Top of page

Student/Staff Portal
Global Site Navigation

Centre for Securing Digital Futures

Local Section Navigation
You are here: Main Content

Research themes

We focus on the three essential themes that we consider at the core to securing our digital futures.

Firstly, we are looking at the cybersecurity of critical infrastructure, which is increasingly due to the digitization of cyber physical systems.  From smart energy systems that support the world’s net-zero strategy, to automation in transport and logistics, to smart cities bringing together physical and digital services optimised for a large population, we all see the infrastructure our daily lives depend on being digitally enabled and connected.

Secondly, this drive to a more digitally connected world is accelerated by secure emerging technologies, such as Artificial Intelligence and Quantum Computing, Space Technologies, etc, which support a very fast paced innovation ecosystem in Australia and the world.  Ensuring that these technologies are designed, developed and deployed with security in mind, is the focus of this research theme.

Thirdly, we are considering digital futures in the context of our economy and society.  Technology used to support human endeavour and enable efficiencies and allow humans to achieve feats thought impossible just a decade ago. This support is increasingly turning to collaboration, and co-evolution with human-led activities.  With humans being at the centre of this digital transformation, their security, well-being and their impact on the digital systems they interact with is at the core of our human factors research theme.

Our core competencies and capabilities

SCADA/OT are the engine rooms of our critical infrastructure and industrial based economies, and much of Australia's key export industries rely on the safe and secure operation of this Operational Technology 24 hours a day, 365 days a year. It powers and drives core parts of our national economy, including mining, electricity, oil, gas, water, manufacturing, ports, airports, industrial processing, refinement and production of goods, and any place where physical automation is utilised.  ECU has extensive purpose-built laboratories for SCADA research and training. These include specialist SCADA/OT, Wireless, MQTT, SDN facilities and network cyber ranges. ECU also provides consultancy and research to various critical infrastructure providers about their cyber security where it relates to the states critical infrastructure .

ECU is home to the southern hemisphere’s largest Security Operations Centre (SOC) within a university. Housed in the School of Science, this cutting-edge $3M SOC offers ECU students first-hand experience in responding to cyber security threats, providing them with a unique real-world training in monitoring, detecting and responding to cyber security incidents.

ECU is leading the Cyber Security Cooperative Research Centre’s research theme on Incident Response and is investigating human-machine teaming and AI augmentation for incident responders and Security Operations Centre staff.  Other projects currently underway consider the use of automation and digital assets in precision farming and the wider agricultural sector and a project on the security impacts of Consumer Energy Resources, such as Photovoltaic Power and battery systems.  We are collaborating with innovators in space technologies to secure low-orbit-satellite systems and securing communication systems used.

We are working with our research partners to improve corporate strategies on cyber security and develop tools that help board directors and senior leaders to understand the risks and opportunities that cyber brings to their organisations. Aligned with Australia’s Cyber Security Strategy 2023-30, we are supporting small to medium enterprises (SME) to improve their cyber security through our award winning initiatives such as Cyber Buddy, and work with the Australian Government to improve awareness and capabilities from schools to board-rooms.

  1. Syed, N., Baig, Z., Ibrahim, A., Valli, C., (2020), Denial of service attack detection through machine learning for the IoT. Journal of Information and Telecommunication, p.1-22, Taylor & Francis, DOI: https://doi.org/10.1080/24751839.2020.1767484.
  2. Yang, W., Johnstone, M., Sikos, L., Wang, S., (2020), Security and Forensics in the Internet of Things: Research Advances and Challenges. Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, 12-17, Piscataway, USA , Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/ETSecIoT50046.2020.00007.
  3. Peacock, M., Johnstone, M., Valli, C., (2018), An Exploration of Some Security Issues Within the BACnet Protocol. Information Systems Security and Privacy , 252–272, Heidelberg, Germany, Springer, DOI: https://doi.org/10.1007/978-3-319-93354-2_12.
  4. Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13, Oxon, United Kingdom, Elsevier Advanced Technology, DOI: 10.1016/j.diin.2017.06.015.
  5. Peacock, M., Johnstone, M. N., & Valli, C. (2017). Security Issues with BACnet Value Handling. Paper presented at the ICISSP2017 - 3rd International Conference on Information Systems Security and Privacy, Porto, Portugal.
  6. Murray, G., Johnstone, M., Valli, C., (2017), The convergence of IT and OT in critical infrastructure. Proceedings of the 15th Australian Information Security Management Conference, 149-155, Perth, WA, Edith Cowan University.
  7. Syed, N. F., Baig, Z. A., Valli, C., & Ibrahim, A. (2017). Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. Paper presented at the IEEE International Conference on Internet of Things (iThings), Exeter,UK.
  8. Valli, C., Peacock, M., Jones, A., & Johnstone, M. N. (2017). BACnet - Bridging the Cyber Physical Divide One HVAC at a Time. Paper presented at the
  9. Valli, C., Rabadia, P., & Woodward, A. (2015). A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Paper presented at the 2015 ADFSL Conference on Digital Forensics, Security and Law, Daytona Beach, Florida.
  10. Johnstone, M., Peacock, M., Den Hartog, J., (2015), Timing attack detection on Bacnet via a machine learning approach. The Proceedings of the 13th Australian Information Security Management Conference, 57-64, Perth, Western Australia, Security Research Institute, Edith Cowan University.
  11. Valli, C., Rabadia, P., Woodward, A. (2013). Patterns and Patter - An Investigation into SSH Activity Using Kippo Honeypots. Paper presented at the 11th Australian Digital Forensics Conference, Perth, Western Australia. http://ro.ecu.edu.au/adf/129/
  12. Valli, C. (2009). The not so smart, smart grid - potential security risks associated with the deployment of smart grid technologies. Paper presented at the 7th Australian Digital Forensics Conference, Perth, Western Australia.
  13. Valli, C. (2009). Snort IDS for SCADA Networks. Paper presented at the Proceedings of the 2009 International Conference on Security and Management.
  14. Valli, C., & Woodward, A. (2009). SCADA Security - Slowly Circling a Disaster Area. Paper presented at the Proceedings of the 2009 International Conference on Security and Management
  15. Woodward, A., & Valli, C. (2008). Issues common to Australian critical infrastructure providers SCADA networks discovered through computer and network vulnerability analysis. Paper presented at the 6th Australian Digital Forensics Conference, Edith Cowan University, Mount Lawley, Western Australia.
  1. Honeypot Deployment Architecture, Cyber Security Cooperative Research Centre, Cyber Security Research Centre Ltd, 2019 - 2021, $130,000
  2. Power Honeynet Development Pilot Research and Development Project, Western Power, Western Power - Grant, 2020, $35,000.
  3. Power Honeynet Development Pilot Research and Development Project, Horizon Power, Grant, 2020, $35,000.
  4. Vulnerabilities in Ship Control Systems, Defence Science and Technology Group of the Department of Defence, Grant, 2017 - 2018, $400,000
  5. Internet of Things (IoT) ModBUS and BacNET, Cisco Systems Australia Pty Ltd, CISCO - Grant, 2015 - 2018, $125,000
  6. Internet of Things (IoT), Cisco Systems Australia Pty Ltd, CISCO - Grant, 2016 - 2017, $160,000
  7. Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support for National Security, 2010 - 2012, $77,154.
  8. Update on Investigation into RFID Threats and Vulnerabilities, Department of the Prime Minister and Cabinet, Grant - Research Support for National Security, 2010, $10,000.
  1. Syed, Naeem (2020) PhD - IoT-MQTT based denial of service attack modelling and detection
  2. Peacock, Matthew (2019) PhD -Anomaly detection in bacnet/ip managed building automation systems
  3. McElroy, Tyson (2018) Honours, 1st Class - Anomaly Detection in Software Defined Supervisory Control and Data Acquisition (SD-SCADA) Networks
  4. Turner, Jack 2016) Honours, 1st Class - A Method for Evaluating the Efficacy of Network Protocol Fuzzing Tools

