Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Professor Andrew Woodward

Executive Dean, School of Science

Staff Member Details
Telephone: +61 8 6304 5019
Email: a.woodward@ecu.edu.au
Campus: Joondalup  
Room: JO18.311  

Professor Andrew Woodward is the Executive Dean of the School of Science and a member of the ECU Security Research Institute.

Qualifications

  • Bachelor of Science Honours, Edith Cowan University.
  • Tertiary Teaching, Edith Cowan University, 2006.
  • Doctor of Philosophy, Edith Cowan University, 2005.

Research Outputs

Journal Articles

  • Carpene, C., Johnstone, M., Woodward, A. (2017). The Effectiveness of Classification Algorithms on IPv6 IID Construction. International Journal of Autonomous and Adaptive Communications Systems, 10(1), 15-22.
  • Chernyshev, M., Zeadally, S., Baig, Z., Woodward, A. (2017). Mobile Forensics: Advances, Challenges, and Research Opportunities. IEEE Security and Privacy Magazine, 15(6), 42-51. https://doi.org/10.1109/MSP.2017.4251107.

Conference Publications

  • Nisbet, A., Woodward, A. (2016). A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs. Information Security and Privacy: 21st Australasian Conference, ACISP 2016 (115-127). Springer. https://doi.org/10.1007/978-3-319-40253-6_7.

Journal Articles

  • Williams, T., Woodward, A. (2015). Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem. Medical Devices: Evidence and Research, 2015(8), 305-316. https://doi.org/10.2147/MDER.S50048.

Conference Publications

  • Woodward, A., Williams, T. (2015). An Uncomfortable Change: Shifting Perceptions to Establish Pragmatic Cyber Security. Recent Advances in Information and Communication Technology 2015. Proceedings of the 11th International Conference on Computing and Information Technology (ICCIT) (1-8). Springer. https://doi.org/10.1007/978-3-319-19024-2_1.
  • Valli, C., Rabadia, P., Woodward, A. (2015). A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law (23-32). Association of Digital Forensics, Security and Law.

Conference Publications

  • Carpene, C., Woodward, A. (2014). A Survey Of IPv6 Address Usage In The Public Domain Name System. The Proceedings of 12th Australian Information Security Management Conference (91-99). Security Research institute, Edith Cowan University. https://doi.org/10.4225/75/57b666d2343d8.
  • Valli, C., Woodward, A., Hannay, P., Johnstone, M. (2014). Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law (35-40). Association of Digital Forensics, Security and Law.

Conference Publications

  • Johnstone, M., Woodward, A. (2013). Automated Detection of Vehicles with Machine Learning. Proceedings of the 11th Australian Information Security Management Conference (102-112). Security Research Centre, Edith Cowan University.
  • Cusack, B., Woodward, A., Butson, S., Leber, B. (2013). The effectiveness of internet activity erasure tools to protect privacy. The Proceedings of the 11th Australian Information Security Management conference (35-41). Security Research Institute, Edith Cowan University.
  • Valli, C., Rabadia, P., Woodward, A. (2013). Patterns and Patter - An Investigation Into SSH Activity Using Kippo Honeypots. The Proceedings of 11th Australian Digital Forensics Conference (141-149). Security Research Centre, Edith Cowan University.
  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M. (2013). Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference (42-48). Security Research Centre, Edith Cowan University.

Conference Publications

  • Coole, M., Corkill, J., Woodward, A. (2012). Defence in depth, protection in depth and security in depth: A comparative analysis towards a common usage language. The Proceedings of the 5th Australian Security and Intelligence Conference (27-35). Security Research Centre, Edith Cowan University.
  • Coole, M., Woodward, A., Valli, C. (2012). Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems. The Proceedings of the 5th Australian Security and Intelligence Conference (36-43). Security Research Centre, Edith Cowan University.
  • Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C. (2012). Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference (54-60). Security Research Centre, Edith Cowan University.
  • Carpene, C., Woodward, A. (2012). Exposing potential privacy issues with IPV6 address construction. The Proceedings of the 10th Australian Information Security Management Conference (44-50). Security Research Centre, Edith Cowan University.
  • Johnstone, M., Woodward, A. (2012). Towards Effective Algorithms for Intelligent Defense Systems. LNCS 7672 - Cyberspace Safety and Security, 4th International Symposium, CSS 2012 (498-508). Springer. https://doi.org/10.1007/978-3-642-35362-8_37.

