Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design i ....Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design innovative host-based IDS, as a complement to the NIDS, to address this issue. The outcomes of this project will strengthen the national capability to resist attacks by criminals and terrorists on Australian networked critical infrastructures and also enhance the global competitiveness of Australia’s information technology industry.Read moreRead less
Finding and exploiting interesting paths in multidimensional information spaces. This project will invent a new approach for searching within a large complex information space, finding interesting paths between points within the space, visualising the results, and supporting rich, human-centric user interaction with queries and results. This project will embody these techniques in a novel, internet-scale framework to support rapid development of large path search and visualisation applications. ....Finding and exploiting interesting paths in multidimensional information spaces. This project will invent a new approach for searching within a large complex information space, finding interesting paths between points within the space, visualising the results, and supporting rich, human-centric user interaction with queries and results. This project will embody these techniques in a novel, internet-scale framework to support rapid development of large path search and visualisation applications. Evaluation will be via development of several exemplar applications. The techniques and framework will be applicable to a broad range of economically important problems in areas as diverse as health, travel, scientific publication search, product marketing and software engineering.Read moreRead less
Detecting Supervisory Control and Data Access (SCADA) malicious programs to protect Australian critical infrastructure. The security of SCADA systems has enormous impact to our national security and economy because they control and monitor critical infrastructure, like power, gas and water facilities and nuclear power plants, etc. This project aims to investigate the security issues and provide innovative technological solutions to detect and prevent such problems.
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Controlling ultracold atomic gases. This project will develop ways to control the quantum state of ultracold atomic gases. These experimentally accessible systems will be used to investigate and understand a huge range of scientific phenomena from stars to superconductors, and enable critical quantum technologies that will revolutionise communications and precision measurement.
A theoretical framework for practical partial fingerprint identification. Fingerprints captured from a crime scene are often partial and poor quality which makes it difficult to identify the criminal suspects from large databases. This project will find mathematical models which can estimate the missing information located in the blank areas of a partial fingerprint and effectively identify it.
Toward inclusive peace. Toward inclusive peace. This project will investigate how peace agreements can advance women’s rights and participation after post-conflict and political transitions. It will examine the relationship between women’s presence in peacemaking processes, women’s rights and gender provisions in peace agreements, and women’s participation in post-conflict governance of countries with successful peace agreements. Women’s participation in peace processes makes a successful peace ....Toward inclusive peace. Toward inclusive peace. This project will investigate how peace agreements can advance women’s rights and participation after post-conflict and political transitions. It will examine the relationship between women’s presence in peacemaking processes, women’s rights and gender provisions in peace agreements, and women’s participation in post-conflict governance of countries with successful peace agreements. Women’s participation in peace processes makes a successful peace agreement likelier, but may not consolidate peace or lead to greater participation by women in the governance of the country. Anticipated outcomes are analysis of the relationship between peace processes and gender equality in conflict-affected societies; improved consular delivery of aid programmes in fragile states; and targeted air delivery that empowers women.Read moreRead less
Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to devel ....Developing Reliable Bio-Crypto Features for Mobile Template Protection. Cost of identity theft crimes were at multi-million dollars in Australia in 2007. Technically this is due to the fact that conventional personal identification number and token based security mechanisms cannot identify genuine users. Biometric fingerprint security systems emerge as a promising solution. However protection of the mobile embedded fingerprint template itself is an unresolved problem. The project aims to develop new ways designing bio-cryptosystems that provide strong security strength. The project will bring new body of knowledge into this field and place Australia in the forefront of this research, and also result in strengthened security of IT infrastructure and systems for industries.Read moreRead less
Gender after conflict: a gendered analysis of the international community's engagement in post-conflict zones. Efforts by the international community to transition post-conflict societies into peaceful democracies can be fraught with complex politics. This project seeks to examine the role that the international community's ideas and policies about gender have on the failures and successes of this transition.
Whistling While They Work: Enhancing the Theory and Practice of Internal Witness Management in Public Sector Organisations. The protection of whistleblowers and other internal witnesses to corruption, misconduct and maladministration is a great unsolved problem in public sector governance. Involving 11 integrity institutions, this first national study of internal witness management will describe and compare organisational experience under varying public interest disclosure regimes across the Au ....Whistling While They Work: Enhancing the Theory and Practice of Internal Witness Management in Public Sector Organisations. The protection of whistleblowers and other internal witnesses to corruption, misconduct and maladministration is a great unsolved problem in public sector governance. Involving 11 integrity institutions, this first national study of internal witness management will describe and compare organisational experience under varying public interest disclosure regimes across the Australian public sector. By identifying and promoting current best practice in workplace responses to public interest whistleblowing, the project will use the experience and perceptions of internal witnesses and first- and second-level managers to identify more routine strategies for preventing, reducing and addressing reprisals and other whistleblowing-related conflicts.Read moreRead less