Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 52 of 52

Full-Text Articles in Engineering

Towards A Set Of Metrics To Guide The Generation Of Fake Computer File Systems, Ben Whitham Jan 2014

Towards A Set Of Metrics To Guide The Generation Of Fake Computer File Systems, Ben Whitham

Australian Digital Forensics Conference

Fake file systems are used in the field of cyber deception to bait intruders and fool forensic investigators. File system researchers also frequently generate their own synthetic document repositories, due to data privacy and copyright concerns associated with experimenting on real-world corpora. For both these fields, realism is critical. Unfortunately, after creating a set of files and folders, there are no current testing standards that can be applied to validate their authenticity, or conversely, reliably automate their detection. This paper reviews the previous 30 years of file system surveys on real world corpora, to identify a set of discrete measures …


The Impact Of Custom Rom Backups On Android External Storage Erasure, Haydon Hope, Peter Hannay Jan 2014

The Impact Of Custom Rom Backups On Android External Storage Erasure, Haydon Hope, Peter Hannay

Australian Digital Forensics Conference

The Android operating system is the current market leader on mobile devices such as smartphones and tablet computers. The core operating system is open source and has a number of developers creating variants of this operating system. These variants, often referred to as custom ROMs are available for a wide number of mobile devices. Custom ROMs provide a number of features, such as enhanced control over the operating system, variation in user interfaces and so on. The process of installing custom ROMs is often accomplished through the use of a ROM manager application. Such applications often provide mechanisms to back …


Finding Evidence Of Wordlists Being Deployed Against Ssh Honeypots – Implications And Impacts, Priya Rabadia, Craig Valli Jan 2014

Finding Evidence Of Wordlists Being Deployed Against Ssh Honeypots – Implications And Impacts, Priya Rabadia, Craig Valli

Australian Digital Forensics Conference

This paper is an investigation focusing on activities detected by three SSH honeypots that utilise Kippo honeypot software. The honeypots were located on the same /24 IPv4 network and configured as identically as possible. The honeypots used the same base software and hardware configurations. The data from the honeypots were collected during the period 17th July 2012 and 26th November 2013, a total of 497 active day periods. The analysis in this paper focuses on the techniques used to attempt to gain access to these systems by attacking entities. Although all three honeypots are have the same configuration settings and …


Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa Jan 2014

Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa

Research outputs 2014 to 2021

With the all IP based Next Generation Networks being deployed around the world, the use of real-time multimedia service applications is being extended from normal daily communications to emergency situations. However, currently different emergency providers utilise differing networks and different technologies. As such, conversations could be terminated at the setup phase or data could be transmitted in plaintext should incompatibility issues exit between terminals. To this end, a novel security gateway that can provide the necessary security support for incompatible terminals was proposed, developed and implemented to ensure the successful establishment of secure real-time multimedia conversations. A series of experiments …


Indirect Measures Of Learning Transfer Between Real And Virtual Environments, Michael J. Garrett, Mark T. Mcmahon Jan 2013

Indirect Measures Of Learning Transfer Between Real And Virtual Environments, Michael J. Garrett, Mark T. Mcmahon

Research outputs 2013

This paper reports on research undertaken to determine the effectiveness of a 3D simulation environment used to train mining personnel in emergency evacuation procedures, designated the Fires in Underground Mines Evacuation Simulator (FUMES). Owing to the operational constraints of the mining facility, methods for measuring learning transfer were employed which did not require real world performance evaluation. Transfer measures that examined simulator performance relative to real world experience, fidelity assessment, and appraisal of the training value of the platform were utilised. Triangulation of results across all three measures indicated the presence of learning transfer, suggesting the viability of indirect measures …


Energy Efficiency Performance Improvements For Ant-Based Routing Algorithm In Wireless Sensor Networks, A. M. Zungeru, Kah Phooi Seng, Li-Minn Ang, W.C. Chia Jan 2013

Energy Efficiency Performance Improvements For Ant-Based Routing Algorithm In Wireless Sensor Networks, A. M. Zungeru, Kah Phooi Seng, Li-Minn Ang, W.C. Chia

