Top of page

Student/Staff Portal
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Professor Andrew Woodward

Professor of Cybersecurity

Staff Member Details
Telephone: +61 8 6304 5019
Email: a.woodward@ecu.edu.au
Campus: Joondalup  
Room: JO23.241  
ORCID iD: https://orcid.org/0000-0001-6322-4958

Professor Andrew Woodward is a Professor of Cybersecurity in the School of Science.

Qualifications

  • Bachelor of Science Honours, Edith Cowan University.
  • Tertiary Teaching, Edith Cowan University, 2006.
  • Doctor of Philosophy, Edith Cowan University, 2005.

Research Outputs

Journal Articles

  • Kaur, J., Singh, Z., Mazhar, MM., Afrifa-Yamoah, E., Woodward, A. (2024). Variability in fruit quality traits of tropical Australian jackfruit (Artocarpus heterophyllus Lam.) genotypes. Scientia Horticulturae, 338(Article in press), Article number 113771. https://doi.org/10.1016/j.scienta.2024.113771.
  • Mahmood Ul Hasan, H., Singh, Z., Shah, S., Kaur, J., Woodward, A. (2024). Water Loss: A Postharvest Quality Marker in Apple Storage. Food and Bioprocess Technology, 2024(Article in press), TBD. https://doi.org/10.1007/s11947-023-03305-9.
  • Shah, S., Singh, Z., Ul Hasan, M., Woodward, A., Afrifa-Yamoah, E. (2024). Preharvest methyl jasmonate application delays cell wall degradation and upregulates phenolic metabolism and antioxidant activities in cold stored raspberries. Food Chemistry, 462(Article in press), Article number 141020. https://doi.org/10.1016/j.foodchem.2024.141020.
  • Shah, S., Singh, Z., Ul Hasan, M., Kaur, J., Afrifa-Yamoah, E., Woodward, A. (2024). Melatonin application suppresses oxidative stress and maintains fruit quality of cold stored ‘Esperanza’ raspberries by regulating antioxidant system. Postharvest Biology and Technology, 207(Article in press), Article number 112597. https://doi.org/10.1016/j.postharvbio.2023.112597.
  • Shah, S., Singh, Z., Ul Hasan, M., Kaur, J., Afrifa-Yamoah, E., Woodward, A. (2024). Methyl Jasmonate Application Downregulates Drupelet Reversion and Enhances Phenolic Biosynthesis and Antioxidant Potential of Blackberries. Journal of Plant Growth Regulation, 2024(Article in press), 14 pages. https://doi.org/10.1007/s00344-024-11499-1.
  • Ul Hasan, M., Singh, Z., Shah, S., Woodward, A., Afrifa-Yamoah, E. (2024). Methyl jasmonate advances fruit ripening, colour development, and improves antioxidant quality of ‘Yoho’ and ‘Jiro’ persimmon. Food Chemistry, 459(Article in press), Article number 140360. https://doi.org/10.1016/j.foodchem.2024.140360.
  • Kaur, J., Singh, Z., Mazhar, MS., Afrifa-Yamoah, E., Sangha, KK., Woodward, A. (2024). Mineral profiling of diverse genotypes of jackfruit (Artocarpus heterophyllus Lam.) grown in Australia. Journal of Food Composition and Analysis, 2024(Article in press), Article number 106599. https://doi.org/10.1016/j.jfca.2024.106599.

