Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design i ....Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design innovative host-based IDS, as a complement to the NIDS, to address this issue. The outcomes of this project will strengthen the national capability to resist attacks by criminals and terrorists on Australian networked critical infrastructures and also enhance the global competitiveness of Australia’s information technology industry.Read moreRead less
Detecting Supervisory Control and Data Access (SCADA) malicious programs to protect Australian critical infrastructure. The security of SCADA systems has enormous impact to our national security and economy because they control and monitor critical infrastructure, like power, gas and water facilities and nuclear power plants, etc. This project aims to investigate the security issues and provide innovative technological solutions to detect and prevent such problems.
Robust and scalable change detection in geo-spatial data. A flood of data in the form of text, images and video emanate from a proliferation of sensors. These data are collected but rarely analysed, rendering it meaningless. This project aims to develop new software and techniques to detect changes over time in large scale geographically referenced data (for example photomaps) for use across numerous domains.
Design of adaptive learning visual sensor networks for crowd modelling in high-density and occluded scenarios. Partnering University of Melbourne researchers, with video surveillance experts SenSen, engineering consultants ARUP and the Melbourne Cricket Club, the project addresses research enabling a system-integrating, existing surveillance, infrastructure to model crowd behaviour and exit strategies, providing real-time analysis, prediction and response capabilities for venue managers and emer ....Design of adaptive learning visual sensor networks for crowd modelling in high-density and occluded scenarios. Partnering University of Melbourne researchers, with video surveillance experts SenSen, engineering consultants ARUP and the Melbourne Cricket Club, the project addresses research enabling a system-integrating, existing surveillance, infrastructure to model crowd behaviour and exit strategies, providing real-time analysis, prediction and response capabilities for venue managers and emergency services. This new capability enhances utilisation of security resources to prevent injury and fatalities in evacuation scenarios, applicable to existing venues and influencing the development of new facilities around the country. The project delivers researcher training, global clientele for local technology and a platform for local industry growth.Read moreRead less
Impacts of Banned Drinkers Register Re-introduction in Northern Territory. This project aims to investigate the impact of the re-introduction of the Banned Drinker Register in the Northern Territory, where rates of alcohol-related harm are more than twenty times that seen in other Australian states.
This interdisciplinary team will use qualitative and quantitative methods across urban and remote locations to answer complex questions about policy impact.
This Project expects to provide evidence ....Impacts of Banned Drinkers Register Re-introduction in Northern Territory. This project aims to investigate the impact of the re-introduction of the Banned Drinker Register in the Northern Territory, where rates of alcohol-related harm are more than twenty times that seen in other Australian states.
This interdisciplinary team will use qualitative and quantitative methods across urban and remote locations to answer complex questions about policy impact.
This Project expects to provide evidence to inform future policy introduction and refinement. It aims to enhance Aboriginal research capacity for investigating alcohol policy.
Benefits should include world’s best evidence on the impact of supply restriction policies on treatment needs and the massive levels of harm seen in the Northern Territory.Read moreRead less