http://researchonline.federation.edu.au/vital/access/manager/Index ${session.getAttribute("locale")} 5 Rapid anomaly detection using integrated prudence analysis (IPA) http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:15825 Wed 23 Mar 2022 16:39:45 AEDT ]]> Automating Open Source Intelligence: Algorithms for OSINT http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:12597 Wed 07 Apr 2021 14:00:50 AEST ]]> REPLOT : REtrieving Profile Links on Twitter for malicious campaign discovery http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:10460 Wed 07 Apr 2021 13:55:50 AEST ]]> Local n-grams for author identification: Notebook for PAN at CLEF 2013 C3 - CEUR Workshop Proceedings http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:7582 Wed 07 Apr 2021 13:47:02 AEST ]]> Authorship analysis of aliases: Does topic influence accuracy? http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:7112 Wed 07 Apr 2021 13:46:37 AEST ]]> The maximum degree & diameter-bounded subgraph and its applications http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:7040 Wed 07 Apr 2021 13:46:33 AEST ]]> Information security governance: The art of detecting hidden malware http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:6841 Wed 07 Apr 2021 13:46:23 AEST ]]> ICANN or ICANT: Is WHOIS an Enabler of Cybercrime? http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5894 Wed 07 Apr 2021 13:45:28 AEST ]]> Identifying Faked Hotel Reviews Using Authorship Analysis http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5875 Wed 07 Apr 2021 13:45:27 AEST ]]> Measuring Surveillance in Online Advertising: A Big Data Approach http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5867 Wed 07 Apr 2021 13:45:26 AEST ]]> Skype Traffic Classification Using Cost Sensitive Algorithms http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5847 Wed 07 Apr 2021 13:45:25 AEST ]]> Indirect information linkage for OSINT through authorship analysis of aliases http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5749 Wed 07 Apr 2021 13:45:19 AEST ]]> REPLOT: REtrieving profile links on Twitter for suspicious networks detection http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5754 Wed 07 Apr 2021 13:45:19 AEST ]]> Evaluating authorship distance methods using the positive Silhouette coefficient http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5156 Wed 07 Apr 2021 13:44:47 AEST ]]> Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP) http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5094 Wed 07 Apr 2021 13:44:42 AEST ]]> A methodology for analyzing the credential marketplace http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:5093 Wed 07 Apr 2021 13:44:42 AEST ]]> Young people, child pornography, and subcultural norms on the Internet http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4971 Wed 07 Apr 2021 13:44:34 AEST ]]> Towards an implementation of information flow security using semantic web technologies http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4974 Wed 07 Apr 2021 13:44:34 AEST ]]> Challenges to automated allegory resolution in open source intelligence http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4975 Wed 07 Apr 2021 13:44:34 AEST ]]> Authorship attribution of IRC messages using inverse author frequency http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4965 Wed 07 Apr 2021 13:44:33 AEST ]]> Patterns of ownership of child model sites : Profiling the profiteers and consumers of child exploitation material http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4931 Wed 07 Apr 2021 13:44:31 AEST ]]> Detecting illicit drugs on social media using Automated Social Media Intelligence Analysis (ASMIA) http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4880 Wed 07 Apr 2021 13:44:27 AEST ]]> Automated unsupervised authorship analysis using evidence accumulation clustering http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4856 Wed 07 Apr 2021 13:44:24 AEST ]]> Recentred local profiles for authorship attribution http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4855 Wed 07 Apr 2021 13:44:24 AEST ]]> Unsupervised authorship analysis of phishing webpages http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4854 Wed 07 Apr 2021 13:44:24 AEST ]]> Cybercrime : The case of obfuscated malware http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4829 Wed 07 Apr 2021 13:44:22 AEST ]]> Zero-day malware detection based on supervised learning algorithms of API call signatures http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4828 Wed 07 Apr 2021 13:44:22 AEST ]]> A consolidated process model for identity management http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4802 Wed 07 Apr 2021 13:44:21 AEST ]]> Illicit image detection using erotic pose estimation based on kinematic constraints http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4773 Wed 07 Apr 2021 13:44:19 AEST ]]> Illicit image detection : An MRF model based stochastic approach http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4772 Wed 07 Apr 2021 13:44:19 AEST ]]> A Grobner-Shirshov Algorithm for Applications in Internet Security http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4778 Wed 07 Apr 2021 13:44:19 AEST ]]> Establishing reasoning communities of security experts for Internet Commerce Security http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4774 Wed 07 Apr 2021 13:44:19 AEST ]]> A survey on latest botnet attack and defense http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4597 Wed 07 Apr 2021 13:44:05 AEST ]]> Fake file detection in P2P networks by consensus and reputation http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4589 Wed 07 Apr 2021 13:44:04 AEST ]]> Determining the influence of visual training on EEG activity patterns using association rule mining