Journal Articles

  • Mahmood Ul Hasan, H., Singh, Z., Shah, S., Kaur, J., Woodward, A., Afrifa-Yamoah, E., Malik, AU. (2023). Oxalic acid: A blooming organic acid for postharvest quality preservation of fresh fruit and vegetables. Postharvest Biology and Technology, 206(Article in press), Article number 112574. https://doi.org/10.1016/j.postharvbio.2023.112574.
  • Shah, S., Singh, Z., Afrifa-Yamoah, E., Mahmood Ul Hasan, H., Kaur, J., Woodward, A. (2023). Insight into the Role of Melatonin in Mitigating Chilling Injury and Maintaining the Quality of Cold- Stored Fruits and Vegetables. Food Reviews International, 2023(Article in press), 1-28. https://doi.org/10.1080/87559129.2023.2212042.
  • Kaur, J., Singh, Z., Shah, S., Mazhar, MS., Mahmood Ul Hasan, H., Woodward, A. (2023). Insights Into Phytonutrient Profile And Postharvest Quality Management Of Jackfruit: A Review. Critical Reviews in Food Science and Nutrition, 2023(article in press), TBD. https://doi.org/10.1080/10408398.2023.2174947.
  • Shah, S., Singh, Z., Ul Hasan, M., Afrifa-Yamoah, E., Woodward, A. (2023). Preharvest melatonin application alleviates red drupelet reversion, improves antioxidant potential and maintains postharvest quality of ‘Elvira’ blackberry. Postharvest Biology and Technology, 203(2023), Article number 112418. https://doi.org/10.1016/j.postharvbio.2023.112418.
  • Shah, S., Singh, Z., Kaur, J., Mahmood Ul Hasan, H., Woodward, A., Afrifa-Yamoah, E. (2023). Trends in maintaining postharvest freshness and quality of Rubus berries. Comprehensive Reviews in Food Science and Food Safety, 2023(Article in press), 44 pages. https://doi.org/10.1111/1541-4337.13235.

Book Chapters

  • Baig, Z., Zeadally, S., Woodward, A. (2019). Information security. Authentication Technologies for Cloud Computing, IoT and Big Data (13-36). The Institution of Engineering and Technology. https://ro.ecu.edu.au/ecuworkspost2013/11323.

Journal Articles

  • Chernyshev, M., Zeadally, S., Baig, Z., Woodward, A. (2018). Internet of Things Forensics: The Need, Process Models, and Open Issues. IT Professional: technology solutions for the enterprise, 20(3), 40-49. https://doi.org/10.1109/MITP.2018.032501747.

Journal Articles

  • Chernyshev, M., Zeadally, S., Baig, Z., Woodward, A. (2017). Mobile Forensics: Advances, Challenges, and Research Opportunities. IEEE Security and Privacy Magazine, 15(6), 42-51. https://doi.org/10.1109/MSP.2017.4251107.
  • Carpene, C., Johnstone, M., Woodward, A. (2017). The Effectiveness of Classification Algorithms on IPv6 IID Construction. International Journal of Autonomous and Adaptive Communications Systems, 10(1), 15-22.

Conference Publications

  • Nisbet, A., Woodward, A. (2016). A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs. Information Security and Privacy: 21st Australasian Conference, ACISP 2016 (115-127). Springer. https://doi.org/10.1007/978-3-319-40253-6_7.

Journal Articles

  • Williams, T., Woodward, A. (2015). Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical Devices: Evidence and Research, 2015(8), 305-316. https://doi.org/10.2147/MDER.S50048.

Conference Publications

  • Woodward, A., Williams, T. (2015). An Uncomfortable Change: Shifting Perceptions to Establish Pragmatic Cyber Security. Recent Advances in Information and Communication Technology 2015. Proceedings of the 11th International Conference on Computing and Information Technology (ICCIT) (1-8). Springer. https://doi.org/10.1007/978-3-319-19024-2_1.
  • Valli, C., Rabadia, P., Woodward, A. (2015). A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law (23-32). Association of Digital Forensics, Security and Law.

Conference Publications

  • Valli, C., Woodward, A., Hannay, P., Johnstone, M. (2014). Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law (35-40). Association of Digital Forensics, Security and Law.
  • Carpene, C., Woodward, A. (2014). A Survey Of IPv6 Address Usage In The Public Domain Name System. The Proceedings of 12th Australian Information Security Management Conference (91-99). Security Research institute, Edith Cowan University. https://doi.org/10.4225/75/57b666d2343d8.

Conference Publications

  • Cusack, B., Woodward, A., Butson, S., Leber, B. (2013). The effectiveness of internet activity erasure tools to protect privacy. The Proceedings of the 11th Australian Information Security Management conference (35-41). Security Research Institute, Edith Cowan University.
  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M. (2013). Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference (42-48). Security Research Centre, Edith Cowan University.
  • Valli, C., Rabadia, P., Woodward, A. (2013). Patterns and Patter - An Investigation Into SSH Activity Using Kippo Honeypots. The Proceedings of 11th Australian Digital Forensics Conference (141-149). Security Research Centre, Edith Cowan University.
  • Johnstone, M., Woodward, A. (2013). Automated Detection of Vehicles with Machine Learning. Proceedings of the 11th Australian Information Security Management Conference (102-112). Security Research Centre, Edith Cowan University.

