ECU offers innovative and practical courses across a variety of disciplines and we have a vibrant research culture. ECU is a leader in developing alternative entry pathways to higher education.
We have three campuses in Western Australia. Joondalup and Mount Lawley in the Perth metropolitan area and our South West campus in Bunbury, 200km south of the Perth CBD.
ECU provides a variety of services and facilities that go beyond the classroom, with opportunities for personal development and social interaction for students and staff.
We collaborate with all types of businesses, including new start-ups, small to medium enterprises, not-for-profits, community organisations, government and large corporates in the resources sector.
Children's University Edith Cowan aims to inspire students between seven and fourteen to develop confidence and a love of learning through validated activities beyond the school curriculum.
The Inspiring Minds scholarship program are equity scholarships that give students an opportunity to access an education that may otherwise be out of reach.
Kaur, J., Singh, Z., Mazhar, MM., Afrifa-Yamoah, E., Woodward, A. (2024). Variability in fruit quality traits of tropical Australian jackfruit (Artocarpus heterophyllus Lam.) genotypes. Scientia Horticulturae, 338(Article in press), Article number 113771. https://doi.org/10.1016/j.scienta.2024.113771.
Mahmood Ul Hasan, H., Singh, Z., Shah, S., Kaur, J., Woodward, A. (2024). Water Loss: A Postharvest Quality Marker in Apple Storage. Food and Bioprocess Technology, 2024(Article in press), TBD. https://doi.org/10.1007/s11947-023-03305-9.
Shah, S., Singh, Z., Ul Hasan, M., Woodward, A., Afrifa-Yamoah, E. (2024). Preharvest methyl jasmonate application delays cell wall degradation and upregulates phenolic metabolism and antioxidant activities in cold stored raspberries. Food Chemistry, 462(Article in press), Article number 141020. https://doi.org/10.1016/j.foodchem.2024.141020.
Shah, S., Singh, Z., Ul Hasan, M., Kaur, J., Afrifa-Yamoah, E., Woodward, A. (2024). Melatonin application suppresses oxidative stress and maintains fruit quality of cold stored ‘Esperanza’ raspberries by regulating antioxidant system. Postharvest Biology and Technology, 207(Article in press), Article number 112597. https://doi.org/10.1016/j.postharvbio.2023.112597.
Shah, S., Singh, Z., Ul Hasan, M., Kaur, J., Afrifa-Yamoah, E., Woodward, A. (2024). Methyl Jasmonate Application Downregulates Drupelet Reversion and Enhances Phenolic Biosynthesis and Antioxidant Potential of Blackberries. Journal of Plant Growth Regulation, 2024(Article in press), 14 pages. https://doi.org/10.1007/s00344-024-11499-1.
Ul Hasan, M., Singh, Z., Shah, S., Woodward, A., Afrifa-Yamoah, E. (2024). Methyl jasmonate advances fruit ripening, colour development, and improves antioxidant quality of ‘Yoho’ and ‘Jiro’ persimmon. Food Chemistry, 459(Article in press), Article number 140360. https://doi.org/10.1016/j.foodchem.2024.140360.
Kaur, J., Singh, Z., Mazhar, MS., Afrifa-Yamoah, E., Sangha, KK., Woodward, A. (2024). Mineral profiling of diverse genotypes of jackfruit (Artocarpus heterophyllus Lam.) grown in Australia. Journal of Food Composition and Analysis, 2024(Article in press), Article number 106599. https://doi.org/10.1016/j.jfca.2024.106599.
Mahmood Ul Hasan, H., Singh, Z., Shah, S., Kaur, J., Woodward, A., Afrifa-Yamoah, E., Malik, AU. (2023). Oxalic acid: A blooming organic acid for postharvest quality preservation of fresh fruit and vegetables. Postharvest Biology and Technology, 206(Article in press), Article number 112574. https://doi.org/10.1016/j.postharvbio.2023.112574.