Cyber Enabled Crime

With a global reputation in cyber research, cyber crime is a national and international research priority, and key focus for SDF.  Director of SDF, Professor Andrew Woodward, is a member of the INTERPOL Cyber Crime Expert Group. Locally SDF collaborates with WA Government and contributes significantly to the state’s cyber security capability via collaborations with the Office of Digital Government, the Office of the Auditor General and WA Police.

SDF collaborates extensively with law enforcement and security agencies at a state, federal and international level, with this position strengthened by the co-location of the WA Police Technology Crime Services Unit on campus.

With specialised digital forensics capabilities and purpose built facilities, SDF have performed forensic analysis of conventional IT systems, GPS, mobile devices, game consoles, network traffic, wireless devices, OT/SCADA devices, embedded devices and emergent IoT devices and new digital technologies.

Work was undertaken collaboratively with the WA Police from 2006 to 2013 to develop a triage tool to forensically capture illegal images and files from desktop and laptop computer systems. The project was called Simple Image Preview Live Environment (SImPLE) and was widely used by WA Police during the period 2008 – 2015 to triage suspect computer systems.  It assisted WA Police to rapidly intercede in matters relating to child exploitation and facilitated the acquisition  of evidence to support custodial charges sentences perpetrators, minimising their capacity to re-offend.