http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4594 Wed 07 Apr 2021 13:44:04 AEST ]]> Child face detection using age specific luminance invariant geometric descriptor http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4548 Wed 07 Apr 2021 13:44:01 AEST ]]> A trust based access control framework for P2P file-sharing systems http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4491 Wed 07 Apr 2021 13:43:57 AEST ]]> Enabling access to British birth cohort studies: A secure web interface for the NSHD (SWIFT) http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4462 Wed 07 Apr 2021 13:43:56 AEST ]]> Accessibility solutions for visually impaired users of web discussion boards http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4454 Wed 07 Apr 2021 13:43:55 AEST ]]> Descriptive data mining on fraudulent online dating profiles http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4352 Wed 07 Apr 2021 13:43:48 AEST ]]> Malware detection based on structural and behavioural features of API calls http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4336 Wed 07 Apr 2021 13:43:47 AEST ]]> Internet security applications of Grobner-Shirvov bases http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4340 Wed 07 Apr 2021 13:43:47 AEST ]]> A new stochastic model based approach for object identification and segmentation in textured color image http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4328 Wed 07 Apr 2021 13:43:46 AEST ]]> An unsupervised stochastic model for detection and identification of objects in textured color images using segmentation technique http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4306 Wed 07 Apr 2021 13:43:45 AEST ]]> How much material on BitTorrent is infringing content? A case study http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4300 Wed 07 Apr 2021 13:43:45 AEST ]]> Real-time detection of children's skin on social networking sites using Markov random field modelling http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4288 Wed 07 Apr 2021 13:43:44 AEST ]]> Internet subcultures and pathways to the use of child pornography http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4295 Wed 07 Apr 2021 13:43:44 AEST ]]> Social networking threats http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4274 Wed 07 Apr 2021 13:43:43 AEST ]]> The factor structure of cybersickness http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4232 Wed 07 Apr 2021 13:43:40 AEST ]]> Automatically determining phishing campaigns using the USCAP methodology http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3923 Wed 07 Apr 2021 13:34:58 AEST ]]> Optimization of classifiers for data mining based on combinatorial semigroups http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3898 Wed 07 Apr 2021 13:34:56 AEST ]]> The seven scam types: Mapping the terrain of cybercrime http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3844 Wed 07 Apr 2021 13:34:54 AEST ]]> Authorship attribution for Twitter in 140 characters or less http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3833 th century considered it difficult to determine the authorship of a document of fewer than 1000 words. By the 1990s this values had decreased to less than 500 words and in the early 21 st century it was considered possible to determine the authorship of a document in 250 words. The need for this ever decreasing limit is exemplified by the trend towards many shorter communications rather than fewer longer communications, such as the move from traditional multi-page handwritten letters to shorter, more focused emails. This trend has also been shown in online crime, where many attacks such as phishing or bullying are performed using very concise language. Cybercrime messages have long been hosted on Internet Relay Chats (IRCs) which have allowed members to hide behind screen names and connect anonymously. More recently, Twitter and other short message based web services have been used as a hosting ground for online crimes. This paper presents some evaluations of current techniques and identifies some new preprocessing methods that can be used to enable authorship to be determined at rates significantly better than chance for documents of 140 characters or less, a format popularised by the micro-blogging website Twitter1. We show that the SCAP methodology performs extremely well on twitter messages and even with restrictions on the types of information allowed, such as the recipient of directed messages, still perform significantly higher than chance. Further to this, we show that 120 tweets per user is an important threshold, at which point adding more tweets per user gives a small but non-significant increase in accuracy. © 2010 IEEE.]]> Wed 07 Apr 2021 13:34:53 AEST ]]> Windows rootkits: Attacks and countermeasures http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3834 Wed 07 Apr 2021 13:34:53 AEST ]]> Towards understanding malware behaviour by the extraction of API calls http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3821 Wed 07 Apr 2021 13:34:52 AEST ]]> New traceability codes and identification algorithm for tracing pirates http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3743 Wed 07 Apr 2021 13:34:46 AEST ]]> Digital forensic techniques for static analysis of NTFS images http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3664 Wed 07 Apr 2021 13:34:40 AEST ]]> Establishing phishing provenance using orthographic features http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3667 Wed 07 Apr 2021 13:34:40 AEST ]]> Cybercrime attribution : An Eastern European case study http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3669 Wed 07 Apr 2021 13:34:40 AEST ]]> Detecting phishing emails using hybrid features http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3566 Wed 07 Apr 2021 13:34:33 AEST ]]> Effective digital forensic analysis