ECU offers innovative and practical courses across a variety of disciplines and we have a vibrant research culture. ECU is a leader in developing alternative entry pathways to higher education.
We have three campuses in Western Australia. Joondalup and Mount Lawley in the Perth metropolitan area and our South West campus in Bunbury, 200km south of the Perth CBD.
ECU provides a variety of services and facilities that go beyond the classroom, with opportunities for personal development and social interaction for students and staff.
We collaborate with all types of businesses, including new start-ups, small to medium enterprises, not-for-profits, community organisations, government and large corporates in the resources sector.
Children's University Edith Cowan aims to inspire students between seven and fourteen to develop confidence and a love of learning through validated activities beyond the school curriculum.
The Inspiring Minds scholarship program are equity scholarships that give students an opportunity to access an education that may otherwise be out of reach.
Malik, I., Ibrahim, A., Hannay, P., Sikos, L. (2023). Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions. Computers, 12(4), Article number 79. https://doi.org/10.3390/computers12040079.
Malik, I., McAteer, I., Ibrahim, A., Hannay, P., Baig, Z., Zheng, G. (2020). Cyber Security for Network of Things (NoTs) in Military Systems: Challenges and Countermeasures. Security Analytics for the Internet of Everything (233-251). CRC Press.
Conference Publications
Walling, L., Johnstone, M., Hannay, P. (2020). Information Warfare by Proxy: Malware in PLC Firmware. Conference Proceedings of the 18th Australian Cyber Warfare Conference 2019 (CWAR 2019) (57-61). Deakin University. https://ro.ecu.edu.au/ecuworkspost2013/8239.
McAteer, I., Hannay, P., Malik, I., Baig, Z. (2018). Forensic Analysis of a Crash-Damaged Cheerson CX-20 Auto Pathfinder Drone. Journal of Digital Forensics, Security and Law, 13(4), 5-21. https://doi.org/10.15394/jdfsl.2018.1535.
Malik, I., McAteer, I., Hannay, P., Baig, Z. (2018). Preparing for Secure Wireless Medical Environment in 2050: A Vision. IEEE Access, 6(4 May 2018), 25666-25674. https://doi.org/10.1109/ACCESS.2018.2833509.
Conference Publications
Malik, I., McAteer, I., Hannay, P., Syed, N., Baig, Z. (2018). XMPP architecture and security challenges in an IoT ecosystem. Proceedings of 16th Australian Information Security Management Conference (2018) (62-73). Edith Cowan University. https://doi.org/10.25958/5c52735166690.
Chong, K., Malik, I., Hannay, P. (2018). Mitigating man-in-the-middle attacks on mobile devices by blocking insecure http traffic without using vpn. Proceedings of the 16th Australian Information Security Management Conference (1-13). Edith Cowan University. https://doi.org/10.25958/5C526C2966688.
Chaudhry, J., Farmand, S., Islam, S., Islam, MR., Hannay, P., Valli, C. (2018). Discovering trends for the development of novel authentication applications for dementia patients. International Conference on Applications and Techniques in Cyber Security and Intelligence, Applications and Techniques in Cyber Security and Intelligence (220-237). Springer. https://doi.org/10.1007/978-3-319-67071-3_29.
Montealegre, C., Njuguna, C., Malik, I., Hannay, P., McAteer, I. (2018). Security vulnerabilities in android applications. Proceedings of the 16th Australian Information Security Management Conference (14-28). Edith Cowan University. https://doi.org/10.25958/5c5274d466691.
Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M. (2017). Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13. https://doi.org/10.1016/j.diin.2017.06.015.
Conference Publications
Wakeling, S., Hannay, P., Baig, Z. (2017). A review of data breaches and losses that occurred from laptops that were stolen or otherwise misplaced in 2015 and 2016. Proceedings of the 15th Australian Information Security Management Conference (97-107). Edith Cowan University. https://doi.org/10.4225/75/5a84fc4395b51.
McElroy, T., Hannay, P., Baatard, G. (2017). The 2017 Homograph Browser Attack Mitigation Survey. Proceedings of the 15th Australian Information Security Management Conference (88-96). https://doi.org/10.4225/75/5a84fe5695b55.
