Discovery Early Career Researcher Award - Grant ID: DE130100885
Funder
Australian Research Council
Funding Amount
$374,723.00
Summary
Aerial robots contacting objects in dynamic environments. This project will allow small unmanned aerial vehicles to touch objects to perform tasks and to fly confidently in complex and cluttered environments where contact with surroundings is inevitable. This will enable robots to perform critical tasks such as servicing power lines, bridges and other elevated infrastructure.
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This pr ....Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This project aims to develop a continuous authentication approach based on user behaviour - typical interactions plus biometrics (for example, keystroke dynamics) - combined with a risk adaptive assessment of the resources being accessed, resulting in re-authentication requests in the event of a suspected compromise.Read moreRead less
Pacific Partners? The Australia-New Zealand alliance in the Pacific Islands. This project aims to investigate how alliances operate and why they endure using an in-depth analysis of the Australia-New Zealand alliance in the Pacific Islands, the region where the alliance has focused and in which there is growing strategic and policy interest. It intends to build a micro-level analysis of the influence of the behaviors and beliefs of individuals onto existing conceptual accounts. Informed by exten ....Pacific Partners? The Australia-New Zealand alliance in the Pacific Islands. This project aims to investigate how alliances operate and why they endure using an in-depth analysis of the Australia-New Zealand alliance in the Pacific Islands, the region where the alliance has focused and in which there is growing strategic and policy interest. It intends to build a micro-level analysis of the influence of the behaviors and beliefs of individuals onto existing conceptual accounts. Informed by extensive interviews, it expects to advance understanding of how the two states negotiate differences in approaches and interests while working together to preserve their security. It anticipates pinpointing strengths and vulnerabilities in the alliance and contributing to a more informed policy debate about how it should operate.Read moreRead less
A fast and effective automated insider threat detection and prediction system. Threats from insiders directly compromises the security, privacy and integrity of Australian e-commerce, large databases and communication channels. This project will provide an essential step in combating this criminal activity by developing methods to detect such threats and secure the public's information against exposure and identity theft.
Compression and communication of single and multi-view video based on overlapping motion hint fields. This project explores a new way of communicating motion for video and multi-view (3D) applications, facilitating efficient interactive access to content. Outcomes will include new compression methods that avoid redundant transmission of motion side information, plus client/server technology that leverages metadata from smart surveillance cameras.
Discovery Early Career Researcher Award - Grant ID: DE230100116
Funder
Australian Research Council
Funding Amount
$419,218.00
Summary
Vulnerability Defence: From Interpretable to Trustworthy Threat Assessment. This project aims to design a novel vulnerability defence framework to automatically identify, prioritise and interpret vulnerabilities and their attack vectors from the Internet of Things (IoT). Currently, most Australian organisations can be targeted by complex cyberattacks, stealing sensitive information leading to financial loss and reputation threats. This project expects to generate new knowledge in IoT vulnerabili ....Vulnerability Defence: From Interpretable to Trustworthy Threat Assessment. This project aims to design a novel vulnerability defence framework to automatically identify, prioritise and interpret vulnerabilities and their attack vectors from the Internet of Things (IoT). Currently, most Australian organisations can be targeted by complex cyberattacks, stealing sensitive information leading to financial loss and reputation threats. This project expects to generate new knowledge in IoT vulnerability assessment using economic risk estimation and cognitive vulnerability identification methods. Expected outcomes include trusted IoT vulnerability assessment methods and vulnerability testbed. Significant benefits are expected to protect IoT networks in all defence, industry and government sectors.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE170101203
Funder
Australian Research Council
Funding Amount
$360,000.00
Summary
Multi-functional antenna arrays for secure and reliable wireless systems. This project aims to develop and validate the fundamental theory and engineering techniques for fully reconfigurable antenna arrays. Multi-functional antennae deliver highly-secure and reliable wireless communications for Australia’s digital economy. Such an antenna array, a critical component of wireless multi-functional systems, can provide full flexibilities of the frequency, polarisation and radiation pattern to satisf ....Multi-functional antenna arrays for secure and reliable wireless systems. This project aims to develop and validate the fundamental theory and engineering techniques for fully reconfigurable antenna arrays. Multi-functional antennae deliver highly-secure and reliable wireless communications for Australia’s digital economy. Such an antenna array, a critical component of wireless multi-functional systems, can provide full flexibilities of the frequency, polarisation and radiation pattern to satisfy the systems’ different requirements. This project is expected to advance the scientific knowledge of several frontiers of antenna research and enhance spectrum usage efficiency, highly-secure wireless communications and compact and reliable military wireless platforms, thus benefiting Australian industry, society and national defence.Read moreRead less
Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT a ....Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT access control with machine learning based anomaly detection. This should provide significant benefits, such as preventing cyber threats on security and privacy of IoT and improving trust in IoT-enabled smart critical infrastructure of Australia.Read moreRead less
Understanding the drivers and motivators of extremist violence. Despite intense interest in the issue, our understanding of and ability to respond to extremist violence is limited. This innovative program of research is designed to establish an empirical foundation for understanding and responding to extremist violence in Australia. It aims to examine risk and protective factors for such violence, the needs of those susceptible to committing such acts, and the effectiveness of intervention. Find ....Understanding the drivers and motivators of extremist violence. Despite intense interest in the issue, our understanding of and ability to respond to extremist violence is limited. This innovative program of research is designed to establish an empirical foundation for understanding and responding to extremist violence in Australia. It aims to examine risk and protective factors for such violence, the needs of those susceptible to committing such acts, and the effectiveness of intervention. Findings are expected to inform health, national security, social welfare, and justice agencies in their pursuit to identify those at risk of offending, address their clinical needs and manage the risk of harm they pose to society and to themselves.Read moreRead less