of the NTFS disk image http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3553 Wed 07 Apr 2021 13:34:32 AEST ]]> A preliminary profiling of internet money mules : An Australian perspective http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3554 Wed 07 Apr 2021 13:34:32 AEST ]]> Internet security applications of the Munn rings http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3453 Wed 07 Apr 2021 13:34:24 AEST ]]> Identifying rootkit infections using data mining http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3454 Wed 07 Apr 2021 13:34:24 AEST ]]> Accessible virtual reality therapy using portable media devices http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3266 Wed 07 Apr 2021 13:34:14 AEST ]]> RBACS : Rootkit behavioral analysis and classification system http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3248 Wed 07 Apr 2021 13:34:12 AEST ]]> A new procedure to help system/network administrators identify multiple rootkit infections http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3247 Wed 07 Apr 2021 13:34:12 AEST ]]> Web services in finance http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3198 Wed 07 Apr 2021 13:34:09 AEST ]]> Web services security http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3180 Wed 07 Apr 2021 13:34:08 AEST ]]> Are sparse-coding simple cell receptive field models physiologically plausible? http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3156 Wed 07 Apr 2021 13:34:06 AEST ]]> Selecting parameters for phase space reconstruction of the electrocorticogram (ECoG) http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3155 2) from observed data rather than from the solution of differential equations, when analyzing noisy and potentially non-stationary signals, such as the electroencephalogram (EEG). The largely arbitrary selection of the time-delay reconstruction (T) of temporal dynamics, and for the embedding (M) of these series, has been widely criticized. This study adopted an analytic and statistical framework within which the scaling behavior of D2 with respect to T and M, could be examined over five data lengths (N = 4096, 8192, 12288, 16384, and 20480) over an 8 × 8 grid of cat EEG. It was found that D2 was invariant over all data lengths only within a very narrow T range (T = 10–16) for M = 4. A statistically significant T by M interaction was found using multiple analysis of variance, with D2 being highly correlated over T as a function of M. Finally, an examination of phase-randomized surrogates indicated that statistically significant differences existed between EEG and phase-randomized surrogates over all data lengths, with time delays (T = 10–16), indicating that the D2 for EEG is phase-dependent when it is invariant with respect to data length. The implications of these findings are discussed with respect to current models of ECoG generation, and their implication with respect to the integration in the brain. [ABSTRACT FROM AUTHOR]]]> Wed 07 Apr 2021 13:34:06 AEST ]]> Estimating distributed coding efficiently in orthogonal models of facial processing http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:3154 Wed 07 Apr 2021 13:34:06 AEST ]]> Automatically generating classifier for phishing email prediction http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2935 Wed 07 Apr 2021 13:33:58 AEST ]]> Rees matrix constructions for clustering of data http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2363 Wed 07 Apr 2021 13:33:26 AEST ]]> Cybersickness and anxiety during simulated motion : Implications for VRET http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2329 Wed 07 Apr 2021 13:33:24 AEST ]]> University incorporated : Implications for professional information security education http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2313 Wed 07 Apr 2021 13:33:23 AEST ]]> Data loss in the British government : A bounty of credentials for organised crime http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2312 Wed 07 Apr 2021 13:33:23 AEST ]]> Why do users trust the wrong messages? A behavioural model of phishing http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2311 Wed 07 Apr 2021 13:33:23 AEST ]]> Autonomic nervous system factors underlying anxiety in virtual environments : A regression model for cybersickness http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2301 Wed 07 Apr 2021 13:33:22 AEST ]]> Estimating cybersickness of simulated motion using the Simulator Sickness Questionnaire (SSQ) : A controlled study http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2300 Wed 07 Apr 2021 13:33:22 AEST ]]> Determining provenance in phishing websites using automated conceptual analysis http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2304 Wed 07 Apr 2021 13:33:22 AEST ]]> Using differencing to increase distinctiveness for phishing website clustering http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2303 Wed 07 Apr 2021 13:33:22 AEST ]]> The case for a consistent cyberscam classification framework (CCCF) http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:2308 Wed 07 Apr 2021 13:33:22 AEST ]]> API based discrimination of ransomware and benign cryptographic programs http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:16739 Tue 25 Oct 2022 10:26:33 AEDT ]]> Spam email categorization with nlp and using federated deep learning http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:17690 Thu 11 May 2023 10:25:41 AEST ]]> Security and blockchain convergence with internet of multimedia things : current trends, research challenges and future directions http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:16664 Thu 06 Oct 2022 10:29:14 AEDT ]]> Characterising network traffic for Skype forensics http://researchonline.federation.edu.au/vital/access/manager/Repository/vital:4950 Fri 30 Apr 2021 15:54:47 AEST ]]>