Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 691 - 720 of 8621

Full-Text Articles in Physical Sciences and Mathematics

Information Leakage Through Online Social Networking: Opening The Doorway For Advanced Persistence Threats, Nurul Nuha Abdul Molok, Shanton Chang, Atif Ahmad Nov 2010

Information Leakage Through Online Social Networking: Opening The Doorway For Advanced Persistence Threats, Nurul Nuha Abdul Molok, Shanton Chang, Atif Ahmad

Australian Information Security Management Conference

The explosion of online social networking (OSN) in recent years has caused damages to organisations due to leakage of information by their employees. Employees’ social networking behaviour, whether accidental or intentional, provides an opportunity for advanced persistent threats (APT) attackers to realise their social engineering techniques and undetectable zero-day exploits. APT attackers use a spear-phishing method that targeted on key employees of victim organisations through social media in order to conduct reconnaissance and theft of confidential proprietary information. This conceptual paper posits OSN as the most challenging channel of information leakage and provides an explanation about the underlying factors of …


Wikileaks: The Truth Or Not, Ian Rosewall, Matthew J. Warren Nov 2010

Wikileaks: The Truth Or Not, Ian Rosewall, Matthew J. Warren

Australian Information Warfare and Security Conference

We live in the Information Age, an age where information is shared in a global context and in real time. The issue is whether all information should be disclosed. In the ‘Information Age’ do secrets still exist? Another major issue is whether groups of vigilantes are the ones who should be disclosing this information, should these vigilante groups be trusted? This paper will focus upon the impact of Wikileaks and the problem of Information disclosure especially when that information is confidential. It will identify cases for discussion. In the main these cases will be of a military flavour.


Asymptotic Theory For Cross-Validated Targeted Maximum Likelihood Estimation, Wenjing Zheng, Mark J. Van Der Laan Nov 2010

Asymptotic Theory For Cross-Validated Targeted Maximum Likelihood Estimation, Wenjing Zheng, Mark J. Van Der Laan

U.C. Berkeley Division of Biostatistics Working Paper Series

We consider a targeted maximum likelihood estimator of a path-wise differentiable parameter of the data generating distribution in a semi-parametric model based on observing n independent and identically distributed observations. The targeted maximum likelihood estimator (TMLE) uses V-fold sample splitting for the initial estimator in order to make the TMLE maximally robust in its bias reduction step. We prove a general theorem that states asymptotic efficiency (and thereby regularity) of the targeted maximum likelihood estimator when the initial estimator is consistent and a second order term converges to zero in probability at a rate faster than the square root of …


A Proposed Policy-Based Management Architecture For Wireless Clients Operating In A Heterogeneous Mobile Environment, Mayank Keshariya, Ray Hunt Nov 2010

A Proposed Policy-Based Management Architecture For Wireless Clients Operating In A Heterogeneous Mobile Environment, Mayank Keshariya, Ray Hunt

Australian Information Security Management Conference

The objective of this paper is to provide a managed always best connected service to mobile entities over underlying heterogeneous wireless and mobile platforms while maintaining negotiated security and quality of service (QoS). This paper proposes a new model and its architecture which is based upon Policy-based Management but provides a new framework based on layered-approach for the centralised management of mobile clients. In particular, we propose and implement a new model of a policy-managed mobile client and its architecture to support seamless handoff across multiple access networks. The proposed mobile client supports multi-domain authentication, authorisation and security based on …


Micro-Blogging In The Workplace, Chia Yao Lee, Matthew Warren Nov 2010

Micro-Blogging In The Workplace, Chia Yao Lee, Matthew Warren

Australian Information Security Management Conference

Micro-blogging services such as Twitter, Yammer, Plurk and Google Buzz have generated substantial interest among members of the business community in recent years. Many CEOs, managers and front-line employees have embraced micro-blogs as a tool for interacting with colleagues, employees, customers, suppliers and investors. Micro-blogs are considered a more informal channel than emails and official websites, and thus present a different set of challenges to businesses. As a positional paper, this paper uses a case study of a bogus Twitter account to emphasise security and ethical issues relating to (i) Trust, Accuracy and Authenticity of Information, (ii) Privacy and Confidentiality, …