Conference Publications

  • Pung, W., Woodward, A. (2011). Can Current Packet Analysis Software Detect BitTORRENT Activity or Extract Files From BTP and uTP Traffic Streams?. Proceedings of The 9th Australian Digital Forensics Conference (93-99). Security Research Centre, Edith Cowan University.
  • Valli, C., Woodward, A., Hannay, P. (2011). Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011 (191-195). Association of Digital Forensics, Security and Law.
  • Jacobson, E., Woodward, A. (2011). A longitudinal study of Wi-Fi access point security in the Perth Central Business District. Proceedings of The 9th Australian Information Security Management Conference (124-129). Security Research Centre, Edith Cowan University.
  • Brand, M., Valli, C., Woodward, A. (2011). A Threat to Cyber Resilience : A Malware Rebirthing Botnet. Proceedings of the 2nd International Cyber Resilience Conference (1-6). Security Research Centre, Edith Cowan University.

Journal Articles

  • Brand, M., Valli, C., Woodward, A. (2010). Malware Forensics: Discovery of the Intent of Deception. Journal of Digital Forensics, Security and Law, 5(4), 31-42.

Conference Publications

  • Brand, M., Valli, C., Woodward, A. (2010). Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software.. The Proceedings of the 8th Australian Digital Forensics Conference (31-38). Security Research Centre, Edith Cowan University.
  • Woodward, A., Valli, C. (2010). Which organisational model meets best practice criterion for critical infrastructure providers: An examination of the Australian perspective based on case studies.. Proceedings of The 2010 International Cyber Resilience Conference icr 2010 (118-125). Security Research Centre, Edith Cowan University.
  • Pung, W., Woodward, A. (2010). Does the use of MIMO Technology used by 802.11n Reduce or Increase the Impact of Denial of Service Attacks?. The Proceedings of the 8th Australian Digital Forensics Conference (135-141). Security Research Centre, Edith Cowan University.
  • Cheng, TC., Woodward, A. (2010). An investigation into the efficacy of three erasure tools under Windows 7. The Proceedings of the 8th Australian Digital Forensics Conference (162-168). Security Research Centre, Edith Cowan University.

Journal Articles

  • Golygowski, LA., Woodward, A. (2009). Is it possible to use passive spectral characteristics of wireless network client devices for forensic identification purposes?. Journal of Network Forensics, 1(1), 1-15.

Conference Publications

  • Woodward, A., Turner, B. (2009). When You Can’t See the Forest for the Domains: Why a Two Forest Model Should be Used to Achieve Logical Segregation Between SCADA and Corporate Networks. Proceedings of the 10th Australian Information Warfare and Security Conference (18-23). Centre for Security Research, Edith Cowan University.
  • Talbot, S., Woodward, A. (2009). Improving an Organisations Existing Information Technology Policy to Increase Security. Proceedings of the 7th Australian Information Security Management Conference (120-128). Centre for Security Research, Edith Cowan University.
  • Freeman, M., Woodward, A. (2009). Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives. Proceedings of the 7th Australian Digital Forensics Conference (33-41). Centre for Security Research, Edith Cowan University.
  • Hannay, P., Woodward, A. (2009). Firewire Forensics in Modern Operating Systems. Proceedings of the 2009 International Conference on Security and Management (SAM'09) (635-638). CSREA Press.
  • Valli, C., Woodward, A. (2009). SCADA Security - Slowly Circling a Disaster Area. Proceedings of the 2009 International Conference on Security and Management (SAM 2009) (613-617). CSREA Press.
  • Woodward, A. (2009). Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?. Proceedings of the 2009 International Conference on Security and Management (SAM'09) (622-627). CSREA Press.
  • Freeman, M., Woodward, A. (2009). SmartPot - Creating a 1st Generation Smartphone Honeypot. Proceedings of the 7th Australian Digital Forensics Conference (25-32). Centre for Security Research, Edith Cowan University.

Conference Publications

  • Valli, C., Woodward, A. (2008). The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues. Proceedings of the 6th Australian Digital Forensics Conference (211-214). Centre for Security Research, Edith Cowan University.
  • Woodward, A., Valli, C. (2008). Issues Common to Australian Critical Infrastructure Providers Scada Networks Discovered Through Computer and Network Vulnerability Analysis.. Proceedings of the 6th Australian Digital Forensics Conference (204-208). Centre for Security Research, Edith Cowan University.
  • Woodward, A. (2008). What Artefacts do Current BitTorrent Clients Leave Behind?. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (608-613). CSREA Press.
  • Turner, B., Woodward, A. (2008). Securing a Wireless Network With EAP-TLS: Perception and Realities of its Implementation. Proceedings of the 6th Australian Information Security Management Conference (130 - 137). Centre for Security Research, Edith Cowan University.
  • Hannay, P., Woodward, A. (2008). Cold Boot Memory Acquisition: An Investigation Into Memory Freezing and Data Retention Claims.. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (620-622). CSREA Press.
  • Woodward, A., Hannay, P. (2008). Forensic implications of using the firewire memory exploit with Microsoft Windows XP. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (593-597). CSREA Press.
  • Turner, B., Woodward, A. (2008). Network security isnt all fun and games: an analysis of information transmitted whilst playing Team Fortress 2. Proceedings of the 6th Australian Information Security Management Conference (138-144). Centre for Security Research, Edith Cowan University.

