Top of page

Student/Staff Portal
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Associate Professor Mike Johnstone

Associate Professor

Staff Member Details
Telephone: +61 8 6304 6615
Facsimile: +61 8 9370 6100
Email: m.johnstone@ecu.edu.au
Campus: Joondalup  
Room: JO18.313  
ORCID iD: https://orcid.org/0000-0001-7192-7098

Mike is an Associate Professor within the School of Science.

Research Interests

  • Cyber Security
  • Privacy
  • Internet of Things
  • Machine Learning
  • Network Forensics

Qualifications

  • Doctor of Philosophy, Curtin University of Technology.
  • Post Grad Diploma, Curtin University of Technology.
  • Master of Science, Curtin University of Technology.
  • Bachelor of Applied Science, Western Australian Institute of Technology.

Research Outputs

Journal Articles

  • Scott, B., Johnstone, M., Szewczyk, P., Richardson, S. (2024). Matrix Profile data mining for BGP anomaly detection. Computer Networks, 242(Article in press), Article number 110257. https://doi.org/https://doi.org/10.1016/j.comnet.2024.110257.
  • Woodiss-Field, A., Johnstone, M., Haskell-Dowland, P. (2024). Examination of Traditional Botnet Detection on IoT-Based Bots. Sensors, 24(3), Article number 1027. https://doi.org/10.3390/s24031027.
  • Kane, J., Johnstone, M., Szewczyk, P. (2024). Voice Synthesis Improvement by Machine Learning of Natural Prosody. Sensors, 24(5), Article number 1624. https://doi.org/https://doi.org/10.3390/s24051624.
  • Scott, B., Johnstone, M., Szewczyk, P. (2024). A Survey of Advanced Border Gateway Protocol Attack Detection Techniques. Sensors, 24(19), Article number 6414. https://doi.org/10.3390/s24196414.
  • Johnstone, M., Crowley, M., Murray, G. (2024). The Changing Face of Cyber Crime as a Service: An Australian Perspective. Journal of Information Warfare, 23(1), 64-76.

Reports

  • Seet, P., Klarin, A., Jones, J., Johnstone, M., Cripps, H., Sharafizad, J., Wilk, V., Suter, D., Marceddo, T. (2024). Opportunities and Challenges posed by Disruptive and Converging information technologies for Australia's future defence capabilities: A Horizon Scan. Joondalup. Edith Cowan University. https://doi.org/https://doi.org/10.25958/0x5j-wd23.
  • Seet, P., Klarin, A., Jones, J., Johnstone, M., Wilk, V., Meek, S., O'Brien, S. (2024). Expanding Australia’s Defence Capabilities for Technological Asymmetric Advantage in Information, Cyber and Space in the Context of Accelerating Regional Military Modernisation: A Systemic Design Approach. Joondalup. Edith Cowan University. https://doi.org/10.25958/arsh-4072.

Journal Articles

  • Crowley, M., Johnstone, M., Murray, G. (2023). Entering the Firing Line: How Civilians Become Legitimate Targets in War as Technology Becomes a Double-Edged Sword. Journal of Information Warfare, 22(1), 1-9. https://ro.ecu.edu.au/ecuworks2022-2026/2474.
  • Mudra, G., Cui, H., Johnstone, M. (2023). Survey: An Overview of Lightweight RFID Authentication Protocols Suitable for the Maritime Internet of Things. Electronics, 12(13), Article number 2990. https://doi.org/10.3390/electronics12132990.
  • Shanley, L., Johnstone, M., Szewczyk, P., Crowley, M. (2023). An Exploration Of Australian Attitudes Towards Privacy. Information and Computer Security, 31(3), 353-367. https://doi.org/10.1108/ICS-11-2022-0171.
  • Alatram, A., Sikos, L., Johnstone, M., Szewczyk, P., Kang, JJ. (2023). DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol. Computer Networks, 231(2023), Article number 109809. https://doi.org/10.1016/j.comnet.2023.109809.

Reports

  • Seet, P., Johnstone, M., Jones, J., Klarin, A., Wilk, V., Meek, S., Marceddo, T. (2023). Competing in the Grey Zone: Hybrid warfare Opportunities and Strategies for the Australian Army. Joondalup, WA. Edith Cowan University.

