ORCID Profile
0000-0002-2352-8815
Current Organisation
University of South Australia
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
In Research Link Australia (RLA), "Research Topics" refer to ANZSRC FOR and SEO codes. These topics are either sourced from ANZSRC FOR and SEO codes listed in researchers' related grants or generated by a large language model (LLM) based on their publications.
Criminology | Law Enforcement Not Elsewhere Classified | Other Information, Computing And Communication Sciences | Computer Communications Networks | Engineering And Technology Not Elsewhere Classified
Law enforcement | Social ethics | Other | Telecommunications | Justice and the law not elsewhere classified |
Publisher: IEEE
Date: 2007
Publisher: IEEE
Date: 02-2010
DOI: 10.1109/ARES.2010.16
Publisher: Kluwer Academic Publishers
Date: 2006
Publisher: Springer International Publishing
Date: 2021
Publisher: Security Research Institute (SRI), Edith Cowan University
Date: 2006
Publisher: Oxford University Press (OUP)
Date: 25-05-2020
Abstract: We present DES16C3cje, a low-luminosity, long-lived type II supernova (SN II) at redshift 0.0618, detected by the Dark Energy Survey (DES). DES16C3cje is a unique SN. The spectra are characterized by extremely narrow photospheric lines corresponding to very low expansion velocities of ≲1500 km s−1, and the light curve shows an initial peak that fades after 50 d before slowly rebrightening over a further 100 d to reach an absolute brightness of Mr ∼ −15.5 mag. The decline rate of the late-time light curve is then slower than that expected from the powering by radioactive decay of 56Co, but is comparable to that expected from accretion power. Comparing the bolometric light curve with hydrodynamical models, we find that DES16C3cje can be explained by either (i) a low explosion energy (0.11 foe) and relatively large 56Ni production of 0.075 M⊙ from an ∼15 M⊙ red supergiant progenitor typical of other SNe II, or (ii) a relatively compact ∼40 M⊙ star, explosion energy of 1 foe, and 0.08 M⊙ of 56Ni. Both scenarios require additional energy input to explain the late-time light curve, which is consistent with fallback accretion at a rate of ∼0.5 × 10−8 M⊙ s−1.
Publisher: Academic Conferences International Ltd
Date: 28-02-2023
Abstract: There has been a dramatic increase in the number of Internet of Things (IoT) devices and their applications. Furthermore, there is a growing impetus to integrate IoT networks on a global scale, using satellites to expand the range of IoT connectivity into geographically remote areas. Ensuring the security of satellite backhaul for IoT networks is thus of paramount importance. The steady advance of quantum computing in recent years threatens to nullify classical cryptographic approaches based on assumptions of computational hardness, motivating the need for post-quantum cryptography. Quantum computing algorithms have been developed that, once a quantum computer of sufficient scale is realised, will be able to break classical cryptosystems efficiently (at polynomial-time complexity). A promising method of securing information against this threat at the physical layer has emerged in the form of quantum key distribution (QKD). QKD exploits the fundamental physical properties of light to guarantee information-theoretic security. Research into the application and standardisation of QKD to secure satellite backhaul, however, is still in its infancy. This paper presents a brief overview of the theoretical basis for QKD, whilst also providing a survey of contemporary QKD protocols. It evaluates the ability of these protocols to secure satellite backhaul in the context of a typical satellite-IoT network architecture. Furthermore, it highlights the vulnerabilities, as well as the technical challenges associated with this endeavour. Finally, it proposes directions for future research and development into protocols and standardisation for the satellite-integrated IoT domain. Several challenges must be overcome before QKD can evolve into a global-scale solution for securing satellite-IoT. Secret key generation rate remains very low in practical demonstrations of trusted-relay QKD satellite architectures. Further research is needed to overcome or mitigate the fundamental rate-distance trade-off before satellite QKD can be considered practicable in an IoT application. Alternatives that do not rely on trusted nodes are contingent on nascent technologies such as quantum repeaters and quantum memory. Whilst in theory QKD provides perfect information-theoretic security, it remains vulnerable to attacks that exploit imperfections in real-world equipment. Further effort is needed to develop QKD protocols that can safeguard against the aforementioned challenges.
