• Detecting Slow DDos Attacks on Mobile Devices

      Cusack, B; Lutui, R; Khaleghparast, R (Australasian Conference on Information Systems (ACIS), 2016)
      Denial of service attacks, distributed denial of service attacks and reflector attacks are well known and documented events. More recently these attacks have been directed at game stations and mobile communication devices ...
    • Evaluating Small Drone Surveillance Capabilities to Enhance Traffic Conformance Intelligence

      Cusack, B; Khaleghparast, R (Security Research Institute, Edith Cowan University, 2015)
      The availability of cheap small physical drones that fly around and have a variety of visual and sensor networks attached invites investigation for work applications. In this research we assess the capability of a set of ...
    • Using Design Science to build a Watermark System for Righful Ownership Protection in the Cloud

      Cusack, B; Khaleghparast, R (arXivThe Australasian Conference on Information Systems (ACIS), 2015)
      Cloud computing opportunities have presented service options for users that are both economical and flexible to use requirements. However, the risk analysis for the user identifies vulnerabilities for intellectual property ...