveness of a 3D simulation environment used to train mining personnel in emergency evacuation procedures, designated the Fires in Underground Mines Evacuation Simulator (FUMES). Owing to the operational constraints of the mining facility, methods for measuring learning transfer were employed which did not require real world performance evaluation. Transfer measures that examined simulator performance relative to real world experience, fidelity assessment, and appraisal of the training value of the platform were utilised. Triangulation of results across all three measures indicated the presence of learning transfer, suggesting the viability of indirect measures …
Energy Efficiency Performance Improvements For Ant-Based Routing Algorithm In Wireless Sensor Networks, A. M. Zungeru, Kah Phooi Seng, Li-Minn Ang, W.C. Chia
Energy Efficiency Performance Improvements For Ant-Based Routing Algorithm In Wireless Sensor Networks, A. M. Zungeru, Kah Phooi Seng, Li-Minn Ang, W.C. Chia
Research outputs 2013
The main problem for event gathering in wireless sensor networks (WSNs) is the restricted communication range for each node. Due to the restricted communication range and high network density, event forwarding in WSNs is very challenging and requires multihop data forwarding. Currently, the energy-efficient ant based routing (EEABR) algorithm, based on the ant colony optimization (ACO) metaheuristic, is one of the state-of-the-art energy-aware routing protocols. In this paper, we propose three improvements to the EEABR algorithm to further improve its energy efficiency. The improvements to the original EEABR are based on the following: (1) a new scheme to intelligently initialize …
Appraising Critical Infrastructure Systems With Visualisation, Graeme Pye, Matthew Warren
Appraising Critical Infrastructure Systems With Visualisation, Graeme Pye, Matthew Warren
Australian Information Warfare and Security Conference
This paper explores the use of system modelling as an approach for appraising critical infrastructure systems. It reports on focus group findings with relation to the system modelling aspects of a critical infrastructure security analysis and modelling framework. Specifically, this discussion focuses on the interpretations of a focus group in terms of the likely benefits or otherwise of system visualisation. With the group focusing on its perceived value as an educational tool in terms of providing an abstract visualisation representation of a critical infrastructure system incident.
Cyber Influence, William Hutchinson
Cyber Influence, William Hutchinson
Australian Information Warfare and Security Conference
This paper explores influence in the cyber-world and the ability and effectiveness of influence campaigns in this medium. It examines the possibilities of influence in the online world as examines the potential of mobile technologies in this area. The contentious link between influence and behavioural change is investigated. Counterinfluence in the context of radicalisation is also looked at. Whilst it is inevitable that the digital medium is and will be used for influence campaigns and will be influential regardless if there are concerted ‘campaigns’ or not, it effects in terms of behavioural change are still open to question.
Safeguarding Australia From Cyber-Terrorism:A Proposed Cyber-Terrorism Scada Risk Framework For Industry Adoption, Christopher Beggs, Matthew Warren
Safeguarding Australia From Cyber-Terrorism:A Proposed Cyber-Terrorism Scada Risk Framework For Industry Adoption, Christopher Beggs, Matthew Warren
Australian Information Warfare and Security Conference
Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework …
A Study And Development Of Temperature And Relative Humidity Control System In Hospital Buildings In Thailand, Thammanoon Sookchaiya, Veerapol Monyakul, Sirichai Thepa
A Study And Development Of Temperature And Relative Humidity Control System In Hospital Buildings In Thailand, Thammanoon Sookchaiya, Veerapol Monyakul, Sirichai Thepa
EDU-COM International Conference
This research was aimed to control thermal environment (temperature and relative humidity) in airconditioned rooms in order to reach thermal comfort and good health for the people in hospital. This research was divided into 2 sections: Section 1 studies the direct and indirect influence of relative humidity on the health of people inside hospital buildings and the appropriate relative humidity and temperature to achieve thermal comfort and good health for Thailand by using Delphi technique; Section 2 develops single phase air conditioning system using inverter to control thermal environment (temperature and relative humidity) inside the room to reach the appropriate …
Economic Sustainability Of Remote Access Networking Classrooms, C Nuangjamnong, S P. Maj, D Veal
Economic Sustainability Of Remote Access Networking Classrooms, C Nuangjamnong, S P. Maj, D Veal
EDU-COM International Conference