Conference Publications

  • Coole, M., Corkill, J., Woodward, A. (2012). Defence in depth, protection in depth and security in depth: A comparative analysis towards a common usage language. The Proceedings of the 5th Australian Security and Intelligence Conference (27-35). Security Research Centre, Edith Cowan University.
  • Carpene, C., Woodward, A. (2012). Exposing potential privacy issues with IPV6 address construction. The Proceedings of the 10th Australian Information Security Management Conference (44-50). Security Research Centre, Edith Cowan University.
  • Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C. (2012). Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference (54-60). Security Research Centre, Edith Cowan University.
  • Coole, M., Woodward, A., Valli, C. (2012). Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems. The Proceedings of the 5th Australian Security and Intelligence Conference (36-43). Security Research Centre, Edith Cowan University.
  • Johnstone, M., Woodward, A. (2012). Towards Effective Algorithms for Intelligent Defense Systems. LNCS 7672 - Cyberspace Safety and Security, 4th International Symposium, CSS 2012 (498-508). Springer. https://doi.org/10.1007/978-3-642-35362-8_37.

Conference Publications

  • Jacobson, E., Woodward, A. (2011). A longitudinal study of Wi-Fi access point security in the Perth Central Business District. Proceedings of The 9th Australian Information Security Management Conference (124-129). Security Research Centre, Edith Cowan University.
  • Pung, W., Woodward, A. (2011). Can Current Packet Analysis Software Detect BitTORRENT Activity or Extract Files From BTP and uTP Traffic Streams?. Proceedings of The 9th Australian Digital Forensics Conference (93-99). Security Research Centre, Edith Cowan University.
  • Brand, M., Valli, C., Woodward, A. (2011). A Threat to Cyber Resilience : A Malware Rebirthing Botnet. Proceedings of the 2nd International Cyber Resilience Conference (1-6). Security Research Centre, Edith Cowan University.
  • Valli, C., Woodward, A., Hannay, P. (2011). Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011 (191-195). Association of Digital Forensics, Security and Law.

Journal Articles

  • Brand, M., Valli, C., Woodward, A. (2010). Malware Forensics: Discovery of the Intent of Deception. Journal of Digital Forensics, Security and Law, 5(4), 31-42.

Conference Publications

  • Woodward, A., Valli, C. (2010). Which organisational model meets best practice criterion for critical infrastructure providers: An examination of the Australian perspective based on case studies.. Proceedings of The 2010 International Cyber Resilience Conference icr 2010 (118-125). Security Research Centre, Edith Cowan University.
  • Brand, M., Valli, C., Woodward, A. (2010). Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software.. The Proceedings of the 8th Australian Digital Forensics Conference (31-38). Security Research Centre, Edith Cowan University.
  • Cheng, TC., Woodward, A. (2010). An investigation into the efficacy of three erasure tools under Windows 7. The Proceedings of the 8th Australian Digital Forensics Conference (162-168). Security Research Centre, Edith Cowan University.
  • Pung, W., Woodward, A. (2010). Does the use of MIMO Technology used by 802.11n Reduce or Increase the Impact of Denial of Service Attacks?. The Proceedings of the 8th Australian Digital Forensics Conference (135-141). Security Research Centre, Edith Cowan University.

Journal Articles

  • Golygowski, LA., Woodward, A. (2009). Is it possible to use passive spectral characteristics of wireless network client devices for forensic identification purposes?. Journal of Network Forensics, 1(1), 1-15.

