Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Associate Professor Mike Johnstone

Associate Professor

Staff Member Details
Telephone: +61 8 6304 6615
Facsimile: +61 8 9370 6100
Email: m.johnstone@ecu.edu.au
Campus: Joondalup  
Room: JO18.313  

Mike is an Associate Professor within the School of Science and a member of the ECU Security Research Institute.

Qualifications

  • Doctor of Philosophy, Curtin University of Technology.
  • Bachelor of Applied Science, Western Australian Institute of Technology.
  • Master of Science, Curtin University of Technology.
  • Post Grad Diploma, Curtin University of Technology.

Research

Recent Research Grants

  • Advanced File Carving Extension for X-Ways Forensics Software,  Cyber Security Research Centre Ltd,  Cyber Security Research Centre PhD Top Up Scholarship,  2021 - 2024,  $105,000.
  • Forensic Investigation of Wireless Medical Systems,  Cyber Security Research Centre Ltd,  Cyber Security Research Centre PhD Scholarship,  2020 - 2021,  $120,000.
  • Scenario Methodology for Assessing Defence Capability Against Information Warfare Threats,  Defence Science and Technology Group of the Department of Defence,  Modelling Complex Warfighting,  2020 - 2021,  $100,000.
  • Academic Centre of Cyber Security Excellence,  Department of Education, Skills and Employment,  Academic Centres of Cyber Security Excellence,  2017 - 2021,  $950,287.
  • Investigating the opportunities and challenges posed by disruptive and converging technologies in Cyber, IoT, AI/ autonomous technologies to the mission, design, structure, operations and future roles and planning of Defence and the Australian Defence Force,  Department of Defence,  Strategic Policy Grants Program,  2020 - 2021,  $179,502.
  • Network Operations Centre - Situational Intelligence,  Cyber Security Research Centre Ltd,  Sprint Student Grant,  2018 - 2019,  $35,000.
  • Detection Likelihood,  Cyber Security Research Centre Ltd,  Sprint Student Grant,  2018 - 2019,  $35,000.
  • Vulnerabilities in Ship Control Systems,  Defence Science and Technology Group of the Department of Defence,  Grant,  2017 - 2018,  $400,000.
  • Investigation of social media for radicalisation and terrorism in the Maldives,  Edith Cowan University,  Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 – 2017,  2017,  $11,000.
  • Investigation of text steganography for malicious covert communication by terrorists in the dark web,  Edith Cowan University,  Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017,  2017,  $8,200.
  • Authentication and Authorisation for Entrusted Unions (AU2EU),  European Commission,  Grant - Seventh Framework Programme (FP7),  2013 - 2015,  $584,907.

Recent Publications (within the last five years)

Book Chapters

  • Zheng, G., Yang, W., Johnstone, M., Shankaran, R., Valli, C., (2020), Securing the elderly in cyberspace with fingerprints. Assistive Technology for the Elderly, 59-79, Cambridge: MA., Academic Press, DOI: 10.1016/B978-0-12-818546-9.00003-8.
  • Johnstone, M., Peacock, M., (2020), Seven Pitfalls of Using Data Science in Cybersecurity.  Data Science in Cybersecurity and Cyberthreat Intelligence, 115-129, Cham, Switzerland, Springer, DOI: 10.1007/978-3-030-38788-4_6.
  • Peacock, M., Johnstone, M., Valli, C., (2018), An Exploration of Some Security Issues Within the BACnet Protocol. Information Systems Security and Privacy , 252–272, Heidelberg, Germany, Springer, DOI: https://doi.org/10.1007/978-3-319-93354-2_12.

Journal Articles

  • Yang, W., Wang, S., Hu, J., Ibrahim, A., Zheng, G., Macedo, M., Johnstone, M., Valli, C., (2019), A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things. Sensors, 19(13), article no.2985, DOI: https://doi.org/10.3390/s19132985.
  • Chernyshev, M., Valli, C., Johnstone, M., (2017), Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. IEEE Transactions on Information Forensics and Security, 12(7), 1625-1636, IEEE Signal Processing Society, DOI: 10.1109/TIFS.2017.2678463.
  • Carpene, C., Johnstone, M., Woodward, A., (2017), The Effectiveness of Classification Algorithms on IPv6 IID Construction. International Journal of Autonomous and Adaptive Communications Systems, 10(1), 15-22, Inderscience.
  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13, Oxon, United Kingdom, Elsevier Advanced Technology, DOI: 10.1016/j.diin.2017.06.015.
  • Crowley, M., Johnstone, M., (2016), Protecting corporate intellectual property: Legal and technical approaches. Business Horizons, 59(6), 623 - 633, Indiana, USA, Elsevier, DOI: 10.1016/j.bushor.2016.08.004.

