Case Studies

Research with impact: Current projects

Case Study

Automating Identity and Access Management (IAM)

The CSCRC is developing an automated intelligent support system for dynamic organisations whose employees’ roles change frequently, allowing staff to effectively carry out their work, without compromising security

Read More
Case Study

Gamification Impact

A collaborative interactive game with the aim of raising awareness and encouraging critical thinking about preparing and responding to a ransomware attack.

Read More
Case Study

DECAAS: Cyber Deception as a Service

This project uses cutting-edge machine learning (ML) algorithms and artificial intelligence (AI) to deceive and trap intruders who make enter a system.

Read More
Case Study

CYBER COMMON OPERATING PICTURE (CCOP)

Our researchers are developing a dashboard for gathering, analysing and visualising cyber security data, to help executive leaders make swift and efficient decisions to protect their organisations.

Read More
Case Study

Research spotlight: Cyber Deviance in Adolescents

Cyber deviance is a modern concept brought to the fore by the rise of the internet. Hence, little historical research to deduce its causation exists. But this is changing.

Read More
Case Study

SMART SHIELD: ARTIFICIAL INTELLIGENCE ANTI-PHISHING SYSTEM

Smart Shield is an anti-phishing solution that uses advanced machine learning algorithms to examine and learn from phishing emails and malicious websites, enabling greater detection of advanced phishing attempts.

Read More
Case Study

MENTAL HEALTH APPS: PRIVACY RISKS

Thousands of mental health apps are now on the market, offering cost-effective and easily accessible support services. However, while these apps serve an important purpose, many are also putting the privacy of users at risk and could be improved.

Read More
Case Study

PERSONAL INFORMATION FACTOR: A tool to tell if and how to share your datasets

The Personal Information Factor (PIF) Tool measures the risk associated with releasing a dataset, proposing recommendations for sharing data that pivot around privacy considerations.

Read More
Case Study

COVIDSAFE App

To help combat the spread of COVID-19, the Federal Government led the development of the COVIDSafe app.

Read More
Case Study

SMART AIRPORTS

In the future, smart devices connected to the internet will enable airline passengers to move seamlessly through Australian airports.

Read More
Case Study

Making future defence bases safer and smarter

'Smart' bases, that operate using a series of interconnected devices the operate autonomously of satellites, will be vital defence resources in the future.

Read More
Case Study

Cyber threat visualisation dashboards for business

To keep their companies safe, boards and executives need to understand complex data about cyber security.

Read More
Case Study

Deception as a service

Organisations sometimes use decoy files to lure and catch malicious actors.

Read More
Case Study

Threat hunting in critical infrastructure

Australia's critical infrastructure is increasingly connected to and reliant on the internet, making it more vulnerable to cyber threats.

Read More
Case Study

Automatic tracking of access privileges

Staff in large organisations often need standing authorisations to access sensitive information.

Read More
Case Study

Real time system patching

Many software patches are so significant they can only be applied when IT systems are not functioning, disrupting users and adding cost for businesses.

Read More
Case Study

Detecting Anomalies in Key Management Systems

Large scale enterprise networks often use enterprise key management (EKM) platforms for unified management of encryption keys.

Read More
Case Study

Development of Australian Cyber Criteria Assessment

This project promotes Common Criteria among stakeholders in IT security products related to specification, development, evaluation, certification and approval, procurement and deployment.

Read More
Case Study

COVID-19 Working From Home

COVID-19 has changed the way people work. At a rapid pace, both in Australia and overseas, many organisations have shifted to a work-from-home workforce.

Read More

Acknowledgement of Country

We acknowledge the many Traditional Custodians of Country throughout Australia and honour their Elders past and present.

We respect their deep enduring connection to their lands, waterways and surrounding clan groups since time immemorial. We cherish the richness of First Nations Peoples’ artistic and cultural expressions.

We are privileged to gather on this Country and through this website to share knowledge with future generations.