• Detecting Slow DDos Attacks on Mobile Devices

      Cusack, B; Lutui, R; Khaleghparast, R (Australasian Conference on Information Systems (ACIS), 2016)
      Denial of service attacks, distributed denial of service attacks and reflector attacks are well known and documented events. More recently these attacks have been directed at game stations and mobile communication devices ...
    • Evaluating Policy Layer Security Controls for Value Realisation in Secure Systems

      Cusack, B; Al-Khazrajy, M (Security Research Institute, Edith Cowan University, 2015)
      A strategic question for any business is: What value do control frameworks give? The question concerns the costs associated with implementing and maintaining control frameworks compared with the benefits gained. Each control ...
    • Evaluating Single Sign on Security Failure in Cloud Services

      Cusack, B; Zadeh, E (Security Research Institute, Edith Cowan University, 2015)
      The business use of cloud computing services is motivated by the ease of use and the potential financial cost reductions. Service failure may occur when the service provider does not protect information or when the use of ...
    • Evaluating Small Drone Surveillance Capabilities to Enhance Traffic Conformance Intelligence

      Cusack, B; Khaleghparast, R (Security Research Institute, Edith Cowan University, 2015)
      The availability of cheap small physical drones that fly around and have a variety of visual and sensor networks attached invites investigation for work applications. In this research we assess the capability of a set of ...
    • Gateway load balancing and routing selection scheme of MANET in disaster scenario

      Mahiddin, NA; Sarkar, NI; Cusack, B (IEEE, 2015)
      After disaster occurs like earthquake, it is common results of collapse structure. It is impossible for disaster victims make use of communication devices such as cellular phones, iPad or laptop to communicate with others ...
    • Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT

      Cusack, B; Kyaw, A; Tian, Z (Springer, 2016)
      Society is faced with the ever more prominent concerns of vulnerabilities including hacking and DoS or DDoS attacks when migrating to new paradigms such as Internet of Things (IoT). These attacks against computer systems ...
    • Mining Social Networking Sites for Digital Evidence

      Cusack, B; Alshaifi, S (Security Research Institute, Edith Cowan University, 2015)
      OnLine Social Networking sites (SNS) hold a vast amount of information that individuals and organisations post about themselves. Investigations include SNS as sources of evidence and the challenge is to have effective tools ...
    • Using Design Science to build a Watermark System for Righful Ownership Protection in the Cloud

      Cusack, B; Khaleghparast, R (arXivThe Australasian Conference on Information Systems (ACIS), 2015)
      Cloud computing opportunities have presented service options for users that are both economical and flexible to use requirements. However, the risk analysis for the user identifies vulnerabilities for intellectual property ...
    • What's in a Programme?

      Cusack, B; Petrova, K (Computing and Information Technology Research and Education New Zealand (CITRENZ), 2011)
      Teaching and research in information technology (IT) is always a reflection of the ever changing landscape of change and continuous innovation. IT programmes also show how content evolves over time, and the emphasis shifts. ...