Anomaly Detection Over User Profiles For Intrusion Detection, Grant Pannell, Helen Ashman Nov 2010

Anomaly Detection Over User Profiles For Intrusion Detection, Grant Pannell, Helen Ashman

Australian Information Security Management Conference

Intrusion detection systems (IDS) have often been used to analyse network traffic to help network administrators quickly identify and respond to intrusions. These detection systems generally operate over the entire network, identifying “anomalies” atypical of the network’s normal collective user activities. We show that anomaly detection could also be host-based so that the normal usage patterns of an individual user could be profiled. This enables the detection of masquerading intruders by comparing a learned user profile against the current session’s profile. A prototype behavioural IDS applies the concept of anomaly detection to user behaviour and compares the effects of using …


The Complexity Of Security Studies In Nfc Payment System, Marc Pasquet, Sylvie Gerbaix Nov 2010

The Complexity Of Security Studies In Nfc Payment System, Marc Pasquet, Sylvie Gerbaix

Australian Information Security Management Conference

If we compare the security problem of a face-to-face contactless card payment process with a mobile phone NFC payment process, we may easily consider that the latter is far more difficult to study. Indeed, the more partners from different organizations involved in the process there are, the more complex the studies are and, accordingly, its protection. As well as the current solutions applied to studying the electronic payment security chain (Common Criteria, ISO 27005, etc), the James Reason model has pointed out the specific risks implied by the interaction between the different links in a complex chain. His theory has …


Development And Evaluation Of A Secure Web Gateway Using Existing Icap Open Source Tools, Michael Pearce, Ray Hunt Nov 2010

Development And Evaluation Of A Secure Web Gateway Using Existing Icap Open Source Tools, Michael Pearce, Ray Hunt

Australian Information Security Management Conference

This work in progress paper discusses the development and evaluation of an open source secure web gateway. The proof of concept system uses a combination of open source software (including the Greasyspoon ICAP Server, Squid HTTP proxy, and Clam Antivirus) to perform the various security tasks that range from simple (such as passive content insertion) to more advanced (such as active content alteration) by modules installed on the server. After discussing the makeup of the proof of concept system we discuss our evaluation methodology for both effectiveness and performance. The effectiveness was tested using comparative analysis of groups of self-browsing …


Information Security Risk Assessment: Towards A Business Practice Perspective, Piya Shedden, Wally Smith, Atif Ahmad Nov 2010

Information Security Risk Assessment: Towards A Business Practice Perspective, Piya Shedden, Wally Smith, Atif Ahmad

Australian Information Security Management Conference

Information security risk assessments (ISRAs) are of great importance for organisations. Current ISRA methods identify an organisation’s security risks and provide a measured, analysed security risk profile of critical information assets in order to build plans to treat risk. However, despite prevalent use in organisations today, current methods adopt a limited view of information assets during risk identification. In the context of day-to-day activities, people copy, print and discuss information, leading to the ‘leakage’ of information assets. Employees will create and use unofficial assets as part of their day-to-day routines. Furthermore, employees will also possess important knowledge on how to …


Security Information Supplied By Australian Internet Service Providers, Patryk Szewczyk Nov 2010

Security Information Supplied By Australian Internet Service Providers, Patryk Szewczyk

Australian Information Security Management Conference

Results from previous studies indicate that numerous Internet Service Providers within Australia either have inadequately trained staff, or refuse to provide security support to end-users. This paper examines the security information supplied by Internet Service Providers on their website. Specifically content relating to securing; a wireless network, an ADSL router, and a Microsoft Windows based workstation. A further examination looked at the accuracy, currency, and accessibility of information provided. Results indicate that the information supplied by Internet Service Providers is either inadequate or may in fact further deter the end-user from appropriately securing their computer and networking devices.