  1. Yang, W., Johnstone, M., Sikos, L., Wang, S., (2020), Security and Forensics in the Internet of Things: Research Advances and Challenges. Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, 12-17, Piscataway, USA , Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/ETSecIoT50046.2020.00007.
  2. McAteer, I.,Ibrahim, A., Zheng, G., Yang, W., Valli, C., (2019), Integration of Biometrics and Steganography: A Comprehensive Review. Technologies, 7(2), Article no. 34, DOI: 10.3390/technologies7020034.
  3. Cabral, WZ., Valli, C., Sikos, L., Wakeling, S., (2019), Review and Analysis of Cowrie Artefacts and their Potential to be Used Deceptively. Proceedings of 6th Annual Conference on Computational Science & Computational Intelligence, 166-171, Piscataway, USA, Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/CSCI49370.2019.00035.
  4. Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13, Oxon, United Kingdom, Elsevier Advanced Technology, DOI: 10.1016/j.diin.2017.06.015.
  5. Chernyshev, M., Valli, C., Johnstone, M., (2017), Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. IEEE Transactions on Information Forensics and Security, 12(7), 1625-1636, IEEE Signal Processing Society, DOI: 10.1109/TIFS.2017.2678463.
  6. Rabadia, P., Valli, C., Ibrahim, A., Baig, Z., (2017), Analysis of attempted intrusions: Intelligence gathered from SSH honeypots. The Proceedings of 15th Australian Information Security Management Conference, 10p., Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a839e6d1d283.
  7. Bothur, D., Zheng, G., Valli, C., (2017), A critical analysis of security vulnerabilities and countermeasures in a smart ship system. The Proceedings of 15th Australian Information Security Management Conference, 81-87, Perth, Australia, Edith Cowan University.
  8. Chernyshev, M., Valli, C., Hannay, P., (2016), On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers. IEEE Transactions on Information Forensics and Security, 11(3), 584 - 593, Piscataway, USA, IEEE, DOI: 10.1109/TIFS.2015.2507542.
  9. Chernyshev, M., Valli, C., Hannay, P., (2016), Service set identifier geolocation for forensic purposes: Opportunities and challenges. Proceedings of the 49th Hawaii International Conference on System Sciences, Article no. 7427866, IEEE Computer Society, DOI: 10.1109/HICSS.2016.678.
  10. Valli, C., Rabadia, P., Woodward, A., (2015), A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law, 23-32, Virginia, USA, Association of Digital Forensics, Security and Law.
  11. Thomas, T., Valli, C., (2015), Mapping the laws which apply to intercepting wireless communications in a Western Australian legal context. Proceedings of the 13th Australian Digital Forensics Conference, 22-36, Perth, WA, ECU Security Research Institute.
  12. Chernyshev, M., Valli, C., Hannay, P., (2015), 802.11 Tracking and Surveillance - A Forensic Perspective. Proceedings of the International Conference on Security and Management (SAM'15), 349-352, WorldComp.
  13. Heriyanto, A., Valli, C., Hannay, P., (2015), Comparison of live response, Linux memory extractor (lime) and mem tool for acquiring android's volatile memory in the malware incident. Proceedings of 13th Australian Digital Forensics Conference, 5-14, Perth, WA, ECU Security Research Institute.
  14. Rabadia, P., Valli, C., (2015), Analysis into developing accurate and efficient intrusion detection approaches. Proceedings of 13th Australian Digital Forensics Conference, 70-76, Perth, WA, ECU Security Research Institute.
  15. Ibrahim, A., Valli, C., (2015), Image Similarity using Dynamic Time Warping of Fractal Features. Proceedings of 13th Australian Digital Forensics Conference, 111-122, Perth, WA, ECU Security Research Institute.
  16. Coole, M., Woodward, A., Valli, C (2012). Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems. Paper presented at the 5th Australian Security and Intelligence Conference, Perth, Western Australia.
  17. Brand, M. W., Valli,C. ,Woodward,A.J. (2010). Malware Forensics: Discovery of the Intent of Deception. Paper presented at the The Proceedings of the 8th Australian Digital Forensics Conference, Perth, Western Australia.
  18. Jones, A., & Valli, C. (2009). Building a Digital Forensic Laboratory (1st ed.). Burlington,MA: Butterworth-Heinemann and Syngress Publishing.
  19. Jones, A., Valli, C., Dardick, G. S., & Sutherland, I. (2009). The 2007 analysis of information remaining on disks offered for sale on the second hand market. International Journal of Liability and Scientific Enquiry, 2(1), 53 - 68.
  20. Valli, C., Jones, A., & Dabibi, G. (2009). The 2009 Analysis of Information Remaining on USB Storage Devices Offered for Sale on the second Hand Market. Paper presented at the Proceedings of The 7th Australian Digital Forensics Conference, Perth, Western Australia.
  21. Jones, A., Valli, C., Sutherland, I., & Dardick, G. (2008). The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. Journal of Digital Forensics, Security and Law, 3(1), 23-36.
  22. Valli, C. (2008). SIMPLE - Rethinking the monolithic approach to digital forensics. Paper presented at the 3rd Conference on Digital Forensics, Security and the Law, Oklahoma City, Oklahoma, USA.
  23. Valli, C., & Jones, A. (2008). A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans. Paper presented at the Proceedings of the 2008 International Conference on Security and Management, Las Vegas, Nevada.
  24. Valli, C., & Woodward, A. (2008). The 2008 Australian study of remnant data contained on 2nd hand hard disks:The saga continues. Paper presented at the 6th Australian Digital Forensics Conference, Edith Cowan University, Mount Lawley, Western Australia.
  25. Woodward, A., & Valli, C. (2007, April 18-20). Do Current Erasure Programs Remove Evidence of BitTorrent Activity? Paper presented at the Conference on Digital Forensics, Security and Law, Arlington, Virginia.
  26. Valli, C., & Woodward, A. (2007). Oops They Did it Again: Results of the 2007 Australian Remnant Hard Disk Study. Paper presented at the The 5th Australian Digital Forensics Conference, Edith Cowan University, Mount Lawley Campus, Western Australia.
  1. Drone Policy Review and Forensic Handbook, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 - 2020, $10,700.
  2. Anti-spear phishing by detecting Email Impersonation, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 - 2020, $10,700.
  3. Anti-Business Email Compromise, Cyber Security Research Centre, Summer Scholarship, 2019 - 2020, $10,700.
  4. Power Honeynet Development Pilot Research and Development Project, Western Power, Western Power - Grant, 2020, $35,000.
  5. Power Honeynet Development Pilot Research and Development Project, Horizon Power, Grant, 2020, $35,000.
  6. Password Hardening Tools, Cyber Security Research Centre, Sprint Student Grant, 2018 - 2019, $70,000.
  7. Vulnerabilities in Ship Control Systems, Defence Science and Technology Group of the Department of Defence, Grant, 2017 - 2018, $400,000.
  8. Overclocking of mechanical hard disk drives, Attorney General's D Branch, Attorney General's Department, D Branch Grant, 2011 - 2012, $54,545.
  9. Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support for National Security, 2010 - 2012, $77,154.

Secure Systems

The Centres secure systems research is relatively broad in focus, covering hardware, software, IT systems, cloud, embedded systems, operating systems, application systems and middleware. It also includes authentication, authorisation, monitoring, logging, auditing and implementation of cyber security countermeasures, along with the human factors of any “system”. The human factors include cyber security education, psychology, health, law and business research. ECU has purpose built laboratories for secure systems research has significantly invested in infrastructure for research to be conducted in this field.