McAteer, I., Malik, I., Baig, Z., Hannay, P. (2017). Security vulnerabilities and cyber threat analysis of the AMQP protocol for the internet of things. 15th Australian Information Security Management Conference (70-80). Edith Cowan University. https://doi.org/10.4225/75/5a84f4a695b4c.
Woolley, C., Ibrahim, A., Hannay, P. (2017). Building a dataset for image steganography. Proceedings of the 15th Australian Digital Forensics Conference (36-45). Edith Cowan University. https://doi.org/10.4225/75/5a83a0541d284.
Chernyshev, M., Valli, C., Hannay, P. (2016). On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers. IEEE Transactions on Information Forensics and Security, 11(3), 584 - 593. https://doi.org/10.1109/TIFS.2015.2507542.
Conference Publications
Chernyshev, M., Valli, C., Hannay, P. (2016). Service set identifier geolocation for forensic purposes: Opportunities and challenges. Proceedings of the 49th Hawaii International Conference on System Sciences (Article no. 7427866). IEEE Computer Society. https://doi.org/10.1109/HICSS.2016.678.
Johnstone, M., Baig, Z., Hannay, P., Carpene, C., Feroze, M. (2016). Controlled Android Application Execution for the IoT Infrastructure. Internet of Things: Second International Summit, IoT 360° 2015 Revised Selected Papers, Part I (16-26). Springer Verlag. https://doi.org/10.1007/978-3-319-47063-4_2.
Heriyanto, A., Valli, C., Hannay, P. (2015). Comparison of live response, Linux memory extractor (lime) and mem tool for acquiring android's volatile memory in the malware incident. Proceedings of 13th Australian Digital Forensics Conference (5-14). ECU Security Research Institute.
Chernyshev, M., Hannay, P. (2015). Security assessment of IoT devices: The case of two smart TVs. Proceedings of the 13th Australian Digital Forensics Conference (85-94). Security Research Institute, Edith Cown University.
Chernyshev, M., Valli, C., Hannay, P. (2015). 802.11 Tracking and Surveillance - A Forensic Perspective. Proceedings of the International Conference on Security and Management (SAM'15) (349-352). WorldComp.
Valli, C., Woodward, A., Hannay, P., Johnstone, M. (2014). Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law (35-40). Association of Digital Forensics, Security and Law.
Hope, H., Hannay, P. (2014). The impace of custom ROM backups on android external storage erasure. Proceedings of the 12th Australian Digital Forensics Conference (94-101). ECU. https://doi.org/10.4225/75/57b3e5dbfb880.
Chernyshev, M., Hannay, P. (2014). The zombies strike back: Towards client-side beef detection. Proceedings of the 12th Australian Digital Forensics Conference (26-34). ECU. https://doi.org/10.4225/75/57b3de3dfb87a.
Hannay, P. (2013). Geo Forensics: Classes of Locational Data Sources for Embedded Devices. IACSIT International Journal of Engineering and Technology, 5(2), 261-264.
Conference Publications
Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M. (2013). Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference (42-48). Security Research Centre, Edith Cowan University.
Hannay, P., Baatard, G. (2012). The 2011 IDN Homograph Attack Mitigation Survey. Proceedings of the 2012 International Conference on Security and Management SAM2012 (653-657). CSREA Press.
Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C. (2012). Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference (54-60). Security Research Centre, Edith Cowan University.
Hannay, P., Baatard, G. (2011). GeoIntelligence: Data Mining Locational Social Media Content for Profiling and Information Gathering. Proceedings of the 2nd International Cyber Resilience Conference (29-37). Security Research Centre, Edith Cowan University.
Barker, J., Hannay, P., Szewczyk, P. (2011). Using traffic analysis to identify The Second Generation Onion Router. Proceedings: 2011 Ninth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (72-78). IEEE. https://doi.org/10.1109/EUC.2011.76.
Hannay, P. (2011). Kindle Forensics: Acquisition & Analysis. Proceedings of the Conference on Digital Forensics, Security, and Law 2011 (145-149). Association of Digital Forensics, Security and Law.
