The architecture of networks: Characterisation and visualisation of complex systems as fluctuating networks. Complex systems comprise many mutually interacting components, characterised by a range of different interactions over time and space. They are dynamical systems, whose features are reminiscent of a web, with fluctuating links of varying strengths. The natural paradigm for such systems is a generic network, or a graph. A suite of novel measures from statistical physics, graph theory, top ....The architecture of networks: Characterisation and visualisation of complex systems as fluctuating networks. Complex systems comprise many mutually interacting components, characterised by a range of different interactions over time and space. They are dynamical systems, whose features are reminiscent of a web, with fluctuating links of varying strengths. The natural paradigm for such systems is a generic network, or a graph. A suite of novel measures from statistical physics, graph theory, topology, geometry, and computer graphics will be developed to characterise system/graph growth and stability. The aim is two-fold: first to reduce real complex systems (mainly financial systems) to computationally manageable structures (including direct visualisation) and second to construct realistic models of the evolution of such systems.Read moreRead less
Proof Theoretical Methods for Reasoning about Process Equivalence. The emergence of internet commerce has made the issue of secure computing more urgent than ever. A substantial part of the security issues with today's computer applications are due to design problems.
The principles of secure computation have not been fully understood and adequate tools for the construction of secure applications are still lacking. The understanding of the foundations of secure computation is essential in bu ....Proof Theoretical Methods for Reasoning about Process Equivalence. The emergence of internet commerce has made the issue of secure computing more urgent than ever. A substantial part of the security issues with today's computer applications are due to design problems.
The principles of secure computation have not been fully understood and adequate tools for the construction of secure applications are still lacking. The understanding of the foundations of secure computation is essential in building trusted computer applications. Process calculi and logic represent two promising disciplines in which the principles of analysis and design of secure systems can be studied systematically, out of which formal verification tools can be constructed.Read moreRead less
Cascades of Violence and Nonviolence. Why did the Arab Spring spread so fast? Why did so many communist regimes collapse so quickly in 1989? This project explains why tactics of violence and of nonviolence cause contagion. It develops a new evidence-based theory of how to contain cascades of violence and accelerate contagions of nonviolence to create a less violent world.
Automated internet warnings to prevent viewing of minor-adult sex images. Since the advent of the internet and digital cameras, the market for child exploitation material (CEM) has boomed. This project aims to explore how the visual appearance of warning messages influences internet users. It plans to conduct a randomised controlled experiment with naïve participants on a real-life website to test the effectiveness of messages designed to discourage viewers of legal ‘barely legal’ pornography. I ....Automated internet warnings to prevent viewing of minor-adult sex images. Since the advent of the internet and digital cameras, the market for child exploitation material (CEM) has boomed. This project aims to explore how the visual appearance of warning messages influences internet users. It plans to conduct a randomised controlled experiment with naïve participants on a real-life website to test the effectiveness of messages designed to discourage viewers of legal ‘barely legal’ pornography. It is anticipated that results will assist policing efforts by indicating whether warnings can be used to dissuade first-time CEM viewers and whether differences exist between harm or deterrent-focused messages.Read moreRead less
Preventing gendered violence: lessons from the global south. This project aims to study the establishment of police stations for women in Argentina as a key element to preventing gendered violence. This project aims to discover the extent to which the Argentinian interventions prevent the occurrence of gendered violence, and identify aspects that could inform the development of new approaches to preventing gendered violence in Australia. Anticipated outcomes include knowledge critical to develo ....Preventing gendered violence: lessons from the global south. This project aims to study the establishment of police stations for women in Argentina as a key element to preventing gendered violence. This project aims to discover the extent to which the Argentinian interventions prevent the occurrence of gendered violence, and identify aspects that could inform the development of new approaches to preventing gendered violence in Australia. Anticipated outcomes include knowledge critical to developing and implementing new ways to prevent gendered violence, with long-term benefits for national health, wellbeing and productivity.Read moreRead less
