Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 214.

Add to Quick Collection   All 214 Results

Sort:
 Add All Items to Quick Collection
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1195165
Description: Major anti-virus solutions have introduced a feature known as ‘self-protection’ so that malware (and even users) cannot modify or disable the core functionality of their products. In this paper, we ha ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1161748
Description: In this paper, we propose new types of cascading attacks against smart grid that use control command disaggregation and core smart grid services. Although there have been tremendous research efforts i ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1161130
Description: Software Defined Network(SDN) is a promising technological advancement in the networking world. It is still evolving and security is a major concern for SDN. In this paper we proposed policy based sec ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1102117
Description: In mobile communication, spatial queries pose a serious threat to user location privacy because the location of a query may reveal sensitive information about the mobile user. In this paper, we study ... More
Reviewed: Reviewed
Date: 2016
Subject Keyword: Big Data Security | Security Attacks
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1145431
Description: In this paper we propose techniques for securing big data environments such as public cloud with tenants using their virtual machines for different services such as utility and healthcare. Our model m ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper abstract
Identifier: http://hdl.handle.net/1959.14/1193093
Description: 1 page(s)
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1048991
Description: In this paper, we introduce a new method of data transformation for finger vein recognition system. Our proposed method uses kernel mapping functions to map the data before performing Principal Compon ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/356183
Description: We introduce Feature Dependent Kernel Entropy Component Analysis (FDKECA) as a new extension to Kernel Entropy Component Analysis (KECA) for data transformation and dimensionality reduction in Image-b ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1048869
Description: Exploit kits have become a major cyber threat over the last few years. They are widely used in both massive and highly targeted cyber attack operations. The exploit kits make use of multiple exploits ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/362825
Description: In many network applications, the nature of traffic is of burst type. Often, the transient response of network to such traffics is the result of a series of inter-dependant events whose occurrence pre ... More
Reviewed: Reviewed
Date: 2015
Subject Keyword: botnet | network security | IPFIX | NetFlow
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1048987
Description: The botnet is a group of hijacked computers, which are employed under command and control mechanism administered by a botmaster. Botnet evolved from IRC based centralized botnet to employing common pr ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1049123
Description: Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that mu ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1051779
Description: In this paper, a whole identification system is introduced for finger vein recognition. The proposed algorithm first maps the input data into kernel space, then; two-dimensional principal component an ... More
Date: 2015
Subject Keyword: SDN | Botnet | IPFIX
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/359674
Description: Software Defined Networking (SDN) is considered as a new approach promising simplified network management by providing a programmable interface. The idea of SDN is based on the separation of control p ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1054613
Description: In this paper, we propose a realistic malware attack against the smart grid. The paper first briefs the architecture of the smart grid in general. And then we explain our proposed attack that is speci ... More
Reviewed: Reviewed