Book Chapters

  • Karie, N., Bin Sahri, NM., Yang, W., Johnstone, M. (2022). Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats. Explainable Artificial Intelligence for Cyber Security (141-169). Springer. https://doi.org/10.1007/978-3-030-96630-0_7.
  • Yang, W., Johnstone, M., Wang, S., Karie, N., Bin Sahri, NM., Kang, J. (2022). Network Forensics in the Era of Artificial Intelligence. Explainable Artificial Intelligence for Cyber Security (171–190). Springer. https://doi.org/10.1007/978-3-030-96630-0_8.

Journal Articles

  • Yang, W., Wang, S., Kang, J., Johnstone, M., Bedari, A. (2022). A Linear Convolution-Based Cancelable Fingerprint Biometric Authentication System. Computers and Security, 114(March 2022), 102583. https://doi.org/10.1016/j.cose.2021.102583.

Conference Publications

  • Woodiss-Field, A., Johnstone, M., Haskell-Dowland, P. (2022). Towards Evaluating the Effectiveness of Botnet Detection Techniques. Ubiquitous Security: First International Conference, UbiSec (292-308). Springer. https://doi.org/10.1007/978-981-19-0468-4_22.
  • Evans, K., Abuadbba, A., Wu, T., Moore, K., Ahmed, M., Pogrebna, G., Nepal, S., Johnstone, M. (2022). RAIDER: Reinforcement-Aided Spear Phishing Detector. Lecture Notes in Computer Science (23-50). Springer. https://doi.org/10.1007/978-3-031-23020-2_2.
  • Scott, B., Johnstone, M., Szewczyk, P. (2022). Anatomy of an Internet Hijack And Interception Attack: A Global And Educational Perspective. Annual ADFSL Conference on Digital Forensics, Security and Law (1-18). Embry-Riddle Aeronautical University. https://ro.ecu.edu.au/ecuworks2022-2026/1623.
  • Shanley, L., Johnstone, M., Szewczyk, P., Crowley, M. (2022). A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results. Human Aspects of Information Security and Assurance (228-239). Springer. https://doi.org/10.1007/978-3-031-12172-2_18.
  • Fakirah, J., Zishan, Z., Mooruth, R., Johnstone, M., Yang, W. (2022). A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation. Annual ADFSL Conference on Digital Forensics, Security and Law (1-8). Embry-Riddle Aeronautical University. https://ro.ecu.edu.au/ecuworks2022-2026/2042.

Conference Publications

  • Wood, A., Johnstone, M. (2021). Detection of Induced False Negatives in Malware Samples. Proc. 18th International Conference on Privacy, Security and Trust (1-6). IEEE. https://doi.org/10.1109/PST52912.2021.9647787.
  • Yang, W., Wang, S., Johnstone, M. (2021). A Comparative Study of ML-ELM and DNN for Intrusion Detection. ACSW '21: 2021 Australasian Computer Science Week Multiconference Proceeding (Article number 3437390). ACM. https://doi.org/10.1145/3437378.3437390.
  • An, A., Szewczyk, P., Johnstone, M., Kang, J. (2021). Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms. Proc. 31st International Telecommunication Networks and Applications Conference (172-179). IEEE. https://ro.ecu.edu.au/ecuworkspost2013/11780.

Book Chapters

Conference Publications

  • Shanley, L., Johnstone, M., Crowley, M., Szewczyk, P. (2020). Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?. Human Aspects of Information Security and Assurance (3-15). Springer. https://doi.org/10.1007/978-3-030-57404-8_1.
  • Woodiss-Field, A., Johnstone, M. (2020). Assessing the Suitability of Traditional Botnet Detection against Contemporary Threats. Proceedings of the 2020 Workshop on Emerging Technologies for Security in IoT (18-21). Institute of Electrical and Electronics Engineers, Inc.. https://doi.org/10.1109/ETSecIoT50046.2020.00008.
  • Yang, W., Wang, S., Yu, K., Kang, J., Johnstone, M. (2020). Secure Fingerprint Authentication with Homomorphic Encryption. 2020 Digital Image Computing: Techniques and Applications (1-6). DICTA. https://ro.ecu.edu.au/ecuworkspost2013/9554.
  • Walling, L., Johnstone, M., Hannay, P. (2020). Information Warfare by Proxy: Malware in PLC Firmware. Conference Proceedings of the 18th Australian Cyber Warfare Conference 2019 (CWAR 2019) (57-61). Deakin University. https://ro.ecu.edu.au/ecuworkspost2013/8239.
  • Woodiss-Field, A., Johnstone, M. (2020). BotNets in the Internet of Things: The Next Wave. Conference Proceedings of the 18th Australian Cyber Warfare Conference 2019 (CWAR 2019) (41-45). Deakin University. https://ro.ecu.edu.au/ecuworkspost2013/8240.
  • Yang, W., Johnstone, M., Sikos, L., Wang, S. (2020). Security and Forensics in the Internet of Things: Research Advances and Challenges. Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020 (12-17). Institute of Electrical and Electronics Engineers, Inc.. https://doi.org/10.1109/ETSecIoT50046.2020.00007.