2020

  1. Johnstone, M., Peacock, M., (2020), Seven Pitfalls of Using Data Science in Cybersecurity. Data Science in Cybersecurity and Cyberthreat Intelligence, 115-129, Cham, Switzerland, Springer, DOI: 10.1007/978-3-030-38788-4_6.
  2. Brooks, D., Coole, M., Haskell-Dowland, P., (2020), Intelligent Building Systems: Security and Facility Professionals’ Understanding of System Threats, Vulnerabilities and Mitigation Practice. Security Journal, 33(2), 244–265, United Kingdom, Palgrave Macmillan Ltd., DOI: https://doi.org/10.1057/s41284-019-00183-9.
  3. Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P., (2020), A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data using Cooperative Co-Evolution. IEEE Access, 8(2020), 150113 - 150129, DOI: 10.1109/ACCESS.2020.3016679.
  4. Karie, N., Bin Sahri, NM., Haskell-Dowland, P., (2020), IoT Threat Detection Advances, Challenges and Future Directions. Proceedings 2020 Workshop on Emerging Technologies for Security in IoT ETSecIoT 2020 , 22-29, online, Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/ETSecIoT50046.2020.00009.
  5. Walling, L., Johnstone, M., Hannay, P., (2020), Information Warfare by Proxy: Malware in PLC Firmware. Conference Proceedings of the 18th Australian Cyber Warfare Conference 2019 (CWAR 2019), 57-61, Geelong, Victoria, Deakin University.
  6. Shanley, L., Johnstone, M., Crowley, M., Szewczyk, P., (2020), Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? Human Aspects of Information Security and Assurance, 3-15, Cham, Switzerland, Springer, DOI:
  7. Yang, W., Johnstone, M., Sikos, L., Wang, S., (2020), Security and Forensics in the Internet of Things: Research Advances and Challenges. Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, 12-17, Piscataway, USA , Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/ETSecIoT50046.2020.00007.
  8. Woodiss-Field, A., Johnstone, M., (2020), BotNets in the Internet of Things: The Next Wave. Conference Proceedings of the 18th Australian Cyber Warfare Conference 2019 (CWAR 2019), 41-45, Geelong, Victoria, Deakin University.
  9. Yang, W., Wang, S., Yu, K., Kang, J., Johnstone, M., (2020), Secure Fingerprint Authentication with Homomorphic Encryption. 2020 Digital Image Computing: Techniques and Applications, 6, Piscataway, New Jersey, United States, IEEE.
  10. Al Fahdi, H., Ahmed, M., (2020), Cryptographic Attacks, Impacts and Countermeasures. Security Analytics for Internet of Everything, 217-232, Boca Raton, United States of America, CRC Press.
  11. Seraj, R., Ahmed, M., (2020), Concept Drift for Big Data. Combating Security Challenges in the Age of Big Data, 29-43, Cham, Switzerland, Springer, DOI: https://doi.org/10.1007/978-3-030-35642-2_2.
  12. Furhad, MH., Sadik, S., Ahmed, M., Barkat, A., (2020), Exploring E-Commerce in Cyber Security Context Through Blockchain Technology. Blockchain in Data Analytics, 216-233, Newcastle upon Tyne, England, Cambridge Scholars Publishing.
  13. Chong, K., Ahmed, M., Islam, S., (2020), An Investigation of Performance Analysis of Machine Learning-Based Techniques for Network Anomaly Detection. Security Analytics for Internet of Everything , 117-156, Boca Raton, USA, CRC Press.
  14. Sadik, S., Ahmed, M., Hassan, MH., (2020), Blockchain in Healthcare. Blockchain in Data Analytics, 234-253, Newcastle upon Tyne, England, Cambridge Scholars Publishing.
  15. Saeed, M., Rashid, T., Ahmed, M., (2020), A Benefits Realization Approach to Cyber Security Projects Implementation in the Public Sector Organizations. Security Analytics for Internet of Everything , 93-114, Boca Raton, United States of America, CRC Press.
  16. Bostami, B., Ahmed, M., (2020), Blockchain for Internet of Things. Blockchain in Data Analytics, 24-51, Newcastle upon Tyne, England, Cambridge Scholars Publishing.
  17. Bostami, B., Ahmed, M., (2020), Deep Learning Meets Malware Detection: An Investigation. Combating Security Challenges in the Age of Big Data, 137-155, Cham, Switzerland, Springer, DOI: https://doi.org/10.1007/978-3-030-35642-2_7.
  18. Sadik, S., Ahmed, M., (2020), An Overview of Dark Web. Security Analytics for the Internet of Everything , 55-64, Boca Raton, United States of America, CRC Press.
  19. Ahmed, M., Islam, AK., (2020), Deep Learning: Hope or Hype. Annals of Data Science, 7(2020), 427–432, DOI: 10.1007/s40745-019-00237-0.
  20. *  Sadik, S., Ahmed, M., Sikos, L., Islam, AN., (2020), Toward a Sustainable Cybersecurity Ecosystem. Computers, 9(3), Basel, Switzerland, DOI: 10.3390/computers9030074.
  21. *  Ahmed, M., Pathan, M., (2020), False Data Injection Attack (FDIA): An Overview and New Metrics for Fair Evaluation of its Countermeasure. Complex Adaptive Systems Modeling, 8(1), Article number 4, DOI: 10.1186/s40294-020-00070-w.
  22. *  Ahmed, M., Pathan, AK., (2020), Blockchain: Can It Be Trusted?. Computer, 53(4), 31-35, DOI: 10.1109/MC.2019.2922950.
  23. Ahmed, M., Seraj, R., Islam, S., (2020), The k-means Algorithm: A Comprehensive Survey and Performance Evaluation. Electronics, 9(8), article number 1295, DOI: 10.3390/electronics9081295.