Conference Publications

  • James, P., Woodward, A. (2007). Securing VoIP - a framework to mitigate or manage risks. Proceedings of the 5th Australian Information Security Management Conference (103-115). School of Computer and Information Science.
  • Hilven, A., Woodward, A. (2007). How safe is Azeroth, or are MMORPGs a security risk?. Proceedings of the 5th Australian Information Security Management Conference (87-95). School of Computer and Information Science.
  • Hansen, P., Woodward, A. (2007). Network Security - Is IP Telephony helping the cause?. Proceedings of 5th Australian Information Security Management Conference (73-79). School of Computer and Information Science.
  • Ng, D., Woodward, A. (2007). Implications for use of different encryption algorithms on power consumption for mobile devices in the healthcare industry. Conference on Security and Management (SAM 2007) (496-500). CSREA.
  • Valli, C., Woodward, A. (2007). Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks. Proceedings of 5th Australian Digital Forensics Conference (218-222). Edith Cowan University.
  • Woodward, A., Williams, T. (2007). Wireless Rx - Risk assessment and recommendations for securing a wireless network in a medical practice. Proceedings of the 2007 World Congress in Computer Science, Computer Engineering, and Applied Computing (501-505). CSREA Press.
  • Woodward, A., Valli, C. (2007). Do Current Erasure Programs Remove Evidence of BitTorrent Activity?. Proceedings of the Conference on Digital Forensics, Security and Law. (147-158). Association of Digital Forensics, Security and Law.
  • Hannay, P., Woodward, A., Cope, N. (2007). A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase 1 proof of concept. Proceedings of 5th Australian Digital Forensics Conference (178-183). School of Computer and Information Science.

Journal Articles

  • Bennett, I., Woodward, A., Pusswonge, S. (2006). The effect of nitrogen source and concentration, medium pH and buffering on in vitro shoot growth and rooting in Eucalyptus marginata. Scientia Horticulturae, 110(2), 208-213.

Conference Publications

  • Hadfield, A., Ahern, M., Sell, L., Woodward, A. (2006). A Methodology for the Examination of the Effectivness of Secure Erasure Tools Running on Windows XP - Research in Progress. Proceedings of the 4th Australian Digital Forensics Conference (11-17). School of Computer and Information Science.
  • Woodward, A. (2006). LIARS: Laptop Inspector and Recovery System. Proceedings of the 4th Australian Digital Forensics Conference (84-89). Edith Cowan University.
  • Woodward, A. (2006). Data Security and wireless networks - mutually exclusive?. Proceedings of the 2006 International Conference on Security and Management (405-409). CSREA Press.
  • Knights, L., Fonceca, M., Mack, G., Woodward, A. (2006). Risks and Responsibilities in Establishing a Wireless Network for an Educational Institution. Proceedings of the 4th Australian Information Security Conference (131-138). School of Computer and Information Science.
  • Crowley, M., Woodward, A. (2006). Does your wireless LAN have criminal intent?. Proceedings of the 4th Australian Information Security Conference (84-92). School of Computer and Information Science.
  • Woodward, A. (2006). BitLocker - the end of digital forensics?. Proceedings of the 4th Australian Digital Forensics Conference (90-97). Edith Cowan University.

Journal Articles

  • Woodward, A., Bennett, I. (2005). The effect of salt stress and abscisic acid on proline production, chlorophyll content and growth of in vitro propagated shoots of Eucalyptus camaldulensis. Plant Cell, Tissue and Organ Culture, 82(2), 189-200. https://doi.org/10.1007/s11240-005-0515-4.