Research outputs 2013

The main problem for event gathering in wireless sensor networks (WSNs) is the restricted communication range for each node. Due to the restricted communication range and high network density, event forwarding in WSNs is very challenging and requires multihop data forwarding. Currently, the energy-efficient ant based routing (EEABR) algorithm, based on the ant colony optimization (ACO) metaheuristic, is one of the state-of-the-art energy-aware routing protocols. In this paper, we propose three improvements to the EEABR algorithm to further improve its energy efficiency. The improvements to the original EEABR are based on the following: (1) a new scheme to intelligently initialize …


Appraising Critical Infrastructure Systems With Visualisation, Graeme Pye, Matthew Warren Dec 2009

Appraising Critical Infrastructure Systems With Visualisation, Graeme Pye, Matthew Warren

Australian Information Warfare and Security Conference

This paper explores the use of system modelling as an approach for appraising critical infrastructure systems. It reports on focus group findings with relation to the system modelling aspects of a critical infrastructure security analysis and modelling framework. Specifically, this discussion focuses on the interpretations of a focus group in terms of the likely benefits or otherwise of system visualisation. With the group focusing on its perceived value as an educational tool in terms of providing an abstract visualisation representation of a critical infrastructure system incident.


Cyber Influence, William Hutchinson Dec 2009

Cyber Influence, William Hutchinson

Australian Information Warfare and Security Conference

This paper explores influence in the cyber-world and the ability and effectiveness of influence campaigns in this medium. It examines the possibilities of influence in the online world as examines the potential of mobile technologies in this area. The contentious link between influence and behavioural change is investigated. Counterinfluence in the context of radicalisation is also looked at. Whilst it is inevitable that the digital medium is and will be used for influence campaigns and will be influential regardless if there are concerted ‘campaigns’ or not, it effects in terms of behavioural change are still open to question.


Safeguarding Australia From Cyber-Terrorism:A Proposed Cyber-Terrorism Scada Risk Framework For Industry Adoption, Christopher Beggs, Matthew Warren Dec 2009

Safeguarding Australia From Cyber-Terrorism:A Proposed Cyber-Terrorism Scada Risk Framework For Industry Adoption, Christopher Beggs, Matthew Warren

Australian Information Warfare and Security Conference

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework …


A Study And Development Of Temperature And Relative Humidity Control System In Hospital Buildings In Thailand, Thammanoon Sookchaiya, Veerapol Monyakul, Sirichai Thepa Jan 2008

A Study And Development Of Temperature And Relative Humidity Control System In Hospital Buildings In Thailand, Thammanoon Sookchaiya, Veerapol Monyakul, Sirichai Thepa

EDU-COM International Conference

This research was aimed to control thermal environment (temperature and relative humidity) in airconditioned rooms in order to reach thermal comfort and good health for the people in hospital. This research was divided into 2 sections: Section 1 studies the direct and indirect influence of relative humidity on the health of people inside hospital buildings and the appropriate relative humidity and temperature to achieve thermal comfort and good health for Thailand by using Delphi technique; Section 2 develops single phase air conditioning system using inverter to control thermal environment (temperature and relative humidity) inside the room to reach the appropriate …


Economic Sustainability Of Remote Access Networking Classrooms, C Nuangjamnong, S P. Maj, D Veal Jan 2008

Economic Sustainability Of Remote Access Networking Classrooms, C Nuangjamnong, S P. Maj, D Veal

EDU-COM International Conference

Within the higher education domain, there is a prevalent belief that e-learning, virtual classroom and tele-education are essential requirements for the long-term effectiveness and success of educational institutions. Many information technologies have been adopted to assist studying and learning remotely and are hence potentially beneficial to students, teachers and educational providers. For educational providers, the benefits are that there are no physical or geographical limits to the number of students that can be enrolled in a course of study. However, within the field of network technology, students must actually use network devices during their studies. This is important not only …


Self-Restraint Admission Control For Ad-Hoc Wlans, Hushairi Zen, Daryoush Habibi, Iftekhar Ahmad Jan 2008