Conference Publications

  • Talbot, S., Woodward, A. (2009). Improving an Organisations Existing Information Technology Policy to Increase Security. Proceedings of the 7th Australian Information Security Management Conference (120-128). Centre for Security Research, Edith Cowan University.
  • Valli, C., Woodward, A. (2009). SCADA Security - Slowly Circling a Disaster Area. Proceedings of the 2009 International Conference on Security and Management (SAM 2009) (613-617). CSREA Press.
  • Woodward, A., Turner, B. (2009). When You Can’t See the Forest for the Domains: Why a Two Forest Model Should be Used to Achieve Logical Segregation Between SCADA and Corporate Networks. Proceedings of the 10th Australian Information Warfare and Security Conference (18-23). Centre for Security Research, Edith Cowan University.
  • Woodward, A. (2009). Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?. Proceedings of the 2009 International Conference on Security and Management (SAM'09) (622-627). CSREA Press.
  • Freeman, M., Woodward, A. (2009). Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives. Proceedings of the 7th Australian Digital Forensics Conference (33-41). Centre for Security Research, Edith Cowan University.
  • Hannay, P., Woodward, A. (2009). Firewire Forensics in Modern Operating Systems. Proceedings of the 2009 International Conference on Security and Management (SAM'09) (635-638). CSREA Press.
  • Freeman, M., Woodward, A. (2009). SmartPot - Creating a 1st Generation Smartphone Honeypot. Proceedings of the 7th Australian Digital Forensics Conference (25-32). Centre for Security Research, Edith Cowan University.

Conference Publications

  • Woodward, A., Valli, C. (2008). Issues Common to Australian Critical Infrastructure Providers Scada Networks Discovered Through Computer and Network Vulnerability Analysis.. Proceedings of the 6th Australian Digital Forensics Conference (204-208). Centre for Security Research, Edith Cowan University.
  • Valli, C., Woodward, A. (2008). The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues. Proceedings of the 6th Australian Digital Forensics Conference (211-214). Centre for Security Research, Edith Cowan University.
  • Hannay, P., Woodward, A. (2008). Cold Boot Memory Acquisition: An Investigation Into Memory Freezing and Data Retention Claims.. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (620-622). CSREA Press.
  • Woodward, A., Hannay, P. (2008). Forensic implications of using the firewire memory exploit with Microsoft Windows XP. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (593-597). CSREA Press.
  • Turner, B., Woodward, A. (2008). Network security isnt all fun and games: an analysis of information transmitted whilst playing Team Fortress 2. Proceedings of the 6th Australian Information Security Management Conference (138-144). Centre for Security Research, Edith Cowan University.
  • Woodward, A. (2008). What Artefacts do Current BitTorrent Clients Leave Behind?. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (608-613). CSREA Press.
  • Turner, B., Woodward, A. (2008). Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation. Proceedings of the 6th Australian Information Security Management Conference (130 - 137). Centre for Security Research, Edith Cowan University.

Conference Publications

  • Ng, D., Woodward, A. (2007). Implications for use of different encryption algorithms on power consumption for mobile devices in the healthcare industry. Conference on Security and Management (SAM 2007) (496-500). CSREA.
  • Hansen, P., Woodward, A. (2007). Network Security - Is IP Telephony helping the cause?. Proceedings of 5th Australian Information Security Management Conference (73-79). School of Computer and Information Science.
  • Valli, C., Woodward, A. (2007). Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks. Proceedings of 5th Australian Digital Forensics Conference (218-222). Edith Cowan University.
  • Woodward, A., Williams, T. (2007). Wireless Rx - Risk assessment and recommendations for securing a wireless network in a medical practice. Proceedings of the 2007 World Congress in Computer Science, Computer Engineering, and Applied Computing (501-505). CSREA Press.
  • James, P., Woodward, A. (2007). Securing VoIP - a framework to mitigate or manage risks. Proceedings of the 5th Australian Information Security Management Conference (103-115). School of Computer and Information Science.
  • Hilven, A., Woodward, A. (2007). How safe is Azeroth, or are MMORPGs a security risk?. Proceedings of the 5th Australian Information Security Management Conference (87-95). School of Computer and Information Science.
  • Hannay, P., Woodward, A., Cope, N. (2007). A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase 1 proof of concept. Proceedings of 5th Australian Digital Forensics Conference (178-183). School of Computer and Information Science.
  • Woodward, A., Valli, C. (2007). Do Current Erasure Programs Remove Evidence of BitTorrent Activity?. Proceedings of the Conference on Digital Forensics, Security and Law. (147-158). Association of Digital Forensics, Security and Law.

