Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Professor Craig Valli

Director, ECU Security Research Institute

Contact Information Telephone: +61 8 6304 5109, Mobile: 0447 853 517, Email:, Campus: Joondalup, Room: JO23.306
Staff Member Details
Telephone: +61 8 6304 5109
Mobile: 0447 853 517
Campus: Joondalup  
Room: JO23.306  


Craig is the Director of the ECU Security Research Institute and Professor (Digital Forensics) within the School of Science.


Craig has over 25 years experience in the IT Industry and consults to industry and government on network security and digital forensics issues. His main research and consultancy is focussed on securing networks and critical infrastructures, detection of network borne threats and forensic analysis of cyber security incidents. Craig is a Fellow of the Australian Computer Society.

Professional Associations

  • Australian Computer Society
  • Australian Information Security Association 

Awards and Recognition

National and International Awards

  • 2010 WAITTA - IT Achiever of the Year Award
  • 2010 Inventor of the Year Award Finalist

Research Areas and Interests

  • Network Security and Forensics, Honeypots, Intrusion Detection Systems, Internet Misuse, Compute Clustering (Beowulf), Computer Forensics, Wireless Security and SCADA Security


  • Master, Edith Cowan University.
  • Bachelor of Education, Edith Cowan University.
  • Doctorate, Edith Cowan University, 2004.
  • Diploma of Teaching, Western Australian CAE, 1985.


Recent Research Grants

  • Internet of Things (IoT) ModBUS and BacNET,  Cisco Systems Australia Pty Ltd,  CISCO - Grant,  2016 - 2017,  $125,000.
  • Internet of Things (IoT),  Cisco Systems Australia Pty Ltd,  CISCO - Grant,  2016 - 2017,  $160,000.
  • Cyber,  City of Joondalup,  Grant,  2015 - 2016,  $16,740.
  • Authentication and Authorisation for Entrusted Unions (AU2EU),  European Commission,  Grant - Seventh Framework Programme (FP7),  2013 - 2015,  $584,907.
  • Rules, Expectations and Security through Privacy-Enhanced Convenient Technologies (RESPECT) - Proposal No 285582,  European Commission,  Grant - Seventh Framework Programme (FP7),  2012 - 2015,  $223,800.
  • Scalable Measures for Automated Recognition Technologies (SMART),  European Union,  EU Seventh Framework Program,  2011 - 2014,  $389,772.
  • Small Medium Enterprise Cyber Security Engagement (SMESEC) - Project Pilot,  City of Wanneroo,  Grant,  2013 - 2014,  $21,908.
  • The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN),  Griffith University,  Grant - NIRAP,  2009 - 2013,  $37,139.
  • CRC for Cyber Security (CyberCRC),  Department of Commerce,  Innovation Co-investment Program,  2013,  $707,833.
  • Transceiver Array for Optical Media,  Attorney-General - Commonwealth,  Grant,  2010 - 2012,  $293,091.
  • Review of Vulnerability in Smart Grid Appliances and Networks,  Department of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2010 - 2012,  $77,154.
  • Overclocking of mechanical hard disk drives,  Attorney General's D Branch,  Attorney General's Department, D Branch Grant,  2011 - 2012,  $54,545.
  • Update on Investigation into RFID Threats and Vulnerabilities,  Department of the Prime Minister and Cabinet,  Grant - Research Support For National Security,  2010,  $10,000.
  • An evaluation of the vulnerabilities of RFID and their implications to the Australian Government sector,  Department of Defence,  Defence Signals Directorate - Grant,  2005 - 2006,  $25,000.
  • Research into the use of deception as a potentially legitimate policy in Commonwealth agencies,  Department of Defence,  Defence Signals Directorate - Grant,  2004 - 2005,  $39,000.

Recent Publications (within the last five years)

Journal Articles

  • Chernyshev, M., Valli, C., Hannay, P., (2016), On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers. IEEE Transactions on Information Forensics and Security, 11(3), 584 - 593, Piscataway, USA.