Self-Restraint Admission Control For Ad-Hoc Wlans, Hushairi Zen, Daryoush Habibi, Iftekhar Ahmad

Research outputs pre 2011

Admission control is an important mechanism for sustaining throughput and supporting quality of service (QoS) for real-time traffic in a wireless local area network (WLAN). In an adhoc WLAN scenario where no access point (AP) is available, admission control has to be self-managed by each node. We propose a self-restraining admission control mechanism that works by monitoring the congestion level of the network in the adhoc WLAN. Wireless nodes can listen to all nodes within their range and be aware of the collision rates. A node wishing to join the network measures the current collision rate, and predicts the post-admission …


Source Localisation In Wireless Sensor Networks Based On Optimised Maximum Likelihood, Mohammed Rahman, Daryoush Habibi, Iftekhar Ahmad Jan 2008

Source Localisation In Wireless Sensor Networks Based On Optimised Maximum Likelihood, Mohammed Rahman, Daryoush Habibi, Iftekhar Ahmad

Research outputs pre 2011

Maximum likelihood (ML) is a popular and effective estimator for a wide range of diverse applications and currently affords the most accurate estimation for source localisation in wireless sensor networks (WSN). ML however has two major shortcomings namely, that it is a biased estimator and is also highly sensitive to parameter perturbations. An Optimisation to ML (OML) algorithm was introduced that minimises the sum-of-squares bias and exhibits superior performance to ML in statistical estimation, particularly with finite datasets. This paper proposes a new model for acoustic source localisation in WSN, based upon the OML estimation process. In addition to the …


Analysis Of Information Remaining On Hand Held Devices For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland Jan 2008

Analysis Of Information Remaining On Hand Held Devices For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland

Research outputs pre 2011

The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …


Converging Voice, Video And Data In Wlan With Qos Support, Hushairi Zen, Daryoush Habibi, Justin Wyatt, Iftekhar Ahmad Jan 2008

Converging Voice, Video And Data In Wlan With Qos Support, Hushairi Zen, Daryoush Habibi, Justin Wyatt, Iftekhar Ahmad

Research outputs pre 2011

Providing quality of service (QoS) for converging traffic in wireless local area network (WLAN) is still a major issue for the researchers and industries. Due to the limited bandwidth and exposure to unpredictable interferences in a wireless environment, efficient management and optimization of the access protocols are essential to provide acceptable QoS for real-time traffic and fairness to best-effort traffic. In this paper, we investigate the throughput and delay performance of the legacy IEEE 802.11 and the 802.11e when carrying converging data in WLAN. We evaluate our recently proposed protocol known as wireless token network protocol (WTN) and show that …


An Improved Fec Scheme For Mobile Wireless Communication At Vehicular Speeds, Iftekhar Ahmad, Daryoush Habibi, Ziaur Rahman Jan 2008

An Improved Fec Scheme For Mobile Wireless Communication At Vehicular Speeds, Iftekhar Ahmad, Daryoush Habibi, Ziaur Rahman

Research outputs pre 2011

WiMAX has emerged as a promising wireless communication technology with potential to deliver high throughput and guaranteed quality of service to the end applications. Recent studies suggest that while WiMAX (802.16e) is capable of delivering a data rate of up to 75 Mbps for fixed wireless communications, data rate decreases drastically for mobile wireless communications, often providing a data rate less than 1 Mb/s when the mobile nodes travel at vehicular speeds. High bit error rate caused at high vehicular speeds is the key reason for low throughput. In noisy mobile communication environments, standard error control mechanisms like the transmission …


Performance Evaluation Of Ieee 802.15.4 For Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad Jan 2008

Performance Evaluation Of Ieee 802.15.4 For Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad

Research outputs pre 2011

The IEEE 802.15.4 standard medium access control (MAC) protocol for low rate wireless personal area networks (LRWPAN) is design mainly for static sensor networks and its capability to support mobile sensor networks has not yet been established. To the best knowledge of authors, this is the first paper that evaluates the suitability of IEEE 802.15.4 MAC in mobile sensor networks environment. We evaluate the performance based on node's speed and beacon order, and observe the effect on energy usage, packet delivery ratio and time required to associate with its coordinator. From the experiment we observe that the moving nodes experienced …


