Top of page
Global Site Navigation

ECU Security Research Institute - ECU Strategic Research Centre

Local Section Navigation
You are here: Main Content

Research themes and program

The research of the Institute is focused on the three essential elements of building and maintaining secure cyber enabled systems: hardware, software and human. The entity generates interdisciplinary research with multidisciplinary inputs from computer science, cyber security, psychology, education, health, law and AI principally. It should be noted that not all research in the Institute is cyber 10111011 centric psychology and education disciplines have the lead on several significant cyber security research projects.

The core research focii of the entity are the three research pillars of secure systems (SS), critical infrastructure security (CIS), and cyber enabled crime (CEC).

Secure Systems - is about investigating the cyber security of systems we use to power our lives and the economy. These means everything from legacy some of which are 30 years old supervisory control and data acquisition (SCADA) systems and operational technology (OT) systems. Through to the latest IT platforms, cloud environments and the Inernet of Things (IOT).

Critical infrastructure security - is about investigating the elements required to maintain and assure the cyber security of systems of the national critical infrastructure. These critical systems include but are not limited to energy, mining, water, ports and transportation. Protection of these elements are critical to the functioning of our modern society and our survival as a species on the planet.

Cyber enabled crime - is about investigating the who, what, where, when and why of cyber enabled crime. This theme will involve utilising existing strong core skills in digital forensics, cyber investigation, law, victim and offender psychology and AI to aid investigation of cyber-crimes. We have worked for over two decades with law enforcement and security agencies at a State, Federal and International level.

Critical Infrastructure Security

ECUs leadership in this area is evinced through the recent commercial spin off called Sapien Cyber. Sapien Cyber is an OT/SCADA security platform designed to protect these often arcane and fragile environments the underlying systems were developed by ECU.

SCADA/OT are the engine rooms of our industrial based economies, much of Australias key export industries rely 24/7 365 on the safe and secure operation of OT. It powers or drives core parts of our national economy these include mining, electricity, oil, gas, water, manufacturing, ports, airports, industrial processing, refinement and production of goods and any place where physical automation is used.

ECU has extensive purpose-built laboratories for SCADA research and training. These include but are not limited to specialist SCADA/OT, Wireless, MQTT, SDN facilities and network cyber ranges. ECU also provides consultancy and research to various critical infrastructure providers about their security and provides services such as penetration testing, vulnerability assessment and critical review of security projects.

ECU also has recently produced a realistic security operations centre (SOC) through a 2 million dollar investment in specialist infrastructure. This allows significant exploration of research into IoT, SCADA and IT incidence response and remediation.

  1. Syed, N., Baig, Z., Ibrahim, A., Valli, C., (2020), Denial of service attack detection through machine learning for the IoT. Journal of Information and Telecommunication, p.1-22, Taylor & Francis, DOI: https://doi.org/10.1080/24751839.2020.1767484.
  2. Yang, W., Johnstone, M., Sikos, L., Wang, S., (2020), Security and Forensics in the Internet of Things: Research Advances and Challenges. Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, 12-17, Piscataway, USA , Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/ETSecIoT50046.2020.00007.
  3. Peacock, M., Johnstone, M., Valli, C., (2018), An Exploration of Some Security Issues Within the BACnet Protocol. Information Systems Security and Privacy , 252–272, Heidelberg, Germany, Springer, DOI: https://doi.org/10.1007/978-3-319-93354-2_12.
  4. Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13, Oxon, United Kingdom, Elsevier Advanced Technology, DOI: 10.1016/j.diin.2017.06.015.
  5. Peacock, M., Johnstone, M. N., & Valli, C. (2017). Security Issues with BACnet Value Handling. Paper presented at the ICISSP2017 - 3rd International Conference on Information Systems Security and Privacy, Porto, Portugal.
  6. Murray, G., Johnstone, M., Valli, C., (2017), The convergence of IT and OT in critical infrastructure. Proceedings of the 15th Australian Information Security Management Conference, 149-155, Perth, WA, Edith Cowan University.
  7. Syed, N. F., Baig, Z. A., Valli, C., & Ibrahim, A. (2017). Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. Paper presented at the IEEE International Conference on Internet of Things (iThings), Exeter,UK.
  8. Valli, C., Peacock, M., Jones, A., & Johnstone, M. N. (2017). BACnet - Bridging the Cyber Physical Divide One HVAC at a Time. Paper presented at the
  9. Valli, C., Rabadia, P., & Woodward, A. (2015). A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Paper presented at the 2015 ADFSL Conference on Digital Forensics, Security and Law, Daytona Beach, Florida. http://proceedings.adfsl.org/index.php/CDFSL/article/view/127/123
  10. Johnstone, M., Peacock, M., Den Hartog, J., (2015), Timing attack detection on Bacnet via a machine learning approach. The Proceedings of the 13th Australian Information Security Management Conference, 57-64, Perth, Western Australia, Security Research Institute, Edith Cowan University.
  11. Valli, C., Rabadia, P., Woodward, A. (2013). Patterns and Patter - An Investigation into SSH Activity Using Kippo Honeypots. Paper presented at the 11th Australian Digital Forensics Conference, Perth, Western Australia. http://ro.ecu.edu.au/adf/129/
  12. Valli, C. (2009). The not so smart, smart grid - potential security risks associated with the deployment of smart grid technologies. Paper presented at the 7th Australian Digital Forensics Conference, Perth, Western Australia.
  13. Valli, C. (2009). Snort IDS for SCADA Networks. Paper presented at the Proceedings of the 2009 International Conference on Security and Management.
  14. Valli, C., & Woodward, A. (2009). SCADA Security - Slowly Circling a Disaster Area. Paper presented at the Proceedings of the 2009 International Conference on Security and Management
  15. Woodward, A., & Valli, C. (2008). Issues common to Australian critical infrastructure providers SCADA networks discovered through computer and network vulnerability analysis. Paper presented at the 6th Australian Digital Forensics Conference, Edith Cowan University, Mount Lawley, Western Australia.
  1. Honeypot Deployment Architecture, Cyber Security Cooperative Research Centre, Cyber Security Research Centre Ltd, 2019 - 2021, $130,000
  2. Power Honeynet Development Pilot Research and Development Project, Western Power, Western Power - Grant, 2020, $35,000.
  3. Power Honeynet Development Pilot Research and Development Project, Horizon Power, Grant, 2020, $35,000.
  4. Vulnerabilities in Ship Control Systems, Defence Science and Technology Group of the Department of Defence, Grant, 2017 - 2018, $400,000
  5. Internet of Things (IoT) ModBUS and BacNET, Cisco Systems Australia Pty Ltd, CISCO - Grant, 2015 - 2018, $125,000
  6. Internet of Things (IoT), Cisco Systems Australia Pty Ltd, CISCO - Grant, 2016 - 2017, $160,000
  7. Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support for National Security, 2010 - 2012, $77,154.
  8. Update on Investigation into RFID Threats and Vulnerabilities, Department of the Prime Minister and Cabinet, Grant - Research Support for National Security, 2010, $10,000.
  1. Syed, Naeem (2020) PhD - IoT-MQTT based denial of service attack modelling and detection
  2. Peacock, Matthew (2019) PhD -Anomaly detection in bacnet/ip managed building automation systems
  3. McElroy, Tyson (2018) Honours, 1st Class - Anomaly Detection in Software Defined Supervisory Control and Data Acquisition (SD-SCADA) Networks
  4. Turner, Jack 2016) Honours, 1st Class - A Method for Evaluating the Efficacy of Network Protocol Fuzzing Tools