Shah, S., Singh, Z., Afrifa-Yamoah, E., Mahmood Ul Hasan, H., Kaur, J., Woodward, A. (2023). Insight into the Role of Melatonin in Mitigating Chilling Injury and Maintaining the Quality of Cold- Stored Fruits and Vegetables. Food Reviews International, 2023(Article in press), 1-28. https://doi.org/10.1080/87559129.2023.2212042.
Kaur, J., Singh, Z., Shah, S., Mazhar, MS., Mahmood Ul Hasan, H., Woodward, A. (2023). Insights Into Phytonutrient Profile And Postharvest Quality Management Of Jackfruit: A Review. Critical Reviews in Food Science and Nutrition, 2023(article in press), TBD. https://doi.org/10.1080/10408398.2023.2174947.
Shah, S., Singh, Z., Ul Hasan, M., Afrifa-Yamoah, E., Woodward, A. (2023). Preharvest melatonin application alleviates red drupelet reversion, improves antioxidant potential and maintains postharvest quality of ‘Elvira’ blackberry. Postharvest Biology and Technology, 203(2023), Article number 112418. https://doi.org/10.1016/j.postharvbio.2023.112418.
Shah, S., Singh, Z., Kaur, J., Mahmood Ul Hasan, H., Woodward, A., Afrifa-Yamoah, E. (2023). Trends in maintaining postharvest freshness and quality of Rubus berries. Comprehensive Reviews in Food Science and Food Safety, 2023(Article in press), 44 pages. https://doi.org/10.1111/1541-4337.13235.
Baig, Z., Zeadally, S., Woodward, A. (2019). Information security. Authentication Technologies for Cloud Computing, IoT and Big Data (13-36). The Institution of Engineering and Technology. https://ro.ecu.edu.au/ecuworkspost2013/11323.
Chernyshev, M., Zeadally, S., Baig, Z., Woodward, A. (2018). Internet of Things Forensics: The Need, Process Models, and Open Issues. IT Professional: technology solutions for the enterprise, 20(3), 40-49. https://doi.org/10.1109/MITP.2018.032501747.
Chernyshev, M., Zeadally, S., Baig, Z., Woodward, A. (2017). Mobile Forensics: Advances, Challenges, and Research Opportunities. IEEE Security and Privacy Magazine, 15(6), 42-51. https://doi.org/10.1109/MSP.2017.4251107.
Carpene, C., Johnstone, M., Woodward, A. (2017). The Effectiveness of Classification Algorithms on IPv6 IID Construction. International Journal of Autonomous and Adaptive Communications Systems, 10(1), 15-22.
Nisbet, A., Woodward, A. (2016). A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs. Information Security and Privacy: 21st Australasian Conference, ACISP 2016 (115-127). Springer. https://doi.org/10.1007/978-3-319-40253-6_7.
Williams, T., Woodward, A. (2015). Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical Devices: Evidence and Research, 2015(8), 305-316. https://doi.org/10.2147/MDER.S50048.
Conference Publications
Woodward, A., Williams, T. (2015). An Uncomfortable Change: Shifting Perceptions to Establish Pragmatic Cyber Security. Recent Advances in Information and Communication Technology 2015. Proceedings of the 11th International Conference on Computing and Information Technology (ICCIT) (1-8). Springer. https://doi.org/10.1007/978-3-319-19024-2_1.
Valli, C., Rabadia, P., Woodward, A. (2015). A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law (23-32). Association of Digital Forensics, Security and Law.
Valli, C., Woodward, A., Hannay, P., Johnstone, M. (2014). Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law (35-40). Association of Digital Forensics, Security and Law.
Carpene, C., Woodward, A. (2014). A Survey Of IPv6 Address Usage In The Public Domain Name System. The Proceedings of 12th Australian Information Security Management Conference (91-99). Security Research institute, Edith Cowan University. https://doi.org/10.4225/75/57b666d2343d8.
Cusack, B., Woodward, A., Butson, S., Leber, B. (2013). The effectiveness of internet activity erasure tools to protect privacy. The Proceedings of the 11th Australian Information Security Management conference (35-41). Security Research Institute, Edith Cowan University.
Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M. (2013). Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference (42-48). Security Research Centre, Edith Cowan University.