2019

  1. Yang, W., Wang, S., Zheng, G., Yang, J., Valli, C., (2019), A Privacy-Preserving Lightweight Biometric System for Internet-of-Things Security. IEEE Communications Magazine, 57(3), 84-89, DOI: 10.1109/MCOM.2019.1800378.
  2. Zheng, G., Yang, W., Valli, C., Shankaran, R., Abbas, H., Zhang, G., Fang, G., Chaudhry, J., Qiao, L., (2019), Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations. IEEE Access, 7(2019), 75629-75641, DOI: 10.1109/ACCESS.2019.2920850.
  3. Yang, W., Wang, S., Hu, J., Zheng, G., Yang, J., Valli, C., (2019), Securing Deep Learning Based Edge Finger-vein Biometrics with Binary Decision Diagram. IEEE Transactions on Industrial Informatics, 15(7), 4244-4253, IEEE, DOI: 10.1109/TII.2019.2900665.
  4. Yang, W., Wang, S., Zheng, G., Valli, C., (2019), Impact of feature proportion on matching performance of multi-biometric systems. ICT Express, 5(1), 37-40, DOI: 10.1016/j.icte.2018.03.001.
  5. McAteer, I., Ibrahim, A., Zheng, G., Yang, W., Valli, C., (2019), Integration of Biometrics and Steganography: A Comprehensive Review. Technologies, 7(2), Article no. 34, DOI: 10.3390/technologies7020034.
  6. Zheng, G., Yang, W., Valli, C., Qiao, L., Shankaran, R., Orgun, MA., Mukhopadhyay, SC., (2019), Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices. IEEE Journal of Biomedical and Health Informatics, 23(4), 1546-1557, IEEE, DOI: 10.1109/JBHI.2018.2864796.
  7. Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C., (2019), Security and Accuracy of Fingerprint-Based Biometrics: A Review. Symmetry, 11(2), article no.141, DOI: 10.3390/sym11020141.
  8. Yang, W., Wang, S., Hu, J., Ibrahim, A., Zheng, G., Macedo, M., Johnstone, M., Valli, C., (2019), A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things. Sensors, 19(13), article no.2985, DOI: https://doi.org/10.3390/s19132985.
  9. Zheng, G., Shankaran, R., Yang, W., Valli, C., Qiao, L., Orgun, M., Mukhopadhyay, SC., (2019), A Critical Analysis of ECG-based Key Distribution for Securing Wearable and Implantable Medical Devices. IEEE Sensors Journal, 19(3), 1186-1198, IEEE Sensors Council, DOI: 10.1109/JSEN.2018.2879929.
  10. Ellis, M., Thompson, G., Haskell-Dowland, P., (2019), From Model B To Micro:Bit – Teaching Computer Science. Proceedings of EDULEARN19 Conference, 2725-2731, online, IATED Academy, DOI: 10.21125/edulearn.2019.0744.
  11. Vasileiou, I., Haskell-Dowland, P., (2019), Addressing STEM Geek Culture Through Peer Learning. EDULEARN19 Proceedings, 5289-5293, online, IATED Academy, DOI: 10.21125/edulearn.2019.1298.
  12. Kang, J., Fahd, K., Venkatraman, S., Trujillo-Rausa, R., Haskell-Dowland, P., (2019), Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks. 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Article number 9077977, online, IEEE, DOI: 10.1109/ITNAC46935.2019.9077977.
  13. Bostami, B., Ahmed, M., Choudhury, S., (2019), False Data Injection Attacks in Internet of Things. Performability in Internet of Things, 47-58, Cham, Switzerland, Springer, DOI: 10.1007/978-3-319-93557-7.
  14. Ahmed, M., Choudhury, S., Al-Turjman, F., (2019), Big Data Analytics for Intelligent Internet of Things. Artificial Intelligence in IoT, 107-127, Cham, Switzerland, Springer, DOI: 10.1007/978-3-030-04110-6.
  15. Ahmed, M., (2019), Intelligent Big Data Summarization for Rare Anomaly Detection. IEEE Access, 7(2019), 68669-68677, DOI: 10.1109/ACCESS.2019.2918364.
  16. Aurisch, R., Ahmed, M., Barkat, A., (2019), An outlook at Agile methodologies for the independent games developer. International Journal of Computers and Applications, 1-7, Taylor & Francis, UK, DOI: 10.1080/1206212X.2019.1621463.
  17. Yang, J., Hasan Onik, MM., Lee, N., Ahmed, M., Kim, C., (2019), Proof-of-Familiarity: A Privacy-Preserved Blockchain Scheme for Collaborative Medical Decision-Making. Applied Sciences, 9(7), Article no.1370, DOI: 10.3390/app9071370
  18. Khandaker, S., Hussain, A., Ahmed, M., (2019), Effectiveness of Hard Clustering Algorithms for Securing Cyber Space. Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018 Proceedings, 256(July 11-11, 2018), 113-120, Cham, Switzerland, Springer, Cham, DOI: 10.1007/978-3-030-05928-6_11.
  19. Saeed, M., Ahmed, M., (2019), Evaluation Metrics for Big Data Project Management. Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018 Proceedings, 256(July 11-11, 2018), 139-142, Cham, Switzerland, Springer, DOI: 10.1007/978-3-030-05928-6_14.
  20. Ahmed, M., Pathan, AK., (2019), Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study. Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers, 969(Sep. 19-22, 2018), 211--219, Singapore, Springer, DOI: 10.1007/978-981-13-5826-5_15.
  21. Ahmed, M., Barkat, A., (2019), Performance Analysis of Hard Clustering Techniques for Big IoT Data Analytics. Proceedings - 2019 Cybersecurity and Cyber forensics Conference, CCC 2019, 62-66, Online, IEEE, DOI: 10.1109/CCC.2019.000-8.
  22. Speelman, C., Valli, C., Guidetti, O., (2019), Towards a Method for Examining the Effects of Cognitive Load on the Performance of Cyber First Responders. Proceedings of the International Conference on Security and Management (SAM), 41-47, Athens, Georgia, The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).