Cyber Enabled Crime

ECU has a worldwide reputation in cybercrime. Cyber-crime is a national and international research priority. Two members of the ECUSRI Professor Craig Valli and Professor Andrew Woodward are members of the INTERPOL Cyber Crime Expert Group. Professor Valli is additionally a member of the INTERPOL Digital Forensics Expert Group. Locally ECUSRI collaborates with WA Government and contributes significantly to the state’s cyber security capability through provision of expertise to the Office of Digital Government, the Office of the Auditor General and WA Police aimed at reducing cyber crime. We also actively work with other WA government departments in improving their cyber security posture and making WA a bad place to be a cyber criminal.

We work very closely with the WA Police and this has been further cemented in place when WA Police Cybercrime and high-tech crime investigation squads co-located on campus in September 2020. ECU has been actively collaborating with WA Police since 2001 and with the WA Office of Auditor General since 2008.

We have specialised digital forensics capabilities and purposed built facilities. We do and have done forensic analysis of conventional IT systems, GPS, mobile devices, game consoles, network traffic, wireless devices, OT/SCADA devices, embedded devices and emergent IoT devices and new digital technologies.

We collaboratively worked with WA Police from 2006 to 2013 to develop a bootable triage tool for the forensic capturing of illegal images and files from desktop and laptop computer systems. This system was in the form of a bootable Linux based DVD or USB drive. The project was called Simple Image Preview Live Environment (SImPLE) and was widely used by WA Police during the period 2008 – 2015 to triage suspects computer systems.  It helped WA Police rapidly intercede in matters relating to child exploitation and allowed the entire police force with minimal training to acquire evidence for presentation in front a judge or justice of the peace when charges were preferred allowing significant predators to be placed into custody rather than being re-released to offend in the community.

ECU continues to provide material and research support to WA Police and other law enforcement and intelligence agencies.

