Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Professor Craig Valli

Director, ECU Security Research Institute

Staff Member Details
Telephone: +61 8 6304 5109
Mobile: 0447 853 517
Email: c.valli@ecu.edu.au
Campus: Joondalup  
Room: JO23.306  
ORCID iD: https://orcid.org/0000-0002-2298-9791

Professor Craig Valli is the Director of the ECU Security Research Institute and Professor (Digital Forensics) within the School of Science.

Background

Professor Valli has over 30 years’ experience in the ICT Industry, and regularly consults with industry and government, conducting research on securing networks and critical infrastructures, detection of network borne threats, forensic analysis of cyber security incidents, network security and digital forensics he has over 200 refereed publications.

Craig started his university career in 2000, holding various positions including Lecturer and then Head of School for the School of Computer and Security Science in 2009, Craig was made a Professor of Digital Forensics in the same year. He continued as Head of School before accepting his current position of Director of the ECU Security Research Institute in 2012.

Craig and his team led the bid for the now successful, $140 million 7 year Cyber Security Co-operative Research Centre (CSCRC) headquartered in WA. Craig is a member of the High Tech Crime Investigators Association (Australian Chapter), the INTERPOL Cyber Crime Experts Group and also INTERPOL Digital Forensics Expert Group. A member of AISA and IEEE and is a Fellow of the Australian Computer Society. He serves on several cyber security related conference committees and journal editorial boards.

Professional Associations

  • Australian Computer Society
  • Australian Information Security Association
  • High Tech Crime Investigators Association

Awards and Recognition

National and International Awards

  • 2010 WAITTA - IT Achiever of the Year Award
  • 2010 Inventor of the Year Award Finalist

Research Areas and Interests

  • Network Security and Forensics, Honeypots, Intrusion Detection Systems, Internet Misuse, Compute Clustering (Beowulf), Computer Forensics, Wireless Security and SCADA Security

Qualifications

  • Bachelor of Education, Edith Cowan University.
  • Doctor of Information Technology, Edith Cowan University, 2003.
  • Masters of Management Information Systems, Edith Cowan University, 2001.
  • Diploma of Teaching, Western Australian CAE, 1985.

Research Outputs

Book Chapters

Journal Articles

Book Chapters

  • Syed, N., Ibrahim, A., Baig, Z., Valli, C. (2019). Bio-inspired cyber-security for the smart grid. Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Application (373-392). Institution of Engineering and Technology (IET). https://doi.org/10.1049/PBSE010E_ch14.

Journal Articles

  • Yang, W., Wang, S., Hu, J., Zheng, G., Yang, J., Valli, C. (2019). Securing Deep Learning Based Edge Finger-vein Biometrics with Binary Decision Diagram. IEEE Transactions on Industrial Informatics, 15(7), 4244-4253. https://doi.org/10.1109/TII.2019.2900665.
  • Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C. (2019). Security and Accuracy of Fingerprint-Based Biometrics: A Review. Symmetry, 11(2), article no.141. https://doi.org/10.3390/sym11020141.
  • Zheng, G., Yang, W., Valli, C., Shankaran, R., Abbas, H., Zhang, G., Fang, G., Chaudhry, J., Qiao, L. (2019). Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations. IEEE Access, 7(2019), 75629-75641. https://doi.org/10.1109/ACCESS.2019.2920850.
  • Zheng, G., Yang, W., Valli, C., Qiao, L., Shankaran, R., Orgun, MA., Mukhopadhyay, SC. (2019). Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices. IEEE Journal of Biomedical and Health Informatics, 23(4), 1546-1557. https://doi.org/10.1109/JBHI.2018.2864796.
  • Zheng, G., Shankaran, R., Yang, W., Valli, C., Qiao, L., Orgun, M., Mukhopadhyay, SC. (2019). A Critical Analysis of ECG-based Key Distribution for Securing Wearable and Implantable Medical Devices. IEEE Sensors Journal, 19(3), 1186-1198. https://doi.org/10.1109/JSEN.2018.2879929.
  • Yang, W., Wang, S., Zheng, G., Valli, C. (2019). Impact of feature proportion on matching performance of multi-biometric systems. ICT Express, 5(1), 37-40. https://doi.org/10.1016/j.icte.2018.03.001.
  • Yang, W., Wang, S., Zheng, G., Yang, J., Valli, C. (2019). A Privacy-Preserving Lightweight Biometric System for Internet-of-Things Security. IEEE Communications Magazine, 57(3), 84-89. https://doi.org/10.1109/MCOM.2019.1800378.
  • McAteer, I., Ibrahim, A., Zheng, G., Yang, W., Valli, C. (2019). Integration of Biometrics and Steganography: A Comprehensive Review. Technologies, 7(2), Article no. 34. https://doi.org/10.3390/technologies7020034.
  • Yang, W., Wang, S., Hu, J., Ibrahim, A., Zheng, G., Macedo, M., Johnstone, M., Valli, C. (2019). A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things. Sensors, 19(13), article no.2985. https://doi.org/https://doi.org/10.3390/s19132985.

