Top of page
Global Site Navigation

School of Science

Local Section Navigation

Help us improve our content by rating this page.

Page rating system

Please leave a comment about your rating so we can better understand how we might improve the page.

You are here: Main Content

Associate Professor Mike Johnstone

Associate Professor

Contact Information Telephone: +61 8 6304 6615, Email:, Campus: Joondalup, Room: JO18.318
Staff Member Details
Telephone: +61 8 6304 6615
Facsimile: +61 8 9370 6100
Campus: Joondalup  
Room: JO18.318  


Mike is an Associate Professor within the School of Science and a member of the ECU Security Research Institute.


  • Doctor of Philosophy, Curtin University of Technology.
  • Master of Science, Curtin University of Technology.
  • Post Grad Diploma, Curtin University of Technology.
  • Bachelor of Applied Science, Western Australian Institute of Technology.


Recent Research Grants

  • Academic Centre of Cyber Security Excellence,  Department of Education and Training,  Academic Centres of Cyber Security Excellence,  2017 - 2021,  $950,287.
  • Vulnerabilities in Ship Control Systems,  Defence Science and Technology Group of the Department of Defence,  Grant,  2017 - 2018,  $400,000.
  • Investigation of social media for radicalisation and terrorism in the Maldives,  Edith Cowan University,  Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 – 2017,  2017,  $11,000.
  • Investigation of text steganography for malicious covert communication by terrorists in the dark web,  Edith Cowan University,  Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017,  2017,  $8,200.
  • Authentication and Authorisation for Entrusted Unions (AU2EU),  European Commission,  Grant - Seventh Framework Programme (FP7),  2013 - 2015,  $584,907.

Recent Publications (within the last five years)

Journal Articles

  • Carpene, C., Johnstone, M., Woodward, A., (2017), The Effectiveness of Classification Algorithms on IPv6 IID Construction. International Journal of Autonomous and Adaptive Communications Systems, 10(1), 15-22, Inderscience.
  • Chernyshev, M., Valli, C., Johnstone, M., (2017), Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. IEEE Transactions on Information Forensics and Security, 12(7), 1625-1636, IEEE Signal Processing Society, DOI: 10.1109/TIFS.2017.2678463.
  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13, Oxon, United Kingdom, Elsevier Advanced Technology, DOI: 10.1016/j.diin.2017.06.015.
  • Crowley, M., Johnstone, M., (2016), Protecting corporate intellectual property: Legal and technical approaches. Business Horizons, 59(6), 623 - 633, Indiana, USA, Elsevier, DOI: 10.1016/j.bushor.2016.08.004.
  • Ahmad, P., Brogan, M., Johnstone, M., (2014), The E-book Power User in Academic and Research Libraries: Deep Log Analysis and User Customisation. Australian Academic and Research Libraries, 45(1), 35-47, Routledge, DOI: 10.1080/00048623.2014.885374.
  • Johnstone, M., (2014), Cloud security meets telemedicine. Electronic Journal of Health Informatics, 8(2), Article No. e14, Health Informatics Society Australia.
  • Johnstone, M., (2013), Embedding Secure Programming in the Curriculum: Some Lessons Learned. International Journal of Engineering and Technology, 5(2), 287-290, Singapore, IACSIT Press, DOI: 10.7763/IJET.2013.V5.560.

