Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramat ....Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramatically benefit Australian people and government, especially for the Australian ICT industry for commercializing the research outputs. Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE230100116
Funder
Australian Research Council
Funding Amount
$419,218.00
Summary
Vulnerability Defence: From Interpretable to Trustworthy Threat Assessment. This project aims to design a novel vulnerability defence framework to automatically identify, prioritise and interpret vulnerabilities and their attack vectors from the Internet of Things (IoT). Currently, most Australian organisations can be targeted by complex cyberattacks, stealing sensitive information leading to financial loss and reputation threats. This project expects to generate new knowledge in IoT vulnerabili ....Vulnerability Defence: From Interpretable to Trustworthy Threat Assessment. This project aims to design a novel vulnerability defence framework to automatically identify, prioritise and interpret vulnerabilities and their attack vectors from the Internet of Things (IoT). Currently, most Australian organisations can be targeted by complex cyberattacks, stealing sensitive information leading to financial loss and reputation threats. This project expects to generate new knowledge in IoT vulnerability assessment using economic risk estimation and cognitive vulnerability identification methods. Expected outcomes include trusted IoT vulnerability assessment methods and vulnerability testbed. Significant benefits are expected to protect IoT networks in all defence, industry and government sectors.Read moreRead less
Uncovering the organisational dynamics of pirates and maritime terrorists. This project will develop a novel framework to assess the organisational dynamics of two major maritime threats: piracy syndicates and maritime-capable terrorist groups. The results will allow analysts and policymakers to understand the behaviour of violent maritime organisations, and to maximise the effectiveness of policies designed to stop them.
Expectations and commitments in the Australia-USA alliance. This project aims to investigate the gap between the high expectations of mutual support and the lack of detailed security commitments in the Australia-US Alliance. The project intends to use a focused approach that captures thematic aspects of the alliance through project frames and historical slices across time. Expected outcomes can advance understanding of how alliances operate as security institutions. The outcomes can help to prom ....Expectations and commitments in the Australia-USA alliance. This project aims to investigate the gap between the high expectations of mutual support and the lack of detailed security commitments in the Australia-US Alliance. The project intends to use a focused approach that captures thematic aspects of the alliance through project frames and historical slices across time. Expected outcomes can advance understanding of how alliances operate as security institutions. The outcomes can help to promote a more informed national conversation about the costs and benefits of Australia's security relationship with the United States of America (USA) and contribute to debates over the future of the Australia-USA Alliance during a period of strategic uncertainty.Read moreRead less
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE140100481
Funder
Australian Research Council
Funding Amount
$389,548.00
Summary
Women in Combat: a comparative analysis of removing the combat exclusion. Women are excluded from combat duties in the majority of defence forces across the world. This project will consider why some countries, such as Australia, have chosen to remove the combat exclusion and the impacts of this policy change. By gathering and analysing data from four countries that have removed the exclusion (Australia, Canada, New Zealand and the United States), this project will advance our understanding of t ....Women in Combat: a comparative analysis of removing the combat exclusion. Women are excluded from combat duties in the majority of defence forces across the world. This project will consider why some countries, such as Australia, have chosen to remove the combat exclusion and the impacts of this policy change. By gathering and analysing data from four countries that have removed the exclusion (Australia, Canada, New Zealand and the United States), this project will advance our understanding of the political drivers and the consequences of this policy change, in terms of gender integration. Read moreRead less
Improved security and privacy for online platforms. Online platforms provide goods and services to people all over the world in a flexible way. Due to COVID-19, the number of online platforms increased significantly. As more and more business activities are conducted in a virtual environment, there is a corresponding increase in major privacy and security challenges. This project aims to work in the online education industry to provide a revolutionary secure environment for both business owners ....Improved security and privacy for online platforms. Online platforms provide goods and services to people all over the world in a flexible way. Due to COVID-19, the number of online platforms increased significantly. As more and more business activities are conducted in a virtual environment, there is a corresponding increase in major privacy and security challenges. This project aims to work in the online education industry to provide a revolutionary secure environment for both business owners and users. This secure online environment will enable privacy and security guarantees that will be first implemented on our Partner Organisation’s education platform. The developed technologies can be easily adapted to most online-service industries and can be commercialised immediately.Read moreRead less
Defence Against Phishing Attacks. Australian businesses and citizens are losing millions of dollars in cybercrimes every year. Rural and regional businesses depend on the integrity of their Internet banking service, and yet, cybercriminals are working hard to defraud these users. This project aims to build a reliable defence against phishing attacks which rely on social engineering to steal online identities, using intelligence gathered from the brazen trade of credentials in the public domain.
Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and ....Privacy in Genetic Databases. With the recent advances in genetic and computer technology enormous databases containing genetic information have become available for research and other purposes. An example of such databases is the Icelandic Health Database containing health and genetic records about the total population of Iceland. This has raised many privacy and ethical questions both among health professionals and the general public. Many agree that genetic information bears more ethical and privacy concerns than other health databases. In this project we shall investigate privacy and ethical issues connected to genetic information and we develop techniques to prevent a disclosure of individual values through statistical analysis.Read moreRead less