  1. Yang, W., Johnstone, M., Sikos, L., Wang, S., (2020), Security and Forensics in the Internet of Things: Research Advances and Challenges. Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, 12-17, Piscataway, USA , Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/ETSecIoT50046.2020.00007.
  2. McAteer, I.,Ibrahim, A., Zheng, G., Yang, W., Valli, C., (2019), Integration of Biometrics and Steganography: A Comprehensive Review. Technologies, 7(2), Article no. 34, DOI: 10.3390/technologies7020034.
  3. Cabral, WZ., Valli, C., Sikos, L., Wakeling, S., (2019), Review and Analysis of Cowrie Artefacts and their Potential to be Used Deceptively. Proceedings of 6th Annual Conference on Computational Science & Computational Intelligence, 166-171, Piscataway, USA, Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/CSCI49370.2019.00035.
  4. Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13, Oxon, United Kingdom, Elsevier Advanced Technology, DOI: 10.1016/j.diin.2017.06.015.
  5. Chernyshev, M., Valli, C., Johnstone, M., (2017), Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. IEEE Transactions on Information Forensics and Security, 12(7), 1625-1636, IEEE Signal Processing Society, DOI: 10.1109/TIFS.2017.2678463.
  6. Rabadia, P., Valli, C., Ibrahim, A., Baig, Z., (2017), Analysis of attempted intrusions: Intelligence gathered from SSH honeypots. The Proceedings of 15th Australian Information Security Management Conference, 10p., Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a839e6d1d283.
  7. Bothur, D., Zheng, G., Valli, C., (2017), A critical analysis of security vulnerabilities and countermeasures in a smart ship system. The Proceedings of 15th Australian Information Security Management Conference, 81-87, Perth, Australia, Edith Cowan University.
  8. Chernyshev, M., Valli, C., Hannay, P., (2016), On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers. IEEE Transactions on Information Forensics and Security, 11(3), 584 - 593, Piscataway, USA, IEEE, DOI: 10.1109/TIFS.2015.2507542.
  9. Chernyshev, M., Valli, C., Hannay, P., (2016), Service set identifier geolocation for forensic purposes: Opportunities and challenges. Proceedings of the 49th Hawaii International Conference on System Sciences, Article no. 7427866, IEEE Computer Society, DOI: 10.1109/HICSS.2016.678.
  10. Valli, C., Rabadia, P., Woodward, A., (2015), A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law, 23-32, Virginia, USA, Association of Digital Forensics, Security and Law.
  11. Thomas, T., Valli, C., (2015), Mapping the laws which apply to intercepting wireless communications in a Western Australian legal context. Proceedings of the 13th Australian Digital Forensics Conference, 22-36, Perth, WA, ECU Security Research Institute.
  12. Chernyshev, M., Valli, C., Hannay, P., (2015), 802.11 Tracking and Surveillance - A Forensic Perspective. Proceedings of the International Conference on Security and Management (SAM'15), 349-352, WorldComp.
  13. Heriyanto, A., Valli, C., Hannay, P., (2015), Comparison of live response, Linux memory extractor (lime) and mem tool for acquiring android's volatile memory in the malware incident. Proceedings of 13th Australian Digital Forensics Conference, 5-14, Perth, WA, ECU Security Research Institute.
  14. Rabadia, P., Valli, C., (2015), Analysis into developing accurate and efficient intrusion detection approaches. Proceedings of 13th Australian Digital Forensics Conference, 70-76, Perth, WA, ECU Security Research Institute.
  15. Ibrahim, A., Valli, C., (2015), Image Similarity using Dynamic Time Warping of Fractal Features. Proceedings of 13th Australian Digital Forensics Conference, 111-122, Perth, WA, ECU Security Research Institute.
  16. Coole, M., Woodward, A., Valli, C (2012). Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems. Paper presented at the 5th Australian Security and Intelligence Conference, Perth, Western Australia.
  17. Brand, M. W., Valli,C. ,Woodward,A.J. (2010). Malware Forensics: Discovery of the Intent of Deception. Paper presented at the The Proceedings of the 8th Australian Digital Forensics Conference, Perth, Western Australia.
  18. Jones, A., & Valli, C. (2009). Building a Digital Forensic Laboratory (1st ed.). Burlington,MA: Butterworth-Heinemann and Syngress Publishing.
  19. Jones, A., Valli, C., Dardick, G. S., & Sutherland, I. (2009). The 2007 analysis of information remaining on disks offered for sale on the second hand market. International Journal of Liability and Scientific Enquiry, 2(1), 53 - 68.
  20. Valli, C., Jones, A., & Dabibi, G. (2009). The 2009 Analysis of Information Remaining on USB Storage Devices Offered for Sale on the second Hand Market. Paper presented at the Proceedings of The 7th Australian Digital Forensics Conference, Perth, Western Australia.
  21. Jones, A., Valli, C., Sutherland, I., & Dardick, G. (2008). The 2007 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. Journal of Digital Forensics, Security and Law, 3(1), 23-36.
  22. Valli, C. (2008). SIMPLE - Rethinking the monolithic approach to digital forensics. Paper presented at the 3rd Conference on Digital Forensics, Security and the Law, Oklahoma City, Oklahoma, USA.
  23. Valli, C., & Jones, A. (2008). A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans. Paper presented at the Proceedings of the 2008 International Conference on Security and Management, Las Vegas, Nevada.
  24. Valli, C., & Woodward, A. (2008). The 2008 Australian study of remnant data contained on 2nd hand hard disks:The saga continues. Paper presented at the 6th Australian Digital Forensics Conference, Edith Cowan University, Mount Lawley, Western Australia.
  25. Woodward, A., & Valli, C. (2007, April 18-20). Do Current Erasure Programs Remove Evidence of BitTorrent Activity? Paper presented at the Conference on Digital Forensics, Security and Law, Arlington, Virginia.
  26. Valli, C., & Woodward, A. (2007). Oops They Did it Again: Results of the 2007 Australian Remnant Hard Disk Study. Paper presented at the The 5th Australian Digital Forensics Conference, Edith Cowan University, Mount Lawley Campus, Western Australia.
  1. Drone Policy Review and Forensic Handbook, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 - 2020, $10,700.
  2. Anti-spear phishing by detecting Email Impersonation, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 - 2020, $10,700.
  3. Anti-Business Email Compromise, Cyber Security Research Centre, Summer Scholarship, 2019 - 2020, $10,700.
  4. Power Honeynet Development Pilot Research and Development Project, Western Power, Western Power - Grant, 2020, $35,000.
  5. Power Honeynet Development Pilot Research and Development Project, Horizon Power, Grant, 2020, $35,000.
  6. Password Hardening Tools, Cyber Security Research Centre, Sprint Student Grant, 2018 - 2019, $70,000.
  7. Vulnerabilities in Ship Control Systems, Defence Science and Technology Group of the Department of Defence, Grant, 2017 - 2018, $400,000.
  8. Overclocking of mechanical hard disk drives, Attorney General's D Branch, Attorney General's Department, D Branch Grant, 2011 - 2012, $54,545.
  9. Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support for National Security, 2010 - 2012, $77,154.

Secure Systems

This theme focuses on secure systems which is relatively broad in focus. It covers hardware and software, IT systems and systems of systems, cloud, embedded systems, operating systems, application systems and middleware. It also covers authentication, authorisation, monitoring, logging, auditing and implementation of cyber security countermeasures. There is also a large focus on the human factors or “wetware” the third element of any “system”. This includes cyber security education, psychology, health, law and business research. ECU has purpose built labs for secure systems research and also an abundance of infrastructure for use in research this includes traditional IT networks and infrastructure, SCADA/OT, IoT, Human Factors specific assets.

