Alana Maurushat

Learn More
'Aren't you just giving the virus writers ideas?' Research into future security threats is not always taken kindly by all members of the anti-virus community. Understanding the bounds of security research is important, however, with the increasing emphasis on proactive rather than reactive defences. We begin to examine how far security research can go in(More)
The extent of Internet censorship in countries like China is regularly tested, but the testing methods used from within a censored country can entail risk for humans. A benevolent worm can be used for testing instead: the worm's self-replication, long the bane of suggested benevolent viruses and worms, is shown to be essential here. We describe the design(More)
Using Internet Service Provider 'Big' metadata as a case study, we examine legal and ethical issues with machine learning Big Data tools developed and deployed in Australia for law enforcement intelligence purposes. In order to do this, we outline the benefits, limitations and risks of these tools, analyze current methods for de-identification and(More)
1. Introduction 'Big Data' is a misleading term that has arisen to describe a new phenomenon of data. Big Data encompasses " data mining " and " predictive analytics, " but it is much more than this. Big Data is in many ways a data revolution. As one expert has put it, " the real revolution is not in the machines that calculate data but in data itself and(More)
  • 1