Conference Publications

  • Cabral, WZ., Valli, C., Sikos, L., Wakeling, S. (2019). Review and Analysis of Cowrie Artefacts and their Potential to be Used Deceptively. Proceedings of 6th Annual Conference on Computational Science & Computational Intelligence (166-171). Institute of Electrical and Electronics Engineers, Inc.. https://doi.org/10.1109/CSCI49370.2019.00035.
  • Speelman, C., Valli, C., Guidetti, O. (2019). Towards a Method for Examining the Effects of Cognitive Load on the Performance of Cyber First Responders. Proceedings of the International Conference on Security and Management (SAM) (41-47). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).

Book Chapters

Journal Articles

  • Yang, W., Wang, S., Hu, J., Zheng, G., Valli, C. (2018). A Fingerprint and Finger-vein Based Cancelable Multi-biometric System. Pattern Recognition, 78(June 2018), 242-251. https://doi.org/10.1016/j.patcog.2018.01.026.
  • Abrar, H., Hussain, S., Chaudhry, J., Saleem, K., Orgun, M., Al-Muhtadi, J., Valli, C. (2018). Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry. IEEE Access, 6(13 February 2018), 19140-19150. https://doi.org/10.1109/ACCESS.2018.2805919.
  • Yang, W., Wang, S., Hu, J., Zheng, G., Chaudhry, J., Adi, E., Valli, C. (2018). Securing Mobile Healthcare Data: A Smart Card based Cancelable Finger-vein Bio-Cryptosystem. IEEE Access, 6(26 January 2018), 9390-9403. https://doi.org/10.1109/ACCESS.2018.2799522.
  • Ibrahim, A., Valli, C., McAteer, I., Chaudhry, J. (2018). A security review of local government using NIST CSF: a case study. Journal of Supercomputing, 74(10), 5171-5186. https://doi.org/10.1007/s11227-018-2479-2.
  • Yang, W., Wang, S., Zheng, G., Chaudhry, J., Valli, C. (2018). ECB4CI: An Enhanced Cancelable Biometric System for Securing Critical Infrastructures. Journal of Supercomputing, 74(10), 4893-4909. https://doi.org/10.1007/s11227-018-2266-0.

Conference Publications

  • Chaudhry, J., Valli, C., Crowley, M., Haass, J., Roberts, P. (2018). POStCODE Middleware for Post-Market Surveillance of Medical Devices for Cyber Security in Medical and Healthcare Sector in Australia. International Symposium on Medical Information and Communication Technology, ISMICT (10 p.). IEEE Computer Society. https://doi.org/10.1109/ISMICT.2018.8573695.
  • Valli, C., Johnstone, M., Fleming, R. (2018). A Survey of Lawyers’ Cyber Security Practises in Western Australia. Annual ADFSL Conference on Digital Forensics, Security and Law (219-226). Association of Digital Forensics, Security and Law.
  • Yang, W., Zheng, G., Ibrahim, A., Chaudhry, J., Wang, S., Hu, J., Valli, C. (2018). Application of 3D Delaunay Triangulation in Fingerprint Authentication System. Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (291-298). Springer. https://doi.org/10.1007/978-3-319-90775-8_23.
  • Chaudhry, J., Farmand, S., Islam, S., Islam, MR., Hannay, P., Valli, C. (2018). Discovering trends for the development of novel authentication applications for dementia patients. International Conference on Applications and Techniques in Cyber Security and Intelligence, Applications and Techniques in Cyber Security and Intelligence (220-237). Springer. https://doi.org/10.1007/978-3-319-67071-3_29.

Book Chapters

  • Zheng, G., Shankaran, R., Valli, C. (2017). Cyber Security for Wireless Implants. Wearable Sensors: Applications, design and implementation (27p.). IoP Publishing. https://doi.org/10.1088/978-0-7503-1505-0.

Journal Articles

  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M. (2017). Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13. https://doi.org/10.1016/j.diin.2017.06.015.
  • Chernyshev, M., Valli, C., Johnstone, M. (2017). Revisiting Urban War Nibbling: Mobile Passive Discovery of Classic Bluetooth Devices Using Ubertooth One. IEEE Transactions on Information Forensics and Security, 12(7), 1625-1636. https://doi.org/10.1109/TIFS.2017.2678463.