2018

  1. Yang, W., Wang, S., Zheng, G., Chaudhry, J., Valli, C., (2018), ECB4CI: An Enhanced Cancelable Biometric System for Securing Critical Infrastructures. Journal of Supercomputing, 74(10), 4893-4909, DOI: 10.1007/s11227-018-2266-0.
  2. Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C., (2018), A Fingerprint and Finger-vein Based Cancelable Multi-biometric System. Pattern Recognition, 78(June 2018), 242-251, DOI: 10.1016/j.patcog.2018.01.026.
  3. Ibrahim, A., Valli, C., McAteer, I., Chaudhry, J., (2018), A security review of local government using NIST CSF: a case study. Journal of Supercomputing, 74(10), 5171-5186, Springer, DOI: 10.1007/s11227-018-2479-2.
  4. Yang, W., Wang, S., Hu, J., Zheng, G., Chaudhry, J., Adi, E., Valli, C., (2018), Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem. IEEE Access, 6(26 January 2018), 9390-9403, IEEE, DOI: 10.1109/ACCESS.2018.2799522.
  5. Abrar, H., Hussain, S., Chaudhry, J., Saleem, K., Orgun, M., Al-Muhtadi, J., Valli, C., (2018), Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry. IEEE Access, 6(13 February 2018), 19140-19150, Institute of Electrical and Electronics Engineers Inc., DOI: 10.1109/ACCESS.2018.2805919.
  6. Valli, C., Johnstone, M., Fleming, R., (2018), A Survey of Lawyers’ Cyber Security Practises in Western Australia. Annual ADFSL Conference on Digital Forensics, Security and Law, 219-226, Florida, USA, Association of Digital Forensics, Security and Law.
  7. Ibrahim, A., Valli, C., McAteer, I., Chaudhry, J., (2018), A security review of local government using NIST CSF: a case study. Journal of Supercomputing, 74(10), 5171-5186, Springer, DOI: 10.1007/s11227-018-2479-2.
  8. Yang, W., Wang, S., Hu, J., Zheng, G., Chaudhry, J., Adi, E., Valli, C., (2018), Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem. IEEE Access, 6(26 January 2018), 9390-9403, IEEE, DOI: 10.1109/ACCESS.2018.2799522.
  9. Abrar, H., Hussain, S., Chaudhry, J., Saleem, K., Orgun, M., Al-Muhtadi, J., Valli, C., (2018), Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry. IEEE Access, 6(13 February 2018), 19140-19150, Institute of Electrical and Electronics Engineers Inc., DOI: 10.1109/ACCESS.2018.2805919.
  10. Yang, W., Zheng, G., Ibrahim, A., Chaudhry, J., Wang, S., Hu, J., Valli, C., (2018), Application of 3D Delaunay Triangulation in Fingerprint Authentication System. Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 235(13-15 December, 2017), 291-298, Springer, Cham, Springer, DOI: 10.1007/978-3-319-90775-8_23.
  11. Chaudhry, J., Farmand, S., Islam, S., Islam, MR., Hannay, P., Valli, C., (2018), Discovering trends for the development of novel authentication applications for dementia patients. International Conference on Applications and Techniques in Cyber Security and Intelligence, Applications and Techniques in Cyber Security and Intelligence, 580(16-18 June, 2017), 220-237, China, Springer, DOI: 10.1007/978-3-319-67071-3_29.
  12. Chaudhry, J., Valli, C., Crowley, M., Haass, J., Roberts, P., (2018), POStCODE Middleware for Post-Market Surveillance of Medical Devices for Cyber Security in Medical and Healthcare Sector in Australia. International Symposium on Medical Information and Communication Technology, ISMICT, 2018-March(26-28 March 2018), 10 p., Piscataway, NJ, IEEE Computer Society, DOI: 10.1109/ISMICT.2018.8573695.
  13. Chaudhry, J., Saleem, K., Haskell-Dowland, P., Miraz, M., (2018), A Survey of Distributed Certificate Authorities in MANETs. Annals of Emerging Technologies in Computing (AETiC), 2(3), 11-18, International Association of Educators and Researchers (IAER).
  14. Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2018), Continuous identity verification in cloud storage services using behavioural profiling. ECCWS 2018 17th European Conference on Cyber Warfare and Security, 10p..
  15. Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2018), Misuse Detection in a Simulated IaaS Environment. Emerging Technologies for Authorization and Authentication. ETAA 2018. Lecture Notes in Computer Science, 11263(7 Sept 2018), 103-115, Switzerland, Springer, DOI: 10.1007/978-3-030-04372-8_9.
  16. Mahmoud, N., Furnell, S., Haskell-Dowland, P., (2018), Design Principles and Guidelines for Targeted Security Awareness. Proceedings of the Annual Information Institute Conference, 18p., online, Information Institute.
  17. Greene, R., Johnstone, M., (2018), An investigation into a denial of service attack on an ethereum network. Australian Information Security Management Conference, 90-96, online, Security Research Institute, Edith Cowan University, DOI: 10.25958/5c526f0b6668b.
  18. Greene, R., Johnstone, M., (2018), Secure Smart Contract Supply Chains. Proceedings of 17th Australian Cyber Warfare Conference (CWAR), 6-17, Melbourne, Victoria, Deakin University Centre for Cyber Security Research and Innovation.
  19. Woodiss-Field, A., Johnstone, M., (2018), Towards a Method for Detecting Botnet Code on IoT Devices. The Proceedings of the 2018 Cyber Forensic & Security International Conference, pp. 30-34, Nuku’alofa, Kingdom of Tonga, Christ's University in Pacific.
  20.   Hassan, MM., Ahmed, M., (2018), Blockchain in the Era of Industry 4.0. Data Analytics Concepts, Techniques, and Applications, 235-273, Boca Raton, USA, CRC Press, DOI: 10.1201/9780429446177. nia, USA, Association of Digital Forensics, Security and Law.
  21. Ahmed, M., Ullah, A., (2018), False Data Injection Attacks in Healthcare. Data Mining. AusDM 2017. Communications in Computer and Information Science, vol 845, 845, , 192-202, Singapore, Springer, DOI: 10.1007/978-981-13-0292-3_12..