2020

  1. Johnstone, M., Peacock, M., (2020), Seven Pitfalls of Using Data Science in Cybersecurity. Data Science in Cybersecurity and Cyberthreat Intelligence, 115-129, Cham, Switzerland, Springer, DOI: 10.1007/978-3-030-38788-4_6.
  2. Brooks, D., Coole, M., Haskell-Dowland, P., (2020), Intelligent Building Systems: Security and Facility Professionals’ Understanding of System Threats, Vulnerabilities and Mitigation Practice. Security Journal, 33(2), 244–265, United Kingdom, Palgrave Macmillan Ltd., DOI: https://doi.org/10.1057/s41284-019-00183-9.
  3. Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P., (2020), A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data using Cooperative Co-Evolution. IEEE Access, 8(2020), 150113 - 150129, DOI: 10.1109/ACCESS.2020.3016679.
  4. Karie, N., Bin Sahri, NM., Haskell-Dowland, P., (2020), IoT Threat Detection Advances, Challenges and Future Directions. Proceedings 2020 Workshop on Emerging Technologies for Security in IoT ETSecIoT 2020 , 22-29, online, Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/ETSecIoT50046.2020.00009.
  5. Walling, L., Johnstone, M., Hannay, P., (2020), Information Warfare by Proxy: Malware in PLC Firmware. Conference Proceedings of the 18th Australian Cyber Warfare Conference 2019 (CWAR 2019), 57-61, Geelong, Victoria, Deakin University.
  6. Shanley, L., Johnstone, M., Crowley, M., Szewczyk, P., (2020), Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? Human Aspects of Information Security and Assurance, 3-15, Cham, Switzerland, Springer, DOI:
  7. Yang, W., Johnstone, M., Sikos, L., Wang, S., (2020), Security and Forensics in the Internet of Things: Research Advances and Challenges. Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, 12-17, Piscataway, USA , Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/ETSecIoT50046.2020.00007.
  8. Woodiss-Field, A., Johnstone, M., (2020), BotNets in the Internet of Things: The Next Wave. Conference Proceedings of the 18th Australian Cyber Warfare Conference 2019 (CWAR 2019), 41-45, Geelong, Victoria, Deakin University.
  9. Yang, W., Wang, S., Yu, K., Kang, J., Johnstone, M., (2020), Secure Fingerprint Authentication with Homomorphic Encryption. 2020 Digital Image Computing: Techniques and Applications, 6, Piscataway, New Jersey, United States, IEEE.
  10. Al Fahdi, H., Ahmed, M., (2020), Cryptographic Attacks, Impacts and Countermeasures. Security Analytics for Internet of Everything, 217-232, Boca Raton, United States of America, CRC Press.
  11. Seraj, R., Ahmed, M., (2020), Concept Drift for Big Data. Combating Security Challenges in the Age of Big Data, 29-43, Cham, Switzerland, Springer, DOI: https://doi.org/10.1007/978-3-030-35642-2_2.
  12. Furhad, MH., Sadik, S., Ahmed, M., Barkat, A., (2020), Exploring E-Commerce in Cyber Security Context Through Blockchain Technology. Blockchain in Data Analytics, 216-233, Newcastle upon Tyne, England, Cambridge Scholars Publishing.
  13. Chong, K., Ahmed, M., Islam, S., (2020), An Investigation of Performance Analysis of Machine Learning-Based Techniques for Network Anomaly Detection. Security Analytics for Internet of Everything , 117-156, Boca Raton, USA, CRC Press.
  14. Sadik, S., Ahmed, M., Hassan, MH., (2020), Blockchain in Healthcare. Blockchain in Data Analytics, 234-253, Newcastle upon Tyne, England, Cambridge Scholars Publishing.
  15. Saeed, M., Rashid, T., Ahmed, M., (2020), A Benefits Realization Approach to Cyber Security Projects Implementation in the Public Sector Organizations. Security Analytics for Internet of Everything , 93-114, Boca Raton, United States of America, CRC Press.
  16. Bostami, B., Ahmed, M., (2020), Blockchain for Internet of Things. Blockchain in Data Analytics, 24-51, Newcastle upon Tyne, England, Cambridge Scholars Publishing.
  17. Bostami, B., Ahmed, M., (2020), Deep Learning Meets Malware Detection: An Investigation. Combating Security Challenges in the Age of Big Data, 137-155, Cham, Switzerland, Springer, DOI: https://doi.org/10.1007/978-3-030-35642-2_7.
  18. Sadik, S., Ahmed, M., (2020), An Overview of Dark Web. Security Analytics for the Internet of Everything , 55-64, Boca Raton, United States of America, CRC Press.
  19. Ahmed, M., Islam, AK., (2020), Deep Learning: Hope or Hype. Annals of Data Science, 7(2020), 427–432, DOI: 10.1007/s40745-019-00237-0.
  20. *  Sadik, S., Ahmed, M., Sikos, L., Islam, AN., (2020), Toward a Sustainable Cybersecurity Ecosystem. Computers, 9(3), Basel, Switzerland, DOI: 10.3390/computers9030074.
  21. *  Ahmed, M., Pathan, M., (2020), False Data Injection Attack (FDIA): An Overview and New Metrics for Fair Evaluation of its Countermeasure. Complex Adaptive Systems Modeling, 8(1), Article number 4, DOI: 10.1186/s40294-020-00070-w.
  22. *  Ahmed, M., Pathan, AK., (2020), Blockchain: Can It Be Trusted?. Computer, 53(4), 31-35, DOI: 10.1109/MC.2019.2922950.
  23. Ahmed, M., Seraj, R., Islam, S., (2020), The k-means Algorithm: A Comprehensive Survey and Performance Evaluation. Electronics, 9(8), article number 1295, DOI: 10.3390/electronics9081295.

