Internet security applications of Grobner-Shirvov bases
- Authors: Kelarev, Andrei , Yearwood, John , Watters, Paul
- Date: 2010
- Type: Text , Journal article
- Relation: Asian-European Journal of Mathematics Vol. 3, no. 3 (2010), p. 435-442
- Relation: http://purl.org/au-research/grants/arc/DP0211866
- Full Text: false
- Reviewed:
A Grobner-Shirshov Algorithm for Applications in Internet Security
- Authors: Kelarev, Andrei , Yearwood, John , Watters, Paul , Wu, Xinwen , Ma, Liping , Abawajy, Jemal , Pan, L.
- Date: 2011
- Type: Text , Journal article
- Relation: Southeast Asian Bulletin of Mathematics Vol. 35, no. (2011), p. 807-820
- Full Text: false
- Reviewed:
- Description: The design of multiple classication and clustering systems for the detection of malware is an important problem in internet security. Grobner-Shirshov bases have been used recently by Dazeley et al. [15] to develop an algorithm for constructions with certain restrictions on the sandwich-matrices. We develop a new Grobner-Shirshov algorithm which applies to a larger variety of constructions based on combinatorial Rees matrix semigroups without any restrictions on the sandwich-matrices.
Determining the influence of visual training on EEG activity patterns using association rule mining
- Authors: Yan, Fangang , Watters, Paul , Wang, Wei
- Date: 2011
- Type: Text , Conference proceedings
- Full Text: false
- Description: To confirm that visual training can change EEG patterns by association rule mining method, firstly, we collected the EEG of people who are under a long-term visual professional training (visual training group) and novice people (control group) during a specific mental tasks. Secondly, we determined the difference of brain electrical activity between the two groups using machine learning methods. Thirdly, we discovered distinct patterns using association rule algorithm, finding that the two groups were separable based on their completion of visual professional cognitive tasks. In the beta band, visual training group showed a specific and significant association pattern which included FP1 and C4. The results indicate that the EEG patterns were modified because of visual professional training. We further discuss the impact of long-term visual professional training on the EEG. © 2011 IEEE.
Fake file detection in P2P networks by consensus and reputation
- Authors: Watters, Paul , Layton, Robert
- Date: 2011
- Type: Text , Conference proceedings
- Full Text: false
- Description: Previous research [1] has indicated that reputation scores can be used as the basis for trust computation in P2P networks. In this paper, we use reputation scores calculated from P2P search engine rating sites to determine whether a torrent is likely to be linked to a fake file (or not). Our results indicate clear separability between files which are fake and which are genuine, assuming the integrity of the "community" ratings provided by specific subcultural groups [2]. Suggestions for more sophisticated reputation-based scoring are also provided. © 2011 Crown.