Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (205)
- Singapore Management University (113)
- Edith Cowan University (81)
- Washington University in St. Louis (62)
- Brigham Young University (55)
-
- Regis University (51)
- University of Nebraska - Lincoln (44)
- Embry-Riddle Aeronautical University (41)
- Selected Works (40)
- University of Massachusetts Amherst (40)
- Georgia State University (37)
- Missouri University of Science and Technology (37)
- Air Force Institute of Technology (34)
- TÜBİTAK (34)
- California Polytechnic State University, San Luis Obispo (32)
- California State University, San Bernardino (25)
- New Jersey Institute of Technology (25)
- Dartmouth College (23)
- Purdue University (23)
- San Jose State University (21)
- Old Dominion University (19)
- University of Central Florida (18)
- City University of New York (CUNY) (16)
- SelectedWorks (16)
- Nova Southeastern University (13)
- University of Nebraska at Omaha (13)
- Technological University Dublin (12)
- Louisiana State University (11)
- Western University (10)
- Iowa State University (9)
- Keyword
-
- College for Professional Studies (51)
- MS Computer and Information Technology (47)
- School of Computer & Information Science (43)
- Regis University MSCIT thesis (31)
- [RSTDPub] (17)
-
- Security (16)
- Algorithms (13)
- Data mining (11)
- Privacy (11)
- Regis University MSCIT Thesis (11)
- Wireless (10)
- Computer science (9)
- Mobile computing (9)
- Information technology (8)
- Machine learning (8)
- Network (8)
- Computer Science (7)
- Ontology (7)
- School of Computer and Information Sciences (7)
- Services Computing (7)
- Algorithm (6)
- Database (6)
- Database design (6)
- Engineering (6)
- Fuzzy logic (6)
- Internet (6)
- Semantics (6)
- Simulation (6)
- #antcenter (5)
- 3-D shape measurement (5)
- Publication
-
- Computer Science & Engineering Syllabi (156)
- Research Collection School Of Computing and Information Systems (112)
- Theses and Dissertations (71)
- All Computer Science and Engineering Research (62)
- Regis University Student Publications (comprehensive collection) (51)
-
- Turkish Journal of Electrical Engineering and Computer Sciences (34)
- Journal of Digital Forensics, Security and Law (31)
- Kno.e.sis Publications (29)
- Computer Science and Software Engineering (26)
- Faculty Publications (25)
- Theses Digitization Project (25)
- Computer Science Theses (24)
- Australian Information Security Management Conference (23)
- Electronic Theses and Dissertations (23)
- Department of Computer Science Technical Reports (22)
- Computer Science Technical Reports (20)
- Computer Science Department Faculty Publication Series (19)
- Computer Science Faculty Research & Creative Works (19)
- Master's Projects (19)
- CSE Conference and Workshop Papers (18)
- Andrew McCallum (17)
- Australian Digital Forensics Conference (17)
- Australian Information Warfare and Security Conference (17)
- Computer Science Faculty Publications (17)
- Research outputs pre 2011 (17)
- Dissertations (16)
- Theses (15)
- CSE Technical Reports (14)
- CCE Theses and Dissertations (13)
- Electrical and Computer Engineering Faculty Research & Creative Works (13)
- Publication Type
- File Type
Articles 1 - 30 of 1336
Full-Text Articles in Physical Sciences and Mathematics
Itr/Im: Enabling The Creation And Use Of Geogrids For Next Generation Geospatial Information, Peggy Agouris, Mary-Kate Beard-Tisdale, Chaitanya Baru, Sarah Nusser
Itr/Im: Enabling The Creation And Use Of Geogrids For Next Generation Geospatial Information, Peggy Agouris, Mary-Kate Beard-Tisdale, Chaitanya Baru, Sarah Nusser
University of Maine Office of Research Administration: Grant Reports
The objective of this project is to advance science in information management, focusing in particular on geospatial information. It addresses the development of concepts, algorithms, and system architectures to enable users on a grid to query, analyze, and contribute to multivariate, quality-aware geospatial information. The approach consists of three complementary research areas: (1) establishing a statistical framework for assessing geospatial data quality; (2) developing uncertainty-based query processing capabilities; and (3) supporting the development of space- and accuracy-aware adaptive systems for geospatial datasets. The results of this project will support the extension of the concept of the computational grid to facilitate …
Screencrayons: Using Screen Captures For Annotation And Research, Trent Alan Taufer
Screencrayons: Using Screen Captures For Annotation And Research, Trent Alan Taufer
Theses and Dissertations
In a world full of digital information we should be able to easily collect, organize, annotate, and leverage information from many different sources. This should be easy to do and not interrupt our normal workflow. A system to support information collection and organization should be user-friendly and as unobtrusive as possible, while still allowing for flexible and intelligent annotation. It should also be able to leverage the inherent information content of a collection of annotated information. We present a system that will demonstrate how these ideas can come together to make information collection easier and more productive. The system facilitates …
High-Resolution, Real-Time Three-Dimensional Shape Measurement, Song Zhang, Peisen S. Huang
High-Resolution, Real-Time Three-Dimensional Shape Measurement, Song Zhang, Peisen S. Huang
