Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramat ....Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramatically benefit Australian people and government, especially for the Australian ICT industry for commercializing the research outputs. Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less
Expectations and commitments in the Australia-USA alliance. This project aims to investigate the gap between the high expectations of mutual support and the lack of detailed security commitments in the Australia-US Alliance. The project intends to use a focused approach that captures thematic aspects of the alliance through project frames and historical slices across time. Expected outcomes can advance understanding of how alliances operate as security institutions. The outcomes can help to prom ....Expectations and commitments in the Australia-USA alliance. This project aims to investigate the gap between the high expectations of mutual support and the lack of detailed security commitments in the Australia-US Alliance. The project intends to use a focused approach that captures thematic aspects of the alliance through project frames and historical slices across time. Expected outcomes can advance understanding of how alliances operate as security institutions. The outcomes can help to promote a more informed national conversation about the costs and benefits of Australia's security relationship with the United States of America (USA) and contribute to debates over the future of the Australia-USA Alliance during a period of strategic uncertainty.Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE240100131
Funder
Australian Research Council
Funding Amount
$539,000.00
Summary
Federated Omniverse Facilities for Smart Digital Futures. A world-first trans-disciplinary, -domain, and -institutional smart 3D omniverse R&D ecosystem AuVerse will be built in NSW, affiliated with Queensland, and accessible to academia and industry. AuVerse will support cloud-based, reality-virtuality-fused, immersive, interactive and secure future-oriented digital design, development, training and society. In the new era of digital innovation and paradigm shift, AuVerse will substantially boo ....Federated Omniverse Facilities for Smart Digital Futures. A world-first trans-disciplinary, -domain, and -institutional smart 3D omniverse R&D ecosystem AuVerse will be built in NSW, affiliated with Queensland, and accessible to academia and industry. AuVerse will support cloud-based, reality-virtuality-fused, immersive, interactive and secure future-oriented digital design, development, training and society. In the new era of digital innovation and paradigm shift, AuVerse will substantially boost Australia’s pivotal research leadership and business competitiveness in nurturing new-generation, collaborative and transformative digital R&D and talent pipeline. It will enable large-scale strategic business innovation and transformation including smart manufacturing and Industry 4.0.Read moreRead less
Towards Generalisable and Unbiased Dynamic Recommender Systems. This project aims to develop the foundations, including models, methodology, and algorithms for building generalisable and unbiased dynamic recommender systems to facilitate intelligent decision-making, prompt contextualised and personalised strategic plans, and support context-aware action recourse. To ensure that fundamental principles, such as fairness and transparency, are respected, a set of algorithms and techniques are propos ....Towards Generalisable and Unbiased Dynamic Recommender Systems. This project aims to develop the foundations, including models, methodology, and algorithms for building generalisable and unbiased dynamic recommender systems to facilitate intelligent decision-making, prompt contextualised and personalised strategic plans, and support context-aware action recourse. To ensure that fundamental principles, such as fairness and transparency, are respected, a set of algorithms and techniques are proposed to develop recommender systems in a more responsible manner. The result of this project will not only maintain Australia's leadership in this frontier research area, but also serve as an excellent vehicle for the education and training of Australia's next generation of scholars and engineers.Read moreRead less
Improving International Law Regulation of Maritime Autonomous Vessels . The use of maritime autonomous vessels (MAVs) is creating regulatory and enforcement opportunities and challenges under international law. The aim of this project is to fill a critical gap in current responses in international law in focusing on the challenges posed by MAVs to international maritime security law. MAVs are increasingly useful for states in peacetime military operations, in response to transnational crime, mar ....Improving International Law Regulation of Maritime Autonomous Vessels . The use of maritime autonomous vessels (MAVs) is creating regulatory and enforcement opportunities and challenges under international law. The aim of this project is to fill a critical gap in current responses in international law in focusing on the challenges posed by MAVs to international maritime security law. MAVs are increasingly useful for states in peacetime military operations, in response to transnational crime, maritime cybersecurity, and in promoting broader national security goals, but non-state actors may also use them for terrorist and transnational criminal activity. International law has not kept up with this technology so this project will redress that problem and propose law reform to enhance global maritime security.Read moreRead less
Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. Th ....Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. The success of this project will further enhance the international competitiveness of Australian research in this important field and will benefit any Australian industry and business where software systems are deeply-rooted, such as transportation, smart homes, medical devices, defence and finance.Read moreRead less