Conference Publications

  • Walling, L., Johnstone, M., Hannay, P., (2020), Information Warfare by Proxy: Malware in PLC Firmware. Conference Proceedings of the 18th Australian Cyber Warfare Conference 2019 (CWAR 2019), 57-61, Geelong, Victoria, Deakin University.
  • Woodiss-Field, A., Johnstone, M., (2020), BotNets in the Internet of Things: The Next Wave. Conference Proceedings of the 18th Australian Cyber Warfare Conference 2019 (CWAR 2019), 41-45, Geelong, Victoria, Deakin University.
  • Kang, J., Yang, W., Johnstone, M., (2020), A Framework of Military Wireless Body Area Networks Converged with Low Power Wide Area Networks. Accepted Papers, 1, Brisbane, Australia, Data61.
  • Yang, W., Wang, S., Yu, K., Kang, J., Johnstone, M., (2020), Secure Fingerprint Authentication with Homomorphic Encryption. 2020 Digital Image Computing: Techniques and Applications, 6, Piscataway, New Jersey, United States, IEEE.
  • Shanley, L., Johnstone, M., Crowley, M., Szewczyk, P., (2020), Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?. Human Aspects of Information Security and Assurance, 3-15, Cham, Switzerland, Springer, DOI: 10.1007/978-3-030-57404-8_1.
  • Yang, W., Johnstone, M., Sikos, L., Wang, S., (2020), Security and Forensics in the Internet of Things: Research Advances and Challenges. Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, 12-17, Piscataway, USA , Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/ETSecIoT50046.2020.00007.
  • Greene, R., Johnstone, M., (2018), An investigation into a denial of service attack on an ethereum network. Australian Information Security Management Conference, 90-96, online, Security Research Institute, Edith Cowan University, DOI: 10.25958/5c526f0b6668b.
  • Woodiss-Field, A., Johnstone, M., (2018), Towards a Method for Detecting Botnet Code on IoT Devices. The Proceedings of the 2018 Cyber Forensic & Security International Conference, pp. 30-34, Nuku’alofa, Kingdom of Tonga, Christ's University in Pacific.
  • Greene, R., Johnstone, M., (2018), Secure Smart Contract Supply Chains. Proceedings of 17th Australian Cyber Warfare Conference (CWAR), 6-17, Melbourne, Victoria, Deakin University Centre for Cyber Security Research and Innovation.
  • Valli, C., Johnstone, M., Fleming, R., (2018), A Survey of Lawyers’ Cyber Security Practises in Western Australia. Annual ADFSL Conference on Digital Forensics, Security and Law, 219-226, Florida, USA, Association of Digital Forensics, Security and Law.
  • Macedo, M., Yang, W., Zheng, G., Johnstone, M., (2017), A Comparison of 2D and 3D Delaunay Triangulations for Fingerprint Authentication. The Proceedings of 15th Australian Information Security Management Conference, 108-115, Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a84f3ca95b4b.
  • Peacock, M., Johnstone, M., Valli, C., (2017), Security Issues with BACnet Value Handling. Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP) 2017, 546-552, Science and Technology Publications.
  • Murray, G., Johnstone, M., Valli, C., (2017), The convergence of IT and OT in critical infrastructure. Proceedings of the 15th Australian Information Security Management Conference, 149-155, Perth, WA, Edith Cowan University.
  • White, T., Johnstone, M., Peacock, M., (2017), An investigation into some security issues in the DDS messaging protocol. Proceedings of the 15th Australian Information Security Management Conference, 132-139, Perth, WA, Edith Cowan University.
  • Bettany, B., Johnstone, M., Peacock, M., (2016), An investigation of potential wireless security issues in traffic lights. The Proceedings of 14th Australian Information Security Management Conference, 76-82, online only, Edith Cowan University.
  • Feroze, M., Baig, Z., Johnstone, M., (2016), A Two-Tiered User Feedback-based Approach for Spam Detection. Proceedings of the 10th International Conference on Systems and Networks Communications, 12-17, IARIA.
  • Johnstone, M., Baig, Z., Hannay, P., Carpene, C., Feroze, M., (2016), Controlled Android Application Execution for the IoT Infrastructure. Internet of Things: Second International Summit, IoT 360° 2015 Revised Selected Papers, Part I, 169(26-27 Oct 2015), 16-26, Cham, Switzerland, Springer Verlag, DOI: 10.1007/978-3-319-47063-4_2.
  • Johnstone, M., Peacock, M., Den Hartog, J., (2015), Timing attack detection on Bacnet via a machine learning approach. The Proceedings of the 13th Australian Information Security Management Conference, 57-64, Perth, Western Australia, Security Reseach Institute, Edith Cowan University.
  • Shanley, L., Johnstone, M., (2015), Selection of penetration testing methodologies: a comparison and evaluation. The Proceedings of the 13th Australian Information Security Management Conference, 65-72, Perth, W.A., Security Research Institute, Edith Cowan University.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy,  A model for systematically investigating relationships between variables that affect the performance of novice programmers.
  • Doctor of Philosophy,  Anomaly detection in bacnet/ip managed building automation systems

Co-principal Supervisor

  • Doctor of Philosophy,  Pictures in words: Indexing, folksonomy and representation of subject content in historic photographs.
  • Doctor of Philosophy,  E-book adoption in academic and research libraries
  • Doctor of Philosophy,  Human factors and cultural influences in implementing agile philosophy and agility in global software development.

Associate Supervisor

  • Doctor of Philosophy,  Mining climate data for shire level wheat yield predictions in Western Australia
  • Doctor of Philosophy,  Blind steganalysis using fractal features
  • Doctor of Philosophy,  An investigation into off-link ipv6 host enumeration search techniques
Skip to top of page