Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutt ....Developing A Smart Farming Oriented Secure Data Infrastructure. Smart farming is the future of agriculture. However, recently the Federal Bureau of Investigation has issued a
warning that the lack of data privacy and cyber security mechanisms in the field runs a high risk of disaster. This
project aims to establish an innovative secure data infrastructure for smart farming including secure and automated smart farming supply-chain management. The deliverables of this project will include the cutting-edge Blockchain based secure IoT data management and privacy-preserving smart contracts for smart farming supply-chain management. This data infrastructure will be the first of its kind which will lay a solid foundation for smart farming technology.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE170101081
Funder
Australian Research Council
Funding Amount
$360,000.00
Summary
Adaptive value-flow analysis to improve code reliability and security. This project aims to develop client-driven adaptive value-flow analysis to detect software bugs in system software written in the C/C++ programme language. Static analysis tools for automated code inspections can benefit software developers, but are imprecise, inefficient and not user-friendly for analysing real-world industrial-sized software. The project will investigate static, dynamic and user-guided value-flow analysis t ....Adaptive value-flow analysis to improve code reliability and security. This project aims to develop client-driven adaptive value-flow analysis to detect software bugs in system software written in the C/C++ programme language. Static analysis tools for automated code inspections can benefit software developers, but are imprecise, inefficient and not user-friendly for analysing real-world industrial-sized software. The project will investigate static, dynamic and user-guided value-flow analysis to efficiently and precisely analyse large-scale programs according to clients’ needs, thereby allowing compilers to generate safe, reliable and secure code. This project is expected to advance value-flow analysis for industrial-sized software, improve software reliability and security, and benefit Australian software systems and industries.Read moreRead less
Special Research Initiatives - Grant ID: SR0354675
Funder
Australian Research Council
Funding Amount
$20,000.00
Summary
Australian Communications Research Network (ACoRN). Information and Communication Technology is a key contributor to national productivity and growth. ACoRN aims to stimulate creativity, innovation and breakthrough science, leading to technological advancement in telecommunications. The focus is on development of fundamental theories for application to emerging wired and wireless communications technologies. Specific objectives include consolidation of existing linkages; facilitation of multidis ....Australian Communications Research Network (ACoRN). Information and Communication Technology is a key contributor to national productivity and growth. ACoRN aims to stimulate creativity, innovation and breakthrough science, leading to technological advancement in telecommunications. The focus is on development of fundamental theories for application to emerging wired and wireless communications technologies. Specific objectives include consolidation of existing linkages; facilitation of multidisciplinary research; formation of new links; stimulation of commercial activity; improved post-graduate education; and increased International prominence. Our current vision involves a range of programs including: undergraduate occupational training, postgraduate internships, national and international visiting programs, and seed funding for collaborative proposals.Read moreRead less
ARC Communications Research Network. Building on a strong platform of existing research excellence, the Aim of the Network is to facilitate nation-wide collaborative research, promoting four intersecting research Themes: Mobile and Wireless Communications, Rural Communications, Broadband and Optical Networks, and Fundamentals of Emerging Media. Each Theme is formulated to drive multidisciplinary, innovative research as well as inspire new collaborative initiatives. Four Programs encapsulate the ....ARC Communications Research Network. Building on a strong platform of existing research excellence, the Aim of the Network is to facilitate nation-wide collaborative research, promoting four intersecting research Themes: Mobile and Wireless Communications, Rural Communications, Broadband and Optical Networks, and Fundamentals of Emerging Media. Each Theme is formulated to drive multidisciplinary, innovative research as well as inspire new collaborative initiatives. Four Programs encapsulate the core activities of the Network: Researcher Mobility, Workshops and Conferences, Postgraduate Education, and Knowledge Management Systems. The Network is expected to add significant value to pre-existing investments and raise the profile of Australian telecommunications research.Read moreRead less
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design i ....Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design innovative host-based IDS, as a complement to the NIDS, to address this issue. The outcomes of this project will strengthen the national capability to resist attacks by criminals and terrorists on Australian networked critical infrastructures and also enhance the global competitiveness of Australia’s information technology industry.Read moreRead less
Special Research Initiatives - Grant ID: SR0567321
Funder
Australian Research Council
Funding Amount
$184,781.00
Summary
Real-time Very Long Baseline Interferometry. We will develop a range of software products that are required to implement real-time very long baseline interferometry with the Australia long baseline array. These developments build upon substancial recent infrastructure investments and will place Australia at the forefront of this field. They will enhance our capacity to participate in international collaborations in a range of sciences including astrophysics, spacecraft tracking and geodetic mo ....Real-time Very Long Baseline Interferometry. We will develop a range of software products that are required to implement real-time very long baseline interferometry with the Australia long baseline array. These developments build upon substancial recent infrastructure investments and will place Australia at the forefront of this field. They will enhance our capacity to participate in international collaborations in a range of sciences including astrophysics, spacecraft tracking and geodetic monitoring.Read moreRead less
Detecting Supervisory Control and Data Access (SCADA) malicious programs to protect Australian critical infrastructure. The security of SCADA systems has enormous impact to our national security and economy because they control and monitor critical infrastructure, like power, gas and water facilities and nuclear power plants, etc. This project aims to investigate the security issues and provide innovative technological solutions to detect and prevent such problems.