Academic literature on the topic 'Computer networks Security measures Australia'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks Security measures Australia.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks Security measures Australia"

1

Asre, Shashank, and Adnan Anwar. "Synthetic Energy Data Generation Using Time Variant Generative Adversarial Network." Electronics 11, no. 3 (January 24, 2022): 355. http://dx.doi.org/10.3390/electronics11030355.

Full text
Abstract:
Energy consumption data is being used for improving the energy efficiency and minimizing the cost. However, obtaining energy consumption data has two major challenges: (i) data collection is very expensive, time-consuming, and (ii) security and privacy concern of the users which can be revealed from the actual data. In this research, we have addressed these challenges by using generative adversarial networks for generating energy consumption profile. We have successfully generated synthetic data which is similar to the real energy consumption data. On the basis of the recent research conducted on TimeGAN, we have implemented a framework for synthetic energy consumption data generation that could be useful in research, data analysis and create business solutions. The framework is implemented using the real-world energy dataset, consisting of energy consumption data of the year 2020 for the Australian states of Victoria, New South Wales, South Australia, Queensland and Tasmania. The results of implementation is evaluated using various performance measures and the results are showcased using visualizations along with Principal Component Analysis (PCA) and t-distributed stochastic neighbor embedding (TSNE) plots. Overall, experimental results show that Synthetic data generated using the proposed implementation possess very similar characteristics to the real dataset with high comparison accuracy.
APA, Harvard, Vancouver, ISO, and other styles
2

Slay, J., and B. Turnbull. "Computer Security Education and Research in Australia." IEEE Security & Privacy Magazine 4, no. 5 (September 2006): 60–63. http://dx.doi.org/10.1109/msp.2006.115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, and Dieter Gollmann. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (April 1, 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”). Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided. The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described. General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided. The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
APA, Harvard, Vancouver, ISO, and other styles
6

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (March 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Kuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.

Full text
Abstract:
The terms “kiberushishroeba” (cyber security) and “kiberusaprtkhoeba” (computer security) are often used in inappropriate contexts. The term “kiberushishroeba” is used when the avoidance of an imminent threat requires the formulation and implementation of socio-political measures (development and adoption of doctrines, laws, legal acts, improvement of the “kiberushishroeba” and “kiberusaprtkhoeba” assurance management process), because the state of protection of national interests in cyberspace is achieved through the establishment of an effective Computer Security system, cyberspace sustainability, protection from unwanted internal and external influences – as a result of qualified cyber policy. The starting-point in “kiberushishroeba” providing is political aim and the result – to achieve them. “Kiberusaprtkhoeba” is an integral component of “kiberushishroeba”, a carrier of different content and weight. “Kiberusaprtkhoeba” is a combination of technologies, methods and processes of technical protection against cyberattacks of components (networks, computers, programs, data, devices) within the field of computer and information-telecommunication. It is more associated with protection from "technical" threats (to be taken organizational-technical measures: to identify those responsible for the operation safety of the computerinformation-telecommunication field and to introduce appropriate technical infrastructure and security system) or rather to “protection of labor safety” than formulation and implementation of socio-political goals. The goal of “kiberusaprtkhoeba” is to protect them, and to achieve this protection as a whole is ensuring of the result that meets the requirements of the political goal of “kiberushishroeba”.
APA, Harvard, Vancouver, ISO, and other styles
9

Smith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (July 1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.

Full text
Abstract:
with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer networks Security measures Australia"

1

Hicks, Michael. "Organisational barriers and their relationship to the effective use of information system audit trails." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2006. https://ro.ecu.edu.au/theses/335.

Full text
Abstract:
Audit trails are important asa detection and monitoring mechanism for unethical or unauthorised behaviour from internal, as well as external users. In addition, they can be used to demonstrate a proof of business process or as an evidentiary record to assess the integrityof an information system. Their effective use is promoted as being an essential component of a well-balanced and complete security policy. Despite the widespread acknowledgrnent of the importance of audit trails, surveys have repeatedly shown they are often neglected in terms of both the degree of implementation and effectiveness. This study explores the evidence that suggests that organisational issues, rather than technical problems may be the cause of deficiencies in audit trail effectiveness. Organisational barriers identified in current and prior studies include, lack of appropriate training, lack of comprehensive security policies and procedures, and an absence of IT staff recruitment policy.
APA, Harvard, Vancouver, ISO, and other styles
2

Sato, Keiko. "Privacy on the internet : Investigation into corporate privacy policy of Australian large private sector organisations on the internet." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1032.