Song Zhang
We describe a high-resolution, real-time 3-D shape measurement system based on a digital fringe projection and phase-shifting technique. It utilizes a single-chip digital light processing projector to project computer-generated fringe patterns onto the object, and a high-speed CCD camera synchronized with the projector to acquire the fringe images at a frame rate of 120frames∕s. A color CCD camera is also used to capture images for texture mapping. Based on a three-step phase-shifting technique, each frame of the 3-D shape is reconstructed using three consecutive fringe images. Therefore the 3-D data acquisition speed of the system is 40frames∕s. With this system, …
Realizing Privacy-Preserving Features In Hippocratic Databases, Yasin Laura-Silva, Walid G. Aref
Realizing Privacy-Preserving Features In Hippocratic Databases, Yasin Laura-Silva, Walid G. Aref
Department of Computer Science Technical Reports
No abstract provided.
Managing Product Line Asset Bases, John Hunt
Managing Product Line Asset Bases, John Hunt
All Dissertations
Product lines are predicated on collecting assets common to the desired product portfolio, commonly known as the asset base. For many product lines, the size of asset base has become large enough to create a variety of difficulties. The techniques for managing large product line asset bases are unaddressed in the literature.
This research presents new techniques that take advantage of asset base characteristics, unavailable in more general collections, to both reduce the number of assets and to organize the asset base that go beyond what is possible with other software collections. The result is an asset base that is …
Analysis Of Near-Infrared Phase Effects On Biometric Iris Data, Brady Roos Stevenson
Analysis Of Near-Infrared Phase Effects On Biometric Iris Data, Brady Roos Stevenson
Theses and Dissertations
The purpose of this research is to ascertain potential iris scan data variations from near infrared waves derived from fluorescent illumination. Prior studies of iris data variances from infrared wave interference of halogen, incandescent, and sunlight with iris cameras suggest that similar changes may exist under near infrared wavelengths from fluorescent light. The concern is that the fluorescent energy emission may interfere with the near infrared detection of an iris camera. An iris camera is used to measure human eye characteristics known as biometrics. If such infrared emission is statistically significant, then it can alter the validity of the iris …
Structure Learning Of A Behavior Network For Context Dependent Adaptability, Ou Li
Structure Learning Of A Behavior Network For Context Dependent Adaptability, Ou Li
Computer Science Theses
One mechanism for an intelligent agent to adapt to substantial environmental changes is to change its decision making structure. Pervious work in this area has developed a context-dependent behavior selection architecture that uses structure change, i.e., changing the mutual inhibition structures of a behavior network, as the main mechanism to generate different behavior patterns according to different behavioral contexts. Given the important of network structure, this work investigates how the structure of a behavior network can be learned. We developed a structure learning method based on generic algorithm and applied it to a model crayfish that needs to survive in …
Qos Multimedia Multicast Routing: A Component Based Primal Dual Approach, Faheem Akhtar Hussain
Qos Multimedia Multicast Routing: A Component Based Primal Dual Approach, Faheem Akhtar Hussain
Computer Science Theses
The QoS Steiner Tree Problem asks for the most cost efficient way to multicast multimedia to a heterogeneous collection of users with different data consumption rates. We assume that the cost of using a link is not constant but rather depends on the maximum bandwidth routed through the link. Formally, given a graph with costs on the edges, a source node and a set of terminal nodes, each one with a bandwidth requirement, the goal is to find a Steiner tree containing the source, and the cheapest assignment of bandwidth to each of its edges so that each source-to-terminal path …
Outsourcing: The Security Risk Management Challenge, Carl Colwill
Outsourcing: The Security Risk Management Challenge, Carl Colwill
Australian Information Security Management Conference
The globalisation of business and the growth of the digital networked economy means that virtually any business process can be undertaken by someone else, somewhere in the world. To achieve business transformation within the UK Information and Communication Technology (ICT) sector, BT is taking a strategic approach to outsourcing: this has resulted in a rapid and substantial increase in the outsourcing and offshoring of ICT development, maintenance and support contracts. Each and every outsourcing decision could have major security, legal, regulatory and contractual impacts. It is generally recognised that risks are likely to be compounded when outsourcing to companies based …
Information Security Management And Virtual Collaboration: A Western Australian Perspective, Rosanna Fanciulli
Information Security Management And Virtual Collaboration: A Western Australian Perspective, Rosanna Fanciulli
Australian Information Security Management Conference