The Economics Of Developing Security Embedded Software, Craig S. Wright, Tanveer A. Zia Nov 2010

The Economics Of Developing Security Embedded Software, Craig S. Wright, Tanveer A. Zia

Australian Information Security Management Conference

Market models for software vulnerabilities have been disparaged in the past citing how these do little to lower the risk of insecure software. In this paper we argue that the market models proposed are flawed and not the concept of a market itself. A well-defined software risk derivative market would improve the information exchange for both the software user and vendor removing the often touted imperfect information state that is said to believe the software industry. In this way, users could have a rational means of accurately judging software risks and costs and as such the vendor could optimally apply …


New Approaches To Mitigation Of Malicious Traffic In Voip Networks, Tobi Wulff, Ray Hunt Nov 2010

New Approaches To Mitigation Of Malicious Traffic In Voip Networks, Tobi Wulff, Ray Hunt

Australian Information Security Management Conference

Voice over IP (VoIP) telephony is becoming widespread in use, and is often integrated into computer networks. Because of this, malicious software threatens VoIP systems in the same way that traditional computer systems have been attacked by viruses, worms, and other automated agents. VoIP networks are a challenge to secure against such malware as much of the network intelligence is focused on the edge devices and access environment. This paper describes the design and implementation of a novel VoIP security architecture in which evaluation of, and mitigation against, malicious traffic is demonstrated by the use of virtual machines to emulate …


Home Computer Security Can Be Improved Using Online Video Streaming Services, Russell Barber Nov 2010

Home Computer Security Can Be Improved Using Online Video Streaming Services, Russell Barber

Regis University Student Publications (comprehensive collection)

Home computer users face many new computer security threats. The rise of the internet has enabled viruses to spread rapidly. Educating computer users on security issues is one way to combat security threats. Video streaming web sites can provide a simple way to distribute educational videos to computer users. This project investigates the effectiveness of creating and distributing computer security educational videos on video streaming sites.


Education In The Environment: A Strategy For Continued Interagency Outdoor Education Programming: Quarterly Progress Report: Period Ending November 30, 2010, Margaret N. Rees Nov 2010

Education In The Environment: A Strategy For Continued Interagency Outdoor Education Programming: Quarterly Progress Report: Period Ending November 30, 2010, Margaret N. Rees

Reports (PLI Education)

Highlights of the university’s focused efforts during the past three months include the following:

  • Two Families in Nature events were held, benefitting approximately 100 people.
  • The Nevada Children’s Outdoor Bill of Rights was officially launched on October 9, 2010.
  • A total of 18 people are finishing capstone projects and homework to complete requirements for the Nevada State Certification in Environmental Education and Interpretation.
  • Forever Earth was scheduled for 35 days serving 965 people.
  • Discover Mojave Outdoor World events were conducted for 253 people.


Education In The Environment: A Strategy For Continued Interagency Outdoor Education Programming: Quarterly Progress Report: Period Ending November 30, 2010, Margaret N. Rees Nov 2010

Education In The Environment: A Strategy For Continued Interagency Outdoor Education Programming: Quarterly Progress Report: Period Ending November 30, 2010, Margaret N. Rees

Reports (PLI Education)

Highlights of the university’s focused efforts during the past three months include the following:

  • Two Families in Nature events were held, benefitting approximately 100 people.
  • The Nevada Children’s Outdoor Bill of Rights was officially launched on October 9, 2010.
  • A total of 18 people are finishing capstone projects and homework to complete requirements for the Nevada State Certification in Environmental Education and Interpretation.
  • Forever Earth was scheduled for 35 days serving 965 people.
  • Discover Mojave Outdoor World events were conducted for 253 people.