Publisher: Unpublished
Date: 2015
Publisher: IEEE
Date: 05-2015
Publisher: Elsevier BV
Date: 06-2017
Publisher: Springer Singapore
Date: 2018
Publisher: Springer Science and Business Media LLC
Date: 08-09-2021
Publisher: IEEE
Date: 08-2010
Publisher: Elsevier BV
Date: 04-2022
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: IEEE
Date: 08-2014
Publisher: Springer Singapore
Date: 2018
Publisher: IEEE
Date: 2007
Publisher: IEEE
Date: 11-2015
Publisher: Informa UK Limited
Date: 03-2016
Publisher: Springer Science and Business Media LLC
Date: 20-11-2019
DOI: 10.1038/S41586-019-1754-6
Abstract: Long-duration γ-ray bursts (GRBs) originate from ultra-relativistic jets launched from the collapsing cores of dying massive stars. They are characterized by an initial phase of bright and highly variable radiation in the kiloelectronvolt-to-megaelectronvolt band, which is probably produced within the jet and lasts from milliseconds to minutes, known as the prompt emission
Publisher: IGI Global
Date: 2009
Abstract: With the tremendous growth in popularity and bandwidth of the Internet, VoIP technology has emerged that allows phone calls to be routed over Internet infrastructure rather than the traditional Public Switched Telephone Network (PSTN) infrastructure. The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. Wiretapping is not applicable to VoIP calls and packet capturing is negated by encryption. This article discusses experimental work carried out to explore methods by which electronic evidence may be collected from systems where VoIP conversations play an important role in suspected criminal activity or communications. It also considers the privacy issues associated with the growing use of VoIP.
Publisher: IEEE
Date: 12-2011
Publisher: IEEE
Date: 07-2012
Publisher: IEEE
Date: 08-2011
DOI: 10.1109/ARES.2011.33
Publisher: IEEE
Date: 08-2011
DOI: 10.1109/ARES.2011.36
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2022
Publisher: Elsevier BV
Date: 09-2009
Publisher: Springer International Publishing
Date: 2018
Publisher: IEEE
Date: 2009
Publisher: Academic Conferences International Ltd
Date: 02-03-2022
Abstract: Space infrastructure provides vital services for a number of critical industries, including defence, transportation, energy, utilities, emergency services, banking, environment, academia, and others. These services range from global communications to remote sensing and geolocation, with many new applications undoubtedly on the horizon, including plans for further exploration and even human settlement. It is therefore essential that space technologies are protected from unwanted interferences – a task that is becoming more challenging by the day. Adding to the already complex space security environment, we are experiencing the beginnings of a second space race that is seeing the rapid deployment of space systems containing a vast array of new technologies, such as the Internet of Things (IoT) and advanced onboard processing. This is subsequently introducing new vulnerabilities to an already aged and vulnerable satellite ecosystem, hence increasing the risk of potentially catastrophic security events. Although well-articulated in political, legal, and international relations literature, the engineering, science, and technology aspects of space security are currently under-studied and disjointed, leading to fragmented research and inconsistent terminology. This paper examined space security from an engineering perspective by conceptually tying existing space and security literature together to detail the space threat landscape and identify research gaps and opportunities. Additionally, this paper identifies the need for wider recognition of space systems security as a specialist inter-disciplinary domain in order to break down disciplinary silos, enhance collaboration, and unify definitions, taxonomies, and research objectives.
Publisher: IEEE
Date: 09-2013
DOI: 10.1109/ARES.2013.50
Publisher: Springer International Publishing
Date: 2018
Publisher: American Astronomical Society
Date: 11-03-2026
Publisher: Elsevier BV
Date: 11-2009
Publisher: Springer Science and Business Media LLC
Date: 16-10-2017
DOI: 10.1038/NATURE24303
Abstract: Gravitational waves were discovered with the detection of binary black-hole mergers and they should also be detectable from lower-mass neutron-star mergers. These are predicted to eject material rich in heavy radioactive isotopes that can power an electromagnetic signal. This signal is luminous at optical and infrared wavelengths and is called a kilonova. The gravitational-wave source GW170817 arose from a binary neutron-star merger in the nearby Universe with a relatively well confined sky position and distance estimate. Here we report observations and physical modelling of a rapidly fading electromagnetic transient in the galaxy NGC 4993, which is spatially coincident with GW170817 and with a weak, short γ-ray burst. The transient has physical parameters that broadly match the theoretical predictions of blue kilonovae from neutron-star mergers. The emitted electromagnetic radiation can be explained with an ejected mass of 0.04 ± 0.01 solar masses, with an opacity of less than 0.5 square centimetres per gram, at a velocity of 0.2 ± 0.1 times light speed. The power source is constrained to have a power-law slope of -1.2 ± 0.3, consistent with radioactive powering from r-process nuclides. (The r-process is a series of neutron capture reactions that synthesise many of the elements heavier than iron.) We identify line features in the spectra that are consistent with light r-process elements (atomic masses of 90-140). As it fades, the transient rapidly becomes red, and a higher-opacity, lanthanide-rich ejecta component may contribute to the emission. This indicates that neutron-star mergers produce gravitational waves and radioactively powered kilonovae, and are a nucleosynthetic source of the r-process elements.
