Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (2356)
- Physics (1864)
- Environmental Sciences (1723)
- Engineering (1515)
- Life Sciences (1333)
-
- Social and Behavioral Sciences (1273)
- Chemistry (1267)
- Earth Sciences (1221)
- Mathematics (1026)
- Oceanography and Atmospheric Sciences and Meteorology (688)
- Statistics and Probability (543)
- Computer Engineering (496)
- Astrophysics and Astronomy (420)
- Geology (402)
- Electrical and Computer Engineering (386)
- Education (382)
- Arts and Humanities (374)
- Medicine and Health Sciences (350)
- Applied Mathematics (347)
- Sustainability (341)
- Business (305)
- Natural Resources Management and Policy (276)
- Natural Resources and Conservation (275)
- Databases and Information Systems (263)
- Water Resource Management (240)
- Law (201)
- Environmental Monitoring (198)
- Public Affairs, Public Policy and Public Administration (188)
- Software Engineering (188)
- Institution
-
- Selected Works (2519)
- University of Nebraska - Lincoln (691)
- University of South Florida (346)
- TÜBİTAK (319)
- Singapore Management University (308)
-
- Wright State University (299)
- University of Wollongong (281)
- SelectedWorks (263)
- Utah State University (245)
- Louisiana State University (210)
- Old Dominion University (197)
- Missouri University of Science and Technology (189)
- Clemson University (186)
- University of Nevada, Las Vegas (174)
- California Polytechnic State University, San Luis Obispo (146)
- Western University (133)
- Wayne State University (132)
- William & Mary (132)
- Portland State University (128)
- University of Kentucky (127)
- University of Texas at El Paso (122)
- University of Tennessee, Knoxville (117)
- San Jose State University (114)
- University of Arkansas, Fayetteville (105)
- Embry-Riddle Aeronautical University (104)
- Technological University Dublin (100)
- Edith Cowan University (98)
- Brigham Young University (97)
- University of Massachusetts Amherst (96)
- The University of Maine (89)
- Keyword
-
- For (96)
- Articles (92)
- Analysis (87)
- Sustainability (74)
- System (69)
-
- Climate change (67)
- Mathematics (65)
- Data (64)
- CMMB (61)
- Australia (59)
- Journal Articles (57)
- Model (55)
- Power (55)
- Systems (54)
- Conference Papers (53)
- Physics (52)
- Applied sciences (51)
- Human (51)
- Carbon (50)
- Simulation (47)
- Energy (43)
- Learning (42)
- Pure sciences (42)
- Water (42)
- Based (41)
- Security (41)
- Detection (40)
- Models (40)
- Chemistry (39)
- Image (39)
- Publication
-
- Research Collection School Of Computing and Information Systems (284)
- Theses and Dissertations (272)
- Computer Science & Engineering Syllabi (164)
- Studia UBB Geologia (145)
- Electronic Theses and Dissertations (142)
-
- Faculty of Science - Papers (Archive) (136)
- USF Tampa Graduate Theses and Dissertations (123)
- Faculty Publications (121)
- Electronic Thesis and Dissertation Repository (115)
- Turkish Journal of Electrical Engineering and Computer Sciences (100)
- Doctoral Dissertations (98)
- Nebraska Tractor Tests (91)
- Open Access Theses & Dissertations (89)
- LSU Master's Theses (85)
- Arun Bansil (84)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (82)
- Journal of Electrochemistry (78)
- S.C. Water Resources Conference (78)
- Professor Philip Ogunbona (76)
- Graduate Theses and Dissertations (75)
- Turkish Journal of Chemistry (75)
- Christian Binek (74)
- Masters Theses (73)
- LSU Doctoral Dissertations (72)
- Australian Institute for Innovative Materials - Papers (70)
- Physics Faculty Research & Creative Works (70)
- Dartmouth Scholarship (69)
- Articles (67)
- Physics Faculty Publications (67)
- Honors Theses (65)
- Publication Type
Articles 811 - 840 of 12196
Full-Text Articles in Physical Sciences and Mathematics
Applying Feature Selection To Reduce Variability In Keystroke Dynamics Data For Authentication Systems, Mark Abernethy, Shri Rai
Applying Feature Selection To Reduce Variability In Keystroke Dynamics Data For Authentication Systems, Mark Abernethy, Shri Rai
Australian Information Warfare and Security Conference
Authentication systems enable the verification of claimed identity. Password-based authentication systems are ubiquitous even though such systems are amenable to numerous attack vectors and are therefore responsible for a large number of security breaches. Biometrics has been increasingly researched and used as an alternative to password-based systems. There are a number of alternative biometric characteristics that can be used for authentication purposes, each with different positive and negative implementation factors. Achieving a successful authentication performance requires effective data processing. This study investigated the use of keystroke dynamics for authentication purposes. A feature selection process, based on normality statistics, was applied …
