Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Physical Sciences and Mathematics

The Insider Threat To Medical Records: Has The Network Age Changed Anything?, Craig Valli Jan 2006

The Insider Threat To Medical Records: Has The Network Age Changed Anything?, Craig Valli

Research outputs pre 2011

There is increasing pressure on medical practices to use digital information systems for storage of patient data. Some consideration is given to protecting these systems from a external or “ hacker” focus. This paper looks at the issue that the increasing use of digital information systems has for insider malfeasance.


Establishing A Vendor Neutral Skills Based Framework For Digital Forensics Curriculum Development And Competence Assessment, Craig Valli Jan 2006

Establishing A Vendor Neutral Skills Based Framework For Digital Forensics Curriculum Development And Competence Assessment, Craig Valli

Research outputs pre 2011

This paper outlines an approach being undertaken between ECU and the Australian Electronic Evidence Special Advisory Group (EESAG) in the production of vendor neutral skills matrix for developing curriculum and evaluating competence. The framework is constructed using Blooms Taxonomy of Learning. This is a work in progress paper and covers the inital stages of the development


Clustering Spatial Data For Join Operations Using Match-Based Partition, Jitian Xiao Jan 2006

Clustering Spatial Data For Join Operations Using Match-Based Partition, Jitian Xiao

Research outputs pre 2011

The spatial join is an operation that combines two sets of spatial data by their spatial relationships. The cost of spatial join could be very high due to the large sizes of spatial objects and the computation-intensive spatial operations. In spatial join processing, a common method to minimize the I/O cost is to partition the spatial objects into clusters and then schedule the processing of the clusters such that the number of times the same objects to be fetched into memory can be minimized. In this paper, we propose a match-based approach to partition a large spatial data set into …


Use Of Bootable Linux Cds For The Delivery Of Educational Course Content, Craig Valli Jan 2006

Use Of Bootable Linux Cds For The Delivery Of Educational Course Content, Craig Valli

Research outputs pre 2011

This paper outlines the processes involved in creating and using bootable Linux/Knoppix compact discs (CDs) as a means of delivering course content to students. An outline of experiences in using these CDs to deliver courses in totally on-line mode is also given.


A Faster Algorithm For Calculating Hypervolume, Lyndon While, Philip Hingston, Luigi Barone, Simon Huband Jan 2006

A Faster Algorithm For Calculating Hypervolume, Lyndon While, Philip Hingston, Luigi Barone, Simon Huband

Research outputs pre 2011

We present an algorithm for calculating hypervolume exactly, the Hypervolume by Slicing Objectives (HSO) algorithm, that is faster than any that has previously been published. HSO processes objectives instead of points, an idea that has been considered before but that has never been properly evaluated in the literature. We show that both previously studied exact hypervolume algorithms are exponential in at least the number of objectives and that although HSO is also exponential in the number of objectives in the worst case, it runs in significantly less time, i.e., two to three orders of magnitude less for randomly generated and …


An Approach To Resolve Data Model Heterogeneities In Multiple Data Sources, Chaiyaporn Chirathamjaree Jan 2006

An Approach To Resolve Data Model Heterogeneities In Multiple Data Sources, Chaiyaporn Chirathamjaree

Research outputs pre 2011

To gain a competitive advantage, it is imperative for executives to be able to obtain one unique view of information, normally scattered across disparate data sources, in an accurate and timely manner. To interoperate data sources which differ structurally and semantically, particular problems occur, for example, problems of changing schema in data sources affect the integrated schema. This paper presents an approach to resolve data model heterogeneities in databases and legacy systems through mediation and wrapping techniques. The system is well supported by the mediated data model (MDM), a semantically-rich data model which can describe and represent heterogeneous data schematically …


Agent-Based Similarity-Aware Web Document Pre-Fetching, Jitian Xiao Jan 2006

Agent-Based Similarity-Aware Web Document Pre-Fetching, Jitian Xiao

Research outputs pre 2011

This paper presents an agent-based similarity-aware Web document pre-fetching scheme that is built on the similarity-aware Web caching architecture. A set of agents are employed to carry out certain duties such as document similarity detection, identification of relevant access patterns, document prediction and network traffic monitoring for document pre-fetching. Preliminary simulations have been conducted to evaluate the proposed scheme, and the results have shown that the new pre-fetching scheme outperforms existing Web-document pre-fetching algorithms


Developing Recordkeeping: Australians Working Together, Karen Anderson Jan 2006

Developing Recordkeeping: Australians Working Together, Karen Anderson

Research outputs pre 2011

Australia has nine governments, each with their own archives and records legislation. This multiplicity of jurisdictions has the potential for generating divergence and incompatibility of standards. However, the Australian recordkeeping community works together with the result that consistent, complementary standards are not only customised to local legislative requirements and situations, but will in future ensure interoperability and ease of transfer of records wherever necessary. Australian recordkeeping professionals have a sound history of working together. The Implementation Guidelines for the current International standard for records management, /SO15489.2-2001, were adopted and adapted from those in an earlier Australian Standard for records management, …


Fixture-Scheduling For The Australian Football League Using A Multi-Objective Evolutionary Algorithm, Luigi Barone, Lyndon While, Paul Hughes, Philip Hingston Jan 2006

Fixture-Scheduling For The Australian Football League Using A Multi-Objective Evolutionary Algorithm, Luigi Barone, Lyndon While, Paul Hughes, Philip Hingston

Research outputs pre 2011

AFL football is a team sport that entertains millions and contributes a huge amount of money to the Australian economy. Scheduling games in the AFL is difficult, as a number of different, often conflicting, factors must be considered. In this paper, we propose the use of a multi-objective evolutionary algorithm for determining such a schedule. We detail the technical details needed to apply a multi-objective evolutionary algorithm to this problem and report on experiments that show the effectiveness of this approach. Comparison with actual schedules used in the AFL demonstrates that this approach could make a useful contribution.