Conference Publications

  • Murray, G., Johnstone, M., Valli, C. (2017). The convergence of IT and OT in critical infrastructure. Proceedings of the 15th Australian Information Security Management Conference (149-155). Edith Cowan University.
  • Syed, N., Baig, Z., Valli, C., Ibrahim, A. (2017). Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. Proceedings 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (748-755). IEEE. https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.115.
  • Bothur, D., Zheng, G., Valli, C. (2017). A critical analysis of security vulnerabilities and countermeasures in a smart ship system. The Proceedings of 15th Australian Information Security Management Conference (81-87). Edith Cowan University.
  • Chaudhry, J., Ahmad, M., Habib, MA., Ashraf, R., Valli, C. (2017). Enhancements in Data-Recovery and Re-Transmit Mechanisms of Transmission Control Protocol Enabled Medical Devices. Proceedings 2017 IEEE 42nd Conference on Local Computer Networks Workshops (121-12721-127). IEEE.
  • Peacock, M., Johnstone, M., Valli, C. (2017). Security Issues with BACnet Value Handling. Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP) 2017 (546-552). Science and Technology Publications.
  • Zheng, G., Zhang, G., Yang, W., Valli, C., Shankaran , R., Orgun, MA. (2017). From WannaCry to WannaDie: Security Trade-offs and Design for Implantable Medical Devices. 17th International Symposium on Communications and Information Technologies (ISCIT2017) (1-5). IEEE. https://doi.org/10.1109/ISCIT.2017.8261228.
  • Chaudhry, J., Saleem, K., Islam, R., Selamat, A., Ahmed, M., Valli, C. (2017). AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments. Proceedings 2017 IEEE 42nd Conference on Local Computer Networks Workshops (121-127). IEEE. https://doi.org/10.1109/LCN.Workshops.2017.73.
  • Rabadia, P., Valli, C., Ibrahim, A., Baig, Z. (2017). Analysis of attempted intrusions: Intelligence gathered from SSH honeypots. The Proceedings of 15th Australian Information Security Management Conference (10p.). Edith Cowan University. https://doi.org/10.4225/75/5a839e6d1d283.

Journal Articles

  • Chernyshev, M., Valli, C., Hannay, P. (2016). On 802.11 Access Point Locatability and Named Entity Recognition in Service Set Identifiers. IEEE Transactions on Information Forensics and Security, 11(3), 584 - 593. https://doi.org/10.1109/TIFS.2015.2507542.

Conference Publications

  • Chernyshev, M., Valli, C., Hannay, P. (2016). Service set identifier geolocation for forensic purposes: Opportunities and challenges. Proceedings of the 49th Hawaii International Conference on System Sciences (Article no. 7427866). IEEE Computer Society. https://doi.org/10.1109/HICSS.2016.678.

Conference Publications

  • Valli, C., Rabadia, P., Woodward, A. (2015). A Profile of Prolonged, Persistent SSH Attack on a Kippo Based Honeynet. Proceedings of the Conference on Digital Forensics, Security and Law (23-32). Association of Digital Forensics, Security and Law.
  • Chernyshev, M., Valli, C., Hannay, P. (2015). 802.11 Tracking and Surveillance - A Forensic Perspective. Proceedings of the International Conference on Security and Management (SAM'15) (349-352). WorldComp.
  • Rabadia, P., Valli, C. (2015). Analysis into developing accurate and efficient intrusion detection approaches. Proceedings of 13th Australian Digital Forensics Conference (70-76). ECU Security Research Institute.
  • Ibrahim, A., Valli, C. (2015). Image Similarity using Dynamic Time Warping of Fractal Features. Proceedings of 13th Australian Digital Forensics Conference (111-122). ECU Security Research Institute.
  • Thomas, T., Valli, C. (2015). Mapping the laws which apply to intercepting wireless communications in a Western Australian legal context. Proceedings of the 13th Australian Digital Forensics Conference (22-36). ECU Security Research Institute.
  • Heriyanto, A., Valli, C., Hannay, P. (2015). Comparison of live response, Linux memory extractor (lime) and mem tool for acquiring android's volatile memory in the malware incident. Proceedings of 13th Australian Digital Forensics Conference (5-14). ECU Security Research Institute.

Conference Publications

  • Valli, C., Woodward, A., Hannay, P., Johnstone, M. (2014). Why penetration testing is a limited use choice for sound cyber security practice. Proceedings of the 2014 ADFSL Conference on Digital Forensics, Security and Law (35-40). Association of Digital Forensics, Security and Law.
  • Rabadia, P., Valli, C. (2014). Finding evidence of wordlists being deployed against SSH Honeypots - implications and impacts. Proceedings of 12th Australian Digital Forensics Conference (114-121). ECU. https://doi.org/10.4225/75/57b3e7d5fb882.
  • Valli, C., Martinus, I., Johnstone, M. (2014). Small to Medium Enterprise Cyber Security Awareness: An Initial Survey of Western Australian Business. Proceedings of the 2014 International Conference on Security and Management (71-75). CSREA Press.

Conference Publications

  • Hannay, P., Carpene, C., Valli, C., Woodward, A., Johnstone, M. (2013). Exchanging Demands: Weaknesses in SSL Implementations for Mobile Platforms. Proceedings of the 11th Australian Information Security Management Conference (42-48). Security Research Centre, Edith Cowan University.
  • Valli, C., Rabadia, P., Woodward, A. (2013). Patterns and Patter - An Investigation Into SSH Activity Using Kippo Honeypots. The Proceedings of 11th Australian Digital Forensics Conference (141-149). Security Research Centre, Edith Cowan University.

