Next-Generation Optical Broadband Access for Rural and Regional Areas. Broadband services in less densely populated areas are a high priority for the Australian government as shown by the $1.1 billion 'Broadband Connect' program. Current commercial broadband access in less densely populated areas is both limited and expensive. Both CUBIN and NEC are committed to developing solutions that enable truly broadband services. NEC Australia's large research and development capability is unique and it, ....Next-Generation Optical Broadband Access for Rural and Regional Areas. Broadband services in less densely populated areas are a high priority for the Australian government as shown by the $1.1 billion 'Broadband Connect' program. Current commercial broadband access in less densely populated areas is both limited and expensive. Both CUBIN and NEC are committed to developing solutions that enable truly broadband services. NEC Australia's large research and development capability is unique and it, together with CUBIN, will convert this research into national benefits including:
-Creating new knowledge and innovation
-Attracting foreign investment and promoting exports
-Training high quality post-doctoral researchers and postgraduate students
-Supporting job creation and retaining talented people in AustraliaRead moreRead less
Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biomet ....Developing a Scalable Infrastructure for Embedded E-Security Incorporating Cryptography and Biometric Authentication. A fundamental flaw in existing embedded e-security technologies is their cryptography-plus-PIN-number infrastructure. This has generated security concerns that have proved a major obstacle to the growth of e-commerce, presently a relatively poor 2% of market share. We aim to design a new infrastructure that can solve this security problem by incorporating cryptography and biometric authentication into a computing resource limited embedded e-security system. The outcomes of this project will be a set of new cryptosystems, new biometrics processing schemes and new onboard resource allocation schemes that will form the basis for the next generation of embedded systems.Read moreRead less
Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptiv ....Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptive trust and integrity preserving methods, and reliable distributed data processing mechanisms to mitigate vulnerabilities in real-time IoT-enabled critical surveillance. This should provide significant benefits to Australia's economy, one of which is the enhanced consumer-centric adoption of IoT for sensitive operations.Read moreRead less
Electro-Optical Primers for Safe Use and Clean Manufacturing. Conventional primers contain a mechanically-sensitive primary explosive that is used to detonate the more stable propellant in a bullet. This project aims to address the health and environmental impacts of heavy metals in current primers by replacing them with benign, electrically or optically activated silicon-based materials. Modern semiconductor fabrication techniques will be used to develop safe and clean primers through cost-effe ....Electro-Optical Primers for Safe Use and Clean Manufacturing. Conventional primers contain a mechanically-sensitive primary explosive that is used to detonate the more stable propellant in a bullet. This project aims to address the health and environmental impacts of heavy metals in current primers by replacing them with benign, electrically or optically activated silicon-based materials. Modern semiconductor fabrication techniques will be used to develop safe and clean primers through cost-effective doping and deposition protocols. The expected outcomes of the project include a sovereign primer manufacturing capability for Australia. This will provide a significant strategic advantage and health benefits for law enforcement and defence personnel during live fire training and firing range exercises.Read moreRead less
Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automate ....Analysis and classification of malicious code. Malicious software such as viruses and worms directly attacks the security, privacy and integrity of Australian e-commerce, large databases and communication channels. The recent uptake of malicious software by organised crime has made finding effective countermeasures more urgent. Around 80% of the malicious code in circulation is disguised in some way. This significantly increases the difficulty of automated detection and delays analysis. Automated classification and de-obfuscation technologies are a precondition to applying more sophisticated detection heuristics. The project will be instrumental in safeguarding Australia by protecting critical infrastructure and defending us from online organised crime and information warfare.Read moreRead less
Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This pr ....Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This project aims to develop a continuous authentication approach based on user behaviour - typical interactions plus biometrics (for example, keystroke dynamics) - combined with a risk adaptive assessment of the resources being accessed, resulting in re-authentication requests in the event of a suspected compromise.Read moreRead less
Visualisation of latent DNA. This project aims to deliver a proof-of-concept that allows visualisation of invisible DNA (latent DNA) into a quick, inexpensive and practical DNA collection method that will lead to DNA evidence being available in more cases. It will build upon a proof-of-concept method ready for transferal to forensic casework. This will allow DNA evidence recovery technicians to improve their hit rate in recovering latent DNA from real crime items, leading to more informative DNA ....Visualisation of latent DNA. This project aims to deliver a proof-of-concept that allows visualisation of invisible DNA (latent DNA) into a quick, inexpensive and practical DNA collection method that will lead to DNA evidence being available in more cases. It will build upon a proof-of-concept method ready for transferal to forensic casework. This will allow DNA evidence recovery technicians to improve their hit rate in recovering latent DNA from real crime items, leading to more informative DNA profiles. Crime items that currently yield no genetic information will now be informative, assisting investigations of serious crimes or terrorist incidents.Read moreRead less
Overcoming barriers to effective Internet use by community sector organisations. Providing adequate Internet access for rural and regional Australia is an important priority for governments at all levels. For communities in these areas to benefit from the information economy and realise a continuing improvement in their social, economic and environmental wellbeing, such access must be both affordable and sustainable. Community organisations make an important contribution in these areas and this ....Overcoming barriers to effective Internet use by community sector organisations. Providing adequate Internet access for rural and regional Australia is an important priority for governments at all levels. For communities in these areas to benefit from the information economy and realise a continuing improvement in their social, economic and environmental wellbeing, such access must be both affordable and sustainable. Community organisations make an important contribution in these areas and this research will examine the questions how they adopt such innovations, and how they make use of the Internet to further interaction with their community. It will identify and examine barriers to such use, relating the barriers to both their root causes and the benefits / behaviour on which they impact.Read moreRead less
Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks ....Scalable Robust Video Surveillance over Constrained Networks. Real-time monitoring of large numbers of people is becoming increasingly important for applications such as efficient service delivery and security against both common crime and terrorism. The use of human operators for such tasks is infeasible due to the large amount of data collected. Existing autonomous video surveillance systems are prone to high numbers of false alarms and often require expensive hardware. This proposal seeks to address both difficulties by using rigorous statistical signal processing methods to optimally fuse information from a network of low-cost cameras.Read moreRead less
Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and ....Securing Knowledge Processes in Organisations. This project will develop a methodology for identifying and comparing security risks associated with knowledge-intensive processes in organizations. The project addresses a significant area that has historically fallen between two research domains: organisational knowledge processes and systems, and critical information infrastructure protection. The project will establish a unified framework to balance the sharing and protection of information and organizational knowledge. Outcomes include a framework for modelling knowledge-intensive processes to assess their security vulnerability, an associated methodology of creating security risk profiles of knowledge intensive processes and the validation of the methodology in 3 to 6 organizations.Read moreRead less