Islands of rocks: geckos as a model system to understand patterns of biodiversity, endemism and speciation in the Kimberley. Australia is renowned for its diversity of lizards, yet a plethora of new "cryptic" gecko species continue to be discovered. The project will densely sample the complex Kimberley to understand the evolution of its geckos, which will shed light on true levels of species diversity and the geological and environmental history of this biodiversity hotspot.
Surviving the data deluge: Scalable feature extraction, discrimination and analysis for computer vision tasks using compressed sensed data. Strategically, our pioneering solutions besides being technically and socially significant, open fresh options for sensor-agnostic data analysis. The technical significance lies through the creation of new technologies for the critical national and global security markets, currently overwhelmed by data. The social significance arises from our solutions being ....Surviving the data deluge: Scalable feature extraction, discrimination and analysis for computer vision tasks using compressed sensed data. Strategically, our pioneering solutions besides being technically and socially significant, open fresh options for sensor-agnostic data analysis. The technical significance lies through the creation of new technologies for the critical national and global security markets, currently overwhelmed by data. The social significance arises from our solutions being privacy preserving, providing new avenues for the production of novel, socially acceptable products for aged care monitoring. Our methods spearhead future advancement in diverse disciplines due to the wide applicability of the methods to other sensor networks (Square Kilometre Array) and data types, providing new frameworks for addressing crucial problems of data management. Read moreRead less
Industrial Transformation Research Hubs - Grant ID: IH200100009
Funder
Australian Research Council
Funding Amount
$5,000,000.00
Summary
ARC Research Hub for Transforming Energy Infrastructure Through Digital Engineering. This Research Hub will harness the strengths of data-based and physics-based sciences to transform the operation of Australia’s offshore energy infrastructure. This essential research will create, use and embed observations of past and ongoing activity to engineer tools and approaches necessary to enhance our understanding of the offshore environment, optimise critical operations for existing facilities (includi ....ARC Research Hub for Transforming Energy Infrastructure Through Digital Engineering. This Research Hub will harness the strengths of data-based and physics-based sciences to transform the operation of Australia’s offshore energy infrastructure. This essential research will create, use and embed observations of past and ongoing activity to engineer tools and approaches necessary to enhance our understanding of the offshore environment, optimise critical operations for existing facilities (including installation and maintenance), and efficiently design future infrastructure. The integrated multidisciplinary approach will not only help Operators achieve high productivity through low downtime and optimised maintenance, but also demonstrate, in research and industry, the transformative potential of digital engineering.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
ARC Research Network in Enterprise Information Infrastructure. EII targets consolidated research towards the comprehensive development & establishment of advanced information infrastructures. Its prime purpose is to provide a forum for intellectual exchange by diverse yet complementary research groups, to address the fundamental research problems faced by scientific & business communities when dealing with deployment of information technology to globally distributed, and data intensive environme ....ARC Research Network in Enterprise Information Infrastructure. EII targets consolidated research towards the comprehensive development & establishment of advanced information infrastructures. Its prime purpose is to provide a forum for intellectual exchange by diverse yet complementary research groups, to address the fundamental research problems faced by scientific & business communities when dealing with deployment of information technology to globally distributed, and data intensive environments. EII will address 3 tightly coupled research themes: Ability to interoperate across existing heterogenous platforms & applications; Efficient processing of very large data sets; Technology adoption & impact. Generic results will be applicable to e-science and large business information systems installations.Read moreRead less
Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to devel ....Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to develop new ways designing bio-cryptosystems that provide strong security strength. The project will bring new body of knowledge into this field and place Australia in the forefront of this research, and also result in strengthened security of IT infrastructure and systems for industries.Read moreRead less
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design i ....Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design innovative host-based IDS, as a complement to the NIDS, to address this issue. The outcomes of this project will strengthen the national capability to resist attacks by criminals and terrorists on Australian networked critical infrastructures and also enhance the global competitiveness of Australia’s information technology industry.Read moreRead less
Robust and scalable change detection in geo-spatial data. A flood of data in the form of text, images and video emanate from a proliferation of sensors. These data are collected but rarely analysed, rendering it meaningless. This project aims to develop new software and techniques to detect changes over time in large scale geographically referenced data (for example photomaps) for use across numerous domains.
Detecting Supervisory Control and Data Access (SCADA) malicious programs to protect Australian critical infrastructure. The security of SCADA systems has enormous impact to our national security and economy because they control and monitor critical infrastructure, like power, gas and water facilities and nuclear power plants, etc. This project aims to investigate the security issues and provide innovative technological solutions to detect and prevent such problems.