Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Design Requirements For Generating Deceptive Content To Protect Document Repositories, Ben Whitham Jan 2014

Design Requirements For Generating Deceptive Content To Protect Document Repositories, Ben Whitham

Australian Information Warfare and Security Conference

For nearly 30 years, fake digital documents have been used to identify external intruders and malicious insider threats. Unfortunately, while fake files hold potential to assist in data theft detection, there is little evidence of their application outside of niche organisations and academic institutions. The barrier to wider adoption appears to be the difficulty in constructing deceptive content. The current generation of solutions principally: (1) use unrealistic random data; (2) output heavily formatted or specialised content, that is difficult to apply to other environments; (3) require users to manually build the content, which is not scalable, or (4) employ an …


Securing The Internet Of Things Infrastructure – Standards And Techniques, Zubair A. Baig Jan 2014

Securing The Internet Of Things Infrastructure – Standards And Techniques, Zubair A. Baig

Australian Information Security Management Conference

The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards …


12th Australian Information Security Management Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University Jan 2014

12th Australian Information Security Management Conference, 2014, Edith Cowan University: Conference Details, Security Research Institute, Edith Cowan University

Australian Information Security Management Conference

No abstract provided.