Valli, C., Rabadia, P., Woodward, A. (2013). Patterns and Patter - An Investigation Into SSH Activity Using Kippo Honeypots. The Proceedings of 11th Australian Digital Forensics Conference (141-149). Security Research Centre, Edith Cowan University.
Johnstone, M., Woodward, A. (2013). Automated Detection of Vehicles with Machine Learning. Proceedings of the 11th Australian Information Security Management Conference (102-112). Security Research Centre, Edith Cowan University.
Coole, M., Corkill, J., Woodward, A. (2012). Defence in depth, protection in depth and security in depth: A comparative analysis towards a common usage language. The Proceedings of the 5th Australian Security and Intelligence Conference (27-35). Security Research Centre, Edith Cowan University.
Carpene, C., Woodward, A. (2012). Exposing potential privacy issues with IPV6 address construction. The Proceedings of the 10th Australian Information Security Management Conference (44-50). Security Research Centre, Edith Cowan University.
Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C. (2012). Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference (54-60). Security Research Centre, Edith Cowan University.
Coole, M., Woodward, A., Valli, C. (2012). Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems. The Proceedings of the 5th Australian Security and Intelligence Conference (36-43). Security Research Centre, Edith Cowan University.
Johnstone, M., Woodward, A. (2012). Towards Effective Algorithms for Intelligent Defense Systems. LNCS 7672 - Cyberspace Safety and Security, 4th International Symposium, CSS 2012 (498-508). Springer. https://doi.org/10.1007/978-3-642-35362-8_37.
Jacobson, E., Woodward, A. (2011). A longitudinal study of Wi-Fi access point security in the Perth Central Business District. Proceedings of The 9th Australian Information Security Management Conference (124-129). Security Research Centre, Edith Cowan University.
Pung, W., Woodward, A. (2011). Can Current Packet Analysis Software Detect BitTORRENT Activity or Extract Files From BTP and uTP Traffic Streams?. Proceedings of The 9th Australian Digital Forensics Conference (93-99). Security Research Centre, Edith Cowan University.
Brand, M., Valli, C., Woodward, A. (2011). A Threat to Cyber Resilience : A Malware Rebirthing Botnet. Proceedings of the 2nd International Cyber Resilience Conference (1-6). Security Research Centre, Edith Cowan University.
Valli, C., Woodward, A., Hannay, P. (2011). Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011 (191-195). Association of Digital Forensics, Security and Law.
Brand, M., Valli, C., Woodward, A. (2010). Malware Forensics: Discovery of the Intent of Deception. Journal of Digital Forensics, Security and Law, 5(4), 31-42.
Conference Publications
Woodward, A., Valli, C. (2010). Which organisational model meets best practice criterion for critical infrastructure providers: An examination of the Australian perspective based on case studies.. Proceedings of The 2010 International Cyber Resilience Conference icr 2010 (118-125). Security Research Centre, Edith Cowan University.
Brand, M., Valli, C., Woodward, A. (2010). Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software.. The Proceedings of the 8th Australian Digital Forensics Conference (31-38). Security Research Centre, Edith Cowan University.
Cheng, TC., Woodward, A. (2010). An investigation into the efficacy of three erasure tools under Windows 7. The Proceedings of the 8th Australian Digital Forensics Conference (162-168). Security Research Centre, Edith Cowan University.
Pung, W., Woodward, A. (2010). Does the use of MIMO Technology used by 802.11n Reduce or Increase the Impact of Denial of Service Attacks?. The Proceedings of the 8th Australian Digital Forensics Conference (135-141). Security Research Centre, Edith Cowan University.
Golygowski, LA., Woodward, A. (2009). Is it possible to use passive spectral characteristics of wireless network client devices for forensic identification purposes?. Journal of Network Forensics, 1(1), 1-15.
Conference Publications
Talbot, S., Woodward, A. (2009). Improving an Organisations Existing Information Technology Policy to Increase Security. Proceedings of the 7th Australian Information Security Management Conference (120-128). Centre for Security Research, Edith Cowan University.