The Regulation Of Space And Cyberspace: One Coin, Two Sides, Brett Biddington
The Regulation Of Space And Cyberspace: One Coin, Two Sides, Brett Biddington
Australian Information Warfare and Security Conference
In the 1960s, during some very tense days in the Cold War the United States of America (USA) and the Union of Socialist Soviet Republics (USSR) brokered a deal in the United Nations for a treaty regime to govern human activities in outer space. This regime has served well enough for almost 50 years. In recent years, however, fears of space weaponisation, the proliferation of space debris in the Low Earth Orbits (LEO) and increasing demands on the electromagnetic spectrum (EMS) have led to demands for regulatory reform. Some nations now consider space to be the fourth domain of modern …
The Reception, Incorporation And Employment Of Informatin Operations By The Australia Defence Force: 1990-2012, Jeff Malone
The Reception, Incorporation And Employment Of Informatin Operations By The Australia Defence Force: 1990-2012, Jeff Malone
Australian Information Warfare and Security Conference
The paper investigates the Australian Defence Force’s (ADF) approach – understood here as the reception, incorporation and operational employment – to military information operations (IO), from 1990 to 2012. The paper identifies key characteristics of the ADF’s approach to IO, and proposes explanatory factors to account for the specific form the ADF’s approach to IO has been manifested. The paper concludes with predictions regarding the future form of IO within the ADF, in the context of the increasing significance of social media, the upcoming 2013 Defence White Paper (WP13) and the US ‘pivot’ to the Asia-Pacific region. The paper is …
Protective Emblems In Cyber Warfare, Iain Sutherland, Konstantinos Xynos, Andrew Jones, Andrew Blyth
Protective Emblems In Cyber Warfare, Iain Sutherland, Konstantinos Xynos, Andrew Jones, Andrew Blyth
Australian Information Warfare and Security Conference
The Tallinn Manual will be released in February 2013 and makes a significant step towards defining the concepts of cyber warfare. The early draft of the manual is available and the expert working party have interpreted the existing international agreements, instruments and conventions and applied them to the field of cyber warfare. The manual makes a number of interpretations on the legal position of civilians and other parties. The manual makes it clear that the existing conventions are applicable and that civilian / religious and medical systems should be viewed as non-combatants in a cyber conflict. In the kinetic warfare …
Exterminating The Cyber Flea: Irregular Warfare Lessons For Cyber Defence, Ben Whitham
Exterminating The Cyber Flea: Irregular Warfare Lessons For Cyber Defence, Ben Whitham
Australian Information Warfare and Security Conference
Traditional approaches to tactical Computer Network Defence (CND), drawn from the lessons and doctrine of conventional warfare, are based on a team of deployed security professionals countering the adversary’s cyber forces. The concept of the adversary in cyberspace does not fit neatly into the conventional military paradigms. Rather than fighting an identifiable foe, cyber adversaries are clandestine, indistinguishable from legitimate users or external services, operate across state boundaries, and from safe havens that provide sanctuary from prosecution. The defender also faces imbalances with rules of engagement and a severe disparity between the cost of delivering the defence and the attackers …
Al-Jihad Fi Sabilillah: In The Heart Of Green Birds, Robyn Torok
Al-Jihad Fi Sabilillah: In The Heart Of Green Birds, Robyn Torok
Australian Counter Terrorism Conference
With an increasing focus on lone-wolf operations, al-Qaeda is becoming increasingly focussed on its internet discourses and propaganda. One of its most significant discourses is the importance of jihad and martyrdom in carrying out a terrorist attack. This study looks at Facebook pages and profiles and examines the discourses presented in relation to jihad and martyrdom. Three important concepts including their justification are considered: Al-Jihad fi Sabilillah (just fight for the sake of Allah), Istishhad (operational heroism of loving death more than the West love life) and Shaheed (becoming a martyr). Results supported previous studies indicating the strong seductive nature …
Forensic Readiness For Wireless Medical Systems, Brian Cusack, Ar Kar Kyaw