Journal Articles

  • Yang, W., Wang, S., Hu, J., Ibrahim, A., Zheng, G., Macedo, M., Johnstone, M., Valli, C. (2019). A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things. Sensors, 19(13), article no.2985. https://doi.org/10.3390/s19132985.

Book Chapters

  • Peacock, M., Johnstone, M., Valli, C. (2018). An Exploration of Some Security Issues Within the BACnet Protocol. Information Systems Security and Privacy (252–272). Springer. https://doi.org/10.1007/978-3-319-93354-2_12.

Conference Publications

  • Woodiss-Field, A., Johnstone, M. (2018). Towards a Method for Detecting Botnet Code on IoT Devices. The Proceedings of the 2018 Cyber Forensic & Security International Conference (pp. 30-34). Christ's University in Pacific. https://ro.ecu.edu.au/ecuworkspost2013/5993.
  • Greene, R., Johnstone, M. (2018). An investigation into a denial of service attack on an ethereum network. Australian Information Security Management Conference (90-96). Security Research Institute, Edith Cowan University. https://doi.org/10.25958/5c526f0b6668b.
  • Greene, R., Johnstone, M. (2018). Secure Smart Contract Supply Chains. Proceedings of 17th Australian Cyber Warfare Conference (CWAR) (6-17). Deakin University Centre for Cyber Security Research and Innovation. https://ro.ecu.edu.au/ecuworkspost2013/5960.
  • Valli, C., Johnstone, M., Fleming, R. (2018). A Survey of Lawyers’ Cyber Security Practises in Western Australia. Annual ADFSL Conference on Digital Forensics, Security and Law (219-226). Association of Digital Forensics, Security and Law. https://ro.ecu.edu.au/ecuworkspost2013/5217.

Journal Articles

  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M. (2017). Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13. https://doi.org/10.1016/j.diin.2017.06.015.
  • Chernyshev, M., Valli, C., Johnstone, M. (2017). Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. IEEE Transactions on Information Forensics and Security, 12(7), 1625-1636. https://doi.org/10.1109/TIFS.2017.2678463.
  • Carpene, C., Johnstone, M., Woodward, A. (2017). The Effectiveness of Classification Algorithms on IPv6 IID Construction. International Journal of Autonomous and Adaptive Communications Systems, 10(1), 15-22.

Conference Publications

  • White, T., Johnstone, M., Peacock, M. (2017). An investigation into some security issues in the DDS messaging protocol. Proceedings of the 15th Australian Information Security Management Conference (132-139). Edith Cowan University.
  • Murray, G., Johnstone, M., Valli, C. (2017). The convergence of IT and OT in critical infrastructure. Proceedings of the 15th Australian Information Security Management Conference (149-155). Edith Cowan University.
  • Peacock, M., Johnstone, M., Valli, C. (2017). Security Issues with BACnet Value Handling. Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP) 2017 (546-552). Science and Technology Publications.
  • Macedo, M., Yang, W., Zheng, G., Johnstone, M. (2017). A Comparison of 2D and 3D Delaunay Triangulations for Fingerprint Authentication. The Proceedings of 15th Australian Information Security Management Conference (108-115). Edith Cowan University. https://doi.org/10.4225/75/5a84f3ca95b4b.