Full text
Abstract:
The popularity of the Internet has been dramatically increased over recent years. The rapid growth of this technology and its international use has made it almost impossible to regulate the internet. As a result, the Internet has certainly provided freedoms to people and it has led to some abusing systems. Privacy is one of the major issues in the development of Electronic Commerce using the Internet. As an enormous amount of personal information is transmitted to several hosts connecting to the Internet, the information can be accessed by both authorised and unauthorised people. Although it is certain that there are several existing problems of using the Internet for business activities, many organisations have already started using it. It is believed that the Internet provides efficiency and effectiveness for various activities Although much research has been described the business use of the Internet in many countries, these studies have not specifically investigated Australian organisations. Therefore, this research investigates the current use of the Internet by Australian organisations and their associated privacy policies, as a means of seeking their privacy concerns. Using a benchmark provided by Australian privacy commissioners, it evaluates their privacy policies to see how well they are established to protect privacy of users. The study utilises the top 100 Australian large private sector organisations as the sample. The current practice of the sample organisations on the Internet was observed by exploring their Web sites. Privacy policies were also collected from their Web sites. Moreover, a letter requesting corporate privacy policy was sent to each organisation that collects personal information on the Internet. The result showed that the majority of Australian organisations were using the Internet today, but a surprisingly few organisations showed their privacy policy on the Internet. Also, this research showed that many organisations did not actually have a corporate privacy policy. Many organisations are using the Internet without apparent concern for customers' privacy. The organisations proactively involved in the Internet Commerce are more concerned about security side of the Internet. Hence, they appear to believe that the technology itself protects information sent on the Internet. It has become clear that technology by itself does not provide the security needed for users of the Internet as unethical act of authorised parties could harm privacy of individuals. There is an argument that the Internet needs to be regulated. However, the process of international regulation on the Internet has not been started. Thus, it is ideal that organisations proactively protect clients' personal information accessible by the use of the Internet technology. This study looks at the methods of obtaining privacy of individuals and suggests the ideal conduct of organisations.
APA, Harvard, Vancouver, ISO, and other styles
3

Valli, Craig. "Non-business use of the World Wide Web : A study of selected Western Australian organisations." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1311.

Full text
Abstract:
Employees undertake a wide range of activities when they use the World Wide Web in the work place. Some of these activities may leave the modem Internet connected organisation vulnerable to undue or unknown risk, potential productivity losses and expense us a result of misuse or abuse or the Internet provision. Much of the existing literature on this subject points to a purported epidemic of misuse in the workplace. If this practice is so prevalent and widespread, what can modem Internet connected organisations do to identify the abuse and reduce the risks and losses that these abuses represent? To what extent is the World Wide Web used by employees for non-business related activities in organisations and can filtering or organisational policies impact on this activity? This research specifically examines contextually, the level of misuse with respect to the use of the World Wide Web in three selected Western Australian organisations using multiple interpretive case study as the vehicle for the study. The research is significant internationally to all organisations that use Internet in their everyday work. The research has discovered anomalous behaviour on the part of non-business users who have employed a variety of techniques and tactics to mask their activities. Also, organisational management in the cases examined had demonstrated shortfalls in their perception of misuse within their organisations and, the implementation of effective policy.
APA, Harvard, Vancouver, ISO, and other styles
4

Bailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

LU, WEN-PAI. "SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION)." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183922.

Full text
Abstract:
This dissertation concerns investigations on two of the most important problems in establishing communication security in computer networks: (1) developing a model which precisely describes the mechanism that enforces the security policy and requirements for a secure network, and (2) designing a key management scheme for establishing a secure session for end-to-end encryption between a pair of communicants. The security mechanism attempts to ensure secure flow of information between entities assigned to different security classes in different computer systems attached to a computer communication network. The mechanism also controls the accesses to the network devices by the subjects (users and processes executed on behalf of the users). The communication security problem is formulated by using a mathematical model which precisely describes the security requirements for the network. The model integrates the notions of access control and information flow control to provide a Trusted Network Base (TNB) for the network. The demonstration of security of the network when the security mechanism is designed following the present model is given by using mathematical induction techniques. The problem of designing key management schemes for establishing end-to-end encrypted sessions between source-destination pairs when the source and the destination are on different networks interconnected via Gateways and intermediate networks is examined. In such an internet environment, the key management problem attains a high degree of complexity due to the differences in the key distribution mechanisms used in the constituent networks and the infeasibility of effecting extensive hardware and software changes to the existing networks. A hierarchical approach for key management is presented which utilizes the existing network specific protocols at the lower levels and protocols between Authentication Servers and/or Control Centers of different networks at the higher levels. Details of this approach are discussed for specific illustrative scenarios to demonstrate the implementational simplicity. A formal verification of the security of the resulting system is also conducted by an axiomatic procedure utilizing certain combinatory logic principles. This approach is general and can be used for verifying the security of any existing key management scheme.
APA, Harvard, Vancouver, ISO, and other styles
6

