Top of page
Global Site Navigation

School of Computer and Security Science

Local Section Navigation
You are here:
ECU is currently converting this web content to a more mobile friendly format. If you find the content below is not formatting correctly during this transition please view on desktop browser.
Main Content

News and events

ECU tech project take on the best in Australia

Monday, 06 July 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 07

Two ECU ICT projects will represent WA at the national iAwards later this year after being named state finalists at the prestigious WAiTTA Incite Awards.

Generation “Like”: Social media and the implications for privacy and identify theft

Tuesday, 16 June 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 06

Karen Stones will present a SIG Seminar on 31 July in which she will discuss social media and privacy and the potential for identity theft.

Cyber Security of Critical Infrastructure: Are our traffic lights at risk?

Sunday, 14 June 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 06

Dr Mike Johnstone will present a SIG Seminar on 7 July in which he examines the potential for cyber-attack on the systems that control traffic lights, highlighting key risks and suggest mitigation strategies against this form of cyber-attack.

Analysing Network Traffic through Artificial Intelligence

Tuesday, 19 May 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 05


Dr Zubair Baig will present a SIG Seminar on 16 June that explores Intrusion Detection Systems and the role of Artificial Intelligence in protecting corporate networks and resources.

Terrorists use marketing skills to attract new recruits online

Thursday, 14 May 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 05

Terrorist organisations are increasingly using marketing techniques to recruit and radicalise Australians online writes Dr Robyn Torok.

2001::/8 An address space oddity: The current state of security in IPv6

Monday, 11 May 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 05

Clinton Carpene will present a SIG Seminar on 4 June looking at the history of IPv6, lesser and better known security issues with the protocol, and strategies to implement better IPv6 security.

Ruddock Fellowship

Tuesday, 28 April 2015 Schools > Computer and Security Science > News and events > School of Computer and Security Science > 2015 > 04

A new $5000 prize has given one ECU student the opportunity to gain valuable experience with Emirates in Dubai.

Drones and their influence on Privacy and Security

Wednesday, 22 April 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 05

Matthew Peacock will present a SIG Seminar on 25 May discussing recent advancements in civilian and commercial drones, impacts on personal security and privacy, and suggested mitigation strategies.

Challenges of NAND Flash memory technology forensics

Monday, 20 April 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 04

Krishnun Sansurooah will present a SIG Seminar on 15 May will discuss the forensic implications and challenges those in digital forensics now face with devices using NAND flash memory technology.

Data Analysis for Honey Pots'data - Integrating Weka Software into matlab for big data analysis

Tuesday, 07 April 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 03

Dr Jinsong Leng will present a SIG Seminar on 20 April explores new approaches and algorithms for big data analysis.

Patterns and Patter in SSH

Monday, 06 April 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 04

Priya Rabadia will present a SIG Seminar on 1 May in which she will discuss findings from a study conducted on the correlation between abnormal activities detected by an SSH honeypot and vulnerability releases using the CVE database.

eSafety is more than an interoperability problem: How mobile technology and medical devices can affect your health!

Monday, 23 March 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 03

Associate Professor Trish Williams will present a SIG Seminar on 16 April exploring the expanding and increasing complex integration of medical devices, healthcare software, and networks, and their impact on clinical and patient safety.

Where and When: Locational Forensics

Tuesday, 17 March 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 03

Peter Hannay will present a SIG Seminar on 31 March looking at a variety of consumer electronic devices and the means by which one can determine their historic locations.

Special Interest Group Seminars Semester 1, 2015

Tuesday, 03 March 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 03

Details of the Security Research Institute's Special Interest Group Seminars for Semester 1, 2015.

Honeypot Data Analysis

Monday, 23 February 2015 Schools > Computer and Security Science > News and events > ECU Security Research Institute > 2015 > 02

Dr Zubair Baig will present a SIG Seminar on 13 March discussing honeypots, techniques for data reduction, and common steps for analysis of the reduced data set.

Skip to top of page