Phytoremediation Of Copper Contaminated Waste Water Using Lemna Minor, Mark Apelt Nov 2010

Phytoremediation Of Copper Contaminated Waste Water Using Lemna Minor, Mark Apelt

Theses and Dissertations

The use of natural remediation methods to remove contaminants from waste water is becoming more popular. Plants have been used for several decades, yet their use for municipal waste water contaminated by heavy metals is limited to a few studies which focus on the Mercury and Chromium (Bennicelli, et.al, 2004). This study specifically attempted to determine the viability for using Lemna minor to remediate municipally generated wastewater contaminated with copper. The study used 100 ml samples of wastewater, artificially spiked with 8 mg/L of copper sulfate and seeded with approximately 100 Lemna minor fronds. Each treatment was repeated 15 times …


Business Relationships In China: Lessons About Deep Trust, A. Kriz, Byron W. Keating Nov 2010

Business Relationships In China: Lessons About Deep Trust, A. Kriz, Byron W. Keating

Dr Byron W. Keating

Trust is acknowledged as a central tenet of business relationships. Yet for all the attention it receives, rarely has trust been investigated in the Chinese business setting. This paper uses an emic approach to unearth some within- culture ‘truths’ about Chinese notions of trust in business exchange. The findings of this research suggest that deep trust (xinren), which is driven by reciprocal help and emotional bonding, is critical for doing business in China. A conceptual framework is provided to assist Western businesspersons to better understand the Chinese concept of trust as well as the interplay between its key antecedents.


The Benthic Ecology Of Expanding Mangrove Habitat, Tauranga Harbour, New Zealand, Debra J. Stokes, Terry R. Healy, Norman Mason Nov 2010

The Benthic Ecology Of Expanding Mangrove Habitat, Tauranga Harbour, New Zealand, Debra J. Stokes, Terry R. Healy, Norman Mason

Debra J Stokes

No abstract provided.


Problem Niekontrolowanego Spalania Odpadów I Pozostałości Roślinnych W Obszarze Wiejskim Na Wybranym Przykładzie, Robert Oleniacz, Barbara Bacik Nov 2010

Problem Niekontrolowanego Spalania Odpadów I Pozostałości Roślinnych W Obszarze Wiejskim Na Wybranym Przykładzie, Robert Oleniacz, Barbara Bacik

Robert Oleniacz

This paper presents the results of surveys on the problem of uncontrolled burning of waste in domestic stoves and boilers for central heating and open burning of plant residues in rural areas. The questionnaires were conducted among the inhabitants of one of Polish village (Łąkta Dolna), located in the Malopolska province, in the submontane area. The study comprised 80.2% of all households. As is clear from conducted surveys waste were burned in more than 80% of surveyed houses and more than half of respondents admitted to the open burning of plant residues. The percentage of people burning waste and plant …


Self-Assembled In0.5Ga0.5As Quantum Dots On Gap, Yuncheng Song, Paul J. Simmonds, Minjoo Larry Lee Nov 2010

Self-Assembled In0.5Ga0.5As Quantum Dots On Gap, Yuncheng Song, Paul J. Simmonds, Minjoo Larry Lee

Paul J. Simmonds

We demonstrate the growth and luminescence of coherently strained In0.5Ga0.5As self-assembled quantum dots on GaP. Cross-sectional and planar-view transmission electron microscopy confirmed the dislocation-free nature of the In0.5Ga0.5As quantum dots and GaP cap layers. Intense photoluminescence from the quantum dots was measured at 80 K and was visible to the unaided eye in ambient lighting. The photoluminescence results show that emission energy can be controlled by varying the In0.5Ga0.5As deposition thickness. In combination with recent advances in the growth of GaP on Si, the In0.5Ga0.5 …


A Bayesian Shared Component Model For Genetic Association Studies, Juan J. Abellan, Carlos Abellan, Juan R. Gonzalez Nov 2010

A Bayesian Shared Component Model For Genetic Association Studies, Juan J. Abellan, Carlos Abellan, Juan R. Gonzalez

COBRA Preprint Series

We present a novel approach to address genome association studies between single nucleotide polymorphisms (SNPs) and disease. We propose a Bayesian shared component model to tease out the genotype information that is common to cases and controls from the one that is specific to cases only. This allows to detect the SNPs that show the strongest association with the disease. The model can be applied to case-control studies with more than one disease. In fact, we illustrate the use of this model with a dataset of 23,418 SNPs from a case-control study by The Welcome Trust Case Control Consortium (2007) …