Publisher: Springer Science and Business Media LLC
Date: 14-01-2019
Publisher: Inderscience Publishers
Date: 2015
Publisher: Springer US
Date: 2007
Publisher: MECS Publisher
Date: 23-10-2012
Publisher: Unpublished
Date: 2014
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Security Research Institute (SRI), Edith Cowan University
Date: 2006
Publisher: Springer Science and Business Media LLC
Date: 23-08-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: Informa UK Limited
Date: 11-01-2016
Publisher: Elsevier BV
Date: 02-2019
Publisher: Elsevier BV
Date: 03-2021
Publisher: Elsevier BV
Date: 11-2011
Publisher: ERAU Hunt Library - DIGITAL COMMONS JOURNALS
Date: 2012
Publisher: IEEE
Date: 02-2010
DOI: 10.1109/ARES.2010.73
Publisher: IEEE
Date: 02-2010
DOI: 10.1109/ARES.2010.74
Publisher: IEEE
Date: 09-2010
DOI: 10.1109/NSS.2010.38
Publisher: IGI Global
Date: 2005
DOI: 10.4018/978-1-59140-575-7.CH129
Abstract: With the continual convergence of analogue technologies with those either simulated or implemented in digital based equivalents, future benefits usually involve better reliability and lower costs. As current technical limitations are removed, the literature does not show any large scale assessment of the legal and security implications of the removal of cables in this digital world or the effect of a move toward wireless transmission in this context. Neither Voice Over Internet Protocol (VoIP) nor IEEE 802.11b is new technology, but the combination of these services to provide a primary telephone network for small regional centres is an innovative solution to rural telecommunication problems.
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: American Astronomical Society
Date: 09-11-2018
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: Oxford University Press (OUP)
Date: 04-03-2015
DOI: 10.1093/MNRAS/STV208
Publisher: EDP Sciences
Date: 08-2019
DOI: 10.1051/0004-6361/201935420
Abstract: We present the results of the monitoring c aign of the Type IIn supernova (SN) 2018cnf (a.k.a. ASASSN-18mr). It was discovered about ten days before the maximum light (on MJD = 58 293.4 ± 5.7 in the V band, with M V = −18.13 ± 0.15 mag). The multiband light curves show an immediate post-peak decline with some minor luminosity fluctuations, followed by a flattening starting about 40 days after maximum. The early spectra are relatively blue and show narrow Balmer lines with P Cygni profiles. Additionally, Fe II, O I, He I, and Ca II are detected. The spectra show little evolution with time and with intermediate-width features becoming progressively more prominent, indicating stronger interaction of the SN ejecta with the circumstellar medium. The inspection of archival images from the Panoramic Survey Telescope and Rapid Response System (Pan-STARRS) survey has revealed a variable source at the SN position with a brightest detection in December 2015 at M r = −14.66 ± 0.17 mag. This was likely an eruptive phase from the massive progenitor star that started from at least mid-2011, and that produced the circumstellar environment within which the star exploded as a Type IIn SN. The overall properties of SN 2018cnf closely resemble those of transients such as SN 2009ip. This similarity favours a massive hypergiant, perhaps a luminous blue variable, as progenitor for SN 2018cnf.
Publisher: Emerald
Date: 08-2003
DOI: 10.1108/10650740310484241
Abstract: System security today focuses on the design of safe and secure information systems and their operation. In the analysis of any information system, whether small or large, one observes within it a “set of human activities related to each other so they can be viewed as a whole”. If one particularly focuses on security aspects of large information systems, and then considers the many layers of complexity comprising the human activity systems within them, it becomes apparent that one of these layers, or subsystems, is a cultural one. This paper proposes that the perspective gained on the impact of culture in such a system by the application of a systems theory, augmented by perspectives supplied by worldview theory, is helpful in designing appropriate learning, e‐commerce or other kinds of distributed environments for multicultural settings.