Journal Articles

Conference Publications

  • Feroze, M., Baig, Z., Johnstone, M. (2016). A Two-Tiered User Feedback-based Approach for Spam Detection. Proceedings of the 10th International Conference on Systems and Networks Communications (12-17). IARIA.
  • Bettany, B., Johnstone, M., Peacock, M. (2016). An investigation of potential wireless security issues in traffic lights. The Proceedings of 14th Australian Information Security Management Conference (76-82). Edith Cowan University.
  • Johnstone, M., Baig, Z., Hannay, P., Carpene, C., Feroze, M. (2016). Controlled Android Application Execution for the IoT Infrastructure. Internet of Things: Second International Summit, IoT 360° 2015 Revised Selected Papers, Part I (16-26). Springer Verlag. https://doi.org/10.1007/978-3-319-47063-4_2.

Conference Publications

  • Shanley, L., Johnstone, M. (2015). Selection of penetration testing methodologies: a comparison and evaluation. The Proceedings of the 13th Australian Information Security Management Conference (65-72). Security Research Institute, Edith Cowan University.
  • Johnstone, M., Peacock, M., Den Hartog, J. (2015). Timing attack detection on Bacnet via a machine learning approach. The Proceedings of the 13th Australian Information Security Management Conference (57-64). Security Reseach Institute, Edith Cowan University.

Journal Articles

  • Johnstone, M. (2014). Cloud security meets telemedicine. Electronic Journal of Health Informatics, 8(2), Article No. e14.
  • Ahmad, P., Brogan, M., Johnstone, M. (2014). The E-book Power User in Academic and Research Libraries: Deep Log Analysis and User Customisation. Australian Academic and Research Libraries, 45(1), 35-47. https://doi.org/10.1080/00048623.2014.885374.

Conference Publications

  • Valli, C., Woodward, A., Hannay, P., Johnstone, M. (2014). Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law (35-40). Association of Digital Forensics, Security and Law.
  • Crowley, M., Johnstone, M. (2014). I remember Richelieu: Is anything secure anymore?. The Proceedings of 7th Australian Security and Intelligence Conference (27 - 32). ECU.
  • Ayed, DF., Camenisch, J., Ignatenko, T., Johnstone, M., Koster, P., Lange, B., Petković, M., Sommer, D., Zic, J. (2014). Authentication and authorisation in entrusted unions. Proc. 12th Australian Information Security Management Conference (56-63). ECU. https://doi.org/10.4225/75/57b660c8343d4.
  • Peacock, M., Johnstone, M. (2014). An analysis of security issues in building automation systems. The Proceedings of 12th Australian Information Security Management Conference (100-104). ECU. https://doi.org/10.4225/75/57b691dfd9386.
  • Valli, C., Martinus, I., Johnstone, M. (2014). Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business. Proceedings of the 2014 International Conference on Security and Management (71-75). CSREA Press.

Journal Articles

  • Johnstone, M. (2013). Embedding Secure Programming in the Curriculum: Some Lessons Learned. International Journal of Engineering and Technology, 5(2), 287-290. https://doi.org/10.7763/IJET.2013.V5.560.

Conference Publications

  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M. (2013). Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference (42-48). Security Research Centre, Edith Cowan University.
  • Johnstone, M., Woodward, A. (2013). Automated Detection of Vehicles with Machine Learning. Proceedings of the 11th Australian Information Security Management Conference (102-112). Security Research Centre, Edith Cowan University.
  • Thompson, R., Johnstone, M. (2013). Security aspects of military sensor-based defence systems. 2013 IEEE International Conference on Trust, Security and Privacy in Computing and Communication Systems (302 - 309). IEEE. https://doi.org/10.1109/TrustCom.2013.277.
  • Peacock, M., Johnstone, M. (2013). Towards detection and control of civilian unmanned aerial vehicles. The Proceedings of 14th Australian Information Warfare Conference (9-15). Security Research Centre, Edith Cowan University.

Journal Articles

  • Johnstone, M., Jarvis, J. (2012). On the Effectiveness of Intrusions into ZigBee-based Wireless Sensor Networks. Journal of Network Forensics, 4(1), 27-39.

Conference Publications

  • Johnstone, M., Woodward, A. (2012). Towards Effective Algorithms for Intelligent Defense Systems. LNCS 7672 - Cyberspace Safety and Security, 4th International Symposium, CSS 2012 (498-508). Springer. https://doi.org/10.1007/978-3-642-35362-8_37.
  • Johnstone, M. (2012). Cloud security: A case study in telemedicine. The Proceedings of the 1st Australian eHealth Informatics and Security Conference (42-48). Security Research Centre, Edith Cowan University.