Web-Based Intelligent Computational Argumentation Based Conflict Resolution In Air Traffic Management, Xiaoqing Frank Liu, Ravi Santosh Arvapally, Hojong Baik, Rubal Wanchoo Nov 2010

Web-Based Intelligent Computational Argumentation Based Conflict Resolution In Air Traffic Management, Xiaoqing Frank Liu, Ravi Santosh Arvapally, Hojong Baik, Rubal Wanchoo

Computer Science Faculty Research & Creative Works

Collaborative decision making (CDM) is a process of reaching consensus on a potential solution of an issue through the evaluation of the different possible alternatives. the web-Based intelligent computational argumentation system allows concerned stakeholders to post their arguments on different alternatives, assign weights and priorities to the arguments and reach the most favorable alternative using fuzzy intelligent techniques over the Internet. Exchange of information among the stakeholders improves the collaboration and drives towards the collective intelligence. in this paper, we show how our tool facilitates resolution of conflicts in air traffic management. It could enhance the Ground Delay Program (GDP) …


Hospital Network Infrastructure: A Modern Look Into The Network Backbone With Real Time Visibility, Homan Mike Hirad Nov 2010

Hospital Network Infrastructure: A Modern Look Into The Network Backbone With Real Time Visibility, Homan Mike Hirad

Regis University Student Publications (comprehensive collection)

For the purposes of this research, the "design science" discipline of Information Systems will structure the overall methodology and framework for results. By leveraging the design science framework, this study will dissect and analyze various parts of a hospital's network, to uncover substandard practices and problematic weaknesses that commonly result in an overall decrease in the quality of healthcare provided to patients, and negatively affect business operations of hospitals and healthcare facilities. For the purposes of this research the chosen hospital will be categorized as Mid-Western Hospital. This thesis will investigate, in a real world healthcare organization, fault management technologies …


Nuclear Magnetic Resonance Affinity Screening Methods For Functional Annotation Of Proteins And Drug Discovery, Matthew D. Shortridge Phd Nov 2010

Nuclear Magnetic Resonance Affinity Screening Methods For Functional Annotation Of Proteins And Drug Discovery, Matthew D. Shortridge Phd

Department of Chemistry: Dissertations, Theses, and Student Research

With nearly 1,350 complete genome sequences available our understanding of biology at the molecular level has never been more complete. A consequence of these sequencing projects was the discovery of large functionally unannotated segments of each genome. The genes (and proteins they encode) found in these unannotated regions are considered “hypothetical proteins”. Current estimates suggest between 12%-50% of the known gene sequences are functionally unannotated. Incomplete functional annotation of the various genomes significantly limits our understanding of biology. Pragmatically, identifying the functions of these proteins could lead to new therapeutics; making functional annotation of paramount importance.

This dissertation describes the …


On-Metal Synthesis Of Some Rhenium Complexes, Chad L. Phillips Nov 2010

On-Metal Synthesis Of Some Rhenium Complexes, Chad L. Phillips

Mahurin Honors College Capstone Experience/Thesis Projects

In 1977, Shirakawa and coworkers discovered the first conductive polymers. Their conductive polymers have been extensively studied. Though some of these first conductive polymers such as polyactelyne seemed to be a promising organic conductor, the commercial applications of these polymers were severely limited due the polymer’s highly air-sensitive nature. Thus, the current focus has shifted towards the development of heterocyclic aromatic polymers which are air-stable and have a low band gap. Expanding of the work of Snyder and Selegue, the focus of my research has been the incorporation of rhenium metal into an organic compound in an on-metal fashion. Several …


Wpływ Zakładu Unieszkodliwiania Stałych Odpadów Komunalnych W Warszawie Na Jakość Powietrza, Robert Oleniacz, Jadwiga Antolak Nov 2010

Wpływ Zakładu Unieszkodliwiania Stałych Odpadów Komunalnych W Warszawie Na Jakość Powietrza, Robert Oleniacz, Jadwiga Antolak