Publisher: IEEE
Date: 06-2015
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IGI Global
Date: 2020
DOI: 10.4018/978-1-7998-2466-4.CH028
Abstract: Past cyber-attacks on Supervisory Control and Data Acquisition (SCADA) Systems for Critical infrastructures have left these systems compromised and caused financial and economic problems. Deliberate attacks have resulted in denial of services and physical injury to the public in certain cases. This study explores the past attacks on SCADA Systems by examining nine case studies across multiple utility sectors including transport, energy and water and sewage sector. These case studies will be further analysed according to the cyber-terrorist decision-making theories including strategic, organisational and psychological theories based on McCormick (2000). Next, this study will look into cyber-terrorist capabilities in conducting attacks according to Nelson's (1999) approach that includes simple-unstructured, advance-structured and complex-coordinated capabilities. The results of this study will form the basis of a guideline that organisations can use so that they are better prepared in identifying potential future cybersecurity attacks on their SCADA systems.
Publisher: IEEE
Date: 03-2008
Publisher: IEEE
Date: 08-2014
Publisher: IEEE
Date: 2009
Publisher: IEEE
Date: 11-2007
Publisher: IEEE
Date: 2007
Publisher: American Astronomical Society
Date: 20-12-2019
Publisher: Springer US
Date: 2007
Publisher: Emerald
Date: 28-12-2013
Publisher: IEEE Comput. Soc
Date: 2001
Publisher: Springer Berlin Heidelberg
Date: 2014
Publisher: Academic Conferences International Ltd
Date: 08-06-2022
Abstract: As the space sector continues to grow, so do the cybersecurity risks. As large as the attack surface of a space system is, the ground segment remains an attractive source of intrusion points, not only because of its relative accessibility but also because the ground system is often viewed as little more than a conventional IT system. Thus, a representative security assessment of a space system cannot avoid addressing the vulnerabilities of the associated ground system and the relevant threats. This motivates the construction of a virtual ground station testbed, as part of larger reference platform, to support our ongoing research on the cybersecurity of space systems. Presented here is a discussion of the preliminary work being undertaken at the University of South Australia node of the SmartSat Cooperative Research Centre on such a testbed. A distinguishing feature of the testbed is the integration of a security information and event management (SIEM) system justifying the name of the testbed, “SIEM4GS”. Based on the latest literature on ground stations, a logical architecture and an implementation plan involving only open-source software building blocks for SIEM4GS are proposed. Features of the ground station and SIEM services are discussed. A plan is provided on how to extend the SIEM system from a primarily “detect” role in the NIST Cybersecurity Framework to a “detect and respond” role.
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: Academic Conferences International Ltd
Date: 28-02-2023
Abstract: Hypersonic vehicles are vehicles travelling faster than Mach 5 (five times the speed of sound). Hypersonic technologies have existed since the end of the 1950s, but recent developments of defence applications have led to their resurgence. Hypersonic weapons can be hypersonic (powered) cruise missiles or hypersonic glide vehicles (HGVs). The near-space trajectories of HGV, combined with their superior manoeuvrability, enable HGVs to evade existing space and terrestrial sensors used to track ballistic missiles, posing an immediate threat to today’s radar networks and making HGVs well-suited for intercontinental ( 5500 km) targets. Securing HGV detection and tracking systems is of great interest to at-risk nations and cybersecurity researchers alike. However, like hypersonic flight technologies, HGV defence technologies are heavily guarded secrets. The shortage of public-domain information did not stop academia from proposing various detection and tracking schemes, but a reasonable question is: “How credible and useful is current public-domain information, including academic publications, on HGV detection and tracking for academic researchers to base their cybersecurity research on?” To answer this question, we scanned and critically reviewed public-domain literature on HGV detection and tracking. We then identified ambiguities and knowledge gaps in the literature. In this paper, we provide a concise version of our multivocal literature review and an analysis of the identified ambiguities and knowledge gaps in our attempt to answer our earlier question.
