Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

3d Visual Method Of Variant Logic Construction For Random Sequence, Huan Wang, Jeffrey Zheng Dec 2013

3d Visual Method Of Variant Logic Construction For Random Sequence, Huan Wang, Jeffrey Zheng

Australian Information Warfare and Security Conference

As Internet security threats continue to evolve, in order to ensure information transmission security, various encrypt and decrypt has been used in channel coding and decoding of data communication. While cryptography requires a very high degree of apparent randomness, Random sequences play an important role in cryptography. Both CA (Cellular Automata) and RC4 contain pseudo‐random number generators and may have intrinsic properties respectively. In this paper, a 3D visualization model (3DVM) is proposed to display spatial characteristics of the random sequences from CA or RC4 keystream. Key components of this model and core mechanism are described. Every module and their …


The Influence And Deception Of Twitter: The Authenticity Of The Narrative And Slacktivism In The Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, David M. Cook Dec 2013

The Influence And Deception Of Twitter: The Authenticity Of The Narrative And Slacktivism In The Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, David M. Cook

Australian Information Warfare and Security Conference

It is uncertain how many discreet users occupy the social media community. Fake tweets, sock puppets, force‐multipliers and botnets have become embedded within the fabric of new media in sufficient numbers that social media support by means of quantity is no longer a reliable metric for determining authority and influence within openly expressed issues and causes. Election campaigns, and their associated political agendas, can now be influenced by non‐specific virtual presences that cajole and redirect opinions without declaring identity or allegiance. In the lead up to the 2013 Australian Federal Election, the open source Twitter activity for the two major …


Complementary Feature Level Data Fusion For Biometric Authentication Using Neural Networks, Mark Abernethy, Shri Rai Dec 2013

Complementary Feature Level Data Fusion For Biometric Authentication Using Neural Networks, Mark Abernethy, Shri Rai

Australian Information Warfare and Security Conference

Data fusion as a formal research area is referred to as multi‐sensor data fusion. The premise is that combined data from multiple sources can provide more meaningful, accurate and reliable information than that provided by data from a single source. There are many application areas in military and security as well as civilian domains. Multi‐sensor data fusion as applied to biometric authentication is termed multi‐modal biometrics. Though based on similar premises, and having many similarities to formal data fusion, multi‐modal biometrics has some differences in relation to data fusion levels. The objective of the current study was to apply feature …


Towards Detection And Control Of Civilian Unmanned Aerial Vehicles, Matthew Peacock, Michael N. Johnstone Dec 2013

Towards Detection And Control Of Civilian Unmanned Aerial Vehicles, Matthew Peacock, Michael N. Johnstone

Australian Information Warfare and Security Conference

Considering the significant number of non‐military unmanned aerial vehicles (UAVs) that can be purchased to operate in unregulated air space and the range of such devices, the potential for security and privacy problems to arise is significant. This can lead to consequent harm for critical infrastructure in the event of these UAVs being used for criminal or terrorist purposes. Further, if these devices are not being detected, there is a privacy problem to be addressed as well. In this paper we test a specific UAV, the Parrot AR Drone version 2, and present a forensic analysis of tests used to …