2019

  1. Yang, W., Wang, S., Zheng, G., Yang, J., Valli, C., (2019), A Privacy-Preserving Lightweight Biometric System for Internet-of-Things Security. IEEE Communications Magazine, 57(3), 84-89, DOI: 10.1109/MCOM.2019.1800378.
  2. Zheng, G., Yang, W., Valli, C., Shankaran, R., Abbas, H., Zhang, G., Fang, G., Chaudhry, J., Qiao, L., (2019), Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations. IEEE Access, 7(2019), 75629-75641, DOI: 10.1109/ACCESS.2019.2920850.
  3. Yang, W., Wang, S., Hu, J., Zheng, G., Yang, J., Valli, C., (2019), Securing Deep Learning Based Edge Finger-vein Biometrics with Binary Decision Diagram. IEEE Transactions on Industrial Informatics, 15(7), 4244-4253, IEEE, DOI: 10.1109/TII.2019.2900665.
  4. Yang, W., Wang, S., Zheng, G., Valli, C., (2019), Impact of feature proportion on matching performance of multi-biometric systems. ICT Express, 5(1), 37-40, DOI: 10.1016/j.icte.2018.03.001.
  5. McAteer, I., Ibrahim, A., Zheng, G., Yang, W., Valli, C., (2019), Integration of Biometrics and Steganography: A Comprehensive Review. Technologies, 7(2), Article no. 34, DOI: 10.3390/technologies7020034.
  6. Zheng, G., Yang, W., Valli, C., Qiao, L., Shankaran, R., Orgun, MA., Mukhopadhyay, SC., (2019), Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices. IEEE Journal of Biomedical and Health Informatics, 23(4), 1546-1557, IEEE, DOI: 10.1109/JBHI.2018.2864796.
  7. Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C., (2019), Security and Accuracy of Fingerprint-Based Biometrics: A Review. Symmetry, 11(2), article no.141, DOI: 10.3390/sym11020141.
  8. Yang, W., Wang, S., Hu, J., Ibrahim, A., Zheng, G., Macedo, M., Johnstone, M., Valli, C., (2019), A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things. Sensors, 19(13), article no.2985, DOI: https://doi.org/10.3390/s19132985.
  9. Zheng, G., Shankaran, R., Yang, W., Valli, C., Qiao, L., Orgun, M., Mukhopadhyay, SC., (2019), A Critical Analysis of ECG-based Key Distribution for Securing Wearable and Implantable Medical Devices. IEEE Sensors Journal, 19(3), 1186-1198, IEEE Sensors Council, DOI: 10.1109/JSEN.2018.2879929.
  10. Ellis, M., Thompson, G., Haskell-Dowland, P., (2019), From Model B To Micro:Bit – Teaching Computer Science. Proceedings of EDULEARN19 Conference, 2725-2731, online, IATED Academy, DOI: 10.21125/edulearn.2019.0744.
  11. Vasileiou, I., Haskell-Dowland, P., (2019), Addressing STEM Geek Culture Through Peer Learning. EDULEARN19 Proceedings, 5289-5293, online, IATED Academy, DOI: 10.21125/edulearn.2019.1298.
  12. Kang, J., Fahd, K., Venkatraman, S., Trujillo-Rausa, R., Haskell-Dowland, P., (2019), Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks. 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Article number 9077977, online, IEEE, DOI: 10.1109/ITNAC46935.2019.9077977.
  13. Bostami, B., Ahmed, M., Choudhury, S., (2019), False Data Injection Attacks in Internet of Things. Performability in Internet of Things, 47-58, Cham, Switzerland, Springer, DOI: 10.1007/978-3-319-93557-7.
  14. Ahmed, M., Choudhury, S., Al-Turjman, F., (2019), Big Data Analytics for Intelligent Internet of Things. Artificial Intelligence in IoT, 107-127, Cham, Switzerland, Springer, DOI: 10.1007/978-3-030-04110-6.
  15. Ahmed, M., (2019), Intelligent Big Data Summarization for Rare Anomaly Detection. IEEE Access, 7(2019), 68669-68677, DOI: 10.1109/ACCESS.2019.2918364.
  16. Aurisch, R., Ahmed, M., Barkat, A., (2019), An outlook at Agile methodologies for the independent games developer. International Journal of Computers and Applications, 1-7, Taylor & Francis, UK, DOI: 10.1080/1206212X.2019.1621463.
  17. Yang, J., Hasan Onik, MM., Lee, N., Ahmed, M., Kim, C., (2019), Proof-of-Familiarity: A Privacy-Preserved Blockchain Scheme for Collaborative Medical Decision-Making. Applied Sciences, 9(7), Article no.1370, DOI: 10.3390/app9071370
  18. Khandaker, S., Hussain, A., Ahmed, M., (2019), Effectiveness of Hard Clustering Algorithms for Securing Cyber Space. Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018 Proceedings, 256(July 11-11, 2018), 113-120, Cham, Switzerland, Springer, Cham, DOI: 10.1007/978-3-030-05928-6_11.
  19. Saeed, M., Ahmed, M., (2019), Evaluation Metrics for Big Data Project Management. Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018 Proceedings, 256(July 11-11, 2018), 139-142, Cham, Switzerland, Springer, DOI: 10.1007/978-3-030-05928-6_14.
  20. Ahmed, M., Pathan, AK., (2019), Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study. Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers, 969(Sep. 19-22, 2018), 211--219, Singapore, Springer, DOI: 10.1007/978-981-13-5826-5_15.
  21. Ahmed, M., Barkat, A., (2019), Performance Analysis of Hard Clustering Techniques for Big IoT Data Analytics. Proceedings - 2019 Cybersecurity and Cyber forensics Conference, CCC 2019, 62-66, Online, IEEE, DOI: 10.1109/CCC.2019.000-8.
  22. Speelman, C., Valli, C., Guidetti, O., (2019), Towards a Method for Examining the Effects of Cognitive Load on the Performance of Cyber First Responders. Proceedings of the International Conference on Security and Management (SAM), 41-47, Athens, Georgia, The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).