2017

  1. Alharbi, N., Papadaki, M., Haskell-Dowland, P., (2017), The impact of security and its antecedents in behaviour intention of using e-government services. Behaviour and Information Technology, 36(6), 620-636, Taylor & Francis, DOI: 10.1080/0144929X.2016.1269198.
  2. Korovessis, P., Furnell, S., Papadaki, M., Haskell-Dowland, P., (2017), A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2), article no.5, Kennesaw State University.
  3. Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F., (2017), Smart Watch based Body-Temperature Authentication. Proceedings of the IEEE International Conference on Computing, Networking and Informatics (ICCNI 2017), 7p., IEEE, DOI: 10.1109/ICCNI.2017.8123790.
  4. Macedo, M., Yang, W., Zheng, G., Johnstone, M., (2017), A Comparison of 2D and 3D Delaunay Triangulations for Fingerprint Authentication. The Proceedings of 15th Australian Information Security Management Conference, 108-115, Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a84f3ca95b4b.
  5. White, T., Johnstone, M., Peacock, M., (2017), An investigation into some security issues in the DDS messaging protocol. Proceedings of the 15th Australian Information Security Management Conference, 132-139, Perth, WA, Edith Cowan University.
  6. Carpene, C., Johnstone, M., Woodward, A., (2017), The Effectiveness of Classification Algorithms on IPv6 IID Construction. International Journal of Autonomous and Adaptive Communications Systems, 10(1), 15-22, Inderscience.
  7. Chaudhry, J., Saleem, K., Islam, R., Selamat, A., Ahmed, M., Valli, C., (2017), AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments. Proceedings 2017 IEEE 42nd Conference on Local Computer Networks Workshops, 121-127, IEEE, DOI: 10.1109/LCN.Workshops.2017.73.
  8. Rabadia, P., Valli, C., Ibrahim, A., Baig, Z., (2017), Analysis of attempted intrusions: Intelligence gathered from SSH honeypots. The Proceedings of 15th Australian Information Security Management Conference, 10p., Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a839e6d1d283.
  9. Zheng, G., Zhang, G., Yang, W., Valli, C., Shankaran , R., Orgun, MA., (2017), From WannaCry to WannaDie: Security Trade-offs and Design for Implantable Medical Devices. 17th International Symposium on Communications and Information Technologies (ISCIT2017), 1-5, online, IEEE, DOI: 10.1109/ISCIT.2017.8261228.
  10. Chaudhry, J., Ahmad, M., Habib, MA., Ashraf, R., Valli, C., (2017), Enhancements in Data-Recovery and Re-Transmit Mechanisms of Transmission Control Protocol Enabled Medical Devices. Proceedings 2017 IEEE 42nd Conference on Local Computer Networks Workshops, 121-12721-127, IEEE.

2016

  1. Zaaba, ZF., Furnell, S., Haskell-Dowland, P., (2016), Literature Studies on Security Warnings Development. International Journal on Perceptive and Cognitive Computing, 2(1), 8-18, Malaysia, International Islamic University Malaysia, DOI: 10.31436/ijpcc.v2i1.22.
  2. Al-Bayati, B., Clarke, N., Haskell-Dowland, P., (2016), Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis. The GSTF Journal on Computing, 5(1), 21-28, Singapore, Global Science and Technology Forum, DOI: 10.5176/2251-3043_4.4.348.
  3. Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S., (2016), Graphical One-Time Password (GOTPass): A usability evaluation. Information Security Journal: a Global Perspective, 25(1-3), 94-108, United States, Taylor and Francis Inc., DOI: 10.1080/19393555.2016.1179374.
  4. Al-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F., (2016), A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches. International Journal for Information Security Research, 6(3), 691-700, Infonomics Society, DOI: 10.20533/ijisr.2042.4639.2016.0080.
  5. Triantafyllidis, A., Clarke, N., Haskell-Dowland, P., Vranopoulos, G., (2016), Increasing eLearning Engagement Using Mobile Technologies. ICERI2016 Conference Proceedings, 8644-8653, online only, IATED Academy.
  6. Johnstone, M., Baig, Z., Hannay, P., Carpene, C., Feroze, M., (2016), Controlled Android Application Execution for the IoT Infrastructure. Internet of Things: Second International Summit, IoT 360° 2015 Revised Selected Papers, Part I, 169(26-27 Oct 2015), 16-26, Cham, Switzerland, Springer Verlag, DOI: 10.1007/978-3-319-47063-4_2.
  7. Bettany, B., Johnstone, M., Peacock, M., (2016), An investigation of potential wireless security issues in traffic lights. The Proceedings of 14th Australian Information Security Management Conference, 76-82, online only, Edith Cowan University.
  8. Feroze, M., Baig, Z., Johnstone, M., (2016), A Two-Tiered User Feedback-based Approach for Spam Detection. Proceedings of the 10th International Conference on Systems and Networks Communications, 12-17, IARIA.
  9. Chernyshev, M., Valli, C., Hannay, P., (2016), Service set identifier geolocation for forensic purposes: Opportunities and challenges. Proceedings of the 49th Hawaii International Conference on System Sciences, Article no. 7427866, IEEE Computer Society, DOI: 10.1109/HICSS.2016.678.

