Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 811 - 840 of 12196

Full-Text Articles in Physical Sciences and Mathematics

Applying Feature Selection To Reduce Variability In Keystroke Dynamics Data For Authentication Systems, Mark Abernethy, Shri Rai Dec 2012

Applying Feature Selection To Reduce Variability In Keystroke Dynamics Data For Authentication Systems, Mark Abernethy, Shri Rai

Australian Information Warfare and Security Conference

Authentication systems enable the verification of claimed identity. Password-based authentication systems are ubiquitous even though such systems are amenable to numerous attack vectors and are therefore responsible for a large number of security breaches. Biometrics has been increasingly researched and used as an alternative to password-based systems. There are a number of alternative biometric characteristics that can be used for authentication purposes, each with different positive and negative implementation factors. Achieving a successful authentication performance requires effective data processing. This study investigated the use of keystroke dynamics for authentication purposes. A feature selection process, based on normality statistics, was applied …


The Regulation Of Space And Cyberspace: One Coin, Two Sides, Brett Biddington Dec 2012

The Regulation Of Space And Cyberspace: One Coin, Two Sides, Brett Biddington

Australian Information Warfare and Security Conference

In the 1960s, during some very tense days in the Cold War the United States of America (USA) and the Union of Socialist Soviet Republics (USSR) brokered a deal in the United Nations for a treaty regime to govern human activities in outer space. This regime has served well enough for almost 50 years. In recent years, however, fears of space weaponisation, the proliferation of space debris in the Low Earth Orbits (LEO) and increasing demands on the electromagnetic spectrum (EMS) have led to demands for regulatory reform. Some nations now consider space to be the fourth domain of modern …


The Reception, Incorporation And Employment Of Informatin Operations By The Australia Defence Force: 1990-2012, Jeff Malone Dec 2012

The Reception, Incorporation And Employment Of Informatin Operations By The Australia Defence Force: 1990-2012, Jeff Malone

Australian Information Warfare and Security Conference

The paper investigates the Australian Defence Force’s (ADF) approach – understood here as the reception, incorporation and operational employment – to military information operations (IO), from 1990 to 2012. The paper identifies key characteristics of the ADF’s approach to IO, and proposes explanatory factors to account for the specific form the ADF’s approach to IO has been manifested. The paper concludes with predictions regarding the future form of IO within the ADF, in the context of the increasing significance of social media, the upcoming 2013 Defence White Paper (WP13) and the US ‘pivot’ to the Asia-Pacific region. The paper is …


Protective Emblems In Cyber Warfare, Iain Sutherland, Konstantinos Xynos, Andrew Jones, Andrew Blyth Dec 2012

Protective Emblems In Cyber Warfare, Iain Sutherland, Konstantinos Xynos, Andrew Jones, Andrew Blyth

Australian Information Warfare and Security Conference

The Tallinn Manual will be released in February 2013 and makes a significant step towards defining the concepts of cyber warfare. The early draft of the manual is available and the expert working party have interpreted the existing international agreements, instruments and conventions and applied them to the field of cyber warfare. The manual makes a number of interpretations on the legal position of civilians and other parties. The manual makes it clear that the existing conventions are applicable and that civilian / religious and medical systems should be viewed as non-combatants in a cyber conflict. In the kinetic warfare …


Exterminating The Cyber Flea: Irregular Warfare Lessons For Cyber Defence, Ben Whitham Dec 2012

Exterminating The Cyber Flea: Irregular Warfare Lessons For Cyber Defence, Ben Whitham

Australian Information Warfare and Security Conference

Traditional approaches to tactical Computer Network Defence (CND), drawn from the lessons and doctrine of conventional warfare, are based on a team of deployed security professionals countering the adversary’s cyber forces. The concept of the adversary in cyberspace does not fit neatly into the conventional military paradigms. Rather than fighting an identifiable foe, cyber adversaries are clandestine, indistinguishable from legitimate users or external services, operate across state boundaries, and from safe havens that provide sanctuary from prosecution. The defender also faces imbalances with rules of engagement and a severe disparity between the cost of delivering the defence and the attackers …