Valli, C., Woodward, A. (2009). SCADA Security - Slowly Circling a Disaster Area. Proceedings of the 2009 International Conference on Security and Management (SAM 2009) (613-617). CSREA Press.
Woodward, A., Turner, B. (2009). When You Can’t See the Forest for the Domains: Why a Two Forest Model Should be Used to Achieve Logical Segregation Between SCADA and Corporate Networks. Proceedings of the 10th Australian Information Warfare and Security Conference (18-23). Centre for Security Research, Edith Cowan University.
Woodward, A. (2009). Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?. Proceedings of the 2009 International Conference on Security and Management (SAM'09) (622-627). CSREA Press.
Freeman, M., Woodward, A. (2009). Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives. Proceedings of the 7th Australian Digital Forensics Conference (33-41). Centre for Security Research, Edith Cowan University.
Hannay, P., Woodward, A. (2009). Firewire Forensics in Modern Operating Systems. Proceedings of the 2009 International Conference on Security and Management (SAM'09) (635-638). CSREA Press.
Freeman, M., Woodward, A. (2009). SmartPot - Creating a 1st Generation Smartphone Honeypot. Proceedings of the 7th Australian Digital Forensics Conference (25-32). Centre for Security Research, Edith Cowan University.
Woodward, A., Valli, C. (2008). Issues Common to Australian Critical Infrastructure Providers Scada Networks Discovered Through Computer and Network Vulnerability Analysis.. Proceedings of the 6th Australian Digital Forensics Conference (204-208). Centre for Security Research, Edith Cowan University.
Valli, C., Woodward, A. (2008). The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues. Proceedings of the 6th Australian Digital Forensics Conference (211-214). Centre for Security Research, Edith Cowan University.
Hannay, P., Woodward, A. (2008). Cold Boot Memory Acquisition: An Investigation Into Memory Freezing and Data Retention Claims.. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (620-622). CSREA Press.
Woodward, A., Hannay, P. (2008). Forensic implications of using the firewire memory exploit with Microsoft Windows XP. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (593-597). CSREA Press.
Turner, B., Woodward, A. (2008). Network security isnt all fun and games: an analysis of information transmitted whilst playing Team Fortress 2. Proceedings of the 6th Australian Information Security Management Conference (138-144). Centre for Security Research, Edith Cowan University.
Woodward, A. (2008). What Artefacts do Current BitTorrent Clients Leave Behind?. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (608-613). CSREA Press.
Turner, B., Woodward, A. (2008). Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation. Proceedings of the 6th Australian Information Security Management Conference (130 - 137). Centre for Security Research, Edith Cowan University.
Ng, D., Woodward, A. (2007). Implications for use of different encryption algorithms on power consumption for mobile devices in the healthcare industry. Conference on Security and Management (SAM 2007) (496-500). CSREA.
Hansen, P., Woodward, A. (2007). Network Security - Is IP Telephony helping the cause?. Proceedings of 5th Australian Information Security Management Conference (73-79). School of Computer and Information Science.
Valli, C., Woodward, A. (2007). Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks. Proceedings of 5th Australian Digital Forensics Conference (218-222). Edith Cowan University.
Woodward, A., Williams, T. (2007). Wireless Rx - Risk assessment and recommendations for securing a wireless network in a medical practice. Proceedings of the 2007 World Congress in Computer Science, Computer Engineering, and Applied Computing (501-505). CSREA Press.
James, P., Woodward, A. (2007). Securing VoIP - a framework to mitigate or manage risks. Proceedings of the 5th Australian Information Security Management Conference (103-115). School of Computer and Information Science.
Hilven, A., Woodward, A. (2007). How safe is Azeroth, or are MMORPGs a security risk?. Proceedings of the 5th Australian Information Security Management Conference (87-95). School of Computer and Information Science.
Hannay, P., Woodward, A., Cope, N. (2007). A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase 1 proof of concept. Proceedings of 5th Australian Digital Forensics Conference (178-183). School of Computer and Information Science.