Valli, C., Woodward, A., Hannay, P. (2011). Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011 (191-195). Association of Digital Forensics, Security and Law.
Hannay, P., Bolan, C. (2010). The 2010 IDN Homograph Attack Mitigation Survey. Proceedings of the 2010 International Conference on Security & Management, SAM 2010 (611-614). CSREA Press.
Barker, J., Hannay, P., Bolan, C. (2010). Using Traffic Analysis to Identify Tor Usage – A Proposed Study. Proceedings of the 2010 International Conference on Security & Management, SAM 2010 (620-623). CSREA Press.
Valli, C., Hannay, P. (2010). Geotagging Where Cyberspace Comes to Your Place. Proceedings of the 2010 International Conference on Security & Management (SAM '10) (627-630). CSREA Press.
Hannay, P. (2009). Fun & Games: an Introduction to Console Forensics. Proceedings of the 2009 International Conference on Security and Management (SAM09) (609-612). CSREA Press.
Bolan, C., Hannay, P. (2009). Freegate: A Defence against the Pending Censorship of Australia?. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009) (133-140). University of Plymouth.
Hannay, P., Bolan, C. (2009). An Assessment of Internationalised Domain Name Homograph Attack Mitigation Implementations. Proceedings of the 7th Australian Information Security Management Conference (82-87). Centre for Security Research, Edith Cowan University.
Hannay, P., Woodward, A. (2009). Firewire Forensics in Modern Operating Systems. Proceedings of the 2009 International Conference on Security and Management (SAM'09) (635-638). CSREA Press.
Hannay, P. (2009). Satellite Navigation Forensics Techniques. Proceedings of the 7th Australian Digital Forensics Conference (14-18). Centre for Security Research, Edith Cowan University.
Pydayya, K., Hannay, P., Szewczyk, P. (2009). The 2009 Personal Firewall Robustness Evaluation. Proceedings of the 7th Australian Information Security Management Conference (98-102). Centre for Security Research, Edith Cowan University.
Woodward, A., Hannay, P. (2008). Forensic implications of using the firewire memory exploit with Microsoft Windows XP. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (593-597). CSREA Press.
Hannay, P., Woodward, A. (2008). Cold Boot Memory Acquisition: An Investigation Into Memory Freezing and Data Retention Claims.. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (620-622). CSREA Press.
Hannay, P. (2008). Forensic Acquisition and Analysis of the TomTom One Satellite Navigation Unit. Proceedings of the 6th Australian Digital Forensics Conference (78-81). Centre for Security Research, Edith Cowan University.
Smart, J., Tedeschi, K., Meakins, D., Hannay, P., Bolan, C. (2008). Subverting National Internet Censors: An Investigation into Existing Tools and Techniques. Proceedings of the 6th Australian Digital Forensics Conference (158-164). Centre for Security Research, Edith Cowan University.
Hannay, P., Woodward, A., Cope, N. (2007). A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase 1 proof of concept. Proceedings of 5th Australian Digital Forensics Conference (178-183). School of Computer and Information Science.
Hannay, P., James, P. (2007). Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment. Proceedings of 5th Australian Digital Forensics Conference (153-162). School of Computer and Information Science, Edith Cowan University.
Hannay, P. (2007). A Methodology for the Forensic Acquisition of the TomTom One Satellite Navigation System - A Research in Progress. Proceedings of 5th Australian Digital Forensics Conference (194-197). School of Computer and Information Science, Edith Cowan University.
Research Projects
Academic Centre of Cyber Security Excellence, Department of Education, Academic Centres of Cyber Security Excellence, 2017 ‑ 2021, $950,287.
Vulnerabilities in Ship Control Systems, Defence Science and Technology Group of the Department of Defence, Grant, 2017 ‑ 2018, $400,000.
Authentication and Authorisation for Entrusted Unions (AU2EU), European Commission, Grant - Seventh Framework Programme (FP7), 2013 ‑ 2015, $83,371.
Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support For National Security, 2010 ‑ 2012, $77,154.