Forensic Readiness For Wireless Medical Systems, Brian Cusack, Ar Kar Kyaw
Australian Digital Forensics Conference
Wireless medical devices and related information systems are vulnerable to use and abuse by unauthorized users. Medical systems are designed for a range of end users in different professional skill groups and also people who carry the devices in and on their bodies. Open, accurate and efficient communication is the priority for medical systems and as a consequence strong protection costs are traded against the utility benefits for open systems. Flexible security provisions are required and strong forensic capabilities built into the systems to treat the risk. In this paper we elaborate the problem area and discuss potential solutions to …
The 2012 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Andy Jones, Thomas Martin, Mohammed Alzaabi
The 2012 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Andy Jones, Thomas Martin, Mohammed Alzaabi
Australian Digital Forensics Conference
The growth in the use of computers in all aspects of our lives has continued to increase to the point where desktop, laptop, netbook or tablet computers are now almost essential in the way that we communicate and work. As a result of this, and the fact that these devices have a limited lifespan, enormous numbers of computers are being disposed of at the end of their useful life by individuals or/and organisations. As the cost of computing has reduced, the level of ‘consumerisation’ has increased together with the requirement for mobility. This has led to an increasing use of …
Commitment And The 1% Motorcycle Club: Threats To The Brotherhood, Kira J. Harris
Commitment And The 1% Motorcycle Club: Threats To The Brotherhood, Kira J. Harris
Australian Counter Terrorism Conference
The brotherhood ethos is the founding principle of the 1% motorcycle clubs community. Interviews with former members and partners show how threatening this social bond can reduce satisfaction and lead to doubts over involvement with the club.
Boko Haram: Terrorist Organization, Freedom Fighters Or Religious Fanatics? An Analysis Of Boko Haram Within Nigeria, An Australian Perspective And The Need For Counter Terrorism Responses That Involves Prescribing Them As A Terrorist Organization., Gabrielle Blanquart
Australian Counter Terrorism Conference
The adoption of Sharia law and the creation of an Islamic government are prominent motivations for religious terrorism within the current climate. Throughout history, Nigeria has been exposed to ethno religious violence and political discontent and has recently seen an escalation in associated violence threatening its sovereignty, territorial integrity, peace and stability. This paper explores Boko Haram, a Nigerian Islamist sect, responsible for numerous attacks in northern and central Nigeria on infrastructure and people. The origins and ideological motivations of this group are examined and compared to the current wave of religious terrorism in relation to tactics, leadership and objectives. …
Secure Key Deployment And Exchange Protocol For Manet Information Management, Brian Cusack, Alastair Nisbet
Secure Key Deployment And Exchange Protocol For Manet Information Management, Brian Cusack, Alastair Nisbet
Australian Digital Forensics Conference
Secure Key Deployment and Exchange Protocol (SKYE) is an innovative encryption Key Management Scheme (KMS) based on a combination of features from recent protocols combined with new features for Mobile Ad Hoc Networks (MANETs). The design focuses on a truly ad hoc networking environment where geographical size of the network, numbers of network members and mobility of the members is all unknown before deployment. This paper describes the process of development of the protocol and the application to system design to assure information security and potential evidential retention for forensic purposes. Threshold encryption key management is utilized and simulation results …
What Is The Proper Forensics Approach On Trojan Banking Malware Incidents?, Andri P. Heriyanto
What Is The Proper Forensics Approach On Trojan Banking Malware Incidents?, Andri P. Heriyanto
Australian Digital Forensics Conference
Digital forensics procedures should be developed to obtain digital evidence with regard to legal requirements such as admissibility, authenticity, completeness, reliability and believability. On the other hand, Trojan banking malware incident has grown significantly and creates a great threat to online banking users globally. This type of malware is known to use anti-forensic technique to avoid forensic detection. Moreover, there are numerous works and researches that impose the drawbacks on post-mortem forensics approach in dealing with evidence that only resided on non-persistence memory or non-volatile memory. There are works that reveal the disadvantage of live-response approach on incident response that …