Woodward, A., Valli, C. (2007). Do Current Erasure Programs Remove Evidence of BitTorrent Activity?. Proceedings of the Conference on Digital Forensics, Security and Law. (147-158). Association of Digital Forensics, Security and Law.
Bennett, I., Woodward, A., Pusswonge, S. (2006). The effect of nitrogen source and concentration, medium pH and buffering on in vitro shoot growth and rooting in Eucalyptus marginata. Scientia Horticulturae, 110(2), 208-213.
Conference Publications
Woodward, A. (2006). BitLocker - the end of digital forensics?. Proceedings of the 4th Australian Digital Forensics Conference (90-97). Edith Cowan University.
Knights, L., Fonceca, M., Mack, G., Woodward, A. (2006). Risks and Responsibilities in Establishing a Wireless Network for an Educational Institution. Proceedings of the 4th Australian Information Security Conference (131-138). School of Computer and Information Science.
Woodward, A. (2006). LIARS: Laptop Inspector and Recovery System. Proceedings of the 4th Australian Digital Forensics Conference (84-89). Edith Cowan University.
Hadfield, A., Ahern, M., Sell, L., Woodward, A. (2006). A Methodology for the Examination of the Effectivness of Secure Erasure Tools Running on Windows XP - Research in Progress. Proceedings of the 4th Australian Digital Forensics Conference (11-17). School of Computer and Information Science.
Woodward, A. (2006). Data Security and wireless networks - mutually exclusive?. Proceedings of the 2006 International Conference on Security and Management (405-409). CSREA Press.
Crowley, M., Woodward, A. (2006). Does your wireless LAN have criminal intent?. Proceedings of the 4th Australian Information Security Conference (84-92). School of Computer and Information Science.
Woodward, A., Bennett, I. (2005). The effect of salt stress and abscisic acid on proline production, chlorophyll content and growth of in vitro propagated shoots of Eucalyptus camaldulensis. Plant Cell, Tissue and Organ Culture, 82(2), 189-200. https://doi.org/10.1007/s11240-005-0515-4.
Conference Publications
Valli, C., Woodward, A., Wild, K., Karvinen, R. (2005). An investigation into long range detection of passive UHF RFID Tags. Proceedings of the 3rd Australian Computer, Network and Information Forensics Conference (84-86). School of Computer and Information Science, Edith Cowan University.
Woodward, A. (2005). Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations. Proceedings of the 3rd Australian Information Security Management Conference (133-140). ECU.
Woodward, A. (2005). WPA/WPA2: Placebo or Panacea?. Proceedings of the 6th Australian Information Warfare and Security Conference (157-164). Deakin University.
Woodward, A. (2005). The effectiveness of commercial erasure programs on BitTorrent activity. Proceedings of the 3rd Australian Computer, Network and Information Forensic Conference (108-114). ECU.
Williams, T., Woodward, A. (2005). Elicitation and customisation of generic skills in a security major. Developing Partnerships: Proceedings of the First Colloquium for Information Systems Security Education - Asia Pacific (CISSE-AP) (42-50). University of South Australia.
Woodward, A. (2004). An analysis of current 802.11 wireless network layer one and two attacks and possible preventative measures. Journal of Information Warfare, 3(3), 37-47.
Conference Publications
Woodward, A. (2004). The risks, costs and possible solutions involved in setting up and running wireless local area networks. 2nd Australian Computer Network and Information Forensics Conference Proceedings (130-135). Edith Cowan University.
Woodward, A., Wolski, P. (2004). Sleep attack: Exploring a possible denial of service attack based on power save mode in 802.11 devices. 5th Australian Information Warfare and Security Conference Proceedings (181-185). Edith Cowan University.
Woodward, A. (2004). Wireless Jacks: An analysis of 802.11 wireless denial of service attacks and hijacks. Proceedings of the 3rd European Conference on Information Warfare and Security (365-370). Academic Conferences Ltd.
Research Projects
Investigating the control of fruit drop in mango to support solutions for northern Australian growers, CRC for Developing Northern Australia, Grant, 2022 ‑ 2026, $99,000.