Thwarted Identity: The Missing Link Between Psychopathology and Prejudice. Prejudice and the extremist violence that arises from it are typically explained either by the psychopathology of individual perpetrators, or by their membership of extremist groups. This project will seek to reconcile these competing explanations and resolve this impasse that has obstructed progress in combating prejudice. This project develops a new framework specifying causal and reciprocal links between the novel conc ....Thwarted Identity: The Missing Link Between Psychopathology and Prejudice. Prejudice and the extremist violence that arises from it are typically explained either by the psychopathology of individual perpetrators, or by their membership of extremist groups. This project will seek to reconcile these competing explanations and resolve this impasse that has obstructed progress in combating prejudice. This project develops a new framework specifying causal and reciprocal links between the novel concept of thwarted identity, psychopathology, ideology, and prejudice. Expected outcomes are new policy solutions and novel targets for interventions to reduce prejudice and extremist violence, which will deliver significant benefit by addressing these pernicious social problems.Read moreRead less
The evolution of cybercrime: the monitoring of serious crime in cyberspace. The research ascertains future threats in cyberspace, in particular, the role of serious criminal networks. The evidence generated will benefit law enforcement, information security industries and policy makers in terms of resource assessment, law reform, and the development of effective mutual legal assistance regimes. The data enable the monitoring of cybercrime, and generate relevant metrics that inform public educati ....The evolution of cybercrime: the monitoring of serious crime in cyberspace. The research ascertains future threats in cyberspace, in particular, the role of serious criminal networks. The evidence generated will benefit law enforcement, information security industries and policy makers in terms of resource assessment, law reform, and the development of effective mutual legal assistance regimes. The data enable the monitoring of cybercrime, and generate relevant metrics that inform public education aimed to reduce risks to individuals and organizations targeted by cybercrime. The research enables law enforcement, lawmakers and other key stakeholders to better understand and manage new cybercrime threats and to develop rapid and innovative solutions to serious forms of cybercrime.Read moreRead less
Law, order and federalism in Australia. In a series of recent cases the High Court has emphasised the constitutional imperatives of judicial independence and impartiality in State court systems. These developments provide minimum human rights protections to individuals confronting criminal justice in the States. But what has not been considered is the cost of these developments. This project will investigate the uncertainty of the constitutional restrictions confronting State governments when re ....Law, order and federalism in Australia. In a series of recent cases the High Court has emphasised the constitutional imperatives of judicial independence and impartiality in State court systems. These developments provide minimum human rights protections to individuals confronting criminal justice in the States. But what has not been considered is the cost of these developments. This project will investigate the uncertainty of the constitutional restrictions confronting State governments when responding to law and order priorities, and the extent to which these have led to the frustration of policy development and experimentation across the Australian federation.Read moreRead less
Defeating Radio Frequency Interference. The radio spectrum is a valuable resource. Development of techniques which minimize the impact of various users on one another, allowing this resource to be shared, will benefit the entire community. For astronomy in particular, shared use is essential because of the very wide bandwidths needed to obtain sufficient sensitivity. Usage of the radio spectrum is increasing rapidly and radio telescopes are becoming more and more sensitive, compounding the probl ....Defeating Radio Frequency Interference. The radio spectrum is a valuable resource. Development of techniques which minimize the impact of various users on one another, allowing this resource to be shared, will benefit the entire community. For astronomy in particular, shared use is essential because of the very wide bandwidths needed to obtain sufficient sensitivity. Usage of the radio spectrum is increasing rapidly and radio telescopes are becoming more and more sensitive, compounding the problems. The digital signal processing techniques developed under this project will be widely applicable, not only to future radio astronomy facilities such as the Square Kilometer Array, but also to the communications industry generally.Read moreRead less
Amino Acid and Peptide Radicals in Biochemistry and Synthesis. The aim of this research is to develop a better fundamental understanding of biochemical free radical reactions of peptides and proteins, particularly those involving superoxide radical anion and thiols, and peptide radicals in enzyme-catalysed reactions. Knowledge gained through this work will be used in the synthesis of physiologically active amino acids and peptides, as well as to establish ways to regulate biochemical free radic ....Amino Acid and Peptide Radicals in Biochemistry and Synthesis. The aim of this research is to develop a better fundamental understanding of biochemical free radical reactions of peptides and proteins, particularly those involving superoxide radical anion and thiols, and peptide radicals in enzyme-catalysed reactions. Knowledge gained through this work will be used in the synthesis of physiologically active amino acids and peptides, as well as to establish ways to regulate biochemical free radical processes. The ultimate goal of the research is to develop methods and pharmaceutical compounds to prevent and treat human disorders associated with these reactions, and to underpin commercial exploitation of peptide and protein biomaterials.Read moreRead less