Journal Articles

  • Bennett, I., Woodward, A., Pusswonge, S. (2006). The effect of nitrogen source and concentration, medium pH and buffering on in vitro shoot growth and rooting in Eucalyptus marginata. Scientia Horticulturae, 110(2), 208-213.

Conference Publications

  • Woodward, A. (2006). BitLocker - the end of digital forensics?. Proceedings of the 4th Australian Digital Forensics Conference (90-97). Edith Cowan University.
  • Knights, L., Fonceca, M., Mack, G., Woodward, A. (2006). Risks and Responsibilities in Establishing a Wireless Network for an Educational Institution. Proceedings of the 4th Australian Information Security Conference (131-138). School of Computer and Information Science.
  • Woodward, A. (2006). LIARS: Laptop Inspector and Recovery System. Proceedings of the 4th Australian Digital Forensics Conference (84-89). Edith Cowan University.
  • Hadfield, A., Ahern, M., Sell, L., Woodward, A. (2006). A Methodology for the Examination of the Effectivness of Secure Erasure Tools Running on Windows XP - Research in Progress. Proceedings of the 4th Australian Digital Forensics Conference (11-17). School of Computer and Information Science.
  • Woodward, A. (2006). Data Security and wireless networks - mutually exclusive?. Proceedings of the 2006 International Conference on Security and Management (405-409). CSREA Press.
  • Crowley, M., Woodward, A. (2006). Does your wireless LAN have criminal intent?. Proceedings of the 4th Australian Information Security Conference (84-92). School of Computer and Information Science.

Journal Articles

  • Woodward, A., Bennett, I. (2005). The effect of salt stress and abscisic acid on proline production, chlorophyll content and growth of in vitro propagated shoots of Eucalyptus camaldulensis. Plant Cell, Tissue and Organ Culture, 82(2), 189-200. https://doi.org/10.1007/s11240-005-0515-4.

Conference Publications

  • Valli, C., Woodward, A., Wild, K., Karvinen, R. (2005). An investigation into long range detection of passive UHF RFID Tags. Proceedings of the 3rd Australian Computer, Network and Information Forensics Conference (84-86). School of Computer and Information Science, Edith Cowan University.
  • Woodward, A. (2005). Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations. Proceedings of the 3rd Australian Information Security Management Conference (133-140). ECU.
  • Woodward, A. (2005). WPA/WPA2: Placebo or Panacea?. Proceedings of the 6th Australian Information Warfare and Security Conference (157-164). Deakin University.
  • Woodward, A. (2005). The effectiveness of commercial erasure programs on BitTorrent activity. Proceedings of the 3rd Australian Computer, Network and Information Forensic Conference (108-114). ECU.
  • Williams, T., Woodward, A. (2005). Elicitation and customisation of generic skills in a security major. Developing Partnerships: Proceedings of the First Colloquium for Information Systems Security Education - Asia Pacific (CISSE-AP) (42-50). University of South Australia.

Journal Articles

  • Woodward, A. (2004). An analysis of current 802.11 wireless network layer one and two attacks and possible preventative measures. Journal of Information Warfare, 3(3), 37-47.

Conference Publications

  • Woodward, A. (2004). The risks, costs and possible solutions involved in setting up and running wireless local area networks. 2nd Australian Computer Network and Information Forensics Conference Proceedings (130-135). Edith Cowan University.
  • Woodward, A., Wolski, P. (2004). Sleep attack: Exploring a possible denial of service attack based on power save mode in 802.11 devices. 5th Australian Information Warfare and Security Conference Proceedings (181-185). Edith Cowan University.
  • Woodward, A. (2004). Wireless Jacks: An analysis of 802.11 wireless denial of service attacks and hijacks. Proceedings of the 3rd European Conference on Information Warfare and Security (365-370). Academic Conferences Ltd.

