Intelligent Incident Management for Software-Intensive Systems. This project aims to develop intelligent incident management methods for software-intensive systems. Incidents are unplanned system interruptions or outages that could affect the normal operations of an organization and cause huge economic loss. This project expects to develop innovative, Artificial Intelligence (AI) based methods for automated incident management, including incident detection, incident identification, and incident ....Intelligent Incident Management for Software-Intensive Systems. This project aims to develop intelligent incident management methods for software-intensive systems. Incidents are unplanned system interruptions or outages that could affect the normal operations of an organization and cause huge economic loss. This project expects to develop innovative, Artificial Intelligence (AI) based methods for automated incident management, including incident detection, incident identification, and incident triage. Expected outcomes of the project include a set of novel methods and tools that can facilitate incident diagnosis and resolution. This project will provide significant benefits, such as improving the availability of software-intensive systems and reducing the economic loss caused by the incidents. Read moreRead less
Data-driven Approach to Resilient Online Service Systems. This project aims to develop a data-driven approach to improving the resilience of online service systems. Many software systems are now provided as online services via the Internet on a 24/7 basis. Although a lot of effort has been devoted to service quality assurance, in reality, online service systems still encounter many incidents and fail to satisfy user requests. This project expects to develop innovative data-driven methods for eff ....Data-driven Approach to Resilient Online Service Systems. This project aims to develop a data-driven approach to improving the resilience of online service systems. Many software systems are now provided as online services via the Internet on a 24/7 basis. Although a lot of effort has been devoted to service quality assurance, in reality, online service systems still encounter many incidents and fail to satisfy user requests. This project expects to develop innovative data-driven methods for effective fault identification, fault localization, and failure prediction. Expected outcomes of this project include novel techniques and tools for maintaining online service systems. This project will provide significant benefits, such as improving the resilience and reliability of our cyber infrastructure.Read moreRead less
Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important effici ....Design and verification of correct, efficient and secure concurrent systems. This project aims to provide methods for the design and verification of correct, secure and efficient concurrent software that are scalable and mechanised. Computers with multiple processors are now the norm and are used in a wide range of safety, security and mission critical software applications such as transport, health and infrastructure. These multi-core architectures have the potential to lead to important efficiency gains, but can introduce complex and error-prone behaviours that cannot be managed using traditional software development approaches. This project will produce better, scalable and mechanised methods for the design and verification of such software which is expected to reduce the prevalence of failures in efficient, modern software.Read moreRead less
Software engineering of people-oriented technologies and services. This project will use role, goal, and activity modelling to improve technologies that enable older people in their homes to communicate with loved ones and support networks. The models will be evaluated to determine whether built technologies are indeed meaningful and helpful for the increasing number of older adults.
Intelligent Technologies for Smart Cryptography. This project aims to improve cybersecurity by automating the process of generating cryptographic software for smart devices. The expected outcomes are tools that automatically produce efficient cryptographic software that resists attacks. The main benefit of this project is to reduce the amount of expert labour required when developing secure software.
Catering for individuals’ emotions in technology development. This project aims to develop new approaches to integrate emotional design into software engineering. Modern technologies can positively transform lives. Many good concepts fail, however, to have a transformative effect by not meeting the emotional needs of intended users. Creating software applications that satisfy needs such as ‘feeling in touch’ or ‘feeling accepted’ is difficult, due to the hard-to-define, personal and subtle natur ....Catering for individuals’ emotions in technology development. This project aims to develop new approaches to integrate emotional design into software engineering. Modern technologies can positively transform lives. Many good concepts fail, however, to have a transformative effect by not meeting the emotional needs of intended users. Creating software applications that satisfy needs such as ‘feeling in touch’ or ‘feeling accepted’ is difficult, due to the hard-to-define, personal and subtle nature of these needs. The project aims to support the development of software that better meets emotional needs by focusing on people, their life context and technology adoption, in concert with existing methods for expressing functionality. The project plans to evaluate applications in two areas: assistance for homeless people, and financial literacy among older people.Read moreRead less
Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical softwar ....Verified concurrent memory management on modern processors. This project aims to formally verify automatic memory managers in the presence of concurrency and the weakly ordered memory of modern processors. A new framework for verifying memory managers, reusable for a wide range of managed programming languages, target hardware, policies, and algorithms will be developed. Expected technical outcomes include improved techniques to ensure trustworthiness of the foundations on which critical software infrastructures are built. This will significantly enhance the security of public and private cyber assets, and deliver applications that are more robust and trustworthy, across a range of critical infrastructure such as transportation, communication, energy and defence.Read moreRead less
Flexible user-guided network layout for biomedical applications. This project will develop techniques for automatic layout of biological network diagrams, allowing users to guide the layout while satisfying any required placement constraints and drawing conventions. As part of the project, these methods will be integrated into several real-world systems biology applications for network browsing and authoring.
Security and Privacy of Individual Data Used to Extract Public Information. The project aims to contribute to the development of techniques to allow the harvesting of useful information without compromising personal privacy. Intelligent analysis of personal data can reveal valuable knowledge about a population but at a risk of invading an individual's privacy. This project aims to provide at least partial solutions to some of the problems associated with the protection of private data. In partic ....Security and Privacy of Individual Data Used to Extract Public Information. The project aims to contribute to the development of techniques to allow the harvesting of useful information without compromising personal privacy. Intelligent analysis of personal data can reveal valuable knowledge about a population but at a risk of invading an individual's privacy. This project aims to provide at least partial solutions to some of the problems associated with the protection of private data. In particular, it plans to work on the problem of security of statistical databases and privacy of streaming data. This would be underpinned by a study of anonymisation and homomorphic encryption. The expected outcomes are new theoretical results, new algorithms and protocols applicable to at least some of the current significant problems in information security.Read moreRead less
Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT a ....Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT access control with machine learning based anomaly detection. This should provide significant benefits, such as preventing cyber threats on security and privacy of IoT and improving trust in IoT-enabled smart critical infrastructure of Australia.Read moreRead less