Conference Publications

  • Chernyshev, M., Valli, C., Hannay, P., (2016), Service set identifier geolocation for forensic purposes: Opportunities and challenges. Proceedings of the 49th Hawaii International Conference on System Sciences, Article no. 7427866, DOI: 10.1109/HICSS.2016.678.
  • Valli, C., Rabadia, P., Woodward, A., (2015), A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law, 23-32, Virginia, USA.
  • Rabadia, P., Valli, C., (2015), Analysis into developing accurate and efficient intrusion detection approaches. Proceedings of 13th Australian Digital Forensics Conference, 70-76, Perth, WA.
  • Heriyanto, A., Valli, C., Hannay, P., (2015), Comparison of live response, Linux memory extractor (lime) and mem tool for acquiring android's volatile memory in the malware incident. Proceedings of 13th Australian Digital Forensics Conference, 5-14, Perth, WA.
  • Ibrahim, A., Valli, C., (2015), Image Similarity using Dynamic Time Warping of Fractal Features. Proceedings of 13th Australian Digital Forensics Conference, 111-122, Perth, WA.
  • Thomas, T., Valli, C., (2015), Mapping the laws which apply to intercepting wireless communications in a Western Australian legal context. Proceedings of the 13th Australian Digital Forensics Conference, 22-36, Perth, WA.
  • Chernyshev, M., Valli, C., Hannay, P., (2015), 802.11 Tracking and Surveillance - A Forensic Perspective. Proceedings of the International Conference on Security and Management (SAM'15), 349-352.
  • Valli, C., Martinus, I., Johnstone, M., (2014), Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business. Proceedings of the 2014 International Conference on Security and Management, 71-75.
  • Rabadia, P., Valli, C., (2014), Finding evidence of wordlists being deployed against SSH Honeypots - implications and impacts. Proceedings of 12th Australian Digital Forensics Conference, 114-121, Perth, W.A..
  • Valli, C., Woodward, A., Hannay, P., Johnstone, M., (2014), Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law, 35-40, Virginia, USA.
  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M., (2013), Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference, 42-48, Perth, Western Australia.
  • Valli, C., Rabadia, P., Woodward, A., (2013), Patterns and Patter - An Investigation Into SSH Activity Using Kippo Honeypots. The Proceedings of 11th Australian Digital Forensics Conference, 141-149, Edith Cowan University.
  • Valli, C., (2012), SSH -- Somewhat Secure Host. LNCS 7672 - Cyberspace Safety and Security, 4th International Symposium, CSS 2012, 227-235, Melbourne, DOI: 10.1007/978-3-642-35362-8.
  • Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C., (2012), Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference, 54-60, Perth, Western Australia.
  • Coole, M., Woodward, A., Valli, C., (2012), Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems. The Proceedings of the 5th Australian Security and Intelligence Conference, 36-43, Perth, Western Australia.
  • Limwiriyakul, S., Valli, C., (2011), An IT Security Investigation into the Online Payment Systems of Selected Local Government Councils in WA. Proceedings of the 2011 International Conference on Security & Management, 598-604, USA.
  • Brand, M., Valli, C., Woodward, A., (2011), A Threat to Cyber Resilience : A Malware Rebirthing Botnet. Proceedings of the 2nd International Cyber Resilience Conference, 1(1-2 August), 1-6, Perth, WA.
  • Valli, C., Woodward, A., Hannay, P., (2011), Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011, 191-195, Richmond, Virginia, USA.

Research Student Supervision

Principal Supervisor

  • Doctor of Information Technology,  A Method For Securing Online Community Service: A Study Of Selected Western Australian Councils
  • Doctor of Philosophy,  An Investigation Into Remote Transactions.
  • Doctor of Philosophy,  The Development Of An Attack Graph Using Applied Levels Of Deception For Directing Attack Methods In A Honeynet.
  • Doctor of Information Technology,  Security Awareness By Online Banking Users In Western Australian Of Phishing Attacks
  • Doctor of Philosophy,  .
  • Doctor of Information Technology,  A Forensics Framework And Method In The Acquisition And Extraction Of Data From Nand Flash Memory Storage Chip
  • Doctor of Philosophy,  Secure Portable Execution And Storage Environments: A Capability To Improve Security For Remote Working
  • Doctor of Philosophy,  An Investigation Into Factors Inhibiting Australian End-users From Utilising Adsl Router Security Effectively
  • Doctor of Philosophy,  Blind Steganalysis Using Fractal Features
  • Master of Science (Computer Science),  Audit Trails And Organisational Barriers.

Co-principal Supervisor

  • Doctor of Philosophy,  Mining Climate Data For Shire Level Wheat Yield Predictions In Western Australia

Associate Supervisor

  • Doctor of Philosophy,  An Investigation Into Off-link Ipv6 Host Enumeration Search Techniques
  • Doctor of Philosophy,  The Information Strategy Requirements Of The Unit States Government From 2004 Onwards.
  • Doctor of Philosophy,  An Intelligence Model For Terrorist Incident Prevention For Australian Police: A Systemic Investigation
  • Doctor of Philosophy,  An Investigation Into Electronic Information Security In General Practice.
Skip to top of page