Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 3D maps (1)
- 802.11 (1)
- Artificial Neural Networks. (1)
- Biometrics (1)
- Botnets (1)
-
- CA (1)
- Data Fusion Paradigms (1)
- Data FusionLevels (1)
- Detection (1)
- Electoral manipulation (1)
- Fake microblogging (1)
- Fake personas (1)
- Fingerprint Recognition (1)
- Keystroke Dynamics (1)
- Meat‐puppets (1)
- Multi‐Modal Biometrics (1)
- Multi‐Sensor Data Fusion (1)
- Privacy (1)
- Pseudo‐random sequence (1)
- RC4 keystream (1)
- Security (1)
- Slacktivism (1)
- Social media (1)
- Sock puppets (1)
- Stream cipher (1)
- Twitter (1)
- UAV (1)
- Unmanned Aerial Vehicles (1)
- Wireless (1)
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
3d Visual Method Of Variant Logic Construction For Random Sequence, Huan Wang, Jeffrey Zheng
3d Visual Method Of Variant Logic Construction For Random Sequence, Huan Wang, Jeffrey Zheng
Australian Information Warfare and Security Conference
As Internet security threats continue to evolve, in order to ensure information transmission security, various encrypt and decrypt has been used in channel coding and decoding of data communication. While cryptography requires a very high degree of apparent randomness, Random sequences play an important role in cryptography. Both CA (Cellular Automata) and RC4 contain pseudo‐random number generators and may have intrinsic properties respectively. In this paper, a 3D visualization model (3DVM) is proposed to display spatial characteristics of the random sequences from CA or RC4 keystream. Key components of this model and core mechanism are described. Every module and their …
The Influence And Deception Of Twitter: The Authenticity Of The Narrative And Slacktivism In The Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, David M. Cook
The Influence And Deception Of Twitter: The Authenticity Of The Narrative And Slacktivism In The Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, David M. Cook
Australian Information Warfare and Security Conference
It is uncertain how many discreet users occupy the social media community. Fake tweets, sock puppets, force‐multipliers and botnets have become embedded within the fabric of new media in sufficient numbers that social media support by means of quantity is no longer a reliable metric for determining authority and influence within openly expressed issues and causes. Election campaigns, and their associated political agendas, can now be influenced by non‐specific virtual presences that cajole and redirect opinions without declaring identity or allegiance. In the lead up to the 2013 Australian Federal Election, the open source Twitter activity for the two major …
Complementary Feature Level Data Fusion For Biometric Authentication Using Neural Networks, Mark Abernethy, Shri Rai
Complementary Feature Level Data Fusion For Biometric Authentication Using Neural Networks, Mark Abernethy, Shri Rai
Australian Information Warfare and Security Conference
Data fusion as a formal research area is referred to as multi‐sensor data fusion. The premise is that combined data from multiple sources can provide more meaningful, accurate and reliable information than that provided by data from a single source. There are many application areas in military and security as well as civilian domains. Multi‐sensor data fusion as applied to biometric authentication is termed multi‐modal biometrics. Though based on similar premises, and having many similarities to formal data fusion, multi‐modal biometrics has some differences in relation to data fusion levels. The objective of the current study was to apply feature …
Towards Detection And Control Of Civilian Unmanned Aerial Vehicles, Matthew Peacock, Michael N. Johnstone
Towards Detection And Control Of Civilian Unmanned Aerial Vehicles, Matthew Peacock, Michael N. Johnstone
Australian Information Warfare and Security Conference
Considering the significant number of non‐military unmanned aerial vehicles (UAVs) that can be purchased to operate in unregulated air space and the range of such devices, the potential for security and privacy problems to arise is significant. This can lead to consequent harm for critical infrastructure in the event of these UAVs being used for criminal or terrorist purposes. Further, if these devices are not being detected, there is a privacy problem to be addressed as well. In this paper we test a specific UAV, the Parrot AR Drone version 2, and present a forensic analysis of tests used to …