2018

  1. Yang, W., Wang, S., Zheng, G., Chaudhry, J., Valli, C., (2018), ECB4CI: An Enhanced Cancelable Biometric System for Securing Critical Infrastructures. Journal of Supercomputing, 74(10), 4893-4909, DOI: 10.1007/s11227-018-2266-0.
  2. Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C., (2018), A Fingerprint and Finger-vein Based Cancelable Multi-biometric System. Pattern Recognition, 78(June 2018), 242-251, DOI: 10.1016/j.patcog.2018.01.026.
  3. Ibrahim, A., Valli, C., McAteer, I., Chaudhry, J., (2018), A security review of local government using NIST CSF: a case study. Journal of Supercomputing, 74(10), 5171-5186, Springer, DOI: 10.1007/s11227-018-2479-2.
  4. Yang, W., Wang, S., Hu, J., Zheng, G., Chaudhry, J., Adi, E., Valli, C., (2018), Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem. IEEE Access, 6(26 January 2018), 9390-9403, IEEE, DOI: 10.1109/ACCESS.2018.2799522.
  5. Abrar, H., Hussain, S., Chaudhry, J., Saleem, K., Orgun, M., Al-Muhtadi, J., Valli, C., (2018), Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry. IEEE Access, 6(13 February 2018), 19140-19150, Institute of Electrical and Electronics Engineers Inc., DOI: 10.1109/ACCESS.2018.2805919.
  6. Valli, C., Johnstone, M., Fleming, R., (2018), A Survey of Lawyers’ Cyber Security Practises in Western Australia. Annual ADFSL Conference on Digital Forensics, Security and Law, 219-226, Florida, USA, Association of Digital Forensics, Security and Law.
  7. Ibrahim, A., Valli, C., McAteer, I., Chaudhry, J., (2018), A security review of local government using NIST CSF: a case study. Journal of Supercomputing, 74(10), 5171-5186, Springer, DOI: 10.1007/s11227-018-2479-2.
  8. Yang, W., Wang, S., Hu, J., Zheng, G., Chaudhry, J., Adi, E., Valli, C., (2018), Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem. IEEE Access, 6(26 January 2018), 9390-9403, IEEE, DOI: 10.1109/ACCESS.2018.2799522.
  9. Abrar, H., Hussain, S., Chaudhry, J., Saleem, K., Orgun, M., Al-Muhtadi, J., Valli, C., (2018), Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry. IEEE Access, 6(13 February 2018), 19140-19150, Institute of Electrical and Electronics Engineers Inc., DOI: 10.1109/ACCESS.2018.2805919.
  10. Yang, W., Zheng, G., Ibrahim, A., Chaudhry, J., Wang, S., Hu, J., Valli, C., (2018), Application of 3D Delaunay Triangulation in Fingerprint Authentication System. Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 235(13-15 December, 2017), 291-298, Springer, Cham, Springer, DOI: 10.1007/978-3-319-90775-8_23.
  11. Chaudhry, J., Farmand, S., Islam, S., Islam, MR., Hannay, P., Valli, C., (2018), Discovering trends for the development of novel authentication applications for dementia patients. International Conference on Applications and Techniques in Cyber Security and Intelligence, Applications and Techniques in Cyber Security and Intelligence, 580(16-18 June, 2017), 220-237, China, Springer, DOI: 10.1007/978-3-319-67071-3_29.
  12. Chaudhry, J., Valli, C., Crowley, M., Haass, J., Roberts, P., (2018), POStCODE Middleware for Post-Market Surveillance of Medical Devices for Cyber Security in Medical and Healthcare Sector in Australia. International Symposium on Medical Information and Communication Technology, ISMICT, 2018-March(26-28 March 2018), 10 p., Piscataway, NJ, IEEE Computer Society, DOI: 10.1109/ISMICT.2018.8573695.
  13. Chaudhry, J., Saleem, K., Haskell-Dowland, P., Miraz, M., (2018), A Survey of Distributed Certificate Authorities in MANETs. Annals of Emerging Technologies in Computing (AETiC), 2(3), 11-18, International Association of Educators and Researchers (IAER).
  14. Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2018), Continuous identity verification in cloud storage services using behavioural profiling. ECCWS 2018 17th European Conference on Cyber Warfare and Security, 10p..
  15. Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2018), Misuse Detection in a Simulated IaaS Environment. Emerging Technologies for Authorization and Authentication. ETAA 2018. Lecture Notes in Computer Science, 11263(7 Sept 2018), 103-115, Switzerland, Springer, DOI: 10.1007/978-3-030-04372-8_9.
  16. Mahmoud, N., Furnell, S., Haskell-Dowland, P., (2018), Design Principles and Guidelines for Targeted Security Awareness. Proceedings of the Annual Information Institute Conference, 18p., online, Information Institute.
  17. Greene, R., Johnstone, M., (2018), An investigation into a denial of service attack on an ethereum network. Australian Information Security Management Conference, 90-96, online, Security Research Institute, Edith Cowan University, DOI: 10.25958/5c526f0b6668b.
  18. Greene, R., Johnstone, M., (2018), Secure Smart Contract Supply Chains. Proceedings of 17th Australian Cyber Warfare Conference (CWAR), 6-17, Melbourne, Victoria, Deakin University Centre for Cyber Security Research and Innovation.
  19. Woodiss-Field, A., Johnstone, M., (2018), Towards a Method for Detecting Botnet Code on IoT Devices. The Proceedings of the 2018 Cyber Forensic & Security International Conference, pp. 30-34, Nuku’alofa, Kingdom of Tonga, Christ's University in Pacific.
  20.   Hassan, MM., Ahmed, M., (2018), Blockchain in the Era of Industry 4.0. Data Analytics Concepts, Techniques, and Applications, 235-273, Boca Raton, USA, CRC Press, DOI: 10.1201/9780429446177. nia, USA, Association of Digital Forensics, Security and Law.
  21. Ahmed, M., Ullah, A., (2018), False Data Injection Attacks in Healthcare. Data Mining. AusDM 2017. Communications in Computer and Information Science, vol 845, 845, , 192-202, Singapore, Springer, DOI: 10.1007/978-981-13-0292-3_12..