Conference Publications

  • Johnstone, M. (2011). Security Aspects of Sensor-based Defence Systems. Proceedings of the 9th Australian Information Security Management Conference (148-154). Security Research Centre, Edith Cowan University.
  • Johnstone, M. (2011). Modelling Misuse Cases as a Means of Capturing Security Requirements. Proceedings of the 9th Australian Information Security Management Conference (140-147). Security Research Centre, Edith Cowan University.
  • Johnstone, M. (2011). Penetration of Zigbee-Based Wireless Sensor Networks. Proceedings of The 12th Australian Information Warfare and Security Conference (17-27). Security Research Centre, Edith Cowan University.

Conference Publications

  • Johnstone, M. (2010). Threat modelling with Stride and UML.. Proceedings of the 8th Australian Information Security Management Conference (18-27). Security Research Centre, Edith Cowan University.
  • Campbell, V., Johnstone, M. (2010). The significance of learning style with respect to achievement in first year programming students.. Proceedings of the 21st Australian Software Engineering Conference ASWEC 2010 (165-170). IEEE. https://doi.org/10.1109/ASWEC.2010.33.

Conference Publications

  • Johnstone, M. (2009). Security Requirements Engineering-The Reluctant Oxymoron. Proceedings of the 7th Australian Information Security Management Conference (31-38). Centre for Security Research, Edith Cowan University.

Conference Publications

  • Johnstone, M. (2008). Postgraduate Students and Critical Thinking: Some Validation. Proceedings of the EDU-COM 2008 International Conference (277-284). Edith Cowan University.
  • Johnstone, M., Venable, JR. (2008). Enacting Design Science with Action Research: An Illustrative Case Study in Methodology Development. Proceedings of the Third International Conference on Design Science Research in Information Systems and Technology (93-110). Colloquium for Information Systems Security Education.

Conference Publications

  • Johnstone, M. (2006). Augmenting Postgraduate Student Problem-Solving Ability by the Use of Critical Thinking Exercises. Proceedings of EDU-COM International Conference: New Engagement and Empowerment - New Opportunities for Growth in Higher Education (245-253). Edith Cowan University.

Conference Publications

  • Johnstone, M. (2005). Using process modelling to capture requirements for a digital library. Proceedings of the Inaugural Transforming Information and Learning Conference 2005 (136-148). SCIS, ECU.

Conference Publications

  • Johnstone, M., McDermid, D., Venable, J. (2003). Extending the business rules diagram method to web based system design. 14th Australasian Conference on Information Systems 2003: Delivering IT and e-business value in networked environments (12 pages). We-B Centre School of Management Information Systems, ECU.

Conference Publications

  • Johnstone, M., McDermid, D., Venable, J. (2002). Shared Use of Diagrams in requirements Elicitation; roles, expectations and behaviours. 13th Australasian Conference on Information Systems (). School of Information Systems, Victoria University.
  • Johnstone, M., McDermid, D., Venable, J. (2002). Modelling E-business Security Requirements: Developer and Client Expectations. 7th Australian Workshop on Requirements Engineering (). Deakin University, VIC.

Conference Publications

  • Johnstone, M., McDermid, D. (2001). Using ontological ideas to facilitate the comparison of requirements elicitation methods. 12th Australasian Conference on Information Systems (323-327). Southern Cross University.