Dong, Ying, and 董穎. "Providing security services for mobile ad hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B3955711X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Davis, Carlton R. "Security protocols for mobile ad hoc networks." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102970.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are generating much interest both in academia and the telecommunication industries. The principal attractions of MANETs are related to the ease with which they can be deployed due to their infrastructure-less and decentralized nature. For example, unlike other wireless networks, MANETs do not require centralized infrastructures such as base stations, and they are arguably more robust due to their avoidance of single point of failures. Interestingly, the attributes that make MANETs attractive as a network paradigm are the same phenomena that compound the challenge of designing adequate security schemes for these innovative networks.
One of the challenging security problems is the issue of certificate revocation in MANETs where there are no on-line access to trusted authorities. In wired network environments, when certificates are to be revoked, certificate authorities (CAs) add the information regarding the certificates in question to certificate revocation lists (CRLs) and post the CRLs on accessible repositories or distribute them to relevant entities. In purely ad hoc networks, there are typically no access to centralized repositories or trusted authorities; therefore the conventional method of certificate revocation is not applicable.
Another challenging MANET security problem is the issue of secure routing in the presence of selfish or adversarial entities which selectively drop packets they agreed to forward; and in so doing these selfish or adversarial entities can disrupt the network traffic and cause various communication problems.
In this thesis, we present two security protocols we developed for addressing the above-mentioned MANET security needs. The first protocol is a decentralized certificate revocation scheme which allows the nodes within a MANET to have full control over the process of certificate revocation. The scheme is fully contained and it does not rely on any input from centralized or external entities such as trusted CAs. The second protocol is a secure MANET routing scheme we named Robust Source Routing (RSR). In addition to providing data origin authentication services and integrity checks, RSR is able to mitigate against intelligent, colluding malicious agents which selectively drop or modify packets they are required to forward.
APA, Harvard, Vancouver, ISO, and other styles
8

Kalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.

Full text
Abstract:
Slow and suspicious activities on modern computer networks are increasingly hard to detect. An attacker may take days, weeks or months to complete an attack life cycle. A particular challenge is to monitor for stealthy attempts deliberately designed to stay beneath detection thresholds. This doctoral research presents a theoretical framework for effective monitoring of such activities. The main contribution of this work is a scalable monitoring scheme proposed in a Bayesian framework, which allows for detection of multiple attackers by setting a threshold using the Grubbs’ test. Second contribution is a tracing algorithm for such attacks. Network paths from a victim to its immediate visible hops are mapped and profiled in a Bayesian framework and the highest scored path is prioritised for monitoring. Third contribution explores an approach to minimise data collection by employing traffic sampling. The traffic is sampled using the stratification sampling technique with optimum allocation method. Using a 10% sampling rate was sufficient to detect simulated attackers, and some network parameters affected on sampling error. Final contribution is a target-centric monitoring scheme to detect nodes under attack. Target-centric approach is quicker to detect stealthy attacks and has potential to detect collusion as it completely independent from source information. Experiments are carried out in a simulated environment using the network simulator NS3. Anomalous traffic is generated along with normal traffic within and between networks using a Poisson arrival model. Our work addresses a key problem of network security monitoring: a scalable monitoring scheme for slow and suspicious activities. State size, in terms of a node score, is a small number of nodes in the network and hence storage is feasible for very large networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Full text
Abstract:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the financial muscle that other business activities experience. However, as an area that is made up of specialist activities, information security may not easily be comprehended at board level like other business related activities. Yet the board of directors needs to provide oversight of information security. That is, put an information security programme in place to ensure that information is adequately protected. This raises a number of challenges. One of the challenges is how can information security be understood and well informed decisions about it be made at the board level? This dissertation provides a mechanism to present information at board level on how information security is implemented according to the vision of the board of directors. This mechanism is built upon well accepted and documented concepts of information security. The mechanism (termed An Organisational Information Security Profile or OISP) will assist organisations with the initialisation, monitoring, measuring, reporting and reviewing of information security programmes. Ultimately, the OISP will make it possible to know if the information security endeavours of the organisation are effective or not. If the information security programme is found to be ineffective, The OISP will facilitate the pointing out of areas that are ineffective and what caused the ineffectiveness. This dissertation also presents how the effectiveness or ineffctiveness of information security can be presented at board level using well known visualisation methods. Finally the contribution, limits and areas that need more investigation are provided.
APA, Harvard, Vancouver, ISO, and other styles
10

