Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 19.

Add to Quick Collection   All 19 Results

Sort:
 Add All Items to Quick Collection
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1161748
Description: In this paper, we propose new types of cascading attacks against smart grid that use control command disaggregation and core smart grid services. Although there have been tremendous research efforts i ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1096855
Description: The paper considers the complexity of verifying that a finite state system satisfies a number of definitions of information flow security. The systems model considered is one in which agents operate s ... More
Reviewed: Reviewed
Date: 2015
Subject Keyword: Australia | China | United States | India | Security | Strategy
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/355556
Description: India and Australia held a set of largely divergent strategic perspectives during the Cold War period, which prevented any significant strategic relationship from developing at that time. Since the en ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1054613
Description: In this paper, we propose a realistic malware attack against the smart grid. The paper first briefs the architecture of the smart grid in general. And then we explain our proposed attack that is speci ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1055875
Description: In this paper, we introduce a belief propagation based technique to combat the effects of primary user emulation attacks (PUEA) in Cognitive Radio (CR) Networks. Primary user emulation attacks have be ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1054102
Description: A critical issue in environmental decision making is how to trust the monitoring information gathered by a multitude of devices at remote locations. The accuracy of information helps in enhancing the ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/331551
Description: RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threa ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/327587
Description: The security of modern computer systems heavily depends on security tools, especially on antivirus software solutions. In the anti-malware research community, development of techniques for evading det ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/307876
Description: Modern computing platforms have progressed to more secure environments with various defensive techniques such as application-based permission and application whitelisting. In addition, anti-virus solu ... More
Reviewed: Reviewed
Date: 2014
Subject Keyword: Network | Skype | VoIP | Security | Machine learning
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/358917
Description: Voice over IP (VoIP) technologies such as Skype are becoming increasingly popular and widely used in different organisations, and therefore identifying the usage of this service at the network level b ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/358751
Description: Purpose: The purpose of this paper is to mitigate vulnerabilities in web applications, security detection and prevention are the most important mechanisms for security. However, most existing research ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/280756
Description: In practical applications, the owner of an RFID-tagged item canchange. In this paper, we propose a new RFID ownership transfer protocol using elliptic-curve cryptography. The paper first considers sec ... More
Reviewed: Reviewed
Date: 2013
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/284621
Description: Today mobile devices are increasingly being used to provide health related information to healthcare related services on the Internet. However such devices have limited resources to enforce strong sec ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/206121
Description: This paper examines whether the underlying demographic factors that precipitated the wave of popular uprisings across the Middle East, popularized as the “Arab Spring,” can be used to predict the like ... More
Reviewed: Reviewed
Date: 2012
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/310526
Description: Recent advances in hardware, software, and communication technologies are enabling the design and implementation of a whole range of different types of networks that are being deployed in various envi ... More
Reviewed: Reviewed