Detecting Supervisory Control and Data Access (SCADA) malicious programs to protect Australian critical infrastructure. The security of SCADA systems has enormous impact to our national security and economy because they control and monitor critical infrastructure, like power, gas and water facilities and nuclear power plants, etc. This project aims to investigate the security issues and provide innovative technological solutions to detect and prevent such problems.
Blockchain-Enabled Federated Learning for Secure and Decentralised Learning. This project aims to develop novel blockchain-enabled federated learning techniques for secure and decentralised learning. It addresses an important and urgent machine learning problem, that is, the data useful for training machine learning models are often held by different owners who are not willing to share their data due to privacy concerns, resulting in isolated data islands. The project will result in a set of inn ....Blockchain-Enabled Federated Learning for Secure and Decentralised Learning. This project aims to develop novel blockchain-enabled federated learning techniques for secure and decentralised learning. It addresses an important and urgent machine learning problem, that is, the data useful for training machine learning models are often held by different owners who are not willing to share their data due to privacy concerns, resulting in isolated data islands. The project will result in a set of innovative algorithms that provide solutions to the key challenges in blockchain-enabled federated learning. The expected outcomes of the project will dramatically advance the frontier of machine learning and blockchain research, and have massive social and economic benefits for Australia and international communities.Read moreRead less
Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design i ....Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design innovative host-based IDS, as a complement to the NIDS, to address this issue. The outcomes of this project will strengthen the national capability to resist attacks by criminals and terrorists on Australian networked critical infrastructures and also enhance the global competitiveness of Australia’s information technology industry.Read moreRead less
Cost-effective App Service Management in Edge Computing Environment. This project aims to deliver a framework and a suite of approaches for cost-effective app service management in the edge computing (EC) environment facilitated by the 5G mobile network. Edge computing offers great promises for rapidly advancing mobile and IoT apps in many active domains in Australia, e.g., self-driving cars, medical services, etc. Using a variety of optimization techniques and game theory, this project attacks ....Cost-effective App Service Management in Edge Computing Environment. This project aims to deliver a framework and a suite of approaches for cost-effective app service management in the edge computing (EC) environment facilitated by the 5G mobile network. Edge computing offers great promises for rapidly advancing mobile and IoT apps in many active domains in Australia, e.g., self-driving cars, medical services, etc. Using a variety of optimization techniques and game theory, this project attacks the new challenges in the deployment, delivery and adaptation of app services in the EC environment. The outcomes of this project will significantly promote new mobile and IoT apps over Australia's 5G mobile network by allowing app vendors to manage their services cost-effectively with ease in the EC environment.Read moreRead less
Taipan: a block-chain with democratic consensus and validated contracts. Blockchains keep records by mass collaboration using peer-to-peer and cryptographical algorithms. Programmable blockchain technology can disrupt the finance industry, governance, and legal services by reducing the role for intermediaries such as banks and government authorities. This project aims to propose a new block-chain for “Trust Among Individual ParticipANts” (TAIPAN). The main feature of TAIPAN’s programmable block ....Taipan: a block-chain with democratic consensus and validated contracts. Blockchains keep records by mass collaboration using peer-to-peer and cryptographical algorithms. Programmable blockchain technology can disrupt the finance industry, governance, and legal services by reducing the role for intermediaries such as banks and government authorities. This project aims to propose a new block-chain for “Trust Among Individual ParticipANts” (TAIPAN). The main feature of TAIPAN’s programmable block-chain is the integrity and security of individual ownership records that current block-chains lack. This project will aim to overcome two major threats in current programmable block-chains, double-spending among participants, and security vulnerabilities in smart contracts. TAIPAN will provide a democratic and leaderless consensus algorithm that will avoid double-spending, and a new bug-checking framework for smart contracts that finds anomalies before smart contracts are admitted to the block-chain.Read moreRead less