Conference Publications

  • Valli, C., Woodward, A., Carpene, C., Hannay, P., Brand, M., Karvinen, R., Holme, C. (2012). Eavesdropping on the Smart Grid. The Proceedings of the 10th Australian Digital Forensics Conference (54-60). Security Research Centre, Edith Cowan University.
  • Coole, M., Woodward, A., Valli, C. (2012). Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems. The Proceedings of the 5th Australian Security and Intelligence Conference (36-43). Security Research Centre, Edith Cowan University.
  • Valli, C. (2012). SSH -- Somewhat Secure Host. LNCS 7672 - Cyberspace Safety and Security, 4th International Symposium, CSS 2012 (227-235). Springer. https://doi.org/10.1007/978-3-642-35362-8_18.

Conference Publications

  • Limwiriyakul, S., Valli, C. (2011). An IT Security Investigation into the Online Payment Systems of Selected Local Government Councils in WA. Proceedings of the 2011 International Conference on Security & Management (598-604). CSREA Press.
  • Valli, C., Woodward, A., Hannay, P. (2011). Backtrack in the Outback - A Preliminary Report on Cyber Security Evaluation of Organisations in Western Australia. Proceedings of the Conference on Digital Forensics, Security, and Law 2011 (191-195). Association of Digital Forensics, Security and Law.
  • Brand, M., Valli, C., Woodward, A. (2011). A Threat to Cyber Resilience : A Malware Rebirthing Botnet. Proceedings of the 2nd International Cyber Resilience Conference (1-6). Security Research Centre, Edith Cowan University.

Journal Articles

  • Valli, C. (2010). Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity. Journal of Digital Forensics, Security and Law, 5(2), 35-44.
  • Brand, M., Valli, C., Woodward, A. (2010). Malware Forensics: Discovery of the Intent of Deception. Journal of Digital Forensics, Security and Law, 5(4), 31-42.
  • Jones, A., Valli, C., Dardick, G., Sutherland, I., Dabibi, G., Davies, G. (2010). The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. Journal of Digital Forensics, Security and Law, 5(4), 43-64.

Conference Publications

  • Leng, J., Valli, C., Armstrong, L. (2010). A Wrapper-based Feature Selection for Analysis of Large Data Sets. 2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010) (167-170). IEEE.
  • Valli, C., Al-Lawati, M. (2010). Developing Robust VoIP Router Honeypots Using Device Fingerprints.. Proceedings of The 2010 International Cyber Resilience Conference ICR 2010 (90-96). Security Research Centre, Edith Cowan University.
  • Alam, MN., Vasiliev, M., Alameh, K., Valli, C. (2010). Magneto-optical visualisation for high-resolution forensic data recovery using advanced thin film nano-materials. Proceedings of the 2010 International Cyber Resilience Conference (78-82). Security Research Centre, Edith Cowan University.
  • Valli, C., Al Lawati, M. (2010). Developing VoIP Router honeypots. Proceedings of the 2010 International Conference on Security & Management (SAM '10) (615-619). CSREA Press.
  • Valli, C., Hannay, P. (2010). Geotagging Where Cyberspace Comes to Your Place. Proceedings of the 2010 International Conference on Security & Management (SAM '10) (627-630). CSREA Press.
  • Valli, C. (2010). An Analysis of Malfeasant Activity Directed at a VoIP Honeypot. Proceedings of 8th Australian Digital Forensics Conference (169-174). Security Research Centre, Edith Cowan University.
  • Szewczyk, P., Valli, C. (2010). Ignorant experts: computer and network security support from internet service providers. Proceedings 2010 4th International Conference on Network and System Security (NSS) (323-327). IEEE. https://doi.org/10.1109/NSS.2010.42.
  • Brand, M., Valli, C., Woodward, A. (2010). Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software.. The Proceedings of the 8th Australian Digital Forensics Conference (31-38). Security Research Centre, Edith Cowan University.
  • Woodward, A., Valli, C. (2010). Which organisational model meets best practice criterion for critical infrastructure providers: An examination of the Australian perspective based on case studies.. Proceedings of The 2010 International Cyber Resilience Conference icr 2010 (118-125). Security Research Centre, Edith Cowan University.

Book Chapters

  • Valli, C. (2009). Management of Evidence Storage. Building a Digital Forensics Laboratory (139-146). Butterworth-Heinemann.
  • Valli, C. (2009). Scoping the Requirement for the Laboratory. Building a Digital Forensics Laboratory (47-58). Butterworth-Heinemann.
  • Valli, C. (2009). Education and Training. Building a Digital Forensics Laboratory (10). Butterworth-Heinemann.
  • Valli, C. (2009). Understanding the role of the Digital Forensic Laboratory Manager. Building a Digital Forensics Laboratory (181-190). Butterworth-Heinemann.
  • Valli, C. (2009). Quality Assurance. Building a Digital Forensics Laboratory (149-157). Butterworth-Heinemann.
  • Valli, C. (2009). Management of the Collection of Evidence. Building a Digital Forensics Laboratory (127-137). Butterworth-Heinemann.
  • Valli, C. (2009). Selecting the Staff. Building a Digital Forensics Laboratory (79-86). Butterworth-Heinemann.
  • Valli, C. (2009). The future of Digital Forensics and Its Role in Criminal Investigations. Building a Digital Forensics Laboratory (249-253). Butterworth-Heinemann.
  • Valli, C. (2009). Laboratory Location. Building a Digital Forensics Laboratory (71-78). Butterworth-Heinemann.

