Enhancing information credibility using mathematical prediction. The aim of this project is to develop theory, techniques, mathematical tools and practical algorithms for rumor detection and forecast in social media to enhance credibility of news, especially in time-sensitive situations and trending events. This project will significantly advance human knowledge of rumor formation, detection, and forecast, which will enable timely and efficient counter attacks. The outcomes from this project wil ....Enhancing information credibility using mathematical prediction. The aim of this project is to develop theory, techniques, mathematical tools and practical algorithms for rumor detection and forecast in social media to enhance credibility of news, especially in time-sensitive situations and trending events. This project will significantly advance human knowledge of rumor formation, detection, and forecast, which will enable timely and efficient counter attacks. The outcomes from this project will offer a reliable information environment for our society.Read moreRead less
Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. Thi ....Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. This project will also propose a novel integrated trust enhanced cloud security architecture, enabling the design of adaptive secure systems which will be more resilient to dynamic cyber security attacks. It will demonstrate the proposed models and architecture using a practical cloud based online application.Read moreRead less
Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This pr ....Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This project aims to develop a continuous authentication approach based on user behaviour - typical interactions plus biometrics (for example, keystroke dynamics) - combined with a risk adaptive assessment of the resources being accessed, resulting in re-authentication requests in the event of a suspected compromise.Read moreRead less
New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a ....New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a lack of solid security foundations. This project aims to apply algebraic and probabilistic techniques to improve efficiency of existing tools, and the understanding of their security. Outcomes are expected to include new insights in cryptographic theory, and new practical tools for cyber security.Read moreRead less
A fast and effective automated insider threat detection and prediction system. Threats from insiders directly compromises the security, privacy and integrity of Australian e-commerce, large databases and communication channels. This project will provide an essential step in combating this criminal activity by developing methods to detect such threats and secure the public's information against exposure and identity theft.