Architecture-based Open Network Management Systems for Next Generation Telecommunications. We aim to develop an open, policy-based architecture for the management of next generation telecommunications networks. It is expected that a comprehensive Open Architecture-based Telecommunications Management Network (AuTuMN) framework could be put in place to manage the network based on centralised policies and roles rather than having to handle individual users and elements. Significantly, the scient ....Architecture-based Open Network Management Systems for Next Generation Telecommunications. We aim to develop an open, policy-based architecture for the management of next generation telecommunications networks. It is expected that a comprehensive Open Architecture-based Telecommunications Management Network (AuTuMN) framework could be put in place to manage the network based on centralised policies and roles rather than having to handle individual users and elements. Significantly, the scientific knowledge of open systems and network management systems for next generation networks will be extended.Read moreRead less
Understanding the impact of enterprise system use on system performance. To optimise organizational benefits, resource intensive enterprise systems must be appropriately used by all user cohorts. This study investigates the impact of system-use on system success. System-use patterns derived for all key user cohorts across the lifecycle phases will create management matrices to assist organizations maximise system-use.
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Streaming video media using semantic information. Delivering video over the Internet has posted a big problem. Video files are extremely big and need hours or even tens of hours to download. This is too long to wait for the content. Much research has been attempted over low-level structures such as coding, buffer, protocol, agent and server. These techniques are either not scalable or impractical. This project aims to collaborate with CyberView on developing a high-level scheme of streaming vide ....Streaming video media using semantic information. Delivering video over the Internet has posted a big problem. Video files are extremely big and need hours or even tens of hours to download. This is too long to wait for the content. Much research has been attempted over low-level structures such as coding, buffer, protocol, agent and server. These techniques are either not scalable or impractical. This project aims to collaborate with CyberView on developing a high-level scheme of streaming video using semantic information. It breaks videos into shots and allows semantic browsing of the content. It also introduces intelligent agents with various behaviours.Read moreRead less
Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even ....Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even be commercialised. The capability of a nation to trace the real source of any attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity.Read moreRead less
Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. ....Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. This project tackles new and urgent challenges in edge data storage, manipulation, maintenance, and protection with optimisation, distributed consensus, graph analytics, and cryptography techniques. The outcomes should build the pillars of edge caching systems and promote Australia's 5G software innovations.Read moreRead less
Palladium Based Mobile Agent System for Collaborative Environments. This project aims to (a) develop a Palladium based mobile agent methodology and System for collaborative environments and to (b) construct a testbed that involves the creation of Palladium and mobile agent system to test it on "Virtual Community", that is, a real commercial application provided by our partner investigator for proof of concept.
Mobile Device Autoconfiguration. Todays cellular networks are built to optimise spectrum efficiency by combining specific codecs and matching bearer services. With general purpose mobile terminals that can access different network types the applications will break this optimisation by using generic codecs. This project aims at solving this problem by letting the access networks configure the terminals with the natively supported codecs and bearer service definitions. The project will lead to con ....Mobile Device Autoconfiguration. Todays cellular networks are built to optimise spectrum efficiency by combining specific codecs and matching bearer services. With general purpose mobile terminals that can access different network types the applications will break this optimisation by using generic codecs. This project aims at solving this problem by letting the access networks configure the terminals with the natively supported codecs and bearer service definitions. The project will lead to considerably higher cost effectiveness in the emerging mobile Internet.Read moreRead less
Enhancing computer user productivity of integrated enterprise wide systems: an intervention study. This project addresses a critical issue in IT investment and productivity. Current theoretical models of user training and acceptance have not contributed to the effectiveness of implementing new integrated enterprise wide systems. This study will identify key indiviudal differences that predict user motivation to learn and utilize such systems under mandatory conditions. A longitudinal study in ....Enhancing computer user productivity of integrated enterprise wide systems: an intervention study. This project addresses a critical issue in IT investment and productivity. Current theoretical models of user training and acceptance have not contributed to the effectiveness of implementing new integrated enterprise wide systems. This study will identify key indiviudal differences that predict user motivation to learn and utilize such systems under mandatory conditions. A longitudinal study in two field settings will test the impact of selected interventions on task performance following training. The outcomes will inform Australian industry on models of effective implementation and provide guidance to increase the productivity of personnel using software systems.Read moreRead less
Information Systems (IS)-Impact utility and intuitiveness: a rigorous approach to relevance. This study aims to evaluate the key elements of models used in design science to assess the impact of information systems. The work will examine the extent to which rigour and relevance are incorporated into these models.