2015

  1. Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S., (2015), Secure Graphical One Time Password (GOTPass): An Empirical Study. Information Security Journal: a Global Perspective, 24(4-6), 207-220, United States, Taylor & Francis Inc., DOI: 10.1080/19393555.2015.1115927.
  2. Shanley, L., Johnstone, M., (2015), Selection of penetration testing methodologies: a comparison and evaluation. The Proceedings of the 13th Australian Information Security Management Conference, 65-72, Perth, W.A., Security Research Institute, Edith Cowan University.
  3. Williams, T., Woodward, A., (2015), Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical Devices: Evidence and Research, 2015(8), 305-316, Macclesfield, UK, Dove Medical Press Ltd, DOI: 10.2147/MDER.S50048.
  4. Nisbet, A., Woodward, A., (2016), A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs. Information Security and Privacy: 21st Australasian Conference, ACISP 2016, 9722(4-6 Jul, 2016), 115-127, Switzerland, Springer, DOI: 10.1007/978-3-319-40253-6_7.
  5. Woodward, A., Williams, T., (2015), An Uncomfortable Change: Shifting Perceptions to Establish Pragmatic Cyber Security. Recent Advances in Information and Communication Technology 2015. Proceedings of the 11th International Conference on Computing and Information Technology (ICCIT), 361(2-3 July 2015), 1-8, Thailand, Springer, DOI: 10.1007/978-3-319-19024-2_1.
  6. Valli, C., Rabadia, P., Woodward, A., (2015), A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law, 23-32, Virgi Rashid, T., Saeed, M., Ahmed, M., (2020), A New Era of Project Management Using Blockchain Technology. Blockchain in Data Analytics, 102-121, Newcastle upon Tyne, England, Cambridge Scholars Publishing
  7. Rabadia, P., Valli, C., (2015), Analysis into developing accurate and efficient intrusion detection approaches. Proceedings of 13th Australian Digital Forensics Conference, 70-76, Perth, WA, ECU Security Research Institute.
  8. Thomas, T., Valli, C., (2015), Mapping the laws which apply to intercepting wireless communications in a Western Australian legal context. Proceedings of the 13th Australian Digital Forensics Conference, 22-36, Perth, WA, ECU Security Research Institute.
  9. Valli, C., Rabadia, P., Woodward, A., (2015), A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law, 23-32, Virginia, USA, Association of Digital Forensics, Security and Law.
  10. Ibrahim, A., Valli, C., (2015), Image Similarity using Dynamic Time Warping of Fractal Features. Proceedings of 13th Australian Digital Forensics Conference, 111-122, Perth, WA, ECU Security Research Institute.
  1. Undergraduate cybersecurity education in Australia - does it meet the mark?, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2020 - 2023, $180,000.
  2. Physiological indicators of stress during Cybersecurity work, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2020 - 2023, $180,000.
  3. Measuring and Mitigating Vigilance Decrement in Cyber Network Defence Tasks, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2019 - 2022, $225,000.
  4. Developing autonomous solutions for building knowledge graphs to support educational outcomes in Virtuoso, CingleVue Pty Ltd, Scholarships to Support Industry Engagement PhD Project, 2020 - 2024, $150,000.
  5. Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 - 2022, $120,000.
  6. Securing Internet of Medical Things against False Data Injection Attacks Using Blockchain, Edith Cowan University, ECU Early Career Researcher Grant - 2019, 2019 - 2020, $25,000.
  7. Academic Centre of Cyber Security Excellence, Department of Education, Skills and Employment, Academic Centres of Cyber Security Excellence, 2017 - 2021, $950,287.
  8. Honeypot Deployment Architecture, Cyber Security Research Centre Ltd, Cyber Security Research Centre Ltd, 2019 - 2021, $130,000.
  9. ESSENTIAL - Evolving Security SciencE through Networked Technologies, Information policy And Law, European Commission, Horizons 2020, 2017 - 2021, $394,374.
  10. Drone Policy Review and Forensic Handbook, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 - 2020, $10,700.
  11. ISMS Framework, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 - 2020, $21,400.
  12. Anti-spear phishing by detecting Email Impersonation, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 - 2020, $10,700.
  13. Anti-Business Email Compromise, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 - 2020, $10,700.
  14. Power Honeynet Development Pilot Research and Development Project, Western Power, Western Power - Grant, 2020, $35,000.
  15. Power Honeynet Development Pilot Research and Development Project, Horizon Power, Grant, 2020, $35,000.
  16. Password Hardening Tools, Cyber Security Research Centre Ltd, Sprint Student Grant, 2018 - 2019, $70,000.
  17. Vulnerabilities in Ship Control Systems, Defence Science and Technology Group of the Department of Defence, Grant, 2017 - 2018, $400,000.
  18. Cyber Security Survey and Professional Development Seminars, Law Society of WA, Grant, 2017 - 2018, $30,000.
  19. Advanced Biometric Template Protection: Design of a Cancelable Biometric Framework, Defence Science and Technology Group of the Department of Defence, Competitive Evaluation Research Agreement (CERA) Program, 2017 - 2018, $128,226.
  20. Cyber Electronic Warfare: The effects of team dynamics, cognitive load and team mental models., Defence Science and Technology Group of the Department of Defence, Competitive Evaluation Research Agreement (CERA) Program, 2017 - 2018, $153,407.
  21. Scenario Methodology for Assessing Defence Capability Against Information Warfare Threats, Defence Science and Technology Group of the Department of Defence, Modelling Complex Warfighting, 2020 - 2021, $100,000.
  22. Internet of Things (IoT) ModBUS and BacNET, Cisco Systems Australia Pty Ltd, CISCO - Grant, 2015 - 2018, $125,000.
  23. Design of a Biometric Protection System using Feature Transformation Techniques, Edith Cowan University, Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017, 2017, $8,700.
  24. Internet of Things (IoT), Cisco Systems Australia Pty Ltd, CISCO - Grant, 2016 - 2017, $160,000.
  25. Investigation of social media for radicalisation and terrorism in the Maldives, Edith Cowan University, Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 – 2017, 2017, $11,000.
  26. Cyber Check.me, City of Joondalup, Grant, 2015 - 2016, $16,740.
  27. Rules, Expectations and Security through Privacy-Enhanced Convenient Technologies (RESPECT) - Proposal No 285582, European Commission, Grant - Seventh Framework Programme (FP7), 2012 - 2015, $223,800.
  28. Authentication and Authorisation for Entrusted Unions (AU2EU), European Commission, Grant - Seventh Framework Programme (FP7), 2013 - 2015, $584,907.
  29. Scalable Measures for Automated Recognition Technologies (SMART), European Union, EU Seventh Framework Program, 2011 - 2014, $389,772.
  30. Small Medium Enterprise Cyber Security Engagement (SMESEC) - Project Pilot, City of Wanneroo, Grant, 2013 - 2014, $21,908.
  31. CRC for Cyber Security (CyberCRC), Department of Commerce, Innovation Co-investment Program, 2013, $707,833.
  32. The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN), Griffith University, Grant - NIRAP, 2009 - 2013, $37,139.
  33. Transceiver Array for Optical Media, Attorney-General - Commonwealth, Grant, 2010 - 2012, $293,091.
  34. Overclocking of mechanical hard disk drives, Attorney General's D Branch, Attorney General's Department, D Branch Grant, 2011 - 2012, $54,545.
  35. Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support For National Security, 2010 - 2012, $77,154.
Skip to top of page