Al-Jihad Fi Sabilillah: In The Heart Of Green Birds, Robyn Torok Dec 2012

Al-Jihad Fi Sabilillah: In The Heart Of Green Birds, Robyn Torok

Australian Counter Terrorism Conference

With an increasing focus on lone-wolf operations, al-Qaeda is becoming increasingly focussed on its internet discourses and propaganda. One of its most significant discourses is the importance of jihad and martyrdom in carrying out a terrorist attack. This study looks at Facebook pages and profiles and examines the discourses presented in relation to jihad and martyrdom. Three important concepts including their justification are considered: Al-Jihad fi Sabilillah (just fight for the sake of Allah), Istishhad (operational heroism of loving death more than the West love life) and Shaheed (becoming a martyr). Results supported previous studies indicating the strong seductive nature …


Forensic Readiness For Wireless Medical Systems, Brian Cusack, Ar Kar Kyaw Dec 2012

Forensic Readiness For Wireless Medical Systems, Brian Cusack, Ar Kar Kyaw

Australian Digital Forensics Conference

Wireless medical devices and related information systems are vulnerable to use and abuse by unauthorized users. Medical systems are designed for a range of end users in different professional skill groups and also people who carry the devices in and on their bodies. Open, accurate and efficient communication is the priority for medical systems and as a consequence strong protection costs are traded against the utility benefits for open systems. Flexible security provisions are required and strong forensic capabilities built into the systems to treat the risk. In this paper we elaborate the problem area and discuss potential solutions to …


The 2012 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Andy Jones, Thomas Martin, Mohammed Alzaabi Dec 2012

The 2012 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Andy Jones, Thomas Martin, Mohammed Alzaabi

Australian Digital Forensics Conference

The growth in the use of computers in all aspects of our lives has continued to increase to the point where desktop, laptop, netbook or tablet computers are now almost essential in the way that we communicate and work. As a result of this, and the fact that these devices have a limited lifespan, enormous numbers of computers are being disposed of at the end of their useful life by individuals or/and organisations. As the cost of computing has reduced, the level of ‘consumerisation’ has increased together with the requirement for mobility. This has led to an increasing use of …


Commitment And The 1% Motorcycle Club: Threats To The Brotherhood, Kira J. Harris Dec 2012

Commitment And The 1% Motorcycle Club: Threats To The Brotherhood, Kira J. Harris

Australian Counter Terrorism Conference

The brotherhood ethos is the founding principle of the 1% motorcycle clubs community. Interviews with former members and partners show how threatening this social bond can reduce satisfaction and lead to doubts over involvement with the club.


Boko Haram: Terrorist Organization, Freedom Fighters Or Religious Fanatics? An Analysis Of Boko Haram Within Nigeria, An Australian Perspective And The Need For Counter Terrorism Responses That Involves Prescribing Them As A Terrorist Organization., Gabrielle Blanquart Dec 2012

Boko Haram: Terrorist Organization, Freedom Fighters Or Religious Fanatics? An Analysis Of Boko Haram Within Nigeria, An Australian Perspective And The Need For Counter Terrorism Responses That Involves Prescribing Them As A Terrorist Organization., Gabrielle Blanquart

Australian Counter Terrorism Conference

The adoption of Sharia law and the creation of an Islamic government are prominent motivations for religious terrorism within the current climate. Throughout history, Nigeria has been exposed to ethno religious violence and political discontent and has recently seen an escalation in associated violence threatening its sovereignty, territorial integrity, peace and stability. This paper explores Boko Haram, a Nigerian Islamist sect, responsible for numerous attacks in northern and central Nigeria on infrastructure and people. The origins and ideological motivations of this group are examined and compared to the current wave of religious terrorism in relation to tactics, leadership and objectives. …


Secure Key Deployment And Exchange Protocol For Manet Information Management, Brian Cusack, Alastair Nisbet Dec 2012

Secure Key Deployment And Exchange Protocol For Manet Information Management, Brian Cusack, Alastair Nisbet

Australian Digital Forensics Conference

Secure Key Deployment and Exchange Protocol (SKYE) is an innovative encryption Key Management Scheme (KMS) based on a combination of features from recent protocols combined with new features for Mobile Ad Hoc Networks (MANETs). The design focuses on a truly ad hoc networking environment where geographical size of the network, numbers of network members and mobility of the members is all unknown before deployment. This paper describes the process of development of the protocol and the application to system design to assure information security and potential evidential retention for forensic purposes. Threshold encryption key management is utilized and simulation results …


What Is The Proper Forensics Approach On Trojan Banking Malware Incidents?, Andri P. Heriyanto Dec 2012

What Is The Proper Forensics Approach On Trojan Banking Malware Incidents?, Andri P. Heriyanto