This paper presents an ongoing case study into stakeholder perceptions regarding information security management systems in emergent organisations operating in Western Australia. It takes a socio-political perspective on the problem of how to manage simultaneously virtual collaboration and information security management. A literature review introduces the context and history of the research. In light of this, it is proposed that social and political issues need to be researched and addressed before many of the existing technological strategies for information security will succeed. The research project is then outlined and the design and preliminary results presented. The results point to a …
Social Engineering And Its Impact Via The Internet, Matthew J. Warren, Shona Leitch
Social Engineering And Its Impact Via The Internet, Matthew J. Warren, Shona Leitch
Australian Information Security Management Conference
Historically social engineering attacks were limited upon a single organisation or single individual at a time. The impact of the Internet and growth of E-Business has allowed social engineering techniques to be applied at a global level. The paper will discuss how new social engineering techniques are being applied and puts forward a conceptual model to allow an understanding of how social engineering attacks are planned and implemented against E-Business activities.
Secure Transmission Of Shared Electronic Health Records: A Review, Rachel J. Mahncke, Patricia A. Williams
Secure Transmission Of Shared Electronic Health Records: A Review, Rachel J. Mahncke, Patricia A. Williams
Australian Information Security Management Conference
Paperbased health records together with electronic Patient Management Systems remain the norm for hospitals and primary care practices to manage patient health information in Australia. Although the benefits of recording patient health information into an electronic format known as an electronic health record (EHR) are well documented, the use of these systems has not yet been fully realised. The next advancement for EHRs is the ability to share health records for the primary purpose of improved patient care. This may for example enable a primary care physician, with the patient’s consent, to electronically share pertinent health information with a specialist, …
Toward A Heuristic Model For Evaluating The Complexity Of Computer Security Visualization Interface, Hsiu-Chung Wang
Toward A Heuristic Model For Evaluating The Complexity Of Computer Security Visualization Interface, Hsiu-Chung Wang
Computer Science Theses
Computer security visualization has gained much attention in the research community in the past few years. However, the advancement in security visualization research has been hampered by the lack of standardization in visualization design, centralized datasets, and evaluation methods. We propose a new heuristic model for evaluating the complexity of computer security visualizations. This complexity evaluation method is designed to evaluate the efficiency of performing visual search in security visualizations in terms of measuring critical memory capacity load needed to perform such tasks. Our method is based on research in cognitive psychology along with characteristics found in a majority of …
Uncontrollable Privacy - The Right That Every Attacker Desires, Giannakis Antoniou, Stefanos Gritzalis
Uncontrollable Privacy - The Right That Every Attacker Desires, Giannakis Antoniou, Stefanos Gritzalis
Australian Information Security Management Conference
The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs). Among the Internet users, there are attackers who desire more than anything else to enjoy privacy during their malicious actions, and a PET is what they were looking for. Thus, although a PET should offer privacy to the internet users, proper techniques should also be employed in order to help the victims during the investigation procedure and unveil the identification of the attackers. The paper summarizes the current design …
A Knowledge Framework For Information Security Modeling, Shuangyan Liu, Ching-Hang Cheung, Lam-For Kwok
A Knowledge Framework For Information Security Modeling, Shuangyan Liu, Ching-Hang Cheung, Lam-For Kwok
Australian Information Security Management Conference
The data collection process for risk assessment highly depends on the security experience of security staffs of an organization. It is difficult to have the right information security staff, who understands both the security requirements and the current security state of an organization and at the same time possesses the skill to perform risk assessment. However, a well defined knowledge model could help to describe categories of knowledge required to guide the data collection process. In this paper, a knowledge framework is introduced, which includes a knowledge model to define the data skeleton of the risk environment of an organization …
The Derivation Of A Conceptual Model For It Security Outsourcing, W D. Wilde, M J. Warren, W Hutchinson
The Derivation Of A Conceptual Model For It Security Outsourcing, W D. Wilde, M J. Warren, W Hutchinson
Australian Information Security Management Conference
IT security outsourcing is the establishment of a contractual relationship between an organization with an outside vendor which assumes responsibility for the organisation’s security functions. Outsourcing in IS has had a variable history of success and the complexity of the decision making process leads to a substantial degree of uncertainty. This is especially so in the realm of IS security since the protection of both hardware and software systems is placed in the hands of an external provider. This paper is a fuller and more comprehensive paper of a previous paper outlining the effectiveness of the decision making process by …