Improving Mobile Sensor Connectivity Time In The Ieee 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, Iftekhar Ahmad Jan 2008

Improving Mobile Sensor Connectivity Time In The Ieee 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, Iftekhar Ahmad

Research outputs pre 2011

In the IEEE 802.15.4 medium access control (MAC) protocol for wireless sensor networks, a sensor node needs to associate with a coordinator before it starts sending or receiving data. The sensor node will mostly choose the nearest coordinator to associate with. However, this method is not suitable for a constantly moving sensor node because it will end up switching coordinators too often due to short connectivity time. The IEEE 802.15.4 has a simplistic and inadequate method of choosing a coordinator in this context. In this paper, we introduce a method to increase the mobile sensor node connectivity time with its …


Sampled Fiber Gratings For High-Resolution And High-Speed Photonic Signal Processing, Mingya Shen, Kamal Alameh Jan 2007

Sampled Fiber Gratings For High-Resolution And High-Speed Photonic Signal Processing, Mingya Shen, Kamal Alameh

Research outputs pre 2011

A novel sampled grating for high-resolution, highspeed signal processing is presented. Simulation based on Sinc2 sampled and rational sampled fiber grating modeling show that a large number of sub-ps time delay steps are attainable, corresponding to a sampling frequency in excess of 1THz. Design method is described for deriving sampling functions that meet specific true-time-delay profile requirements.


Success? The Impact Of Involving Customers In E-Commerce Development, Julian Terry, Craig Standing Jan 2007

Success? The Impact Of Involving Customers In E-Commerce Development, Julian Terry, Craig Standing

Research outputs pre 2011

In e-commerce, customers have become Information System users. In this environment of non-mandatory usage, remote, untrained users need to quickly feel comfortable and satisfied with a site encounter. Throughout the literature for four decades, a commonly cited factor pertaining to system success has been user participation in the systems development process. Among other things this is likely to lead to increased user satisfaction and the perceived usefulness of the application. This study uses findings from thirty cases of recently completed e-commerce sites in which project leaders accounts of customer participation in e-commerce development activities are analysed, along with their perceptions …


Use Of The Wfg Toolkit And Pisa For Comparison Of Moeas, Lucas Bradstreet, Luigi Barone, Lyndon While, Simon Huband, Philip Hingston Jan 2007

Use Of The Wfg Toolkit And Pisa For Comparison Of Moeas, Lucas Bradstreet, Luigi Barone, Lyndon While, Simon Huband, Philip Hingston

Research outputs pre 2011

Understanding the behaviour of different optimisation algorithms is important in order to apply the best algorithm to a particular problem. The WFG toolkit was designed to aid this task for multi-objective evolutionary algorithms (MOEAs), offering an easily modifiable framework that allows practitioners the ability to test different features by "plugging" in different forms of transformations. In doing so, the WFG toolkit provides a set of problems that exhibit a variety of different characteristics. This paper presents a comparison between two state of the art MOEAs (NSGA-II and SPEA2) that exemplifies the unique capabilities of the WFG toolkit. By altering the …


Passive And Active Optical Bit-Pattern Recognition Structures For Multiwavelength Optical Packet Switching Networks, Muhsen Aljada, Kamal Alameh Jan 2007

Passive And Active Optical Bit-Pattern Recognition Structures For Multiwavelength Optical Packet Switching Networks, Muhsen Aljada, Kamal Alameh

Research outputs pre 2011

Next generation High-Speed optical packet switching networks require components capable of recognising the optical header to enable on-the-fly accurate switching of incoming data packets to their destinations. This paper experimentally demonstrates a comparison between two different optical header recognition structures; A passive structure based on the use of Fiber Bragg Gratings (FBGs), whereas the active structure employs Opto-VLSI processors that synthesise dynamic wavelength profile through digital phase holograms. The structures are experimentally demonstrated at 10Gbps. Performance comparison between the two structures is also discussed. These optical header recognition structures are attractive for multiwavelength optical network and applications.