Australian Digital Forensics Conference

Digital forensics procedures should be developed to obtain digital evidence with regard to legal requirements such as admissibility, authenticity, completeness, reliability and believability. On the other hand, Trojan banking malware incident has grown significantly and creates a great threat to online banking users globally. This type of malware is known to use anti-forensic technique to avoid forensic detection. Moreover, there are numerous works and researches that impose the drawbacks on post-mortem forensics approach in dealing with evidence that only resided on non-persistence memory or non-volatile memory. There are works that reveal the disadvantage of live-response approach on incident response that …


Harms: Hierarchical Attack Representation Models For Network Security Analysis, Jin Hong, Dong-Seong Kim Dec 2012

Harms: Hierarchical Attack Representation Models For Network Security Analysis, Jin Hong, Dong-Seong Kim

Australian Information Security Management Conference

Attack models can be used to assess network security. Purely graph based attack representation models (e.g., attack graphs) have a state-space explosion problem. Purely tree-based models (e.g., attack trees) cannot capture the path information explicitly. Moreover, the complex relationship between the host and the vulnerability information in attack models create difficulty in adjusting to changes in the network, which is impractical for modern large and dynamic network systems. To deal with these issues, we propose hierarchical attack representation models (HARMs). The main idea is to use two-layer hierarchy to separate the network topology information (in the upper layer) from the …


Territorial Behavior And The Economics Of Botnets, Craig S. Wright Dec 2012

Territorial Behavior And The Economics Of Botnets, Craig S. Wright

Australian Information Security Management Conference

This paper looks at the economics associated with botnets. This research can be used to calculate territorial sizes for online criminal networks. Looking at the types of systems we can compare the time required to maintain the botnet against the benefits received. In doing this it will be possible to formulate economic defence strategies that reduce the benefits received through the control of the botnet. We look at the decision to be territorial or not from the perspective of the criminal bot-herder. This is extended to an analysis of territorial size. The criminal running a botnet seeks to maximize profit. …


Evidence Examination Tools For Social Networks, Brian Cusack, Jung Son Dec 2012

Evidence Examination Tools For Social Networks, Brian Cusack, Jung Son

Australian Digital Forensics Conference

Social networking (SNS) involves computer networks and billions of users who interact for a multiplicity of purposes. The web based services allow people to communicate using many media sources and to build relationship networks that have personalized meanings. Businesses and Governments also exploit the opportunity for economical consumer interaction. With the valued use of SNS services also comes the potential for misuse and legal liability. In this paper three software tools are tested in the laboratory to assess the capability of the tools to extract files from the four most popular web browsers while browsers are being used to surf …


The 2012 Investigation Into Remnant Data On Second Hand Memory Cards Sold In Australia, Patryk Szewczyk, Krishnun Sansurooah Dec 2012

The 2012 Investigation Into Remnant Data On Second Hand Memory Cards Sold In Australia, Patryk Szewczyk, Krishnun Sansurooah

Australian Digital Forensics Conference

This study investigates the remnant data on memory cards that were purchased through Australian second hand auctions sites in 2012. Memory cards are increasing in capacity and are commonly used amongst many consumer orientated electronic devices including mobile phones, tablet computers, cameras and multimedia devices. This study examined 78 second hand memory cards. The investigation shows that confidential data is present on many of the memory cards and that in many instances there is no evidence to suggest that the seller attempted to erase data. In many instances the sellers are asking the buyer to erase the data on the …


Implementing A Secure Academic Grid System - A Malaysian Case, Mohd Samsu Sajat, Suhaidi Hassan, Adi Affandi Ahmad, Ali Yusny Daud, Amran Ahmad Dec 2012

Implementing A Secure Academic Grid System - A Malaysian Case, Mohd Samsu Sajat, Suhaidi Hassan, Adi Affandi Ahmad, Ali Yusny Daud, Amran Ahmad

Australian Information Security Management Conference

Computational grids have become very popular in the recent times due to their capabilities and flexibility in handling large computationally intensive jobs. When it comes to the implementation of practical grid systems, security plays a major role due to the confidentiality of the information handled and the nature of the resources employed. Also due to the complex nature of the grid operations, grid systems face unique security threats compared to other distributed systems. This paper describes how to implement a secure grid system with special emphasis on the steps to be followed in obtaining, implementing and testing PKI certificates.


