Top of page
Global Site Navigation

School of Science

Local Section Navigation

Help us improve our content by rating this page.

Page rating system

Please leave a comment about your rating so we can better understand how we might improve the page.

You are here: Main Content

Associate Professor Mike Johnstone

Associate Professor

Contact Information Telephone: +61 8 6304 6615, Email:, Campus: Joondalup, Room: JO18.318
Staff Member Details
Telephone: +61 8 6304 6615
Facsimile: +61 8 9370 6100
Campus: Joondalup  
Room: JO18.318  


Mike is an Associate Professor within the School of Science and a member of the ECU Security Research Institute.


  • Bachelor of Applied Science, Western Australian Institute of Technology.
  • Doctor of Philosophy, Curtin University of Technology.
  • Master of Science, Curtin University of Technology.
  • Post Grad Diploma, Curtin University of Technology.


Recent Research Grants

  • Academic Centre of Cyber Security Excellence,  Department of Education and Training,  Academic Centres of Cyber Security Excellence,  2017 - 2021,  $950,288.
  • Vulnerabilities in Ship Control Systems,  Defence Science and Technology Group of the Department of Defence,  Grant,  2017 - 2018,  $400,000.
  • Authentication and Authorisation for Entrusted Unions (AU2EU),  European Commission,  Grant - Seventh Framework Programme (FP7),  2013 - 2015,  $584,907.

Recent Publications (within the last five years)

Journal Articles

  • Crowley, M., Johnstone, M., (2016), Protecting corporate intellectual property: Legal and technical approaches. Business Horizons, 59(6), 623 - 633, Indiana, USA, DOI: 10.1016/j.bushor.2016.08.004.
  • Johnstone, M., (2014), Cloud security meets telemedicine. Electronic Journal of Health Informatics, 8(2), Article No. e14.
  • Ahmad, P., Brogan, M., Johnstone, M., (2014), The E-book Power User in Academic and Research Libraries: Deep Log Analysis and User Customisation. Australian Academic and Research Libraries, 45(1), 35-47, DOI: 10.1080/00048623.2014.885374.
  • Johnstone, M., (2013), Embedding Secure Programming in the Curriculum: Some Lessons Learned. International Journal of Engineering and Technology, 5(2), 287-290, Singapore, DOI: 10.7763/IJET.2013.V5.560.
  • Johnstone, M., Jarvis, J., (2012), On the Effectiveness of Intrusions into ZigBee-based Wireless Sensor Networks. Journal of Network Forensics, 4(1), 27-39, Perth, Australia.

Conference Publications

  • Feroze, M., Baig, Z., Johnstone, M., (2016), A Two-Tiered User Feedback-based Approach for Spam Detection. Proceedings of the 10th International Conference on Systems and Networks Communications, 12-17.
  • Bettany, B., Johnstone, M., Peacock, M., (2016), An investigation of potential wireless security issues in traffic lights. The Proceedings of 14th Australian Information Security Management Conference, 76-82, online only.
  • Johnstone, M., Baig, Z., Hannay, P., Carpene, C., Feroze, M., (2016), Controlled Android Application Execution for the IoT Infrastructure. Internet of Things: Second International Summit, IoT 360? 2015 Revised Selected Papers, Part I, 169(26-27 Oct 2015), 16-26, Cham, Switzerland, DOI: 10.1007/978-3-319-47063-4_2.
  • Shanley, A., Johnstone, M., (2015), Selection of penetration testing methodologies: a comparison and evaluation. The Proceedings of the 13th Australian Information Security Management Conference, 65-72, Perth, W.A..
  • Johnstone, M., Peacock, M., Den Hartog, J., (2015), Timing attack detection on Bacnet via a machine learning approach. The Proceedings of the 13th Australian Information Security Management Conference, 57-64, Perth, Western Australia.
  • Ayed, DF., Camenisch, J., Ignatenko, T., Johnstone, M., Koster, P., Lange, B., Petkovic, M., Sommer, D., Zic, J., (2014), Authentication and authorisation in entrusted unions. Proc. 12th Australian Information Security Management Conference, 56-63, Perth, W.A..
  • Valli, C., Woodward, A., Hannay, P., Johnstone, M., (2014), Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law, 35-40, Virginia, USA.
  • Crowley, M., Johnstone, M., (2014), I remember Richelieu: Is anything secure anymore?. The Proceedings of 7th Australian Security and Intelligence Conference, 27 - 32, Perth, W.A..
  • Valli, C., Martinus, I., Johnstone, M., (2014), Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business. Proceedings of the 2014 International Conference on Security and Management, 71-75.
  • Peacock, M., Johnstone, M., (2014), An analysis of security issues in building automation systems.  The Proceedings of 12th Australian Information Security Management Conference, 100-104, Perth, W.A..
  • Thompson, R., Johnstone, M., (2013), Security aspects of military sensor-based defence systems. 2013 IEEE International Conference on Trust, Security and Privacy in Computing and Communication Systems, 302 - 309 , Melbourne, Australia, DOI: 10.1109/TrustCom.2013.277.
  • Johnstone, M., Woodward, A., (2013), Automated Detection of Vehicles with Machine Learning. Proceedings of the 11th Australian Information Security Management Conference, 102-112, Perth, Western Australia.
  • Peacock, M., Johnstone, M., (2013), Towards detection and control of civilian unmanned aerial vehicles. The Proceedings of 14th Australian Information Warfare Conference, 9-15, Perth.
  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M., (2013), Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference, 42-48, Perth, Western Australia.
  • Johnstone, M., Woodward, A., (2012), Towards Effective Algorithms for Intelligent Defense Systems. Cyberspace Safety and Security: The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), 498-508, Heidelberg, DOI: 10.1007/978-3-642-35362-8.
  • Johnstone, M., (2012), Cloud security: A case study in telemedicine. The Proceedings of the 1st Australian eHealth Informatics and Security Conference, 42-48, Perth, Western Australia.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy,  A Model For Systematically Investigating Relationships Between Variables That Affect The Performance Of Novice Programmers.

Co-principal Supervisor

  • Doctor of Philosophy,  Human Factors And Cultural Influences In Implementing Agile Philosophy And Agility In Global Software Development.
  • Doctor of Philosophy,  E-book Adoption In Academic And Research Libraries
  • Doctor of Philosophy,  Pictures In Words: Indexing, Folksonomy And Representation Of Subject Content In Historic Photographs.

Associate Supervisor

  • Doctor of Philosophy,  Mining Climate Data For Shire Level Wheat Yield Predictions In Western Australia
  • Doctor of Philosophy,  Blind Steganalysis Using Fractal Features
  • Doctor of Philosophy,  An Investigation Into Off-link Ipv6 Host Enumeration Search Techniques
Skip to top of page