2017

  1. Alharbi, N., Papadaki, M., Haskell-Dowland, P., (2017), The impact of security and its antecedents in behaviour intention of using e-government services. Behaviour and Information Technology, 36(6), 620-636, Taylor & Francis, DOI: 10.1080/0144929X.2016.1269198.
  2. Korovessis, P., Furnell, S., Papadaki, M., Haskell-Dowland, P., (2017), A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2), article no.5, Kennesaw State University.
  3. Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F., (2017), Smart Watch based Body-Temperature Authentication. Proceedings of the IEEE International Conference on Computing, Networking and Informatics (ICCNI 2017), 7p., IEEE, DOI: 10.1109/ICCNI.2017.8123790.
  4. Macedo, M., Yang, W., Zheng, G., Johnstone, M., (2017), A Comparison of 2D and 3D Delaunay Triangulations for Fingerprint Authentication. The Proceedings of 15th Australian Information Security Management Conference, 108-115, Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a84f3ca95b4b.
  5. White, T., Johnstone, M., Peacock, M., (2017), An investigation into some security issues in the DDS messaging protocol. Proceedings of the 15th Australian Information Security Management Conference, 132-139, Perth, WA, Edith Cowan University.
  6. Carpene, C., Johnstone, M., Woodward, A., (2017), The Effectiveness of Classification Algorithms on IPv6 IID Construction. International Journal of Autonomous and Adaptive Communications Systems, 10(1), 15-22, Inderscience.
  7. Chaudhry, J., Saleem, K., Islam, R., Selamat, A., Ahmed, M., Valli, C., (2017), AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments. Proceedings 2017 IEEE 42nd Conference on Local Computer Networks Workshops, 121-127, IEEE, DOI: 10.1109/LCN.Workshops.2017.73.
  8. Rabadia, P., Valli, C., Ibrahim, A., Baig, Z., (2017), Analysis of attempted intrusions: Intelligence gathered from SSH honeypots. The Proceedings of 15th Australian Information Security Management Conference, 10p., Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a839e6d1d283.
  9. Zheng, G., Zhang, G., Yang, W., Valli, C., Shankaran , R., Orgun, MA., (2017), From WannaCry to WannaDie: Security Trade-offs and Design for Implantable Medical Devices. 17th International Symposium on Communications and Information Technologies (ISCIT2017), 1-5, online, IEEE, DOI: 10.1109/ISCIT.2017.8261228.
  10. Chaudhry, J., Ahmad, M., Habib, MA., Ashraf, R., Valli, C., (2017), Enhancements in Data-Recovery and Re-Transmit Mechanisms of Transmission Control Protocol Enabled Medical Devices. Proceedings 2017 IEEE 42nd Conference on Local Computer Networks Workshops, 121-12721-127, IEEE.

2016

  1. Zaaba, ZF., Furnell, S., Haskell-Dowland, P., (2016), Literature Studies on Security Warnings Development. International Journal on Perceptive and Cognitive Computing, 2(1), 8-18, Malaysia, International Islamic University Malaysia, DOI: 10.31436/ijpcc.v2i1.22.
  2. Al-Bayati, B., Clarke, N., Haskell-Dowland, P., (2016), Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis. The GSTF Journal on Computing, 5(1), 21-28, Singapore, Global Science and Technology Forum, DOI: 10.5176/2251-3043_4.4.348.
  3. Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S., (2016), Graphical One-Time Password (GOTPass): A usability evaluation. Information Security Journal: a Global Perspective, 25(1-3), 94-108, United States, Taylor and Francis Inc., DOI: 10.1080/19393555.2016.1179374.
  4. Al-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F., (2016), A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches. International Journal for Information Security Research, 6(3), 691-700, Infonomics Society, DOI: 10.20533/ijisr.2042.4639.2016.0080.
  5. Triantafyllidis, A., Clarke, N., Haskell-Dowland, P., Vranopoulos, G., (2016), Increasing eLearning Engagement Using Mobile Technologies. ICERI2016 Conference Proceedings, 8644-8653, online only, IATED Academy.
  6. Johnstone, M., Baig, Z., Hannay, P., Carpene, C., Feroze, M., (2016), Controlled Android Application Execution for the IoT Infrastructure. Internet of Things: Second International Summit, IoT 360° 2015 Revised Selected Papers, Part I, 169(26-27 Oct 2015), 16-26, Cham, Switzerland, Springer Verlag, DOI: 10.1007/978-3-319-47063-4_2.
  7. Bettany, B., Johnstone, M., Peacock, M., (2016), An investigation of potential wireless security issues in traffic lights. The Proceedings of 14th Australian Information Security Management Conference, 76-82, online only, Edith Cowan University.
  8. Feroze, M., Baig, Z., Johnstone, M., (2016), A Two-Tiered User Feedback-based Approach for Spam Detection. Proceedings of the 10th International Conference on Systems and Networks Communications, 12-17, IARIA.
  9. Chernyshev, M., Valli, C., Hannay, P., (2016), Service set identifier geolocation for forensic purposes: Opportunities and challenges. Proceedings of the 49th Hawaii International Conference on System Sciences, Article no. 7427866, IEEE Computer Society, DOI: 10.1109/HICSS.2016.678.