A Proposed Formula For Comparing Kill Password Effectiveness In Single Password Rfid Systems, Christopher Bolan Dec 2012

A Proposed Formula For Comparing Kill Password Effectiveness In Single Password Rfid Systems, Christopher Bolan

Australian Information Security Management Conference

The Electronic Product Code standard for RFID systems plays a significant role in worldwide RFID implementations. A feature of the RFID standards has been the RFID Kill command which allows for the "permanent" destruction of an RFID tag through the issuing of a simple command. Whilst the inclusion of this command may be vital for user privacy it also opens up significant avenues for attack. Whilst such attacks may be well documented there has been little to no discussion of the efficacy of the differing mitigation approaches taken. A simple formula to calculate the full timing of such an attack …


Human-Readable Real-Time Classifications Of Malicious Executables, Anselm Teh, Arran Stewart Dec 2012

Human-Readable Real-Time Classifications Of Malicious Executables, Anselm Teh, Arran Stewart

Australian Information Security Management Conference

Shafiq et al. (2009a) propose a non–signature-based technique for detecting malware which applies data mining techniques to features extracted from executable files. Their technique has a high level of accuracy, a low false positive rate, and a speed on par with commercial anti-virus products. One portion of their technique uses a multi-layer perceptron as a classifier, which provides little insight into the reasons for classification. Our experience is that network security analysts prefer tools which provide human-comprehensible reasons for a classification, rather than operating as “black boxes”. We therefore build on the results of Shafiq et al. by demonstrating a …


An Investigation Into The Wi-Fi Protected Setup Pin Of The Linksys Wrt160n V2, Symon Aked, Christopher Bolan, Murray Brand Dec 2012

An Investigation Into The Wi-Fi Protected Setup Pin Of The Linksys Wrt160n V2, Symon Aked, Christopher Bolan, Murray Brand

Australian Information Security Management Conference

Wi-Fi Protected Setup (WPS) is a method of allowing a consumer to set up a secure wireless network in a user friendly way. However, in December 2011 it was discovered that a brute force attack exists that reduces the WPS key space from 108 to 104+103. This resulted in a proof of concept tool that was able to search all possible combinations of PINs within a few days.This research presents a methodology to test wireless devices to determine their susceptibility to the external registrar PIN authentication design vulnerability. A number of devices were audited, and the Linksys WRT160N v2 router …


Exposing Potential Privacy Issues With Ipv6 Address Construction, Clinton Carpene, Andrew Woodward Dec 2012

Exposing Potential Privacy Issues With Ipv6 Address Construction, Clinton Carpene, Andrew Woodward

Australian Information Security Management Conference

The usage of 128 bit addresses with hexadecimal representation in IPv6 poses significant potential privacy issues. This paper discusses the means of allocating IPv6 addresses, along with the implications each method may have upon privacy in different usage scenarios. The division of address space amongst the global registries in a hierarchal fashion can provide geographical information about the location of an address, and its originating device. Many IPv6 address configuration methods are available, including DHCPv6, SLAAC (with or without privacy extensions), and Manual assignment. These assignment techniques are dissected to expose the identifying characteristics of each technique. It is seen …


Multiple Peaks In Saber Mesospheric Oh Emission Altitude Profiles, Jordan Rozum, Gene A. Ware, Doran J. Baker, Martin G. Wlynczak, James M. Russell Dec 2012

Multiple Peaks In Saber Mesospheric Oh Emission Altitude Profiles, Jordan Rozum, Gene A. Ware, Doran J. Baker, Martin G. Wlynczak, James M. Russell

Browse All Undergraduate research

No abstract provided.


First Temperature Observations With The Usu Very Large Rayleigh Lidar: An Examination Of Mesopause Temperatures, Leda Sox, Vincent B. Wickwar, Joshua P. Herron, Marcus J. Bingham, Lance W. Petersen, Matthew T. Emerick Dec 2012

First Temperature Observations With The Usu Very Large Rayleigh Lidar: An Examination Of Mesopause Temperatures, Leda Sox, Vincent B. Wickwar, Joshua P. Herron, Marcus J. Bingham, Lance W. Petersen, Matthew T. Emerick

Posters

As the impetus for extended observational measurements throughout the middle atmosphere has increased1 , the limits of previous instrumentation need to be pushed. The Rayleigh lidar group at the Atmospheric Lidar Observatory (ALO) at Utah State University has pushed such limits on existing Rayleigh scatter lidar technology and, through major upgrades to the previous lidar system, has been able to gather temperature measurements in the upper mesosphere and lower thermosphere from approximately 70P109 km. A data campaign with the new system was conducted around the annual temperature minimum, centered on late June 2012, in this region. The temperatures from this …


Visualizing Digital Collections At Archive-It, Michele C. Weigle, Michael L. Nelson Dec 2012

Visualizing Digital Collections At Archive-It, Michele C. Weigle, Michael L. Nelson

Computer Science Presentations

PDF of a powerpoint presentation from a Archive-It Partners Meeting in Annapolis, Maryland, December 3, 2012. Also available on Slideshare.