Conference Publications

  • Valli, C., Woodward, A., Wild, K., Karvinen, R. (2005). An investigation into long range detection of passive UHF RFID Tags. Proceedings of the 3rd Australian Computer, Network and Information Forensics Conference (84-86). School of Computer and Information Science, Edith Cowan University.
  • Woodward, A. (2005). Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations. Proceedings of the 3rd Australian Information Security Management Conference (133-140). ECU.
  • Williams, T., Woodward, A. (2005). Elicitation and customisation of generic skills in a security major. Developing Partnerships: Proceedings of the First Colloquium for Information Systems Security Education - Asia Pacific (CISSE-AP) (42-50). University of South Australia.
  • Woodward, A. (2005). WPA/WPA2: Placebo or Panacea?. Proceedings of the 6th Australian Information Warfare and Security Conference (157-164). Deakin University.
  • Woodward, A. (2005). The effectiveness of commercial erasure programs on BitTorrent activity. Proceedings of the 3rd Australian Computer, Network and Information Forensic Conference (108-114). ECU.

Journal Articles

  • Woodward, A. (2004). An analysis of current 802.11 wireless network layer one and two attacks and possible preventative measures. Journal of Information Warfare, 3(3), 37-47.

Conference Publications

  • Woodward, A. (2004). The risks, costs and possible solutions involved in setting up and running wireless local area networks. 2nd Australian Computer Network and Information Forensics Conference Proceedings (130-135). Edith Cowan University.
  • Woodward, A. (2004). Wireless Jacks: An analysis of 802.11 wireless denial of service attacks and hijacks. Proceedings of the 3rd European Conference on Information Warfare and Security (365-370). Academic Conferences Ltd.
  • Woodward, A., Wolski, P. (2004). Sleep attack: Exploring a possible denial of service attack based on power save mode in 802.11 devices. 5th Australian Information Warfare and Security Conference Proceedings (181-185). Edith Cowan University.

Research Projects

  • Evaluation of selected clones of jackfruit (Artocarpus heterophyllus Lam.) produced in different preharvest settings, CRC for Developing Northern Australia, Grant, 2021 ‑ 2024, $150,000.
  • Academic Centre of Cyber Security Excellence, Department of Education, Skills and Employment, Academic Centres of Cyber Security Excellence, 2017 ‑ 2021, $950,287.
  • Authentication and Authorisation for Entrusted Unions (AU2EU), European Commission, Grant - Seventh Framework Programme (FP7), 2013 ‑ 2015, $83,371.
  • Rules, Expectations and Security through Privacy-Enhanced Convenient Technologies (RESPECT) - Proposal No 285582, European Commission, Grant - Seventh Framework Programme (FP7), 2012 ‑ 2015, $223,800.
  • Scalable Measures for Automated Recognition Technologies (SMART), European Union, EU Seventh Framework Program, 2011 ‑ 2014, $389,772.
  • The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN), Griffith University, Grant - NIRAP, 2009 ‑ 2013, $37,139.
  • Overclocking of mechanical hard disk drives, Attorney General's D Branch, Attorney General's Department, D Branch Grant, 2011 ‑ 2012, $54,545.
  • Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support For National Security, 2010 ‑ 2012, $77,154.
  • Practical Information Security Capability Assessment Protocols for Application in the General Medical Practice Environment, Edith Cowan University, ECU Early Career Researcher - Grant, 2009 ‑ 2011, $24,502.
  • Leading edge developments in tourism ICT and related underlying technologies, CRC Centre for Sustainable Tourism, Grant, 2004, $17,000.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy, An investigation into off-link ipv6 host enumeration search techniques

Co-principal Supervisor

  • Master of Science (Computer Science), An assessment of static and dynamic malware analysis techniques for the android platform
  • Doctor of Philosophy, .
  • Doctor of Information Technology, A method for securing online community service: A study of selected Western Australian councils

Associate Supervisor

  • Doctor of Philosophy, An intelligence model for terrorist incident prevention for Australian police: A systemic investigation
  • Doctor of Philosophy, Vulnerabilities in class one electronic product code radio frequency identification systems
  • Doctor of Philosophy, An investigation into factors inhibiting Australian end-users from utilising adsl router security effectively
  • Doctor of Philosophy, Extraction of patterns in selected network traffic for a precise and efficient intrusion detection approach
  • Doctor of Information Technology, Security awareness by online banking users in Western Australian of phishing attacks
  • Doctor of Philosophy, The development of an attack graph using applied levels of deception for directing attack methods in a honeynet.
  • Doctor of Philosophy, A non-device specific framework for the development of forensic locational data analysis procedure for consumer grade small and embedded devices
  • Doctor of Philosophy, An investigation into remote transactions.
  • Doctor of Philosophy, Secure portable execution and storage environments: A capability to improve security for remote working
Skip to top of page