Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 177.

Add to Quick Collection   All 177 Results

Sort:
 Add All Items to Quick Collection
Date: 2017
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1248960
Description: In a cognitive radio network (CRN), energy detection is one of the most efficient spectrum sensing techniques for the protection of legacy spectrum users, with which the presence of primary users (PUs ... More
Reviewed: Reviewed
Date: 2017
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1248708
Description: RFID Grouping proof convinces an offline verifier that multiple tags are simultaneously scanned. Various solutions have been proposed but most of them have security and privacy vulnerabilities. In thi ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1161748
Description: In this paper, we propose new types of cascading attacks against smart grid that use control command disaggregation and core smart grid services. Although there have been tremendous research efforts i ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1235507
Description: Intrusion Detection System is one of the challenging research areas in Cloud Security. Security incidents such as Denial of service, scanning, malware code injection, virus, worm and password cracking ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1222199
Description: Today we are living in the era of Cloud Computing where services are provisioned to users on demand and on a pay-per-use basis. On oneside, Cloud Computing has made things easier but it has also opene ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1248822
Description: In this paper, we propose a policy driven security architecture for securing end to end services across multiple autonomous domain based SDN environment. We develop a language based approach to design ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1161130
Description: Software Defined Network(SDN) is a promising technological advancement in the networking world. It is still evolving and security is a major concern for SDN. In this paper we proposed policy based sec ... More
Reviewed: Reviewed
Date: 2016
Subject Keyword: Big Data Security | Security Attacks
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1145431
Description: In this paper we propose techniques for securing big data environments such as public cloud with tenants using their virtual machines for different services such as utility and healthcare. Our model m ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1048991
Description: In this paper, we introduce a new method of data transformation for finger vein recognition system. Our proposed method uses kernel mapping functions to map the data before performing Principal Compon ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1048869
Description: Exploit kits have become a major cyber threat over the last few years. They are widely used in both massive and highly targeted cyber attack operations. The exploit kits make use of multiple exploits ... More
Reviewed: Reviewed
Date: 2015
Subject Keyword: botnet | network security | IPFIX | NetFlow
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1048987
Description: The botnet is a group of hijacked computers, which are employed under command and control mechanism administered by a botmaster. Botnet evolved from IRC based centralized botnet to employing common pr ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1049123
Description: Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that mu ... More
Reviewed: Reviewed
Date: 2015
Subject Keyword: SDN | Botnet | IPFIX
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/359674
Description: Software Defined Networking (SDN) is considered as a new approach promising simplified network management by providing a programmable interface. The idea of SDN is based on the separation of control p ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1054613
Description: In this paper, we propose a realistic malware attack against the smart grid. The paper first briefs the architecture of the smart grid in general. And then we explain our proposed attack that is speci ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1061193
Description: In this paper, we analyse the Internet of Things (IoT) aspect of smart home from a security perspective, and adapt an advanced malware technique (called feature-distributed malware) for the IoT. We de ... More
Reviewed: Reviewed