Cyber Crime And Biometric Authentication – The Problem Of Privacy Versus Protection Of Business Assets, Michael G. Crowley
Cyber Crime And Biometric Authentication – The Problem Of Privacy Versus Protection Of Business Assets, Michael G. Crowley
Australian Information Security Management Conference
Cyber crime is now a well recognised international problem that is a major issue for anyone who runs, manages, owns, uses or accesses computer systems linked to the worldwide web. Computer systems are business assets. Personal biometric information is also an asset. Studies have shown that privacy concerns represent a key hurdle to the successful introduction of biometric authentication. In addition, terrorist activity and the resultant legislation have added an additional risk factor businesses need to take into account if they propose using biometric authentication technology. This paper explores the use of biometric authentication to protect business and individual assets. …
The Implementation Of E-Mail Content Management In A Large Corporation, Michael Hansen, Craig Valli
The Implementation Of E-Mail Content Management In A Large Corporation, Michael Hansen, Craig Valli
Australian Information Security Management Conference
It is a well known fact that while Email is a valuable tool to any business that it has also become the main cause in the distribution of viruses, worms and other malware. Further to this is the real threat of spyware that can affect performance on computers, phishing schemes that can cheat employees into giving up valuable information, such as passwords, using social engineering and the timeconsuming and costly effect of spam to a corporate network. This paper will analyse and show the effect of a successful implementation of Email filtering software in a large corporation, together with some …
Qos Issues Of Using Probabilistic Non-Repudiation Protocol In Mobile Ad Hoc Network Environment, Yi-Chi Lin, Jill Slay
Qos Issues Of Using Probabilistic Non-Repudiation Protocol In Mobile Ad Hoc Network Environment, Yi-Chi Lin, Jill Slay
Australian Information Security Management Conference
So as to guarantee the fairness of electronic transactions, users may require a NonRepudiation (NR) service in any type of network. However, most existing NR protocols cannot work properly in a Mobile Ad hoc Network (MANET) due to their characteristics (e.g. limited resources and lack of central authority). The design of the Probabilistic NonRepudiation Protocol (PNRP) is comparatively suitable for the nature of a MANET, but it still poses some QoS issues. This article points out the QoS issues which are caused by using PNRP in a MANET environment. These issues explain the difficult of performing PNRP in such an …
Does Your Wireless Lan Have Criminal Intent?, Michael Crowley, Andrew Woodward
Does Your Wireless Lan Have Criminal Intent?, Michael Crowley, Andrew Woodward
Australian Information Security Management Conference
All of the literature relating to wireless network security has focused on the flaws, newer alternatives and suggestions for securing the network. There is much speculation and anecdotal statements in relation to what can happen if a breach occurs, but this is mostly from a computer security perspective, and mostly expressed in terms of potential for financial loss. This paper examines the potential legal ramifications of failing to properly secure a wireless network. Several scenarios are examined within based on usage of wireless on the various category of attack. Legal opinion, backed up with case law, is provided for each …
The Information Security Ownership Question In Iso/Iec 27001 – An Implementation, Lizzie Coles-Kemp, Richard E. Overill
The Information Security Ownership Question In Iso/Iec 27001 – An Implementation, Lizzie Coles-Kemp, Richard E. Overill
Australian Information Security Management Conference
The information security management standard ISO/IEC 27001 is built on the notion that information security is driven by risk assessment and risk treatment. Fundamental to the success of risk assessment and treatment is the decision making process that takes risk assessment output and assigns decisions to this output in terms of risk treatment actions. It is argued that the effectiveness of the management system lies in its ability to make effective, easytoimplement and measurable decisions. One of the key issues in decision making is ownership. In this paper two aspects of information security ownership are considered: ownership of the asset …
The Lazarus Effect: Resurrecting Killed Rfid Tags, Christopher Bolan
The Lazarus Effect: Resurrecting Killed Rfid Tags, Christopher Bolan
Australian Information Security Management Conference
Several RFID Standards allow RFID Tags to be ‘killed’ using a specialised command code. ‘Killed’ RFID Tags should be irrevocably deactivated. In actuality, when a valid kill command is sent to a tag four sections of the tags management data are zeroed causing the tag to enter a ‘fault state’ and thus be ignored by RFID readers. Through the reinitialisation of these four sections to valid values it was discovered that a tag could be resurrected and function normally.