Journal Articles

  • Jones, A., Valli, C., Dardick, G. (2009). The 2008 analysis of information remaining on disks offered for sale on the second hand market. International Journal of Liability and Scientific Enquiry, 4(3), 162-175.
  • Szewczyk, P., Valli, C. (2009). Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective. Journal of Digital Forensics, Security and Law, 4(3), 5-16.
  • Valli, C. (2009). Visualisation of Honeypot Data Using Graphviz and Afterglow. Journal of Digital Forensics, Security and Law, 4(2), 27-38.
  • Jones, A., Dardick, G., Davies, G., Sutherland, I., Valli, C. (2009). The 2008 analysis of information remaining on disks offered for sale on the second hand market. Journal of International Commercial Law and Technology, 4(3), 162-175.

Conference Publications

  • Jones, A., Valli, C., Dabibi, G. (2009). The 2009 Analysis of Information Remaining on USB Storage Devices Offered for Sale on the Second Hand Market. Proceedings of The 7th Australian Digital Forensics Conference (8-14). Centre for Security Research, Edith Cowan University.
  • Valli, C. (2009). The not so smart, smart grid – potential security risks associated with the deployment of smart grid technologies. Proceedings of The 7th Australian Digital Forensics Conference (19-23). Centre for Security Research, Edith Cowan University.
  • Valli, C. (2009). Snort IDS for SCADA Networks. Proceedings of the 2009 International Conference on Security and Management (SAM 2009) (618-621). CSREA Press.
  • Valli, C., Woodward, A. (2009). SCADA Security - Slowly Circling a Disaster Area. Proceedings of the 2009 International Conference on Security and Management (SAM 2009) (613-617). CSREA Press.

Journal Articles

  • Jones, A., Valli, C., Sutherland, I. (2008). Analysis of Information Remaining on Hand Held Devices for Sale on the Second Hand Market. Journal of Digital Forensics, Security and Law, 3(2), 55-70.
  • Jones, A., Valli, C., Dardick, G., Sutherland, I. (2008). The 2007 Analysis of Information Remaining on Disks offered for sale on the second hand market. Journal of Digital Forensics, Security and Law, 3(1), 5-24.

Conference Publications

  • Valli, C., Brand, MW. (2008). The Malware Analysis Body of Knowledge (MABOK). Proceedings of the 6th Australian Digital Forensics Conference (70-72). Centre for Security Research, Edith Cowan University.
  • Williams, T., Valli, C. (2008). Trust me. I am a Doctor. Your Records Are Safe.... Proceedings of the 6th Australian Information Security Management Conference (155-162). Centre for Security Research, Edith Cowan University.
  • Valli, C., Woodward, A. (2008). The 2008 Australian Study of Remnant Data Contained on 2nd Hand Hard Disks: The Saga Continues. Proceedings of the 6th Australian Digital Forensics Conference (211-214). Centre for Security Research, Edith Cowan University.
  • Woodward, A., Valli, C. (2008). Issues Common to Australian Critical Infrastructure Providers Scada Networks Discovered Through Computer and Network Vulnerability Analysis.. Proceedings of the 6th Australian Digital Forensics Conference (204-208). Centre for Security Research, Edith Cowan University.
  • Valli, C., Jones, A. (2008). A Study into the Forensic Recoverability of Data from 2nd Hand Blackberry Devices: World-Class Security, Foiled by Humans. Proceedings of the 2008 International Conference on Security & Management (SAM '08) (604-607). CSREA Press.

Journal Articles

  • Valli, C. (2007). Honeypot technologies and their applicability as a strategic internal countermeasure. International Journal of Information and Computer Security, 1(4), 430-436.

Conference Publications

  • Valli, C., Wooten, A. (2007). An Overview of ADSL Homed Nepenthes Honeypots In Western Australia.. Proceedings of 5th Australian Digital Forensics Conference (203-208). Edith Cowan University.
  • Valli, C., Woodward, A. (2007). Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks. Proceedings of 5th Australian Digital Forensics Conference (218-222). Edith Cowan University.
  • Valli, C. (2007). IT Sharps: Issues Relating to Securely Disposing of Hard Disks From Medical Information Systems. Proceedings of the 2007 International Conference on Security and Management (SAM'07) (506-509). CSREA Press, U.S.A..
  • Woodward, A., Valli, C. (2007). Do Current Erasure Programs Remove Evidence of BitTorrent Activity?. Proceedings of the Conference on Digital Forensics, Security and Law. (147-158). Association of Digital Forensics, Security and Law.