Harms: Hierarchical Attack Representation Models For Network Security Analysis, Jin Hong, Dong-Seong Kim
Harms: Hierarchical Attack Representation Models For Network Security Analysis, Jin Hong, Dong-Seong Kim
Australian Information Security Management Conference
Attack models can be used to assess network security. Purely graph based attack representation models (e.g., attack graphs) have a state-space explosion problem. Purely tree-based models (e.g., attack trees) cannot capture the path information explicitly. Moreover, the complex relationship between the host and the vulnerability information in attack models create difficulty in adjusting to changes in the network, which is impractical for modern large and dynamic network systems. To deal with these issues, we propose hierarchical attack representation models (HARMs). The main idea is to use two-layer hierarchy to separate the network topology information (in the upper layer) from the …
Territorial Behavior And The Economics Of Botnets, Craig S. Wright
Territorial Behavior And The Economics Of Botnets, Craig S. Wright
Australian Information Security Management Conference
This paper looks at the economics associated with botnets. This research can be used to calculate territorial sizes for online criminal networks. Looking at the types of systems we can compare the time required to maintain the botnet against the benefits received. In doing this it will be possible to formulate economic defence strategies that reduce the benefits received through the control of the botnet. We look at the decision to be territorial or not from the perspective of the criminal bot-herder. This is extended to an analysis of territorial size. The criminal running a botnet seeks to maximize profit. …
Evidence Examination Tools For Social Networks, Brian Cusack, Jung Son
Evidence Examination Tools For Social Networks, Brian Cusack, Jung Son
Australian Digital Forensics Conference
Social networking (SNS) involves computer networks and billions of users who interact for a multiplicity of purposes. The web based services allow people to communicate using many media sources and to build relationship networks that have personalized meanings. Businesses and Governments also exploit the opportunity for economical consumer interaction. With the valued use of SNS services also comes the potential for misuse and legal liability. In this paper three software tools are tested in the laboratory to assess the capability of the tools to extract files from the four most popular web browsers while browsers are being used to surf …
The 2012 Investigation Into Remnant Data On Second Hand Memory Cards Sold In Australia, Patryk Szewczyk, Krishnun Sansurooah
The 2012 Investigation Into Remnant Data On Second Hand Memory Cards Sold In Australia, Patryk Szewczyk, Krishnun Sansurooah
Australian Digital Forensics Conference
This study investigates the remnant data on memory cards that were purchased through Australian second hand auctions sites in 2012. Memory cards are increasing in capacity and are commonly used amongst many consumer orientated electronic devices including mobile phones, tablet computers, cameras and multimedia devices. This study examined 78 second hand memory cards. The investigation shows that confidential data is present on many of the memory cards and that in many instances there is no evidence to suggest that the seller attempted to erase data. In many instances the sellers are asking the buyer to erase the data on the …
Implementing A Secure Academic Grid System - A Malaysian Case, Mohd Samsu Sajat, Suhaidi Hassan, Adi Affandi Ahmad, Ali Yusny Daud, Amran Ahmad
Implementing A Secure Academic Grid System - A Malaysian Case, Mohd Samsu Sajat, Suhaidi Hassan, Adi Affandi Ahmad, Ali Yusny Daud, Amran Ahmad
Australian Information Security Management Conference
Computational grids have become very popular in the recent times due to their capabilities and flexibility in handling large computationally intensive jobs. When it comes to the implementation of practical grid systems, security plays a major role due to the confidentiality of the information handled and the nature of the resources employed. Also due to the complex nature of the grid operations, grid systems face unique security threats compared to other distributed systems. This paper describes how to implement a secure grid system with special emphasis on the steps to be followed in obtaining, implementing and testing PKI certificates.
