Downloadable Libraries That Need to Be Installed in Order to Enable Complete Functionality in Terms of Placing a Proper 3G-H324M Call Over the ISDN Network

Downloadable Libraries That Need to Be Installed in Order to Enable Complete Functionality in Terms of Placing a Proper 3G-H324M Call Over the ISDN Network

Advances in Networks, Computing and Communications 6 Proceedings of the MSc/MRes Programmes from the School of Computing, Communications and Electronics 2007 - 2008 Editors Dr Paul S Dowland Prof Steven M Furnell School of Computing, Communications & Electronics University of Plymouth ISBN: 978-1-84102-258-1 © 2009 University of Plymouth All rights reserved Printed in the United Kingdom No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means – electronic, mechanical, photocopy, recording or otherwise, without the prior written permission of the publisher or distributor. Preface This book is the sixth in a series presenting research papers arising from MSc/MRes research projects undertaken by students of the School of Computing, Communications and Electronics at the University of Plymouth. These one year masters courses include a significant period of full-time project activity, and students are assessed on the basis of an MSc or MRes thesis, plus an accompanying research paper. The publications in this volume are based upon research projects that were undertaken during the 2007/08 academic year. A total of 35 papers are presented, covering many aspects of modern networking and communication technology, including security, mobility, coding schemes and quality measurement. The expanded topic coverage compared to earlier volumes in this series reflects the broadening of our range of MSc programmes. Specifically contributing programmes are: Network Systems Engineering, Information Systems Security, Web Technologies and Security, Communications Engineering and Signal Processing, Computer Applications, Computing, Robotics, and Interactive Intelligent Systems The authorship of the papers is credited to the MSc/MRes student in each case (appearing as the first named author), with other authors being the academic supervisors that had significant input into the projects. Indeed, the projects were conducted in collaboration with supervisors from the internationally recognised research groups within the School, and the underlying research projects are typically related to wider research initiatives with which these groups are involved. Readers interested in further details of the related research areas are therefore encouraged to make contact with the academic supervisors, using the contact details provided elsewhere in this publication. Each of the papers presented here is also supported by a full MSc or MRes thesis, which contains more comprehensive details of the work undertaken and the results obtained. Copies of these documents are also in the public domain, and can generally be obtained upon request via inter-library loan. We believe that these papers have value to the academic community, and we therefore hope that their publication in this volume will be of interest to you. Steven Furnell and Paul Dowland School of Computing, Communications and Electronics University of Plymouth, May 2009 i About the School of Computing, Communications and Electronics The School of Computing, Communication and Electronics has interests spanning the interface between computing and art, through software, networks, and communications to electronic engineering. The School contains 61 academic staff and has over 1000 students enrolled on its portfolio of taught courses, over 100 of which are at MSc level. In addition there is a similar number of postgraduate research students enrolled on a variety of research programmes, most of which enjoy sponsorship from external sources. The bulk of the staff in the School are housed in the Portland Square building, a purpose built state of the art building costing over £25million and situated near the centre of the historic city of Plymouth on the University campus. The laboratories are located in the newly refurbished Smeaton Building, and the Clean room for nanotechnology also recently refurbished courtesy of a Wolfson Foundation grant is situated in the nearby Brunel Building. All buildings are a short walk from each other, enabling a close collaboration within our research community. This School sits alongside two other Schools in the Faculty of Technology, the School of Engineering (the merged School of Civil and Structural Engineering and Department of Mechanical and Marine Engineering), and the School of Mathematics and Statistics. There are research and teaching links across all three schools as well as with the rest of the University. The closest links are with the Faculty of Science, principally the Centre for Computational and Theoretical Neuroscience which started in Computing, and Psychology through Artificial Intelligence and Human