Ren, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer networks Security measures Australia"

1

Cobb, Adam. Australia's vulnerability to information attack: Towards a national information policy. Canberra, Australia: Strategic and Defence Studies Centre, Australian National University, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liqun, Chen, Mu Yi 1955-, and Susilo Willy, eds. Information security practice and experience: 4th international conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008 : proceedings. Berlin: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Officers, Western Australia Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police. Western Australia Police Service: Information management and security. Perth]: Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Western Australia. Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers. Western Australia Police Service: Corruption prevention strategies. Perth]: Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Western Australia. Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Western Australian Police Officers. Western Australia Police Service: Internal investigations and disciplinary processes. Perth]: Royal Commission into Whether There Has Been Any Corrupt or Criminal Conduct by Any Western Australian Police Officer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

M, González Nieto Juan, ed. Autonomic and trusted computing: 6th international conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 proceedings. New York: Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Computer security fundamentals. 2nd ed. Indianapolis, Ind: Pearson IT Certification, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Oram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Per, Christoffersson, ed. Security mechanisms for computer networks. Chichester, West Sussex, England: Ellis Horwood, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

John, Mallery, ed. Hardening network security. New York: McGraw-Hill/Osborne, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer networks Security measures Australia"

1

Michael, Mark. "Physical Security Threats and Measures." In Handbook of Computer Networks, 596–631. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilbur, Steve R., Jon Crowcroft, and Yuko Murayama. "MAC layer security measures in local area networks." In Lecture Notes in Computer Science, 53–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/3-540-51754-5_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stepień, Krzysztof, and Aneta Poniszewska-Marańda. "Towards the Security Measures of the Vehicular Ad-Hoc Networks." In Lecture Notes in Computer Science, 233–48. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05081-8_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Parwekar, Pritee, and Sparsh Arora. "Security Issues and Its Counter Measures in Mobile Ad Hoc Networks." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I, 301–9. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rohilla, Shourya, and Rejo Mathew. "Comparison of Cloud Computing Security Threats and Their Counter Measures." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019), 224–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wallis, Tania, Greig Paul, and James Irvine. "Organisational Contexts of Energy Cybersecurity." In Computer Security. ESORICS 2021 International Workshops, 384–402. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_22.

Full text
Abstract:
AbstractThe energy system is going through huge transformation to integrate distributed renewable generation and to achieve the goals of net-zero carbon emissions. This involves a significant adjustment to how the system is controlled and managed, with increasing digitalisation of technology and growing complexities across interconnected systems. Traditionally electricity networks adjusted their supply of energy in response to changes in demand. The future energy system will require more flexible demand to be able to use or store energy when renewables are generating. This change is exacerbated by additional demand for electricity for heat and transport uses.Utility organisations hold responsibility for securing their networks and assuring the supply of electricity. This paper describes a full investigation of cybersecurity issues and concerns for utilities. This industry review was carried out to create a clear organisational context for the ongoing design of cybersecurity improvements. The assessment of potential impact and consequences of cyber-attack is recommended to direct necessary preparations towards protecting essential functions and processes. Improving resilience across interdependent actors is discussed and resilience measures suggested to guide the contributions of different actors towards whole system resilience.
APA, Harvard, Vancouver, ISO, and other styles
7

Hanif, Muhammad Abdullah, Faiq Khalid, Rachmad Vidya Wicaksana Putra, Mohammad Taghi Teimoori, Florian Kriebel, Jeff (Jun) Zhang, Kang Liu, et al. "Robust Computing for Machine Learning-Based Systems." In Dependable Embedded Systems, 479–503. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_20.

Full text
Abstract:
AbstractThe drive for automation and constant monitoring has led to rapid development in the field of Machine Learning (ML). The high accuracy offered by the state-of-the-art ML algorithms like Deep Neural Networks (DNNs) has paved the way for these algorithms to being used even in the emerging safety-critical applications, e.g., autonomous driving and smart healthcare. However, these applications require assurance about the functionality of the underlying systems/algorithms. Therefore, the robustness of these ML algorithms to different reliability and security threats has to be thoroughly studied and mechanisms/methodologies have to be designed which result in increased inherent resilience of these ML algorithms. Since traditional reliability measures like spatial and temporal redundancy are costly, they may not be feasible for DNN-based ML systems which are already super computer and memory intensive. Hence, new robustness methods for ML systems are required. Towards this, in this chapter, we present our analyses illustrating the impact of different reliability and security vulnerabilities on the accuracy of DNNs. We also discuss techniques that can be employed to design ML algorithms such that they are inherently resilient to reliability and security threats. Towards the end, the chapter provides open research challenges and further research opportunities.
APA, Harvard, Vancouver, ISO, and other styles
8

Adogbeji, Oghenevwogaga Benson. "Computer Security in Cybercafés." In Security and Software for Cybercafes, 18–29. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.

Full text
Abstract:
The purpose of this chapter is to address the security breaches in cybercafés and also suggest measures of securing the unsecured computers. In order that cybercafés operate breach free Internet services, there is need for measures to be put in place to secure their network. This chapter of the book therefore unveils the security situation in cybercafés with the view to address network security, network breaches, and methods of protecting cybercafés’ systems. The chapter reveals some ways through which cybercafés encountered breaches such as Trojan horse programs, back door and remote administration programs, unauthorized access, denial of service, and so forth, and equally suggests measures of protecting the computers or networks such as installation of firewalls, use of antivirus, avoidance of opening unknown attachments, disabling of hidden filename extensions, keeping all applications parched, disconnecting from the net when not in use, regular backup of data, virtual private networks, and so forth.
APA, Harvard, Vancouver, ISO, and other styles
9

Aikins, Stephen K. "Practical Measures for Securing Government Networks." In Handbook of Research on Public Information Technology, 386–94. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-857-4.ch037.

Full text
Abstract:
The modern network and Internet security vulnerabilities expose state and local government networks to numerous threats such as denial of service (DoS) attacks, computer viruses, unauthorized access, confidentiality breaches, and so forth. For example, in June 2005, the state of Delaware saw a spike of 141,000 instances of “suspicious activity” due to a variant of the mytopb worm, which could have brought the state’s network to its knees had appropriate steps not been taken (Jarrett, 2005; National Association of State Chief Information Officers [NASCIO], 2006b). On an average day, the state of Michigan blocks 22,059 spam e-mails, 21,702 e-mail viruses, 4,239 Web defacements, and six remote computer takeover attempts. Delaware fends off nearly 3,000 attempts at entering the state’s network daily (NASCIO, 2006b). Governments have the obligation to manage their information security risks by securing mission- critical internal resources such as financial records and taxpayer sensitive information on their networks. Consequently, public-sector information security officers are faced with the challenge to contain damage from compromised systems, prevent internally and Internet-launched attacks, provide systems for logging and intrusion detection, and build frameworks for administrators to securely manage government networks (Oxlenhandler, 2003). This chapter discusses some of the cost-effective measures needed to address government agency information security vulnerabilities and related threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Lokbani, Ahmed Chaouki, Ahmed Lehireche, Reda Mohamed Hamou, and Abdelmalek Amine. "Synthesis of Supervised Approaches for Intrusion Detection Systems." In Network Security Technologies, 44–57. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4789-3.ch003.

