• Analysis and prevention of account hijacking based incidents in cloud environment 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay (2015-12)
    Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. ...
  • Phonated speech reconstruction using twin mapping models 

    Sharifzadeh, Hamid; HajiRassouliha, Amir; McLoughlin, Ian V.; Ardekani, Iman; Allen, Jacqueline E. (IEEE Communications Society, 2015-12)
    Computational speech reconstruction algorithms have the ultimate aim of returning natural sounding speech to aphonic and dysphonic individuals. These algorithms can also be used by unimpaired speakers for communicating ...
  • Comparative whisper vowel space for Singapore English and British English accents 

    Sharifzadeh, Hamid; Ardekani, Iman; McLoughlin, Ian V. (Asia-Pacific Signal and Information Association (APSIPA), 2015-12)
    Whispered speech, as a relatively common form of communications, has received little research effort in spite of its usefulness in everyday vocal communications. Apart from a few notable studies analysing the main whispered ...
  • Effect of channel impairments on radiometric fingerprinting 

    Rehman, Saeed; Sowerby, Kevin W.; Shafiq, Alam; Ardekani, Iman; Komosny, Dan (IEEE Communications Society, 2015-12)
    To increase network security and mitigate identity theft attacks, much of the research is focused on traditional bit-level algorithmic. In conventional wireless networks, security issues are primarily considered above the ...
  • Encryption, storage technology and security of data at rest 

    Alkorbi, Mohammed (2015-11)
    The term cryptography is defined as the encryption of sensitive information such as, data, image and others. The cryptographic techniques have changed over the years based on the developments of encryption software and ...
  • Progress report on a proposed theory for software development 

    Kirk, Diana; MacDonell, Stephen G. (SCITEPRESS (Science and Technology Publications) Digital Library, 2015-07)
    There is growing acknowledgement within the software engineering community that a theory of software development is needed to integrate the myriad methodologies that are currently popular, some of which are based on opposing ...
  • Free and open source intrusion detection systems : a study 

    Tirumala, Sreenivas Sremath; Sathu, Hira; Sarrafzadeh, Hossein (IEEE, 2015-07)
    Importance of cyber security cannot be denied in the current cyber environment. With continuous growth of internet, cyber security has become a necessity for both big and reputed organizations as well as small businesses ...
  • Improving the understandability of artifact-centric workflows using BPMN with extensions 

    Godha, Narendra (2015)
    Since 2003 the enterprises have accelerated research in this approach through development of methods, tools and other technologies in support of the artifact-centric approach. The artifact-centric approach is expected to ...
  • Efficient FXLMS algorithm with simplified secondary path models. 

    Ardekani, Iman; Sharifzadeh, Hamid Reza; Rehman, Saeed; Abdulla, Waleed H. (IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015)
    his paper extends the existing work on the root locus analysis of FxLMS algorithm by considering secondary path modeling errors. Rules for sketching FxLMS root locus are set out. An analytic convergence condition is then ...
  • A View Framework for Modeling and Change Validation of Artifact-Centric Inter-Organizational Business Processes 

    Liu, Chengfei; Jian, Yu; Zhao, Xiaohui; Yongchareon, Sira (Elsevier, 2015)
    Over the past several years, more efficient approaches have been on increasing demands for designing, modeling, and implementing inter-organizational business processes. In the process collaboration across organizational ...
  • Performance evaluation of defence mechanisms against ICMPv6 router advertisement flood attacks 

    Mudaliar, Keysha (2015)
    The Internet Protocol version 6 (IPv6) was developed to replace the Internet Protocol version 4 (IPv4). IPv6 provides many improvements over IPv4. However, there are major problems with new features introduced in IPv6, ...
  • Mobile internet user experience of Small to Medium Enterprises (SMEs) in New Zealand 

    Iqbal, Asif (2015)
    This study is about SMEs (Small to medium enterprises) customers’ mobile internet experience in relation to its key attributes such as speed, security, cost, coverage, reliability and smart phones used. This study is ...
  • The effect of mobility, security and shadowing on latest wireless LAN standard (IEEE802.11ac) 

    Almatrook, Abdulbasit (2015)
    This thesis focuses on the evaluation of IEEE 802.11ac WLAN performance using TCP and UDP for both versions of the Internet Protocol (IPv4, IPv6) in three scenarios, namely, the effect of implementing WPA2 security encryption, ...
  • Hourly power consumption prediction for New Zealand residential houses using artificial neural network models 

    Ahmad, Aziz; Anderson, Tim (Australia PV Institute, 2014-12)
    In this study several Artificial Neural Network (ANN) models were experimented to predict electricity consumption for a residential house in New Zealand. The effect of day of the week and weather variables on electricity ...
  • Security of Wireless Devices using Biological-Inspired RF Fingerprinting Technique 

    Rehman, Saeed; Alam, Shafiq; Ardekani, Iman (IGI Global, 2014-11-23)
    Radio Frequency (RF) fingerprinting is a security mechanism inspired by biological fingerprint identification systems. RF fingerprinting is proposed as a means of providing an additional layer of security for wireless ...
  • Cloud-based Video Monitoring Framework: An Approach based on Software-Defined Networking for Addressing Scalability Problems 

    Sandar, Nay Myo; Chaisiri, Sivadon; Yongchareon, Sira; Liesaputra, Veronica (Cham Springer International Publishing, 2014-10-12)
    Abstract. Closed-circuit television (CCTV) and Internet protocol (IP) cameras have been applied to a surveillance or monitoring system, from which users can remotely monitor video streams. The system has been employed for ...
  • The global cyber security workforce : an ongoing human capital crisis 

    Fourie, Leon; Pang, Shaoning; Kingston, Tamsin; Hettema, Hinne; Watters, Paul; Sarrafzadeh, Hossein (Global Business and Technology Association, 2014-07)
    Cyber threats pose substantial risk to government, businesses and individuals. There is an alarming shortage of trained professionals and academic programs to train and produce these professionals. Many countries including ...
  • Eve : an affect-sensitive pedagogical agent 

    Fourie, Leon; Overmyer, Scott; Shanbehzadeh, Jamshid; Sarrafzadeh, Hossein; Alexander, Samuel T.V. (Global Business and Technology Association, 2014-07)
    Easy with Eve is an affect-sensitive tutoring system that features Eve, an animated pedagogical agent that adapts to student emotion based on the results of an observational study of human tutors. This paper presents the ...
  • Improved learning through peer tutoring in a declarative programming course 

    Alexander, Samuel T.V.; Sarrafzadeh, Hossein (Global Business and Technology Association, 2014-07)
    A method of peer tutoring was used and evaluated in an introductory programming course in Haskell. Students were paired on the basis of skill level with pairings opposite those suggested by the existing literature. This ...
  • Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers 

    Rehman, Saeed; Sowerby, Kevin; Coghill, Colin (Academic Press, 2014-05)
    Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish ...