Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 55.

Add to Quick Collection   All 55 Results

Sort:
 Add All Items to Quick Collection
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1250731
Description: 3 page(s)
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1250669
Description: Security is of paramount importance in this new era of on-demand Cloud Computing. Researchers have provided a survey on several intrusion detection techniques for detecting intrusions in the cloud com ... More
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1240876
Description: Lightweight devices such as smart cards and RFID tags have a very limited hardware resource, which could be too weak to cope with asymmetric-key cryptography. It would be desirable if the cryptographi ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1195165
Description: Major anti-virus solutions have introduced a feature known as ‘self-protection’ so that malware (and even users) cannot modify or disable the core functionality of their products. In this paper, we ha ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1249582
Description: With the rapid developments occurring in cloud services, there has been a growing trend to use cloud for large-scale data storage. Due to the increasing popularity of cloud storage, many healthcare or ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1102117
Description: In mobile communication, spatial queries pose a serious threat to user location privacy because the location of a query may reveal sensitive information about the mobile user. In this paper, we study ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1249588
Description: Modern computing platforms have progressed to deploying more secure software with various defensive techniques such as code signing and application whitelisting. However, the adversary, on the other h ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/356183
Description: We introduce Feature Dependent Kernel Entropy Component Analysis (FDKECA) as a new extension to Kernel Entropy Component Analysis (KECA) for data transformation and dimensionality reduction in Image-b ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/362825
Description: In many network applications, the nature of traffic is of burst type. Often, the transient response of network to such traffics is the result of a series of inter-dependant events whose occurrence pre ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/356118
Description: Cloud storage auditing is viewed as an important service to verify the integrity of the data in public cloud. Current auditing protocols are all based on the assumption that the client's secret key fo ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1048696
Description: Due to the enormous growth in the amount of digital information that needs to be stored, outsourcing data to third-party storage service providers, such as cloud, have attracted much attention in rece ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1043972
Description: The current mobile devices have become smart and are increasingly being used for conducting business and personal activities. Also, there is increasing number of attacks targeting such mobile devices. ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/355967
Description: Radio Frequency Identification (RFID) has been widely adopted in practice for objects identification. The ownership of an object can be represented by the ownership of the RFID tag attached to the obj ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/363107
Description: Cloud data storage has provided significant benefits by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud, cryptog ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1043943
Description: Cloud computing technologies are receiving a great deal of attention. Although there are several benefits with the cloud, attackers can also make use of the cloud infrastructure for hosting malicious ... More
Reviewed: Reviewed