Journal Articles

  • Morfitt, K., Valli, C. (2006). A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients. Digital Forensics, Security and Law. Journal, 1(3), 51-63.
  • Jones, A., Valli, C., Sutherland, I., Thomas, P. (2006). The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market. Digital Forensics, Security and Law. Journal, 1(3), 23-36.
  • Valli, C. (2006). A Preliminary Investigation into Malware Propagation on Australian ISP Networks using the mwcollect Malware Collector daemon. Journal of Information Warfare, 5(1), 1-9.

Conference Publications

  • Valli, C. (2006). The Insider Threat to Medical Records: Has the network Age Changed anything?. Proceedings of the 2006 International Conference on Security and Management (SAM '06) (410-414). CSREA Press, U.S.A..
  • Hansen, K., Valli, C. (2006). The implemention of E-mail content management in a large corporation. Proceedings of 4th Australian Information Security Management Conference (103-113). School of Computer and Information Science, Edith Cowan University, Australia.
  • Szewczyk, P., Valli, C. (2006). Personal Firewalls - Testing Robustness. Proceedings of the 4th Australian Digital Forensics Conference (105-112). Edith Cowan University.
  • Innes, S., Valli, C. (2006). Honeypots: How do you know when you're inside one?. Proceedings of the 4th Australian Digital Forensics Conference (78-83). Edith Cowan University.
  • Valli, C. (2006). Use of bootable Linux CDs for the delivery of educational course content. Making and keeping connections: Life, learning and information networks: Proceedings of the Transforming Information and Learning Conference (106-111). Edith Cowan University, Perth.
  • Valli, C. (2006). SQL Injection - Threats to Medical Systems: The Issues and Countermeasures. Proceedings of the 2006 International Conference on Security and Management (SAM '06) (421-425). CSREA Press, U.S.A..
  • Valli, C. (2006). Establishing a vendor neutral skills based framework for digital forensics curriculum development and competence assessment. Proceedings of the 4th Australian Digital Forensics Conference (153-158). Edith Cowan University.

Conference Publications

  • Valli, C. (2005). Issues relating to the Forensic Analysis of PDA and Telephony (PDAT) Enabled Devices. 4th European Conference on Information Warfare and Security (363-367). Academic Conferences Limited.
  • Valli, C., Woodward, A., Wild, K., Karvinen, R. (2005). An investigation into long range detection of passive UHF RFID Tags. Proceedings of the 3rd Australian Computer, Network and Information Forensics Conference (84-86). School of Computer and Information Science, Edith Cowan University.
  • Valli, C. (2005). Integrating Open Source Protections into SCADA Networks. Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference (165-168). Deakin University.
  • Valli, C., Jones, A. (2005). A UK and Australian Study of Hard Disk Disposal. Proceedings of the 3rd Australian Computer, Network and Information Forensics Conference (74-78). School of Computer and Information Science, ECU.
  • Morfitt, K., Valli, C. (2005). After Conversation - A Forensic ICQ Logfile Extraction Tool. Proceedings of the 3rd Australian Computer, Network and Information Forensics Conference (54-61). School of Computer and Information Science, Edith Cowan University.
  • Valli, C., Patak, P. (2005). An investigation into the efficiency of forensic erasure tools for hard disk mechanisms. Proceedings of the 3rd Australian Computer, Network and Information Forensics Conference (79-83). School of Computer and Information Science, Edith Cowan University.
  • Valli, C. (2005). Honeypot technologies and their applicability as an internal countermeasure. Proceedings of the 3rd Austalian Computer, Network and Information Forensics Conference (68-73). School of Computer and Information Science, Edith Cowan University.

Journal Articles

  • Valli, C. (2004). Non-Business use of the WWW in three Western Australian Organisations. Internet Research, 14(5), 353-359.

Conference Publications

  • Valli, C. (2004). WITS: Wireless intrusion tracking system. Proceedings of the 3rd European Conference on Information Warfare and Security (359-363). Academic Conferences Ltd.
  • Valli, C., Wolski, P. (2004). 802.11b wireless networks insecure at any speed. Proceedings of the International Conference on Security and Management: SAM'04 (0). CSREA Press.
  • Valli, C. (2004). Wireless snort: A WIDS in progress. 2nd Australian Computer, Network and Information Forensics Conference: Conference Proceedings (112-116). Edith Cowan University.
  • Valli, C. (2004). Throwing out the Enterprise with the Hard Disk. 2nd Australian Computer, Network and Information Forensics Conference: Conference Proceedings (124-129). Edith Cowan University.

Conference Publications

  • Valli, C. (2003). Industry Certification: Challenges for the conduct of University security based courses. Enhancing Trust (357-361). University of South Australia.
  • Xenitellis, S., Valli, C. (2003). A Case Study in the Security of Network Enabled Devices. 2nd European Conference on Information Warfare and Security (357-364). MCIL.
  • Valli, C. (2003). Honeyd - A OS Fingerprinting Artifice. 1st Australian Computer Network and Information Forensics Conference (5p.). We-B centre, School of Computer and Infomation Science, Edith Cowan University.
  • Valli, C., Gupta, N. (2003). An Initial Investigation into the Performance of the Honeyd Virtual Honeypot System. Enhancing Trust (363-369). University of South Australia.