A Proposed Formula For Comparing Kill Password Effectiveness In Single Password Rfid Systems, Christopher Bolan
A Proposed Formula For Comparing Kill Password Effectiveness In Single Password Rfid Systems, Christopher Bolan
Australian Information Security Management Conference
The Electronic Product Code standard for RFID systems plays a significant role in worldwide RFID implementations. A feature of the RFID standards has been the RFID Kill command which allows for the "permanent" destruction of an RFID tag through the issuing of a simple command. Whilst the inclusion of this command may be vital for user privacy it also opens up significant avenues for attack. Whilst such attacks may be well documented there has been little to no discussion of the efficacy of the differing mitigation approaches taken. A simple formula to calculate the full timing of such an attack …
Human-Readable Real-Time Classifications Of Malicious Executables, Anselm Teh, Arran Stewart
Human-Readable Real-Time Classifications Of Malicious Executables, Anselm Teh, Arran Stewart
Australian Information Security Management Conference
Shafiq et al. (2009a) propose a non–signature-based technique for detecting malware which applies data mining techniques to features extracted from executable files. Their technique has a high level of accuracy, a low false positive rate, and a speed on par with commercial anti-virus products. One portion of their technique uses a multi-layer perceptron as a classifier, which provides little insight into the reasons for classification. Our experience is that network security analysts prefer tools which provide human-comprehensible reasons for a classification, rather than operating as “black boxes”. We therefore build on the results of Shafiq et al. by demonstrating a …
An Investigation Into The Wi-Fi Protected Setup Pin Of The Linksys Wrt160n V2, Symon Aked, Christopher Bolan, Murray Brand
An Investigation Into The Wi-Fi Protected Setup Pin Of The Linksys Wrt160n V2, Symon Aked, Christopher Bolan, Murray Brand
Australian Information Security Management Conference
Wi-Fi Protected Setup (WPS) is a method of allowing a consumer to set up a secure wireless network in a user friendly way. However, in December 2011 it was discovered that a brute force attack exists that reduces the WPS key space from 108 to 104+103. This resulted in a proof of concept tool that was able to search all possible combinations of PINs within a few days.This research presents a methodology to test wireless devices to determine their susceptibility to the external registrar PIN authentication design vulnerability. A number of devices were audited, and the Linksys WRT160N v2 router …
Exposing Potential Privacy Issues With Ipv6 Address Construction, Clinton Carpene, Andrew Woodward
Exposing Potential Privacy Issues With Ipv6 Address Construction, Clinton Carpene, Andrew Woodward
Australian Information Security Management Conference
The usage of 128 bit addresses with hexadecimal representation in IPv6 poses significant potential privacy issues. This paper discusses the means of allocating IPv6 addresses, along with the implications each method may have upon privacy in different usage scenarios. The division of address space amongst the global registries in a hierarchal fashion can provide geographical information about the location of an address, and its originating device. Many IPv6 address configuration methods are available, including DHCPv6, SLAAC (with or without privacy extensions), and Manual assignment. These assignment techniques are dissected to expose the identifying characteristics of each technique. It is seen …
Multiple Peaks In Saber Mesospheric Oh Emission Altitude Profiles, Jordan Rozum, Gene A. Ware, Doran J. Baker, Martin G. Wlynczak, James M. Russell
Multiple Peaks In Saber Mesospheric Oh Emission Altitude Profiles, Jordan Rozum, Gene A. Ware, Doran J. Baker, Martin G. Wlynczak, James M. Russell
Browse All Undergraduate research
No abstract provided.
First Temperature Observations With The Usu Very Large Rayleigh Lidar: An Examination Of Mesopause Temperatures, Leda Sox, Vincent B. Wickwar, Joshua P. Herron, Marcus J. Bingham, Lance W. Petersen, Matthew T. Emerick
First Temperature Observations With The Usu Very Large Rayleigh Lidar: An Examination Of Mesopause Temperatures, Leda Sox, Vincent B. Wickwar, Joshua P. Herron, Marcus J. Bingham, Lance W. Petersen, Matthew T. Emerick
Posters
As the impetus for extended observational measurements throughout the middle atmosphere has increased1 , the limits of previous instrumentation need to be pushed. The Rayleigh lidar group at the Atmospheric Lidar Observatory (ALO) at Utah State University has pushed such limits on existing Rayleigh scatter lidar technology and, through major upgrades to the previous lidar system, has been able to gather temperature measurements in the upper mesosphere and lower thermosphere from approximately 70P109 km. A data campaign with the new system was conducted around the annual temperature minimum, centered on late June 2012, in this region. The temperatures from this …
Visualizing Digital Collections At Archive-It, Michele C. Weigle, Michael L. Nelson
Visualizing Digital Collections At Archive-It, Michele C. Weigle, Michael L. Nelson
Computer Science Presentations
PDF of a powerpoint presentation from a Archive-It Partners Meeting in Annapolis, Maryland, December 3, 2012. Also available on Slideshare.
