Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods an ....Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods and efficient algorithms that will be able to prevent real-time exfiltration and identify previously undetected exfiltration of sensitive data. This should provide significant benefits to governments, defence networks as well as businesses and health sectors, as it will protect them from sophisticated cyber attacks.
Read moreRead less
Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptiv ....Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptive trust and integrity preserving methods, and reliable distributed data processing mechanisms to mitigate vulnerabilities in real-time IoT-enabled critical surveillance. This should provide significant benefits to Australia's economy, one of which is the enhanced consumer-centric adoption of IoT for sensitive operations.Read moreRead less
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Optimising disease surveillance to support decision-making. COVID-19 has demonstrated the critical role of epidemic data and analytics in guiding government response to pandemic threats, reducing disease and saving lives. The demand for epidemic analytics for response to threats of national significance will only grow. The goals of this project are to 1) determine the combination(s) of surveillance methods that provide the most useful data for epidemic analysis and 2) translate these findings in ....Optimising disease surveillance to support decision-making. COVID-19 has demonstrated the critical role of epidemic data and analytics in guiding government response to pandemic threats, reducing disease and saving lives. The demand for epidemic analytics for response to threats of national significance will only grow. The goals of this project are to 1) determine the combination(s) of surveillance methods that provide the most useful data for epidemic analysis and 2) translate these findings into the blueprint for a next-generation infectious disease surveillance system for Australia. We will use a simulation-evaluation approach, coupling methods from infectious disease modelling with those from information theory optimal design. Outcomes will enable more tailored and effective pandemic response.Read moreRead less
Expectations and commitments in the Australia-USA alliance. This project aims to investigate the gap between the high expectations of mutual support and the lack of detailed security commitments in the Australia-US Alliance. The project intends to use a focused approach that captures thematic aspects of the alliance through project frames and historical slices across time. Expected outcomes can advance understanding of how alliances operate as security institutions. The outcomes can help to prom ....Expectations and commitments in the Australia-USA alliance. This project aims to investigate the gap between the high expectations of mutual support and the lack of detailed security commitments in the Australia-US Alliance. The project intends to use a focused approach that captures thematic aspects of the alliance through project frames and historical slices across time. Expected outcomes can advance understanding of how alliances operate as security institutions. The outcomes can help to promote a more informed national conversation about the costs and benefits of Australia's security relationship with the United States of America (USA) and contribute to debates over the future of the Australia-USA Alliance during a period of strategic uncertainty.Read moreRead less
Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks ....Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks to address both difficulties by using rigorous statistical signal processing methods to optimally fuse information from a network of low-cost cameras.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE170101081
Funder
Australian Research Council
Funding Amount
$360,000.00
Summary
Adaptive value-flow analysis to improve code reliability and security. This project aims to develop client-driven adaptive value-flow analysis to detect software bugs in system software written in the C/C++ programme language. Static analysis tools for automated code inspections can benefit software developers, but are imprecise, inefficient and not user-friendly for analysing real-world industrial-sized software. The project will investigate static, dynamic and user-guided value-flow analysis t ....Adaptive value-flow analysis to improve code reliability and security. This project aims to develop client-driven adaptive value-flow analysis to detect software bugs in system software written in the C/C++ programme language. Static analysis tools for automated code inspections can benefit software developers, but are imprecise, inefficient and not user-friendly for analysing real-world industrial-sized software. The project will investigate static, dynamic and user-guided value-flow analysis to efficiently and precisely analyse large-scale programs according to clients’ needs, thereby allowing compilers to generate safe, reliable and secure code. This project is expected to advance value-flow analysis for industrial-sized software, improve software reliability and security, and benefit Australian software systems and industries.Read moreRead less
Modelling human decision making in complex environments. The project aims to extend quantitative psychological models of simple choice tasks to decision-making with complex stimuli in complex environments. The new formal models are designed to provide a comprehensive account of behaviour, including the choices that are made, how long it takes to make them, and how choices and choice times vary within and between decision-makers. The models would explain how people adapt to changes in task demand ....Modelling human decision making in complex environments. The project aims to extend quantitative psychological models of simple choice tasks to decision-making with complex stimuli in complex environments. The new formal models are designed to provide a comprehensive account of behaviour, including the choices that are made, how long it takes to make them, and how choices and choice times vary within and between decision-makers. The models would explain how people adapt to changes in task demands when dealing with multiple stimuli or performing multiple tasks concurrently under time pressure. The project aims to provide the basic research that is needed to extend psychological models of choice to complex ‘real-world’ tasks, such air traffic control and maritime surveillance.Read moreRead less