Virtual Environments for Improved Enterprise Software Deployment. This project aims to improve quality assurance for enterprise IT. Enterprise IT systems are highly interconnected and interdependent — a failure in one system can cause a cascade of failures across multiple systems, bringing business to a standstill. The project aims to create new technologies to automate the provisioning of virtual deployment environments to test the enterprise systems. In particular, it aims to develop new metho ....Virtual Environments for Improved Enterprise Software Deployment. This project aims to improve quality assurance for enterprise IT. Enterprise IT systems are highly interconnected and interdependent — a failure in one system can cause a cascade of failures across multiple systems, bringing business to a standstill. The project aims to create new technologies to automate the provisioning of virtual deployment environments to test the enterprise systems. In particular, it aims to develop new methods for the automatic analysis of service interaction traces and the generation of accurate executable service models, without requiring explicit knowledge of them. The automatic analysis and generation should reduce development cost for enterprise IT systems and increase system quality and reliability. The new software deployment technologies from this project aim to significantly reduce the time, effort and cost of system quality assurance activities in software development organisations, and yet produce higher-quality software leading to uninterrupted business operation in end-user organisations across all sectors.Read moreRead less
Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This pr ....Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This project aims to develop a continuous authentication approach based on user behaviour - typical interactions plus biometrics (for example, keystroke dynamics) - combined with a risk adaptive assessment of the resources being accessed, resulting in re-authentication requests in the event of a suspected compromise.Read moreRead less
Building Peer-to-Peer Middleware Infrastructure with Web Services. Peer-to-Peer (P2P) computing is a framework defining the interactions between systems acting as both clients and servers. Web services technology is an evolving set of Web standards based on eXtensible Markup Language (XML), and is considered as the newest approach to distributed computing. In this project, we aim to build a new type of P2P architectural framework that is truly interoperable and distributed, being platform and la ....Building Peer-to-Peer Middleware Infrastructure with Web Services. Peer-to-Peer (P2P) computing is a framework defining the interactions between systems acting as both clients and servers. Web services technology is an evolving set of Web standards based on eXtensible Markup Language (XML), and is considered as the newest approach to distributed computing. In this project, we aim to build a new type of P2P architectural framework that is truly interoperable and distributed, being platform and language independent in an Internet-wide context. Using Web services and message queuing, this project also aims to develop a robust middleware infrastructure consisting of a set of tools and programming libraries to ease the development of verifiable P2P applications on heterogeneous platforms.Read moreRead less
Visual analytics for massive multivariate networks. Visual analytics for massive multivariate networks. This project aims to create methods to visually analyse massive multivariate networks. The amount of network data available has exploded in recent years: software systems, social networks and biological systems have millions of nodes and billions of edges with multivariate attributes. Their size and complexity makes these data sets hard to exploit. More efficient ways to understand the data ar ....Visual analytics for massive multivariate networks. Visual analytics for massive multivariate networks. This project aims to create methods to visually analyse massive multivariate networks. The amount of network data available has exploded in recent years: software systems, social networks and biological systems have millions of nodes and billions of edges with multivariate attributes. Their size and complexity makes these data sets hard to exploit. More efficient ways to understand the data are needed. This project will design, implement and evaluate visualisation methods for massive multivariate network data sets. This research is expected to be used by Australian software development, biotechnology and security companies to exploit their data.Read moreRead less
A fast and effective automated insider threat detection and prediction system. Threats from insiders directly compromises the security, privacy and integrity of Australian e-commerce, large databases and communication channels. This project will provide an essential step in combating this criminal activity by developing methods to detect such threats and secure the public's information against exposure and identity theft.
Assistive technologies for autism support harnessing social media. This project aims to tap social media to revolutionize early intervention therapy for children with autism. By creating open, extensible software for therapy delivery, and tools for parents to access high quality information and support, we will provide children a greater chance to achieve their potential and much-needed relief for parents and carers.