Publisher: Springer International Publishing
Date: 2017
Publisher: IEEE Comput. Soc
Date: 2005
Publisher: Academic Conferences International Ltd
Date: 19-06-2023
Abstract: This paper briefly reviews the application of the Software-defined Networking (SDN) architecture to satellite networks. It highlights the prominent cyber threats that SDN-based satellite networks are vulnerable to and proposes relevant defence mechanisms. SDN transforms traditional networking architectures by separating the control plane from the forwarding (data) plane. This separation enhances scalability and centralises management. In comparison, in traditional networks, the control plane and the data plane are usually combined, resulting in complex network management and reduced scalability. Satellite networks can take advantage of these benefits offered by SDN and this supports them as key enablers of critical services, including weather prediction, global broadband Internet coverage, and Internet of Things (IoT) services. Ease of configuration and flexibility are essential for satellites providing critical services to instantly adapt to network changes. These desirable attributes can be realised by applying SDN to satellite networks. Although SDN offers significant benefits to satellite networks, it is vulnerable to cyber-attacks and particularly due to its centralised architecture. A common attack on SDN is the Distributed Denial of Service (DDoS) attack which could render the entire SDN unavailable. To mitigate such threats, an efficient Intrusion Detection System (IDS) is required to monitor the network and detect any suspicious traffic. However, traditional IDSs produce too many false positives and often fail to detect advanced attacks. For their ability to learn feature hierarchies in network traffic data automatically, whether, for network traffic classification or anomaly detection, deep learning (DL) plays an increasingly important role in IDSs. In this paper, we present a brief review of recent developments in cyber security for SDN-based space systems, and we identify vulnerabilities and threats to an SDN-based satellite network. We further discuss the potential of a DL-based IDS for the detection of cyber threats. Finally, we identify further research gaps in the recent literature and propose future research directions.
Publisher: Informa UK Limited
Date: 18-03-2010
Publisher: Springer International Publishing
Date: 2015
Publisher: Emerald
Date: 07-01-2014
DOI: 10.1108/JMLC-06-2013-0019
Abstract: – There is a clear consensus of opinion that virtual environments and virtual currencies pose a money laundering and terrorism financing threat. What is less clear, however, is the level of risk that they pose. This paper aims to clarify the suitability of virtual environments for conducting money laundering and terrorism financing activities. – A number of experiments were conducted to estimate the quantity of funds that could be moved through these environments. These experiments took into account a number of factors such as the number of accounts that would need to be opened to launder/raise a specific amount of funds, the amount of funds that could be placed within a certain timeframe and the transaction limits imposed by each of the massively multiplayer online games and online financial service providers involved in the money laundering and terrorism financing scenarios. – The findings of this research show that money laundering and terrorism financing can take place inside virtual environments. Virtual money laundering and terrorism financing offer high levels of anonymity, potentially low levels of detection, and remove many of the risks associated with real-world money laundering and terrorism financing activity. However, this comes at the cost of ease, time and, in some cases, the amount of funds laundered. Large sums (millions of dollars) can be laundered in virtual environments, but this exponentially increases the level of effort involved in setting up accounts and placing, layering and integrating funds. – A number of authors have described potential virtual money laundering scenarios, but some of these are out-of-date due to closed loopholes, all are rudimentary and make no attempt to discuss the practicality or feasibility of using these scenarios. This research addresses those issues.
Publisher: IEEE
Date: 04-2007
Publisher: Springer US
Date: 2008
Publisher: Unpublished
Date: 2015
Publisher: IEEE
Date: 2008
DOI: 10.1109/ARES.2008.4
Publisher: IEEE
Date: 03-2008
Start Date: 2009
End Date: 2011
Funder: Australian Research Council
View Funded ActivityStart Date: 2008
End Date: 2010
Funder: Australian Research Council
View Funded ActivityStart Date: 2009
End Date: 2013
Funder: Australian Research Council
View Funded ActivityStart Date: 2007
End Date: 2009
Funder: Australian Research Council
View Funded ActivityStart Date: 07-2009
End Date: 04-2010
Amount: $586,400.00
Funder: Australian Research Council
View Funded ActivityStart Date: 06-2008
End Date: 06-2010
Amount: $132,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 06-2008
End Date: 06-2011
Amount: $75,354.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2009
End Date: 12-2012
Amount: $78,420.00
Funder: Australian Research Council
View Funded Activity