Developing Robust Mobile Middleware for Large Scale Distributed On-line Applications. Existing electronic commerce have shown profound limitations when dealing with key issues related to electronic commerce applications, such as data interoperability, mobility and performance. The aim of this project is to understand the complexity of the underlying problems related to electronic commerce applications, and to subsequently produce a robust and efficient infrastructure to support them. It is sig ....Developing Robust Mobile Middleware for Large Scale Distributed On-line Applications. Existing electronic commerce have shown profound limitations when dealing with key issues related to electronic commerce applications, such as data interoperability, mobility and performance. The aim of this project is to understand the complexity of the underlying problems related to electronic commerce applications, and to subsequently produce a robust and efficient infrastructure to support them. It is significant because it is expected to automate most of the tedious and complex activities of on-line transactions. The main outcome will be a set of techniques and programs that will form the basis of the commercial software, with a significant export potential.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. I ....Development of methods to address internet crime. If this research accomplishes successfully, it will be a big step forward in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crimes more effectively and efficiently. It will also limit the damage caused by Internet crimes quickly. For example, if we can quickly identify the origins of a fast spreading virus, we will be able to prevent its propagation as fast as possible. If we can quickly identify and block a harmful phishing site, then less innocent people will be deceived into disclosing their credit card numbers, bank account information, passwords or other sensitive information.Read moreRead less
Modelling in the Large. Business modelling supports a variety of approaches, which are currently of significant interest for Australian organisations. This includes business process management, risk management or Enterprise Architecture design. The trend to centralised and integrated business modelling leads to projects with a high number of models, modellers, users, and modelling purposes. This phenomenon is called modelling in the large. The proposed research project explores the major issues ....Modelling in the Large. Business modelling supports a variety of approaches, which are currently of significant interest for Australian organisations. This includes business process management, risk management or Enterprise Architecture design. The trend to centralised and integrated business modelling leads to projects with a high number of models, modellers, users, and modelling purposes. This phenomenon is called modelling in the large. The proposed research project explores the major issues within these projects and develops improved modelling techniques and project management approaches for large modelling initiatives. The outcomes will streamline the design, integration, maintenance and communication of models with a focus on Enterprise Systems.Read moreRead less
Enhancing computer user productivity of integrated enterprise wide systems: an intervention study. This project addresses a critical issue in IT investment and productivity. Current theoretical models of user training and acceptance have not contributed to the effectiveness of implementing new integrated enterprise wide systems. This study will identify key indiviudal differences that predict user motivation to learn and utilize such systems under mandatory conditions. A longitudinal study in ....Enhancing computer user productivity of integrated enterprise wide systems: an intervention study. This project addresses a critical issue in IT investment and productivity. Current theoretical models of user training and acceptance have not contributed to the effectiveness of implementing new integrated enterprise wide systems. This study will identify key indiviudal differences that predict user motivation to learn and utilize such systems under mandatory conditions. A longitudinal study in two field settings will test the impact of selected interventions on task performance following training. The outcomes will inform Australian industry on models of effective implementation and provide guidance to increase the productivity of personnel using software systems.Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less
Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and ....Defending AI based FinTech Systems against Model Extraction Attacks. This project aims to develop new methods for defending artificial intelligence (AI) based FinTech systems from highly potent and insidious model extraction attacks whereby an adversary can steal the AI model from the system to cause intellectual property (IP) violation, business advantage disruption, and financial loss. This can be achieved by examining various attack models, creating active and utility-preserving defences, and inventing non-removable watermarks on AI models. The outcomes are new tools for securing AI-based FinTech systems before deployment and tools for IP violation forensics post-deployment. Such capabilities are beneficial by improving the security and safety of FinTech systems and other nationally critical AI systems.Read moreRead less
Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even ....Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even be commercialised. The capability of a nation to trace the real source of any attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity.Read moreRead less
Next-Generation Reference Process Models. Business process modelling is a key tool for organisations striving to create efficiencies by leveraging their IT infrastructure. This project will develop techniques for increasing the productivity of business process analysts by allowing them to reuse as much as possible existing models rather than systematically desigining new ones from scratch. Specifically, the project will develop and validate a language for designing highly configurable process mo ....Next-Generation Reference Process Models. Business process modelling is a key tool for organisations striving to create efficiencies by leveraging their IT infrastructure. This project will develop techniques for increasing the productivity of business process analysts by allowing them to reuse as much as possible existing models rather than systematically desigining new ones from scratch. Specifically, the project will develop and validate a language for designing highly configurable process models. This language will enable superior approaches to business process modelling and hence smarter use of information. This will place Australia at the forefront of developments in business process management: a crucial technology in today's global, dynamic and heterogeneous environments.Read moreRead less
An Integrated Infrastructure for Dynamic and Large Scale Supply Chain. Efficient and scalable middlewares are an important part of our current competitive economy. This is particularly important in Australia where production and population centres are spread over large distances. As a result, inefficiencies in web-based disparate businesses are likely to have a strong impact on the national economy. This project will provide an integrated framework and solutions to urgently needed integration ....An Integrated Infrastructure for Dynamic and Large Scale Supply Chain. Efficient and scalable middlewares are an important part of our current competitive economy. This is particularly important in Australia where production and population centres are spread over large distances. As a result, inefficiencies in web-based disparate businesses are likely to have a strong impact on the national economy. This project will provide an integrated framework and solutions to urgently needed integration problems faced by current industries. The development of a reliable and flexible infrastructure will benefit small and medium-scale enterprises, as they will be able to participate in large-scale supply chains and expand their business, without having to invest in expensive new computer systems and software.Read moreRead less