Computer Interaction research. Prof. Steven Furnell Head of School ii Contributing Research Groups Centre for Information Security and Network Research Head: Professor S M Furnell E-mail [email protected] Research interests: 1) Information systems security 2) Internet and Web technologies and applications 3) Mobile applications and services 4) Network management http://www.cscan.org Centre for Interactive Intelligent Systems Head: Professor E Miranda & Professor A Cangelosi Email: [email protected] Research interests: 1) Natural language interaction and adaptive systems 2) Natural object categorisation 3) Adaptive behaviour and cognition 4) Visualisation 5) Semantic web http://www.tech.plymouth.ac.uk/Research/computer_science_and_informatics/ Centre for Robotics and Intelligent Systems Head: Dr G Bugmann Email: [email protected] Research interests: 1) Cognitive systems 2) Social interaction and concept formation through human-robot interaction 3) Artificial intelligence techniques and human-robot interfaces 4) Cooperative mobile robots 5) Visual perception of natural objects 6) Humanoid robots http://www.tech.plymouth.ac.uk/socce/ris/ Fixed and Mobile Communications Head: Professor M Tomlinson BSc, PhD, CEng, MIEE E-mail: [email protected] Research interests: 1) Satellite communications 2) Wireless communications 3) Broadcasting 4) Watermarking 5) Source coding and data compression http://www.tech.plymouth.ac.uk/see/research/satcen/sat.htm http://www.tech.plymouth.ac.uk/see/research/cdma/ iii Interdisciplinary Centre for Computer Music Research Head: Professor E Miranda Email: [email protected] Research interests: 1) Computer-aided music composition 2) New digital musical instruments 3) Sound synthesis and processing 4) Music perception and the brain http://cmr.soc.plymouth.ac.uk iv Contents Contents SECTION 1 Network Systems Engineering Improving the Usability of Security Features – a Survey of End Users 3 M.O.Adjei and S.M.Furnell Information Security Awareness and Culture 12 Y.Al-Shehri and N.L.Clarke Social Engineering Vulnerabilities 23 T.Bakhshi and M.Papadaki Vulnerability Awareness 32 A.Edu and M.Papadaki Network Security, Guidelines to Build a Security Perimeter for SMEs 40 S.Godon and P.S.Dowland Performance Analysis and Comparison of PESQ and 3SQM in Live 3G 48 Mobile Networks M.Goudarzi and L.Sun Investigation of Radio Access Bearer Dedicated Bandwidth and PDCP 56 Compression on UMTS Networks and their Impact on SIP Session Delay A.Hadjicharalambous and X.Wang Video Quality Analysis in 3G Mobile Networks 64 M.Imran and L.Sun Home Users Vulnerabilities in Audio/Video Players 73 R.Jain and M.Papadaki BER Performance of MPSK and MQAM in 2x2 Almouti MIMO System 83 A.S.Mindaudu and M.A.Abu-Rgheff CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 92 and IIS 7.0 when Serving Static and PHP Content D.J.Moore and P.S.Dowland Assessing the Usability of Security Features in Tools and Applications 98 F.Moustafa and S.M.Furnell Guidelines/Recommendations on Best Practices in Fine Tuning IDS Alarms 107 C.A.Obi and M.Papadaki Implementing Biometrics to Curb Examination Malpractices In Nigeria 115 O.A.Odejobi and N.L.Clarke v Advances in Networks, Computing and Communications 6 An Assessment of People’s Vulnerabilities in Relation to Personal and 124 Sensitive Data B.G.Sanders and P.S.Dowland Internet Security: A View from ISPs and Retailers 135 R.Shams and S.M.Furnell Improving Awareness on Social Engineering Attacks 144 A.Smith and M.Papadaki An Assessment of Security Advisory Website 152 J.Thomas and S.M.Furnell Response of Software Vendors to Vulnerabilities 160 G.Erebor and M.Papadaki SECTION 2 Information Systems Security & Web Technologies and Security Information Security Leakage: 171 A Forensic Analysis of USB Storage Disks A.Adam and N.L.Clarke Digital Watermarking with Side Information 179 I.Al-Houshi and M.A.Ambroze Smartphone Deployment of Keystroke Analysis 190 A.Buchoux and N.L.Clarke Information Revelation and Computer-Mediated Communication in Online 198 Social Networks R.J.Davey and A.D.Phippen School Children! A Security Aware Generation? 206 J.W.G.Littlejohns and N.L.Clarke Comparative Study and Evaluation of Six Face Recognition Algorithms with 212 a View of their Application on Mobile Phones N.Mahmoud and N.L.Clarke Implementation of the Least Privilege Principle on Windows XP, Windows 226 Vista and Linux L.Scalbert and P.S.Dowland Design and Development of Hard Disk Images for use in Computer 234 Forensics S.Siddiqui and N.L.Clarke vi Contents SECTION 3 Communications Engineering and Signal Processing Article Surveillance Magnetic Marker with Built-In Security 245 M.Gaschet and L.Panina Peak-to-Average Power Ratio Reduction in OFDM Using Cyclic Coding 253 P.Henrys d’Aubigny d’Esmyards and M.A.Abu-Rgheff Brain-Computer Music Interface

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    323 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us