Within the higher education domain, there is a prevalent belief that e-learning, virtual classroom and tele-education are essential requirements for the long-term effectiveness and success of educational institutions. Many information technologies have been adopted to assist studying and learning remotely and are hence potentially beneficial to students, teachers and educational providers. For educational providers, the benefits are that there are no physical or geographical limits to the number of students that can be enrolled in a course of study. However, within the field of network technology, students must actually use network devices during their studies. This is important not only …
Self-Restraint Admission Control For Ad-Hoc Wlans, Hushairi Zen, Daryoush Habibi, Iftekhar Ahmad
Self-Restraint Admission Control For Ad-Hoc Wlans, Hushairi Zen, Daryoush Habibi, Iftekhar Ahmad
Research outputs pre 2011
Admission control is an important mechanism for sustaining throughput and supporting quality of service (QoS) for real-time traffic in a wireless local area network (WLAN). In an adhoc WLAN scenario where no access point (AP) is available, admission control has to be self-managed by each node. We propose a self-restraining admission control mechanism that works by monitoring the congestion level of the network in the adhoc WLAN. Wireless nodes can listen to all nodes within their range and be aware of the collision rates. A node wishing to join the network measures the current collision rate, and predicts the post-admission …
Source Localisation In Wireless Sensor Networks Based On Optimised Maximum Likelihood, Mohammed Rahman, Daryoush Habibi, Iftekhar Ahmad
Source Localisation In Wireless Sensor Networks Based On Optimised Maximum Likelihood, Mohammed Rahman, Daryoush Habibi, Iftekhar Ahmad
Research outputs pre 2011
Maximum likelihood (ML) is a popular and effective estimator for a wide range of diverse applications and currently affords the most accurate estimation for source localisation in wireless sensor networks (WSN). ML however has two major shortcomings namely, that it is a biased estimator and is also highly sensitive to parameter perturbations. An Optimisation to ML (OML) algorithm was introduced that minimises the sum-of-squares bias and exhibits superior performance to ML in statistical estimation, particularly with finite datasets. This paper proposes a new model for acoustic source localisation in WSN, based upon the OML estimation process. In addition to the …
Analysis Of Information Remaining On Hand Held Devices For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland
Analysis Of Information Remaining On Hand Held Devices For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland
Research outputs pre 2011
The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …
Converging Voice, Video And Data In Wlan With Qos Support, Hushairi Zen, Daryoush Habibi, Justin Wyatt, Iftekhar Ahmad
Converging Voice, Video And Data In Wlan With Qos Support, Hushairi Zen, Daryoush Habibi, Justin Wyatt, Iftekhar Ahmad
Research outputs pre 2011
Providing quality of service (QoS) for converging traffic in wireless local area network (WLAN) is still a major issue for the researchers and industries. Due to the limited bandwidth and exposure to unpredictable interferences in a wireless environment, efficient management and optimization of the access protocols are essential to provide acceptable QoS for real-time traffic and fairness to best-effort traffic. In this paper, we investigate the throughput and delay performance of the legacy IEEE 802.11 and the 802.11e when carrying converging data in WLAN. We evaluate our recently proposed protocol known as wireless token network protocol (WTN) and show that …
An Improved Fec Scheme For Mobile Wireless Communication At Vehicular Speeds, Iftekhar Ahmad, Daryoush Habibi, Ziaur Rahman
An Improved Fec Scheme For Mobile Wireless Communication At Vehicular Speeds, Iftekhar Ahmad, Daryoush Habibi, Ziaur Rahman
Research outputs pre 2011
WiMAX has emerged as a promising wireless communication technology with potential to deliver high throughput and guaranteed quality of service to the end applications. Recent studies suggest that while WiMAX (802.16e) is capable of delivering a data rate of up to 75 Mbps for fixed wireless communications, data rate decreases drastically for mobile wireless communications, often providing a data rate less than 1 Mb/s when the mobile nodes travel at vehicular speeds. High bit error rate caused at high vehicular speeds is the key reason for low throughput. In noisy mobile communication environments, standard error control mechanisms like the transmission …
Performance Evaluation Of Ieee 802.15.4 For Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad
Performance Evaluation Of Ieee 802.15.4 For Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad
Research outputs pre 2011
