Gigabit Wireless: Setting the Standard for Tomorrow's Broadband. This project will strengthen a long-term alliance between researchers at the University of Melbourne and NEC Australia, one of the few multinational research laboratories with significant R & D presence in Australia. Researchers at the University of Melbourne with expertise in communication theory fundamentals will collaborate with experienced research and design engineers at NEC, to produce fundamental research, and the resulting ....Gigabit Wireless: Setting the Standard for Tomorrow's Broadband. This project will strengthen a long-term alliance between researchers at the University of Melbourne and NEC Australia, one of the few multinational research laboratories with significant R & D presence in Australia. Researchers at the University of Melbourne with expertise in communication theory fundamentals will collaborate with experienced research and design engineers at NEC, to produce fundamental research, and the resulting design tools and intellectual property that will provide a new direction for wireless broadband access. The project will provide high-quality postgraduate and postdoctoral training in an area of great relevance to the Australian telecommunications industry.Read moreRead less
Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less