A Preliminary Investigation Into Malware Propagation On Australian Isp Networks Using The Mwcollect Malware Collector Daemon, Craig Valli Jan 2006

A Preliminary Investigation Into Malware Propagation On Australian Isp Networks Using The Mwcollect Malware Collector Daemon, Craig Valli

Research outputs pre 2011

This paper describes an initial investigation into the propagation of malicious software (malware) that allows for remote command and control of Internet connected machines using the Windows platform in the Australian ISP address space. The research as conducted utilised the mwcollect daemon which is a low interaction honeypot on the Linux platform, to collect the details about the activity. The program mwcollect works by emulation of vulnerable services on the target platform in this case Windows based computers. There were two collectors within the pilot collection system. The machines were running no other Internet services such as http or mail, …


Sql Injection - Threats To Medical Systems: The Issues And Countermeasures, Craig Valli Jan 2006

Sql Injection - Threats To Medical Systems: The Issues And Countermeasures, Craig Valli

Research outputs pre 2011

A vast majority of medical information systems use Standard Query Language databases (SQL) as the underlying technology to deliver medical records in a timely and efficient manner. SQL is a standardised and well entrenched database technology, which allows for the development of robust, customised applications for information management. In recent years, SQL has been used as the back-end to many successful web client accessible applications. The use of SQL in this manner has been greatly enhanced through the development of server side scripting languages such as Microsoft ASP and open source systems such as PHP. These allow for the representation …


A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli Jan 2006

A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli

Research outputs pre 2011

Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the log files from such programs are of interest in a forensic investigation. This paper outlines research that has resulted in the development of a tool for the extraction of ICQ log file entries. Detailed reconstruction of data from log files was achieved with a number of different ICQ software. There are several limitations with the current design including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to …


The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland, Paula Thomas Jan 2006

The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland, Paula Thomas

Research outputs pre 2011

All organisations, whether in the public or private sector, use computers for the storage and processing of information relating to their business or services, their employees and their customers. A large proportion of families and individuals in their homes now also use personal computers and, both intentionally and inadvertently, often store on those computers personal information. It is clear that most organisations and individuals continue to be unaware of the information that may be stored on the hard disks that the computers contain, and have not considered what may happen to the information after the disposal of the equipment. In …


Honeypots: How Do You Know When You Are Inside One?, Simon Innes, Craig Valli Jan 2006

Honeypots: How Do You Know When You Are Inside One?, Simon Innes, Craig Valli

Research outputs pre 2011

This paper will discuss honeypots and their use and effectiveness as a security measure in an IT environment. It will specifically discuss various methods of honeypot implementations. Furthermore, this paper will look into the weaknesses within a honeypot system. This will include attacks against honeypots and methods a hacker may use to detect the presence of a honeypot or the fact that he/she is actually inside one. Finally this paper will discuss methods of further securing honeypots and ways the community is dealing with security flaws as they are identified


A Comparison Of Heuristics For Scheduling Spatial Clusters To Reduce I/O Cost In Spatial Join Processing, Jitian Xiao Jan 2006

A Comparison Of Heuristics For Scheduling Spatial Clusters To Reduce I/O Cost In Spatial Join Processing, Jitian Xiao

Research outputs pre 2011

In spatial join processing, a common method to minimize the I/O cost is to partition the spatial objects into clusters, and then to schedule the processing of the clusters in the spatial join processing such that the number of times the same objects to be fetched into memory can be minimized. A key issue of this clustering-and-scheduling approach is how to produce a better sequence of clusters to guide the cluster scheduling thus to reduce the total I/O cost of spatial join processing. This paper describes three cluster sequencing heuristics. An extensive comparison among them has been conducted, and simulation …


Opening Pandora's Box: Teacher Librarianship In The Twenty-First Century, Barbara Combes Jan 2006

Opening Pandora's Box: Teacher Librarianship In The Twenty-First Century, Barbara Combes

Research outputs pre 2011

In a world that is currently struggling to come to terms with the Internet, the exponential explosion in the volume of readily available information and a plethora of delivery modes and resource formats; the role of the teacher librarian and the school library in this new information landscape is murkier than ever before, This presentation looks at how teacher librarians can reinvent themselves and their school libraries to become an essential component of the core business of the school, i.e." teaching and learning, It is all about unlocking hidden talents, facing challenges and taking control.


Leading Hackers Down The Garden Path, Suen Yek Jan 2006

Leading Hackers Down The Garden Path, Suen Yek

Research outputs pre 2011

Can a hacker be controlled by predetermined deception? Limiting the decision making capabilities of hackers is one technique of network countermeasure that a honeynet enables. By furnishing a honeynet with a realistic range of services but restricted vulnerabilities, a hacker may be forced to direct their attacks to the only available exploits. This research discusses the deployment of a honeynet configured with a deceptive TELNET and TFTP exploit. Four hackers were invited to attack the honeynet and the analysis of their compromise identified if they engaged in a guided pathway to the intended deception. Hand trace analysis was performed on …