Conference Publications

  • Macedo, M., Yang, W., Zheng, G., Johnstone, M., (2017), A Comparison of 2D and 3D Delaunay Triangulations for Fingerprint Authentication. The Proceedings of 15th Australian Information Security Management Conference, 108-115, Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a84f3ca95b4b.
  • White, T., Johnstone, M., Peacock, M., (2017), An investigation into some security issues in the DDS messaging protocol. Proceedings of the 15th Australian Information Security Management Conference, 132-139, Perth, WA, Edith Cowan University.
  • Peacock, M., Johnstone, M., Valli, C., (2017), Security Issues with BACnet Value Handling. Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP) 2017, 546-552, Science and Technology Publications.
  • Murray, G., Johnstone, M., Valli, C., (2017), The convergence of IT and OT in critical infrastructure. Proceedings of the 15th Australian Information Security Management Conference, 149-155, Perth, WA, Edith Cowan University.
  • Bettany, B., Johnstone, M., Peacock, M., (2016), An investigation of potential wireless security issues in traffic lights. The Proceedings of 14th Australian Information Security Management Conference, 76-82, online only, Edith Cowan University.
  • Feroze, M., Baig, Z., Johnstone, M., (2016), A Two-Tiered User Feedback-based Approach for Spam Detection. Proceedings of the 10th International Conference on Systems and Networks Communications, 12-17, IARIA.
  • Johnstone, M., Baig, Z., Hannay, P., Carpene, C., Feroze, M., (2016), Controlled Android Application Execution for the IoT Infrastructure. Internet of Things: Second International Summit, IoT 360° 2015 Revised Selected Papers, Part I, 169(26-27 Oct 2015), 16-26, Cham, Switzerland, Springer Verlag, DOI: 10.1007/978-3-319-47063-4_2.
  • Shanley, A., Johnstone, M., (2015), Selection of penetration testing methodologies: a comparison and evaluation. The Proceedings of the 13th Australian Information Security Management Conference, 65-72, Perth, W.A., Security Research Institute, Edith Cowan University.
  • Johnstone, M., Peacock, M., Den Hartog, J., (2015), Timing attack detection on Bacnet via a machine learning approach. The Proceedings of the 13th Australian Information Security Management Conference, 57-64, Perth, Western Australia, Security Reseach Institute, Edith Cowan University.
  • Crowley, M., Johnstone, M., (2014), I remember Richelieu: Is anything secure anymore?. The Proceedings of 7th Australian Security and Intelligence Conference, 27 - 32, Perth, W.A., ECU.
  • Valli, C., Woodward, A., Hannay, P., Johnstone, M., (2014), Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law, 35-40, Virginia, USA, Association of Digital Forensics, Security and Law.
  • Ayed, DF., Camenisch, J., Ignatenko, T., Johnstone, M., Koster, P., Lange, B., Petković, M., Sommer, D., Zic, J., (2014), Authentication and authorisation in entrusted unions. Proc. 12th Australian Information Security Management Conference, 56-63, Perth, W.A., ECU, DOI: 10.4225/75/57b660c8343d4.
  • Valli, C., Martinus, I., Johnstone, M., (2014), Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business. Proceedings of the 2014 International Conference on Security and Management, 71-75, CSREA Press.
  • Peacock, M., Johnstone, M., (2014), An analysis of security issues in building automation systems. The Proceedings of 12th Australian Information Security Management Conference, 100-104, Perth, W.A., ECU, DOI: 10.4225/75/57b691dfd9386.
  • Thompson, R., Johnstone, M., (2013), Security aspects of military sensor-based defence systems. 2013 IEEE International Conference on Trust, Security and Privacy in Computing and Communication Systems, 302 - 309 , Melbourne, Australia, IEEE, DOI: 10.1109/TrustCom.2013.277.
  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M., (2013), Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference, 42-48, Perth, Western Australia, Security Research Centre, Edith Cowan University.
  • Peacock, M., Johnstone, M., (2013), Towards detection and control of civilian unmanned aerial vehicles. The Proceedings of 14th Australian Information Warfare Conference, 9-15, Perth, Security Research Centre, Edith Cowan University.
  • Johnstone, M., Woodward, A., (2013), Automated Detection of Vehicles with Machine Learning. Proceedings of the 11th Australian Information Security Management Conference, 102-112, Perth, Western Australia, Security Research Centre, Edith Cowan University.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy,  A Model For Systematically Investigating Relationships Between Variables That Affect The Performance Of Novice Programmers.

Co-principal Supervisor

  • Doctor of Philosophy,  Human Factors And Cultural Influences In Implementing Agile Philosophy And Agility In Global Software Development.
  • Doctor of Philosophy,  E-book Adoption In Academic And Research Libraries
  • Doctor of Philosophy,  Pictures In Words: Indexing, Folksonomy And Representation Of Subject Content In Historic Photographs.

Associate Supervisor

  • Doctor of Philosophy,  Mining Climate Data For Shire Level Wheat Yield Predictions In Western Australia
  • Doctor of Philosophy,  Blind Steganalysis Using Fractal Features
  • Doctor of Philosophy,  An Investigation Into Off-link Ipv6 Host Enumeration Search Techniques
Skip to top of page