Conference Publications

  • Valli, C. (2002). An Examination of Non-Business Usage of the World Wide Web in Two Western Australian Organisations. Computer Ethics: Its Impact Upon Australia (). AiCE.
  • Valli, C. (2002). With Speed the Hacker Cometh. 3rd Australian Information Warfare & Security Conference (). We-B Centre, Edith Cowan University.
  • Valli, C., Yek, S. (2002). If You go Down the Internet Today - Deceptive Honeypots. 3rd Australian Information Warfare & Security Conference (). We-B Centre, Edith Cowan University.
  • Valli, C. (2002). The Proxy Bakers Dirty Dozen - An Analysis of Abusive Users of a WWW Cache. Protecting the Infrastructure Proceedings (). University of Wollongong.
  • Valli, C. (2002). The New Homeland Defense. European Conference on Information Warfare and Security (). MCIL.
  • Valli, C. (2002). The Misuse of the Internet at Work. 3rd International Network Conference (). Network Research Group, University of Plymouth.

Journal Articles

  • Valli, C. (2001). NIDH - Network Intrusion Dection Hierarchy. Journal of Information Warfare, 1, 42-49.

Conference Publications

  • Valli, C. (2001). Digital chimney sweeps - maximising your internet connections business potential. Working for Excellence in the E-conomy (299-307). We-B Centre, Edith Cowan University.
  • Valli, C., Voeten-Lim, A. (2001). Automaton hackers. 2nd Australian Information Warfare and Security Conference (133-143). We-B Centre, Edith Cowan University.
  • Valli, C. (2001). The well bookshop - moving to virtuality. Business Information Technology Management Enabling Cultural Awareness (0). RITI.
  • Valli, C. (2001). The stumbling blocks of trust in virtual organising. Business Information Technology Management Enabling Cultural Awareness (0). RITI.
  • Valli, C. (2001). Key knowledge matrix - a tool for guiding an intranet based knowledge management system. Working for Excellence in the E-conomy (376-381). We-B Centre, Edith Cowan University.
  • Valli, C., Marshall, P. (2001). An initial study of Australian on-line bookstores. 2nd Annual Global Information Technology Management World Conference (82-85). GITMA.

Research Projects

  • Undergraduate cybersecurity education in Australia - does it meet the mark?, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2020 ‑ 2023, $180,000.
  • Measuring and Mitigating Vigilance Decrement in Cyber Network Defence Tasks, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2019 ‑ 2022, $225,000.
  • Academic Centre of Cyber Security Excellence, Department of Education, Skills and Employment, Academic Centres of Cyber Security Excellence, 2017 ‑ 2021, $950,287.
  • Honeypot Deployment Architecture, Cyber Security Research Centre Ltd, Cyber Security Research Centre Ltd, 2019 ‑ 2021, $130,000.
  • ESSENTIAL - Evolving Security SciencE through Networked Technologies, Information policy And Law, European Commission, Horizons 2020, 2017 ‑ 2021, $394,374.
  • Drone Policy Review and Forensic Handbook, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 ‑ 2020, $10,700.
  • ISMS Framework, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 ‑ 2020, $21,400.
  • Anti-spear phishing by detecting Email Impersonation, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 ‑ 2020, $10,700.
  • Anti-Business Email Compromise, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 ‑ 2020, $10,700.
  • Power Honeynet Development Pilot Research and Development Project , Western Power, Western Power - Grant, 2020, $20,000.
  • Power Honeynet Development Pilot Research and Development Project , Horizon Power, Grant, 2020, $20,000.
  • Password Hardening Tools, Cyber Security Research Centre Ltd, Sprint Student Grant, 2018 ‑ 2019, $70,000.
  • Vulnerabilities in Ship Control Systems, Defence Science and Technology Group of the Department of Defence, Grant, 2017 ‑ 2018, $400,000.
  • Cyber Security Survey and Professional Development Seminars, Law Society of WA, Grant, 2017 ‑ 2018, $6,000.
  • Advanced Biometric Template Protection: Design of a Cancelable Biometric Framework, Defence Science and Technology Group of the Department of Defence, Competitive Evaluation Research Agreement (CERA) Program, 2017 ‑ 2018, $97,729.
  • Cyber Electronic Warfare: The effects of team dynamics, cognitive load and team mental models., Defence Science and Technology Group of the Department of Defence, Competitive Evaluation Research Agreement (CERA) Program, 2017 ‑ 2018, $99,369.
  • Internet of Things (IoT) ModBUS and BacNET, Cisco Systems Australia Pty Ltd, CISCO - Grant, 2015 ‑ 2018, $110,000.
  • Design of a Biometric Protection System using Feature Transformation Techniques, Edith Cowan University, Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017, 2017, $8,700.
  • Internet of Things (IoT), Cisco Systems Australia Pty Ltd, CISCO - Grant, 2016 ‑ 2017, $60,000.
  • Investigation of social media for radicalisation and terrorism in the Maldives, Edith Cowan University, Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 – 2017, 2017, $11,000.
  • Cyber Check.me, City of Joondalup, Grant, 2015 ‑ 2016, $10,000.
  • Rules, Expectations and Security through Privacy-Enhanced Convenient Technologies (RESPECT) - Proposal No 285582, European Commission, Grant - Seventh Framework Programme (FP7), 2012 ‑ 2015, $223,800.
  • Authentication and Authorisation for Entrusted Unions (AU2EU), European Commission, Grant - Seventh Framework Programme (FP7), 2013 ‑ 2015, $83,371.
  • Scalable Measures for Automated Recognition Technologies (SMART), European Union, EU Seventh Framework Program, 2011 ‑ 2014, $389,772.
  • Small Medium Enterprise Cyber Security Engagement (SMESEC) - Project Pilot, City of Wanneroo, Grant, 2013 ‑ 2014, $5,000.
  • CRC for Cyber Security (CyberCRC), Department of Commerce, Innovation Co-investment Program, 2013, $425,667.
  • The Design, Development and Application of Active RFID Technology in Disaster Victim Identification and Routine Mortuary Practice / The Australian Future Forensics Innovation Network (AFFIN), Griffith University, Grant - NIRAP, 2009 ‑ 2013, $37,139.
  • Transceiver Array for Optical Media, Attorney-General - Commonwealth, Grant, 2010 ‑ 2012, $293,091.
  • Overclocking of mechanical hard disk drives, Attorney General's D Branch, Attorney General's Department, D Branch Grant, 2011 ‑ 2012, $54,545.
  • Review of Vulnerability in Smart Grid Appliances and Networks, Department of the Prime Minister and Cabinet, Grant - Research Support For National Security, 2010 ‑ 2012, $77,154.
  • Update on Investigation into RFID Threats and Vulnerabilities, Department of the Prime Minister and Cabinet, Grant - Research Support For National Security, 2010, $10,000.
  • An evaluation of the vulnerabilities of RFID and their implications to the Australian Government sector, Department of Defence, Defence Signals Directorate - Grant, 2005 ‑ 2006, $25,000.
  • Research into the use of deception as a potentially legitimate policy in Commonwealth agencies, Department of Defence, Defence Signals Directorate - Grant, 2004 ‑ 2005, $39,000.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy, Cybersecurity in public sector healthcare - Developing a new approach
  • Doctor of Philosophy, Cryptography, end to end trust assurance and legal interception
  • Master of Computing and Security by Research, Honeypot deployment architecture