2015

  1. Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S., (2015), Secure Graphical One Time Password (GOTPass): An Empirical Study. Information Security Journal: a Global Perspective, 24(4-6), 207-220, United States, Taylor & Francis Inc., DOI: 10.1080/19393555.2015.1115927.
  2. Shanley, L., Johnstone, M., (2015), Selection of penetration testing methodologies: a comparison and evaluation. The Proceedings of the 13th Australian Information Security Management Conference, 65-72, Perth, W.A., Security Research Institute, Edith Cowan University.
  3. Williams, T., Woodward, A., (2015), Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical Devices: Evidence and Research, 2015(8), 305-316, Macclesfield, UK, Dove Medical Press Ltd, DOI: 10.2147/MDER.S50048.
  4. Nisbet, A., Woodward, A., (2016), A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs. Information Security and Privacy: 21st Australasian Conference, ACISP 2016, 9722(4-6 Jul, 2016), 115-127, Switzerland, Springer, DOI: 10.1007/978-3-319-40253-6_7.
  5. Woodward, A., Williams, T., (2015), An Uncomfortable Change: Shifting Perceptions to Establish Pragmatic Cyber Security. Recent Advances in Information and Communication Technology 2015. Proceedings of the 11th International Conference on Computing and Information Technology (ICCIT), 361(2-3 July 2015), 1-8, Thailand, Springer, DOI: 10.1007/978-3-319-19024-2_1.
  6. Valli, C., Rabadia, P., Woodward, A., (2015), A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law, 23-32, Virgi Rashid, T., Saeed, M., Ahmed, M., (2020), A New Era of Project Management Using Blockchain Technology. Blockchain in Data Analytics, 102-121, Newcastle upon Tyne, England, Cambridge Scholars Publishing
  7. Rabadia, P., Valli, C., (2015), Analysis into developing accurate and efficient intrusion detection approaches. Proceedings of 13th Australian Digital Forensics Conference, 70-76, Perth, WA, ECU Security Research Institute.
  8. Thomas, T., Valli, C., (2015), Mapping the laws which apply to intercepting wireless communications in a Western Australian legal context. Proceedings of the 13th Australian Digital Forensics Conference, 22-36, Perth, WA, ECU Security Research Institute.
  9. Valli, C., Rabadia, P., Woodward, A., (2015), A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law, 23-32, Virginia, USA, Association of Digital Forensics, Security and Law.
  10. Ibrahim, A., Valli, C., (2015), Image Similarity using Dynamic Time Warping of Fractal Features. Proceedings of 13th Australian Digital Forensics Conference, 111-122, Perth, WA, ECU Security Research Institute.
  1. Undergraduate cybersecurity education in Australia - does it meet the mark?, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2020 - 2023, $180,000.
  2. Physiological indicators of stress during Cybersecurity work, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2020 - 2023, $180,000.
  3. Measuring and Mitigating Vigilance Decrement in Cyber Network Defence Tasks, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2019 - 2022, $225,000.
  4. Developing autonomous solutions for building knowledge graphs to support educational outcomes in Virtuoso, CingleVue Pty Ltd, Scholarships to Support Industry Engagement PhD Project, 2020 - 2024, $150,000.
  5. Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 - 2022, $120,000.
  6. Securing Internet of Medical Things against False Data Injection Attacks Using Blockchain, Edith Cowan University, ECU Early Career Researcher Grant - 2019, 2019 - 2020, $25,000.
  7. Academic Centre of Cyber Security Excellence, Department of Education, Skills and Employment, Academic Centres of Cyber Security Excellence, 2017 - 2021, $950,287.
  8. Honeypot Deployment Architecture, Cyber Security Research Centre Ltd, Cyber Security Research Centre Ltd, 2019 - 2021, $130,000.
  9. ESSENTIAL - Evolving Security SciencE through Networked Technologies, Information policy And Law, European Commission, Horizons 2020, 2017 - 2021, $394,374.
  10. Drone Policy Review and Forensic Handbook, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 - 2020, $10,700.
  11. ISMS Framework, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 - 2020, $21,400.
  12. Anti-spear phishing by detecting Email Impersonation, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 - 2020, $10,700.
  13. Anti-Business Email Compromise, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 - 2020, $10,700.
  14. Power Honeynet Development Pilot Research and Development Project, Western Power, Western Power - Grant, 2020, $35,000.
  15. Power Honeynet Development Pilot Research and Development Project, Horizon Power, Grant, 2020, $35,000.
  16. Password Hardening Tools, Cyber Security Research Centre Ltd, Sprint Student Grant, 2018 - 2019, $70,000.
  17. Vulnerabilities in Ship Control Systems, Defence Science and Technology Group of the Department of Defence, Grant, 2017 - 2018, $400,000.
  18. Cyber Security Survey and Professional Development Seminars, Law Society of WA, Grant, 2017 - 2018, $30,000.
  19. Advanced Biometric Template Protection: Design of a Cancelable Biometric Framework, Defence Science and Technology Group of the Department of Defence, Competitive Evaluation Research Agreement (CERA) Program, 2017 - 2018, $128,226.
  20. Cyber Electronic Warfare: The effects of team dynamics, cognitive load and team mental models., Defence Science and Technology Group of the Department of Defence, Competitive Evaluation Research Agreement (CERA) Program, 2017 - 2018, $153,407.
  21. Scenario Methodology for Assessing Defence Capability Against Information Warfare Threats, Defence Science and Technology Group of the Department of Defence, Modelling Complex Warfighting, 2020 - 2021, $100,000.
  22. Internet of Things (IoT) ModBUS and BacNET, Cisco Systems Australia Pty Ltd, CISCO - Grant, 2015 - 2018, $125,000.
  23. Design of a Biometric Protection System using Feature Transformation Techniques, Edith Cowan University, Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017, 2017, $8,700.
  24. Internet of Things (IoT), Cisco Systems Australia Pty Ltd, CISCO - Grant, 2016 - 2017, $160,000.
  25. Investigation of social media for radicalisation and terrorism in the Maldives, Edith Cowan University, Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 – 2017, 2017, $11,000.
  26. Cyber Check.me, City of Joondalup, Grant, 2015 - 2016, $16,740.
  27. Rules, Expectations and Security through Privacy-Enhanced Convenient Technologies (RESPECT) - Proposal No 285582, European Commission, Grant - Seventh Framework Programme (FP7), 2012 - 2015, $223,800.
  28. Authentication and Authorisation for Entrusted Unions (AU2EU), European Commission, Grant - Seventh Framework Programme (FP7), 2013 - 2015, $584,907.
  29. Scalable Measures for Automated Recognition Technologies (SMART), European Union, EU Seventh Framework Program, 2011 - 2014, $389,772.
  30. Small Medium Enterprise Cyber Security Engagement (SMESEC) - Project Pilot, City of Wanneroo, Grant, 2013 - 2014, $21,908.
  31. CRC for Cyber Security (CyberCRC), Department of Commerce, Innovation Co-investment Program, 2013, $707,833.
  32. The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN), Griffith University, Grant - NIRAP, 2009 - 2013, $37,139.
  33. Transceiver Array for Optical Media, Attorney-General - Commonwealth, Grant, 2010 - 2012, $293,091.
  34. Overclocking of mechanical hard disk drives, Attorney General's D Branch, Attorney General's Department, D Branch Grant, 2011 - 2012, $54,545.
  35. Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support For National Security, 2010 - 2012, $77,154.
Skip to top of page