Research Projects

  • Investigating the control of fruit drop in mango to support solutions for northern Australian growers, CRC for Developing Northern Australia, Grant, 2022 ‑ 2026, $99,000.
  • Evaluation of selected clones of jackfruit (Artocarpus heterophyllus Lam.) produced in different preharvest settings, CRC for Developing Northern Australia, Grant, 2021 ‑ 2025, $112,500.
  • An investigation into privacy and cyber security elements for operational C-ITS, iMOVE Australia Limited, iMOVE CRC, 2024 ‑ 2025, $448,400.
  • 1.4 Network Forensics and Responses to Emerging Threats (R14-00270) , Cyber Security Research Centre Ltd, Postdoctoral Research Fellowship, 2022 ‑ 2024, $666,662.
  • Academic Centre of Cyber Security Excellence, Department of Education, Academic Centres of Cyber Security Excellence, 2017 ‑ 2021, $950,287.
  • Rules, Expectations and Security through Privacy-Enhanced Convenient Technologies (RESPECT) - Proposal No 285582, European Commission, Grant - Seventh Framework Programme (FP7), 2012 ‑ 2015, $223,800.
  • Authentication and Authorisation for Entrusted Unions (AU2EU), European Commission, Grant - Seventh Framework Programme (FP7), 2013 ‑ 2015, $83,371.
  • Scalable Measures for Automated Recognition Technologies (SMART), European Union, EU Seventh Framework Program, 2011 ‑ 2014, $389,772.
  • The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN), Griffith University, Grant - NIRAP, 2009 ‑ 2013, $37,139.
  • Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support For National Security, 2010 ‑ 2012, $77,154.
  • Overclocking of mechanical hard disk drives, Attorney General's D Branch, Attorney General's Department, D Branch Grant, 2011 ‑ 2012, $54,545.
  • Practical Information Security Capability Assessment Protocols for Application in the General Medical Practice Environment, Edith Cowan University, ECU Early Career Researcher - Grant, 2009 ‑ 2011, $24,502.
  • Leading edge developments in tourism ICT and related underlying technologies, CRC Centre for Sustainable Tourism, Grant, 2004, $17,000.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy, Ontology-Driven Artificial Intelligence-Powered Automation of Digital Forensic Investigations

Associate Supervisor

  • Doctor of Philosophy, Postharvest quality management of Rubus berries
  • Doctor of Philosophy, Regulations of fruit set and retention in mango (Mangifera indica L.)
  • Doctor of Philosophy, Maturity determination and postharvest quality management of jackfruit (Artocarpus heterophyllus Lam.)
  • Doctor of Philosophy, Mapping Identified Incompleteness in Knowledge-Graph Representations to Missing Artefacts for Digital Forensic Investigations involving Data Breaches and Cyber-Intrusions
  • Doctor of Philosophy, Pre- and postharvest interventions for regulating ripening, extending storage life, and maintaining quality of persimmon fruit

Principal Supervisor

  • Doctor of Philosophy, An investigation into off-link ipv6 host enumeration search techniques

Co-principal Supervisor

  • Doctor of Information Technology, A method for securing online community service: A study of selected Western Australian councils
  • Master of Science (Computer Science), An assessment of static and dynamic malware analysis techniques for the android platform
  • Doctor of Philosophy, .

Associate Supervisor

  • Doctor of Philosophy, Extraction of patterns in selected network traffic for a precise and efficient intrusion detection approach
  • Doctor of Philosophy, A non-device specific framework for the development of forensic locational data analysis procedure for consumer grade small and embedded devices
  • Doctor of Philosophy, Secure portable execution and storage environments: A capability to improve security for remote working
  • Doctor of Information Technology, Security awareness by online banking users in Western Australian of phishing attacks
  • Doctor of Philosophy, An investigation into factors inhibiting Australian end-users from utilising adsl router security effectively
  • Doctor of Philosophy, An intelligence model for terrorist incident prevention for Australian police: A systemic investigation
  • Doctor of Philosophy, An investigation into remote transactions.
  • Doctor of Philosophy, Vulnerabilities in class one electronic product code radio frequency identification systems
  • Doctor of Philosophy, The development of an attack graph using applied levels of deception for directing attack methods in a honeynet.
  • Doctor of Philosophy, Graduates' work readiness? Cybersecurity curriculum in Australian Universities
Skip to top of page