Co-principal Supervisor

  • Doctor of Philosophy, Cybernetic management of vigilance decrement in network defenders

Associate Supervisor

  • Doctor of Philosophy, Threat models and mitigations for cyber attacks against oil and gas critical infrastructure
  • Doctor of Philosophy, Mining SCADA alarm analysis by autonomous operator to identify cyber-physical attacks
  • Doctor of Philosophy, Detection of online radicalisation in the Maldivian language
  • Doctor of Philosophy, Cyber Security Education in Australia: Does it meet the mark?

Principal Supervisor

  • Doctor of Philosophy, Secure portable execution and storage environments: A capability to improve security for remote working
  • Master of Science (Computer Science), Audit trails and organisational barriers.
  • Doctor of Philosophy, A non-device specific framework for the development of forensic locational data analysis procedure for consumer grade small and embedded devices
  • Doctor of Information Technology, Security awareness by online banking users in Western Australian of phishing attacks
  • Doctor of Philosophy, .
  • Doctor of Philosophy, Discourses of terrorism: The role of internet technologies (social media and online propaganda) on islamic radicalisation, extremism and recruitment post 9/11
  • Doctor of Philosophy, Extraction of patterns in selected network traffic for a precise and efficient intrusion detection approach
  • Doctor of Philosophy, The development of an attack graph using applied levels of deception for directing attack methods in a honeynet.
  • Doctor of Information Technology, A forensics framework and method in the acquisition and extraction of data from nand flash memory storage chip
  • Doctor of Philosophy, Blind steganalysis using fractal features
  • Doctor of Information Technology, A method for securing online community service: A study of selected Western Australian councils
  • Master of Science (Computer Science), Physical layer security using optical steganography and encoding techniques in optical networks
  • Doctor of Philosophy, An investigation into remote transactions.
  • Doctor of Philosophy, An investigation into factors inhibiting Australian end-users from utilising adsl router security effectively

Co-principal Supervisor

  • Doctor of Philosophy, Mining climate data for shire level wheat yield predictions in Western Australia

Associate Supervisor

  • Doctor of Philosophy, The information strategy requirements of the unit states government from 2004 onwards.
  • Doctor of Philosophy, Anomaly detection in bacnet/ip managed building automation systems
  • Doctor of Philosophy, IoT-MQTT based denial of service attack modelling and detection
  • Doctor of Philosophy, An intelligence model for terrorist incident prevention for Australian police: A systemic investigation
  • Doctor of Philosophy, An investigation into off-link ipv6 host enumeration search techniques
  • Doctor of Philosophy, An investigation into electronic information security in general practice.
Skip to top of page