Probing Radical Pathways In Electrophilic Addition Of Halogens: Classical Vs. Bridged Intermediates, Lisa George, Aimable Kalume, Scott Reid Dec 2012

Probing Radical Pathways In Electrophilic Addition Of Halogens: Classical Vs. Bridged Intermediates, Lisa George, Aimable Kalume, Scott Reid

Chemistry Faculty Research and Publications

We examine radical mediated pathways in electrophilic addition to the simplest alkene, ethylene, where the structure of the radical intermediate has been extensively debated. Starting from the π-complex with a dihalogen, C2H4⋯I2, isolated in an inert matrix, we initiate reaction by photolytically cleaving the I2 bond. We succeed in trapping and spectroscopically interrogating the symmetrically bridged radical complex, which calculations confirm is the global minimum on the C2H5I Potential Energy Surface (PES). Consistent with the participation of a bridged intermediate, radical addition preferentially but not exclusively yields the anti …


Necessary And Sufficient Informativity Conditions For Robust Network Reconstruction Using Dynamical Structure Functions, Vasu Nephi Chetty Dec 2012

Necessary And Sufficient Informativity Conditions For Robust Network Reconstruction Using Dynamical Structure Functions, Vasu Nephi Chetty

Theses and Dissertations

Dynamical structure functions were developed as a partial structure representation of linear time-invariant systems to be used in the reconstruction of biological networks. Dynamical structure functions contain more information about structure than a system's transfer function, while requiring less a priori information for reconstruction than the complete computational structure associated with the state space realization. Early sufficient conditions for network reconstruction with dynamical structure functions severely restricted the possible applications of the reconstruction process to networks where each input independently controls a measured state. The first contribution of this thesis is to extend the previously established sufficient conditions to incorporate …


The Role Of Dynamic Capabilities In Creating Business Value From Is Assets, Rajeev Sharma, Graeme Shanks Dec 2012

The Role Of Dynamic Capabilities In Creating Business Value From Is Assets, Rajeev Sharma, Graeme Shanks

Professor Rajeev Sharma

This paper draws on and extends the emerging literature on dynamic capabilities to understand and explain the role ofinformation systems (IS) assets in creating business value. Our analysis identifies the critical roles of managerial actions andthe organizational context in identifying, resourcing and implementing IS-enabled competitive actions in delivering businessvalue. This paper extends earlier treatments of the relationship between IS assets and organizational strategy and performanceby explicitly accounting for the roles of human agency and context, which have not been adequately addressed in priorliterature. A research model for future research is proposed.


Research Methods And The Relevance Of The Is Discipline: A Critical Analysis Of The Role Of Methodological Pluralism, Rajeev Sharma Dec 2012

Research Methods And The Relevance Of The Is Discipline: A Critical Analysis Of The Role Of Methodological Pluralism, Rajeev Sharma

Associate Professor Rajeev Sharma

No abstract provided.


Investigating The Effect Of Participation-Limiting Structures On Outcomes Of E-Democracy Systems (Research In Progress), Rajeev Sharma Dec 2012

Investigating The Effect Of Participation-Limiting Structures On Outcomes Of E-Democracy Systems (Research In Progress), Rajeev Sharma

Professor Rajeev Sharma

Modern information systems provide a technical foundation for greater participation of citizens in the agenda-setting and decision-making processes of government. Information systems researchers and designers will need to address a number of issues to design IS applications for the effective functioning of evolving forms of democracy. This paper identifies a research agenda at the intersection of information systems research, economics and political science research and avenues for information systems researchers to contribute to the research agenda.


On The Atomic Decomposition Of H^1 And Interpolation, Robert Sharpley Dec 2012

On The Atomic Decomposition Of H^1 And Interpolation, Robert Sharpley

Robert Sharpley

© 1986 by American Mathematical Society