The IEEE 802.15.4 standard medium access control (MAC) protocol for low rate wireless personal area networks (LRWPAN) is design mainly for static sensor networks and its capability to support mobile sensor networks has not yet been established. To the best knowledge of authors, this is the first paper that evaluates the suitability of IEEE 802.15.4 MAC in mobile sensor networks environment. We evaluate the performance based on node's speed and beacon order, and observe the effect on energy usage, packet delivery ratio and time required to associate with its coordinator. From the experiment we observe that the moving nodes experienced …
Improving Mobile Sensor Connectivity Time In The Ieee 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, Iftekhar Ahmad
Improving Mobile Sensor Connectivity Time In The Ieee 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, Iftekhar Ahmad
Research outputs pre 2011
In the IEEE 802.15.4 medium access control (MAC) protocol for wireless sensor networks, a sensor node needs to associate with a coordinator before it starts sending or receiving data. The sensor node will mostly choose the nearest coordinator to associate with. However, this method is not suitable for a constantly moving sensor node because it will end up switching coordinators too often due to short connectivity time. The IEEE 802.15.4 has a simplistic and inadequate method of choosing a coordinator in this context. In this paper, we introduce a method to increase the mobile sensor node connectivity time with its …
Sampled Fiber Gratings For High-Resolution And High-Speed Photonic Signal Processing, Mingya Shen, Kamal Alameh
Sampled Fiber Gratings For High-Resolution And High-Speed Photonic Signal Processing, Mingya Shen, Kamal Alameh
Research outputs pre 2011
A novel sampled grating for high-resolution, highspeed signal processing is presented. Simulation based on Sinc2 sampled and rational sampled fiber grating modeling show that a large number of sub-ps time delay steps are attainable, corresponding to a sampling frequency in excess of 1THz. Design method is described for deriving sampling functions that meet specific true-time-delay profile requirements.
Success? The Impact Of Involving Customers In E-Commerce Development, Julian Terry, Craig Standing
Success? The Impact Of Involving Customers In E-Commerce Development, Julian Terry, Craig Standing
Research outputs pre 2011
In e-commerce, customers have become Information System users. In this environment of non-mandatory usage, remote, untrained users need to quickly feel comfortable and satisfied with a site encounter. Throughout the literature for four decades, a commonly cited factor pertaining to system success has been user participation in the systems development process. Among other things this is likely to lead to increased user satisfaction and the perceived usefulness of the application. This study uses findings from thirty cases of recently completed e-commerce sites in which project leaders accounts of customer participation in e-commerce development activities are analysed, along with their perceptions …
Use Of The Wfg Toolkit And Pisa For Comparison Of Moeas, Lucas Bradstreet, Luigi Barone, Lyndon While, Simon Huband, Philip Hingston
Use Of The Wfg Toolkit And Pisa For Comparison Of Moeas, Lucas Bradstreet, Luigi Barone, Lyndon While, Simon Huband, Philip Hingston
Research outputs pre 2011
Understanding the behaviour of different optimisation algorithms is important in order to apply the best algorithm to a particular problem. The WFG toolkit was designed to aid this task for multi-objective evolutionary algorithms (MOEAs), offering an easily modifiable framework that allows practitioners the ability to test different features by "plugging" in different forms of transformations. In doing so, the WFG toolkit provides a set of problems that exhibit a variety of different characteristics. This paper presents a comparison between two state of the art MOEAs (NSGA-II and SPEA2) that exemplifies the unique capabilities of the WFG toolkit. By altering the …
Passive And Active Optical Bit-Pattern Recognition Structures For Multiwavelength Optical Packet Switching Networks, Muhsen Aljada, Kamal Alameh
Passive And Active Optical Bit-Pattern Recognition Structures For Multiwavelength Optical Packet Switching Networks, Muhsen Aljada, Kamal Alameh
Research outputs pre 2011
Next generation High-Speed optical packet switching networks require components capable of recognising the optical header to enable on-the-fly accurate switching of incoming data packets to their destinations. This paper experimentally demonstrates a comparison between two different optical header recognition structures; A passive structure based on the use of Fiber Bragg Gratings (FBGs), whereas the active structure employs Opto-VLSI processors that synthesise dynamic wavelength profile through digital phase holograms. The structures are experimentally demonstrated at 10Gbps. Performance comparison between the two structures is also discussed. These optical header recognition structures are attractive for multiwavelength optical network and applications.