Robert Oleniacz

The paper presents the results of air quality impact assessment carried out for the Municipal Solid Waste Disposal Plant in Warsaw. As part of the plant is working so far the only municipal solid waste incinerator in Poland. Following the evaluation, including data for the year 2008, it was found that it is a minor source of emissions to air and causes a slight air pollution. The highest maximum one-hour and annual average concentrations caused at ground level are many times lower than the respective reference (or permissible) values and background values for analyzed substances in the air. Increasing the …


Testing Coupling Relationships In Object-Oriented Programs, Roger Alexander, Jeff Offutt, Andreas Stefik Nov 2010

Testing Coupling Relationships In Object-Oriented Programs, Roger Alexander, Jeff Offutt, Andreas Stefik

All Faculty Scholarship for the College of the Sciences

As we move toward developing object‐oriented (OO) programs, the complexity traditionally found in functions and procedures is moving to the connections among components. Different faults occur when components are integrated to form higher‐level structures that aggregate the behavior and state. Consequently, we need to place more effort on testing the connections among components. Although OO technologies provide abstraction mechanisms for building components that can then be integrated to form applications, it also adds new compositional relations that can contain faults. This paper describes techniques for analyzing and testing the polymorphic relationships that occur in OO software. The techniques adapt traditional …


Frequency Dependence In The Initiation Of Ultrafast Laser-Induced Damage, Jeremy R. Gulley Nov 2010

Frequency Dependence In The Initiation Of Ultrafast Laser-Induced Damage, Jeremy R. Gulley

Faculty Articles

Numerous studies have investigated the role of photoionization in ultrafast laser-induced damage of bulk dielectrics. This study examines the role of spectral width and instantaneous laser frequency in laser-induced damage using a frequency dependent multiphoton ionization model and numerical simulation of an 800 nm laser pulse propagating through fused silica. When the individual photon wavelengths are greater than 827 nm, an additional photon is required for photoionization, reducing the probability of the event by many orders of magnitude. Simulation results suggest that this frequency dependence may significantly affect the processes of laser-induced damage and filamentation.


Study On Preparing Technology And Corrosion Resistance Of Ti/Zr Based Chromium-Free Chemical Conversion Coating On Zinc Electroplating Layer, Yong Guan, Jian-Guo Liu, Chuan-Wei Yan Nov 2010

Study On Preparing Technology And Corrosion Resistance Of Ti/Zr Based Chromium-Free Chemical Conversion Coating On Zinc Electroplating Layer, Yong Guan, Jian-Guo Liu, Chuan-Wei Yan

Journal of Electrochemistry

In this paper,we obtained environmental-friendly chromium-free chemical conversion coating on the non-cyanide alkaline zinc electroplating layer by employing the optimized Ti/Zr based conversion technique.At the same time,the performances of the Ti/Zr based conversion coating were compared with chromate colour passivation coating.The corrosion resistances of the conversion coatings were investigated by using neutral salt spray(NSS) test,potentiodynamic polarization and electrochemical impedance spectroscopy(EIS).The results showed that the white rust appeared after 96 hours when the NSS test was performed on the Ti/Zr based conversion coating,which was close to the corrosion resistance rating of chromate colour passivation coating.Compared with the chromate passivation coating,the Ti/Zr …


The Roles Of The Width Of Gas/Liquid/Solid Three-Phase Boundary Zone Of Dispersion Water Films In Atmospheric Corrosion Of Metals, Wang Jia, Jing Jiang Nov 2010

The Roles Of The Width Of Gas/Liquid/Solid Three-Phase Boundary Zone Of Dispersion Water Films In Atmospheric Corrosion Of Metals, Wang Jia, Jing Jiang

Journal of Electrochemistry

The roles of TPB(Three-Phase Boundary) width in the corrosion processes of metals under dispersed water films were investigated by electrochemical techniques combined with contact angle measurement.It is found that both cathodic limiting current density and corrosion current density linearly increases with increasing the TPB width,confirming the important role of TPB width in gas/liquid/solid multiphase corrosion systems.Based on above results,the effect of water film thickness on atmospheric corrosion rate was quantitatively evaluated by the TPB width.