Network Forensics And Privacy Enhancing Technologies “Living” Together In Harmony, Giannakis Antoniou, Stefanos Gritzalis
Network Forensics And Privacy Enhancing Technologies “Living” Together In Harmony, Giannakis Antoniou, Stefanos Gritzalis
Australian Information Security Management Conference
Privacy Enhancing Technology (PET) is the technology responsible to hide the identification of Internet users, whereas network forensics is a technology responsible to reveal the identification of Internet users who perform illegal actions through the Internet. The paper identifies the collision of these opposite-goal technologies and describes what happens in case they come across. Can a Network Forensics protocol discover the identification of an Internet user who is trying to be anonymous behind a PET? The paper also proposes a way to bridge and eliminate the gap between these two technologies.
Electronic Surveillance In Hospitals: A Review, Sue Kennedy
Electronic Surveillance In Hospitals: A Review, Sue Kennedy
Australian Information Security Management Conference
This paper focuses on the increasing use of electronic surveillance systems in hospitals and the apparent lack of awareness of the implications of these systems for privacy of the individual. The systems are used for identification and tracking of equipment, staff and patients. There has been little public comment or analysis of these systems with regard to privacy as their implementation has been driven by security issues. The systems that gather this information include video, smart card and more recently RFID systems. The system applications include tracking of vital equipment, labelling of blood and other samples, tracking of patients, new …
Individuals’ Perceptions Of Wireless Security In The Home Environment, Patryk Szewczyk
Individuals’ Perceptions Of Wireless Security In The Home Environment, Patryk Szewczyk
Australian Information Security Management Conference
Research in 802.11 wireless networking has in the past focused predominantly on corporate wireless network use, or identifying the flaws in wireless security. This study was aimed to determine the individuals’ perceptions of wireless security in the home environment. 163 volunteers completed a survey on their perceptions, knowledge, experiences and attitudes towards wireless networking. The results of the survey indicated that there is little difference in knowledge between those who had worked in the IT industry, and those who did not. The sources of information used to configure wireless networks are not improving the knowledge respondents had on wireless security. …
Making Research Real: Is Action Research A Suitable Methodology For Medical Information Security Investigations?, Patricia A. Williams
Making Research Real: Is Action Research A Suitable Methodology For Medical Information Security Investigations?, Patricia A. Williams
Australian Information Security Management Conference
In the medical field, information security is an important yet vastly underrated issue. Research into the protection of sensitive medical data is often technically focused and does not address information systems and behavioural aspects integral to effective information security implementation. Current information security policy and guidelines are strategically oriented which, whilst relevant to large organisations, are less supportive to smaller enterprises such as primary care practices. Further, the conservative nature of the medical profession has been shown to hinder investigation into information technology use and management, making effective improvement based on research problematical. It is an environment which relies greatly …
Managing Information Security Complexity, Murray Brand
Managing Information Security Complexity, Murray Brand
Australian Information Security Management Conference
This paper examines using a requirements management tool as a common thread to managing the complexity of information security systems. Requirements management provides a mechanism to trace requirements through to design, implementation, operating, monitoring, reviewing, testing, and reporting by creating links to associated, critical artefacts. This is instrumental in managing complex and dynamic systems where change can impact other subsystems and associated documentation. It helps to identify the affected artefacts through many layers. Benefits to this approach would include better project planning and management, improved risk management, superior change management, ease of reuse, enhanced quality control and more effective acceptance …