Evaluation of selected clones of jackfruit (Artocarpus heterophyllus Lam.) produced in different preharvest settings, CRC for Developing Northern Australia, Grant, 2021 ‑ 2025, $112,500.
An investigation into privacy and cyber security elements for operational C-ITS, iMOVE Australia Limited, iMOVE CRC, 2024 ‑ 2025, $448,400.
1.4 Network Forensics and Responses to Emerging Threats (R14-00270) , Cyber Security Research Centre Ltd, Postdoctoral Research Fellowship, 2022 ‑ 2024, $666,662.
Academic Centre of Cyber Security Excellence, Department of Education, Academic Centres of Cyber Security Excellence, 2017 ‑ 2021, $950,287.
Rules, Expectations and Security through Privacy-Enhanced Convenient Technologies (RESPECT) - Proposal No 285582, European Commission, Grant - Seventh Framework Programme (FP7), 2012 ‑ 2015, $223,800.
Authentication and Authorisation for Entrusted Unions (AU2EU), European Commission, Grant - Seventh Framework Programme (FP7), 2013 ‑ 2015, $83,371.
Scalable Measures for Automated Recognition Technologies (SMART), European Union, EU Seventh Framework Program, 2011 ‑ 2014, $389,772.
The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN), Griffith University, Grant - NIRAP, 2009 ‑ 2013, $37,139.
Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support For National Security, 2010 ‑ 2012, $77,154.
Overclocking of mechanical hard disk drives, Attorney General's D Branch, Attorney General's Department, D Branch Grant, 2011 ‑ 2012, $54,545.
Practical Information Security Capability Assessment Protocols for Application in the General Medical Practice Environment, Edith Cowan University, ECU Early Career Researcher - Grant, 2009 ‑ 2011, $24,502.
Leading edge developments in tourism ICT and related underlying technologies, CRC Centre for Sustainable Tourism, Grant, 2004, $17,000.
Doctor of Philosophy, Ontology-Driven Artificial Intelligence-Powered Automation of Digital Forensic Investigations
Associate Supervisor
Doctor of Philosophy, Postharvest quality management of Rubus berries
Doctor of Philosophy, Regulations of fruit set and retention in mango (Mangifera indica L.)
Doctor of Philosophy, Maturity determination and postharvest quality management of jackfruit (Artocarpus heterophyllus Lam.)
Doctor of Philosophy, Mapping Identified Incompleteness in Knowledge-Graph Representations to Missing Artefacts for Digital Forensic Investigations involving Data Breaches and Cyber-Intrusions
Doctor of Philosophy, Pre- and postharvest interventions for regulating ripening, extending storage life, and maintaining quality of persimmon fruit
Doctor of Philosophy, An investigation into off-link ipv6 host enumeration search techniques
Co-principal Supervisor
Doctor of Information Technology, A method for securing online community service: A study of selected Western Australian councils
Master of Science (Computer Science), An assessment of static and dynamic malware analysis techniques for the android platform
Doctor of Philosophy, .
Associate Supervisor
Doctor of Philosophy, Extraction of patterns in selected network traffic for a precise and efficient intrusion detection approach
Doctor of Philosophy, A non-device specific framework for the development of forensic locational data analysis procedure for consumer grade small and embedded devices
Doctor of Philosophy, Secure portable execution and storage environments: A capability to improve security for remote working
Doctor of Information Technology, Security awareness by online banking users in Western Australian of phishing attacks
Doctor of Philosophy, An investigation into factors inhibiting Australian end-users from utilising adsl router security effectively
Doctor of Philosophy, An intelligence model for terrorist incident prevention for Australian police: A systemic investigation
Doctor of Philosophy, An investigation into remote transactions.
Doctor of Philosophy, Vulnerabilities in class one electronic product code radio frequency identification systems
Doctor of Philosophy, The development of an attack graph using applied levels of deception for directing attack methods in a honeynet.
Doctor of Philosophy, Graduates' work readiness? Cybersecurity curriculum in Australian Universities
Help us improve our content
Please leave a comment about your rating so we can better understand how we might improve the page.