Probing Radical Pathways In Electrophilic Addition Of Halogens: Classical Vs. Bridged Intermediates, Lisa George, Aimable Kalume, Scott Reid
Probing Radical Pathways In Electrophilic Addition Of Halogens: Classical Vs. Bridged Intermediates, Lisa George, Aimable Kalume, Scott Reid
Chemistry Faculty Research and Publications
We examine radical mediated pathways in electrophilic addition to the simplest alkene, ethylene, where the structure of the radical intermediate has been extensively debated. Starting from the π-complex with a dihalogen, C2H4⋯I2, isolated in an inert matrix, we initiate reaction by photolytically cleaving the I2 bond. We succeed in trapping and spectroscopically interrogating the symmetrically bridged radical complex, which calculations confirm is the global minimum on the C2H5I Potential Energy Surface (PES). Consistent with the participation of a bridged intermediate, radical addition preferentially but not exclusively yields the anti …
Necessary And Sufficient Informativity Conditions For Robust Network Reconstruction Using Dynamical Structure Functions, Vasu Nephi Chetty
Necessary And Sufficient Informativity Conditions For Robust Network Reconstruction Using Dynamical Structure Functions, Vasu Nephi Chetty
Theses and Dissertations
Dynamical structure functions were developed as a partial structure representation of linear time-invariant systems to be used in the reconstruction of biological networks. Dynamical structure functions contain more information about structure than a system's transfer function, while requiring less a priori information for reconstruction than the complete computational structure associated with the state space realization. Early sufficient conditions for network reconstruction with dynamical structure functions severely restricted the possible applications of the reconstruction process to networks where each input independently controls a measured state. The first contribution of this thesis is to extend the previously established sufficient conditions to incorporate …
The Role Of Dynamic Capabilities In Creating Business Value From Is Assets, Rajeev Sharma, Graeme Shanks
The Role Of Dynamic Capabilities In Creating Business Value From Is Assets, Rajeev Sharma, Graeme Shanks
Professor Rajeev Sharma
This paper draws on and extends the emerging literature on dynamic capabilities to understand and explain the role ofinformation systems (IS) assets in creating business value. Our analysis identifies the critical roles of managerial actions andthe organizational context in identifying, resourcing and implementing IS-enabled competitive actions in delivering businessvalue. This paper extends earlier treatments of the relationship between IS assets and organizational strategy and performanceby explicitly accounting for the roles of human agency and context, which have not been adequately addressed in priorliterature. A research model for future research is proposed.
Research Methods And The Relevance Of The Is Discipline: A Critical Analysis Of The Role Of Methodological Pluralism, Rajeev Sharma
Research Methods And The Relevance Of The Is Discipline: A Critical Analysis Of The Role Of Methodological Pluralism, Rajeev Sharma
Associate Professor Rajeev Sharma
No abstract provided.
Investigating The Effect Of Participation-Limiting Structures On Outcomes Of E-Democracy Systems (Research In Progress), Rajeev Sharma
Investigating The Effect Of Participation-Limiting Structures On Outcomes Of E-Democracy Systems (Research In Progress), Rajeev Sharma
Professor Rajeev Sharma
Modern information systems provide a technical foundation for greater participation of citizens in the agenda-setting and decision-making processes of government. Information systems researchers and designers will need to address a number of issues to design IS applications for the effective functioning of evolving forms of democracy. This paper identifies a research agenda at the intersection of information systems research, economics and political science research and avenues for information systems researchers to contribute to the research agenda.
On The Atomic Decomposition Of H^1 And Interpolation, Robert Sharpley
On The Atomic Decomposition Of H^1 And Interpolation, Robert Sharpley
Robert Sharpley
© 1986 by American Mathematical Society