Research Projects

  • Supporting Government and ADF activities in the ‘Grey Zone’: Hybrid Warfare Roles and Opportunities for the Australian Army, Department of Defence - Australian Army, Australian Army Research Scheme, 2022 ‑ 2024, $25,000.
  • Forensic Identification of Deep Fakes, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2021 ‑ 2024, $105,000.
  • Advanced File Carving Extension for X-Ways Forensics Software, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Top Up Scholarship, 2021 ‑ 2024, $105,000.
  • BGP Anomaly Detection: A Multi-dimensional Investigation, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Top Up Scholarship, 2021 ‑ 2024, $105,000.
  • Expanding Australia's Defence Capabilities for Technological Asymmetric Advantage in Information, Cyber and Space in the Context of Accelerating Regional Military Modernisation: A Systemic Design Approach, Department of Defence, Strategic Policy Grants Program, 2021 ‑ 2024, $120,775.
  • 2020-106-054 - Opportunities and Challenges posed by Disruptive and Converging information technologies for Australia’s future defence capabilities: A Horizon Scan. , Department of Defence, Strategic Policy Grants Program, 2020 ‑ 2024, $89,045.
  • Developing and Testing a Forensic Framework for Civilian Unmanned Aerial Vehicles, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2021 ‑ 2023, $120,000.
  • Scenario Methodology for Assessing Defence Capability Against Information Warfare Threats, Defence Science and Technology Group of the Department of Defence, Modelling Complex Warfighting, 2020 ‑ 2021, $100,000.
  • Forensic Investigation of Wireless Medical Systems, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 ‑ 2021, $120,000.
  • Academic Centre of Cyber Security Excellence, Department of Education, Academic Centres of Cyber Security Excellence, 2017 ‑ 2021, $950,287.
  • Network Operations Centre - Situational Intelligence, Cyber Security Research Centre Ltd, Sprint Student Grant, 2018 ‑ 2019, $35,000.
  • Detection Likelihood, Cyber Security Research Centre Ltd, Sprint Student Grant, 2018 ‑ 2019, $35,000.
  • Vulnerabilities in Ship Control Systems, Defence Science and Technology Group of the Department of Defence, Grant, 2017 ‑ 2018, $400,000.
  • Investigation of text steganography for malicious covert communication by terrorists in the dark web, Edith Cowan University, Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017, 2017, $8,200.
  • Investigation of social media for radicalisation and terrorism in the Maldives, Edith Cowan University, Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 – 2017, 2017, $11,000.
  • Authentication and Authorisation for Entrusted Unions (AU2EU), European Commission, Grant - Seventh Framework Programme (FP7), 2013 ‑ 2015, $83,371.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy, Developing efficient and scalable detection methods for the Software Supply Chain through Machine Learning
  • Doctor of Philosophy, Artificial intelligence audio upscaling by addition of prosody
  • Doctor of Philosophy, Managing Cybersecurity Risk for Critical Infrastructure: A framework to secure critical infrastructure
  • Doctor of Philosophy, Understanding of a Forensic Corpus via Topic Modelling of the Autopsy Forensic Search Index
  • Doctor of Philosophy, Advancing BGP Anomaly Detection: Multidimensional Recurrence Quantification Analysis and Matrix Profile

Co-principal Supervisor

  • Doctor of Philosophy, Prediction of Driver Distraction by Machine Learning Models

Principal Supervisor

  • Doctor of Philosophy, Developing resilient approaches for detection of compromised IoT devices through machine learning
  • Doctor of Philosophy, A model for systematically investigating relationships between variables that affect the performance of novice programmers.
  • Doctor of Philosophy, Attitudes and Perceptions Towards Privacy and Surveillance in Australia
  • Doctor of Philosophy, Anomaly detection in bacnet/ip managed building automation systems
  • Master of Computing and Security by Research, Forensic Analysis on Wireless Medical Devices
  • Doctor of Philosophy, A defensive strategy for detecting targeted adversarial poisoning attacks in machine learning trained malware detection models
  • Master of Science (Computer Science), An Investigation into the Efficacy of URL Content Filtering Systems

Co-principal Supervisor

  • Doctor of Philosophy, Pictures in words: Indexing, folksonomy and representation of subject content in historic photographs.
  • Doctor of Philosophy, E-book adoption in academic and research libraries
  • Doctor of Philosophy, Human factors and cultural influences in implementing agile philosophy and agility in global software development.

Associate Supervisor

  • Doctor of Philosophy, Blind steganalysis using fractal features
  • Doctor of Philosophy, An investigation into off-link ipv6 host enumeration search techniques
  • Doctor of Philosophy, Detection of Online Radicalisation in the Maldivian language, Dhivehi
  • Master of Computing and Security by Research, A Forensic framework for Detecting Denial-of-Service Attacks in IoT Networks Using the MQTT Protocol
  • Doctor of Philosophy, Mining climate data for shire level wheat yield predictions in Western Australia
  • Master of Computing and Security by Research, Developing and testing a forensic framework for civilian unmanned aerial vehicles
Skip to top of page