Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Ballistics system (1)
- Biometrics (1)
- Body sensor networks (1)
- Cryptographic primitives (1)
- Data leakage (1)
-
- Data licencing (1)
- Data management (1)
- Data privacy (1)
- Data storage (1)
- Data visualisation (1)
- De facto standard (1)
- Digital forensic (1)
- Digital forensics (1)
- Electromyography (1)
- Electronic crime countermeasures (1)
- Electronic evidences (1)
- Energy capability (1)
- Energy resources (1)
- Energy security (1)
- Feature vectors (1)
- Ffirearm identification (1)
- Generation algorithm (1)
- Grille cipher (1)
- Guilty identification (1)
- Image processing (1)
- Information services (1)
- Information use (1)
- Internal systems (1)
- Malware (1)
- Medical computing (1)
Articles 1 - 5 of 5
Full-Text Articles in Engineering
Muscle Activity-Driven Green-Oriented Random Number Generation Mechanism To Secure Wbsn Wearable Device Communications, Yuanlong Cao, Guanghe Zhang, Fanghua Liu, Ilsun You, Guanglou Zheng, Oluwarotimi W. Samuel, Shixiong Chen
Muscle Activity-Driven Green-Oriented Random Number Generation Mechanism To Secure Wbsn Wearable Device Communications, Yuanlong Cao, Guanghe Zhang, Fanghua Liu, Ilsun You, Guanglou Zheng, Oluwarotimi W. Samuel, Shixiong Chen
Research outputs 2014 to 2021
Wireless body sensor networks (WBSNs) mostly consist of low-cost sensor nodes and implanted devices which generally have extremely limited capability of computations and energy capabilities. Hence, traditional security protocols and privacy enhancing technologies are not applicable to the WBSNs since their computations and cryptographic primitives are normally exceedingly complicated. Nowadays, mobile wearable and wireless muscle-computer interfaces have been integrated with the WBSN sensors for various applications such as rehabilitation, sports, entertainment, and healthcare. In this paper, we propose MGRNG, a novel muscle activity-driven green-oriented random number generation mechanism which uses the human muscle activity as green energy resource to generate …
Proactive Biometric-Enabled Forensic Imprinting, Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven M. Furnell
Proactive Biometric-Enabled Forensic Imprinting, Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven M. Furnell
Research outputs 2014 to 2021
Threats to enterprises have become widespread in the last decade. A major source of such threats originates from insiders who have legitimate access to the organization's internal systems and databases. Therefore, preventing or responding to such incidents has become a challenging task. Digital forensics has grown into a de-facto standard in the examination of electronic evidence; however, a key barrier is often being able to associate an individual to the stolen data. Stolen credentials and the Trojan defense are two commonly cited arguments used. This paper proposes a model that can more inextricably links the use of information (e.g. images, …
The Social Life Of Big Data - Pawsey Resources, Luke Edwards
The Social Life Of Big Data - Pawsey Resources, Luke Edwards
The Social Life of Big Data Symposium
The presentation covers the supercomputing facilities and services available at the Pawsey Supercomputing Centre, Western Australia.
The Pawsey Supercomputing Centre is an unincorporated joint venture between CSIRO, Curtin University, Edith Cowan University, Murdoch University and the University of Western Australia and is supported by the Western Australian Government.
Energy Security: An Australian Nuclear Power Industry, Geoff I. Swan
Energy Security: An Australian Nuclear Power Industry, Geoff I. Swan
Australian Security and Intelligence Conference
Climate change and energy security are driving a worldwide renaissance in nuclear power. An Australian nuclear power industry has also been seriously investigated by the Australian government and its agencies. This paper provides a broad overview of the nuclear fuel cycle and the nuclear power industry. It identifies aspects that are sensitive to nuclear terrorism and nuclear weapons proliferation to help security professionals identify threats and prepare for a possible Australian nuclear power industry.
Firearm Forensics Based On Ballistics Cartridge Case Image Segmentation Using Colour Invariants, Dongguang Li
Firearm Forensics Based On Ballistics Cartridge Case Image Segmentation Using Colour Invariants, Dongguang Li
Australian Security and Intelligence Conference
Ballistics firearm identification based on image processing is of paramount importance in criminal investigation. The efficiency of traditional ballistics imaging system is heavily dependent upon the expertise and experience of end-user. An intelligent ballistics imaging system is highly demanded to address this issues. The segmentation of cartridge case object from the original image is a key step to subsequent process. It is very difficult to segment cartridge case from the original image using traditional threshold based methods due to the shadows or unlimited environments to acquire image. In this paper, we proposed a novel approach based upon the colour invariant …