Full text
Abstract:
Given the increasing number of users of computer systems and networks, it is difficult to know the profile of the latter, and therefore, intrusion has become a highly prized area of network security. In this chapter, to address the issues mentioned above, the authors use data mining techniques, namely association rules, decision trees, and Bayesian networks. The results obtained on the KDD'99 benchmark have been validated by several evaluation measures and are promising and provide access to other techniques and hybridization to improve the security and confidentiality in the field.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks Security measures Australia"

1

Ghorbel, Ahmed, Imen Tajouri, Walid Elaydi, and Nouri Masmoudi. "The effect of the similarity measures and the interpolation techniques on fractional eigenfaces algorithm." In 2015 World Symposium on Computer Networks and Information Security (WSCNIS). IEEE, 2015. http://dx.doi.org/10.1109/wscnis.2015.7368300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fang, Chaojun. "Study on security problems and preventive measures of computer network and foreign trade and business." In 3rd International Conference on Green Communications and Networks. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/gcn130101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hayes, Jan, Lynne Chester, and Dolruedee Kramnaimuang King. "Is Public Safety Impacted by the Multiple Regulatory Regimes for Gas Pipelines and Networks?" In 2018 12th International Pipeline Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/ipc2018-78160.

Full text
Abstract:
Gas pipelines and networks are subject to multiple regulatory governance arrangements. One regime is economic regulation which is designed to ensure fair access to gas markets and emulate the price pressures of competition in a sector dominated by a few companies. Another regime is technical regulation which is designed to ensure pipeline system integrity is sufficient for the purposes of public safety, environmental protection and physical security of supply. As was highlighted in analysis of the San Bruno pipeline failure, these two regulatory regimes have substantially different orientations towards expenditure on things such as maintenance and inspection which ultimately impact public safety. Drawing on more than 50 interviews, document review and case studies of specific price determinations, we have investigated the extent to which these two regulatory regimes as enacted in Australia may conflict, and particularly whether economic regulation influences long-term public safety outcomes. We also draw on a comparison with how similar regulatory requirements are enacted in the United Kingdom (UK). Analysis shows that the overall orientation towards risk varies between the two regimes. The technical regulatory regime is a typical goal-setting style of risk governance with an overarching requirement that ‘reasonably practicable’ measures are put in place to minimize risk to the public. In contrast, the incentive-based economic regulatory regime requires that expenditure should be ‘efficient’ to warrant inclusion in the determination of acceptable charges to customers. How safety is considered within this remains an open question. Best practice in performance-based safety regimes such as those used in the UK and Australia require that regulators adopt an attitude towards companies based on the principle of ‘trust but verify’ as, generally speaking, all parties aim for the common goal of no accidents. Equally, in jurisdictions that favor prescriptive safety requirements such as the United States (US) the common goal remains. In contrast, stakeholders in the economic regulatory regime have significantly diverse interests; companies seek to maximize their individual financial returns and regulators seek to exert downward price pressures. We argue that these differences in the two regulatory regimes are significant for the management of public safety risk and conclude that minimizing risk to the public from a major pipeline failure would be better served by the economic regulatory regime’s separate consideration of safety-related from other expenditure and informed by the technical regulator’s view of safety.
APA, Harvard, Vancouver, ISO, and other styles
4

Murray, Mark. "Technology Dependence Beyond Control Systems." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0366.

Full text
Abstract:
Operations has grown beyond relying only on SCADA infrastructure — can you operate without your non-scada infrastructure? As the operator of the world’s longest and most complex liquids pipeline, Enbridge Pipelines Inc. relies heavily on automated systems to control, monitor, maintain our pipeline system. As the scope of automation continues to expand beyond the SCADA control system, so to does the dependence on ancillary computer applications such as pipeline scheduling, electronic ticketing, nominations and oil accounting. Uninterrupted operation of the pipeline system now depends on an increasingly complex electronic infrastructure and new levels of reliability are required from this infrastructure. This paper will describe the inherent risks as we continue to increase the automation of pipelining functions such as scheduling, oil accounting and electronic ticketing. We will discuss the type of technological threats (system failure, design flaws, security) and the strategies adopted by Enbridge for mitigating each of them. Further to the risks, this paper will explore the infrastructure components where exceptional risk mitigation is required, and the measures that Enbridge has taken to minimize the risks associated with those components. Specific areas to be analysed include; wide and local area networks, power and environmental systems, system clustering, hot and cold standby systems, network segment isolation and system backup solutions. Attention will also be paid to the increasing dependence on shared infrastructure services such as the Internet and telecommunications. For each of these technology areas, we will discuss the level of adoption within Enbridge, and the value proposition for these decisions. We will attempt to answer the questions; Why go that far? Why not go further? Finally, we will discuss the technology infrastructure requirements for business resumption. We will discuss system and site redundancy alternatives employed by Enbridge, the challenges involved in establishing business resumption plans, and how they are used by Enbridge to minimize the operational risk to our pipeline.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography