View the list of publications created by our research teams or download a full list by clicking below.

-
Aryan Sharma, Deepak Mishra, Sanjay Jha, Aruna Seneviratne
2024
An Investigation into the Non-Uniformity of Channel State Information in WiFi Sensing Systems
Conference Paper -
Neel Bhaskar, Jawad Ahmed, Rahat Masood, Nadeem Ahmed, Stephen Kerr, Sanjay Jha
2024
A Comprehensive Threat Modelling Analysis for Distributed Energy Resources
Journal Article -
Ahmed Ibrahim, Marnie McKee, Leslie Sikos, Nicola Johnson
2024
A Systematic Review of K-12 Cybersecurity Education Around the World
Journal Article -
Yansong Gao, Seyit Camtepe, Nazatul Sultan, Hang Bui, Arash Mahboubi, Hamed Aboutorab, Michael Bewong, Rafiqul Islam, Md Islam, Aufeef Chauhan, Praveen Gauravaram, Dineshkumar Singh
2024
Security threats to agricultural artificial intelligence: Position and perspective
Journal Article -
Arash Mahboubi, Khanh Luong, Hamed Aboutorab, Hang Bui, Geoff Jarrad, Mohammed Bahutair, Seyit Camtepe, Ganna Pogrebna, Ejaz Ahmed, Bazara Barry, Hannah Gately
2024
Evolving techniques in cyber threat hunting: A systematic review
Conference Paper -
Triet Le, Muhammad Babar
2024
Automatic Data Labeling for Software Vulnerability Prediction Models: How Far Are We?
Conference Paper -
Triet Le, Muhammad Babar
2024
Mitigating Data Imbalance for Software Vulnerability Assessment: Does Data Augmentation Help?
Conference Paper -
Robert Marlin, Raja Jurdak, Alsharif Abuadbba, Sushmita Ruj, Dimity Miller
2024
Electric Vehicle Next Charge Location Prediction
Journal Article -
Khondokar Hasan, Leonie Simpson, Mir Baee, Chadni Islam, Ziaur Rahman, Warren Armstrong, Praveen Gauravaram, Matthew McKague
2024
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies
Journal Article -
Anh Nguyen, Triet Le, Ali Babar
2024
Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++
Conference Paper -
Arash Mahboubi, Seyit Camtepe, Keyvan Ansari, Marcin Pawłowski, Paweł Morawiecki, Hamed Aboutorab, Josef Pieprzyk, Jarek Duda
2024
Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method
Journal Article -
Yashothara Shanmugarasa, Map Chamikara, Hye-young Paik, Salil Kanhere, Liming Zhu
2024
Local Differential Privacy for Smart Meter Data Sharing with Energy Disaggregation
Conference Paper -
Ahmed Musleh, Jawad Ahmed, Nadeem Ahmed, Hunter Xu, Guo Chen, Stephen Kerr, Sanjay Jha
2024
Experimental Cybersecurity Evaluation of Distributed Solar Inverters: Vulnerabilities and Impacts on the Australian Grid
Journal Article -
Sajal Halder, Michael Bewong, Arash Mahboubi, Yinhao Jiang, Md Islam, Md Islam, Ryan Ip, Muhammad Ahmed, Gowri Ramachandran, Muhammad Babar
2024
Malicious Package Detection using Metadata Information
Conference Paper -
Mohammad Nosouhi, Zubair Baig, Robin Doss, Divyans Mahansaria, Debi Pati, Praveen Gauravaram, Lei Pan, Keshav Sood
2024
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments
Conference Paper -
Aryan Sharma, Junye Li, Deepak Mishra, Sanjay Jha, Aruna Seneviratne
2024
Towards Energy Efficient Wireless Sensing by Leveraging Ambient Wi-Fi Traffic
Journal Article -
Michael Zipperle, Yu Zhang, Elizabeth Chang, Tharam Dillon
2024
PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description model
Journal Article -
Kevin Saric, Felix Savins, Gowri Ramachandran, Raja Jurdak, Surya Nepal
2024
Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains
Conference Paper -
Nguyen Tran, Samodha Pallewatta, Muhammad Babar
2024
An Empirically Grounded Reference Architecture for Software Supply Chain Metadata Management
Conference Paper -
Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil Kanhere
2024
SoK: Can Trajectory Generation Combine Privacy and Utility?
Conference Paper -
Hang Bui, Hamed Aboutorab, Arash Mahboubi, Yansong Gao, Nazatul Sultan, Aufeef Chauhan, Mohammad Parvez, Michael Bewong, Rafiqul Islam, Zahid Islam, Seyit Camtepe, Praveen Gauravaram, Dineshkumar Singh, Ali Babar, Shihao Yan
2024
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
Journal Article -
Kerry Farrea, Zubair Baig, Robin Doss, Dongxi Liu
2024
Provably secure optimal homomorphic signcryption for satellite-based internet of things
Journal Article -
Gnanakumar Thedchanamoorthy, Michael Bewong, Meisam Mohammady, Tanveer Zia, Md Islam
2024
Optimization of UD-LDP with statistical prior knowledge
Conference Paper -
Evan Krul, Hye-young Paik, Sushmita Ruj, Salil Kanhere
2024
SoK: Trusting Self-Sovereign Identity
Conference Paper -
Muhammad Rana, Quazi Mamun, Rafiqul Islam
2024
P-Box Design in Lightweight Block Ciphers: Leveraging Nonlinear Feedback Shift Registers
Conference Paper -
Muhammad Rana, Quazi Mamun, Rafiqul Islam
2024
Balancing Security and Efficiency: A Power Consumption Analysis of a Lightweight Block Cipher
Journal Article -
Ben Scott, Michael Johnstone, Patryk Szewczyk
2024
A Survey of Advanced Border Gateway Protocol Attack Detection Techniques
Journal Article -
Samodha Pallewatta, Muhammad Babar
2024
Towards Secure Management of Edge-Cloud IoT Microservices Using Policy as Code
Conference Paper -
Selasi Kwashie, Wei Kang, Sandeep Kumar, Geoff Jarrad, Seyit Camtepe, Surya Nepal
2024
Acumen: Analysing the Impact of Organisational Change on Users’ Access Entitlements
Conference Paper -
Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, Ali Babar
2024
A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness
Journal Article -
Huaming Chen, Ali Babar
2024
Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges
Journal Article -
Jamil Ispahany, Md. Islam, Md. Islam, Arif Khan
2024
Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions
Journal Article -
Ashish Nanda, Jongkil Jeong, Syed Shah, Mohammad Nosouhi, Robin Doss
2024
Examining usable security features and user perceptions of Physical Authentication Devices
Journal Article -
Ben Scott, Michael Johnstone, Patryk Szewczyk, Steven Richardson
2024
Matrix Profile data mining for BGP anomaly detection
Journal Article -
Jongkil Jeong, Syed Shah, Ashish Nanda, Robin Doss, Mohammad Nosouhi, Jeb Webb
2024
User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Devices
Journal Article -
Marius Becherer, Omar Hussain, Yu Zhang, Frank Hartog, Elizabeth Chang
2024
On Trust Recommendations in the Social Internet of Things – A Survey
Journal Article -
Kane Walter, Meisam Mohammady, Surya Nepal, Salil Kanhere
2024
Optimally Mitigating Backdoor Attacks in Federated Learning
Journal Article -
Connor McLaughlin, Yi Lu
2024
Multi-class vulnerability prediction using value flow and graph neural networks
Journal Article -
Ishan Karunanayake, Jiaojiao Jiang, Nadeem Ahmed, Sanjay Jha
2024
Exploring Uncharted Waters of Website Fingerprinting
Journal Article -
Mir Baee, Leonie Simpson, Warren Armstrong
2024
Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework
Journal Article -
Mir Baee, Leonie Simpson, Warren Armstrong
2024
Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata
Journal Article -
Arash Mahboubi, Seyit Camtepe, Keyvan Ansari, Marcin Pawłowski, Paweł Morawiecki, Jarek Duda, Josef Pieprzyk
2024
File System Shield FSS: A Pass-Through Strategy Against Unwanted Encryption in Network File Systems
Conference Paper -
Michael Chesser, Surya Nepal, Damith Ranasinghe
2024
MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware
Conference Paper -
Zakia Zaman, Wanli Xue, Praveen Gauravaram, Wen Hu, Jiaojiao Jiang, Sanjay Jha
2024
Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis
Journal Article -
Monica Whitty, Nour Moustafa, Marthie Grobler
2024
Cybersecurity when working from home during COVID-19: considering the human factors
Journal Article -
Ashish Nanda, Syed Shah, Jongkil Jeong, Robin Doss, Jeb Webb
2023
Towards Higher Levels of Assurance in Remote Identity Proofing
Journal Article -
Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, Muhammad Babar
2023
A Review on C3I Systems Security: Vulnerabilities, Attacks, and Countermeasures
Journal Article -
Michael Bewong, John Wondoh, Selasi Kwashie, Jixue Liu, Lin Liu, Jiuyong Li, Md. Islam, David Kernot
2023
DATM: A Novel Data Agnostic Topic Modeling Technique With Improved Effectiveness for Both Short and Long Text
Journal Article -
Luke Kane, Vicky Liu, Matthew McKague, Geoffrey Walker
2023
Security Challenges and Wireless Technology Choices in IoT-Based Smart Grids
Journal Article -
Chandra Thapa, Jun Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng
2023
Evaluation of Federated Learning in Phishing Email Detection
Journal Article -
Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal
2023
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors
Conference Paper -
Chadni Islam, Victor Prokhorenko, Ali Babar
2023
Runtime software patching: Taxonomy, survey and future directions
Journal Article -
Cassandra Cross, Thomas Holt
2023
More than Money: Examining the Potential Exposure of Romance Fraud Victims to Identity Crime
Journal Article -
Ishan Karunanayake, Nadeem Ahmed, Robert Malaney, Rafiqul Islam, Sanjay Jha
2023
Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification
Journal Article -
Willy Susilo, Fuchun Guo, Zhen Zhao, Yinhao Jiang, Chunpeng Ge
2023
Secure Replication-Based Outsourced Computation Using Smart Contracts
Journal Article -
Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal
2023
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children s Apps
Journal Article -
Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil Kanhere
2023
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models
Journal Article -
Kealan Dunnett, Shantanu Pal, Zahra Jadidi, Raja Jurdak
2023
The Role of Cyber Threat Intelligence Sharing in the Metaverse
Journal Article -
Russell Brewer, Tyson Whitten, Katie Logos, Morgan Sayer, Colette Langos, Thomas Holt, Jesse Cale, Andrew Goldsmith
2023
Examining the Psychosocial and Behavioral Factors Associated with Adolescent Engagement in Multiple Types of Cyberdeviance: Results from an Australian Study
Journal Article -
Tance Suleski, Mohiuddin Ahmed, Wencheng Yang, Eugene Wang
2023
A review of multi-factor authentication in the Internet of Healthcare Things
Journal Article -
Zahra Jadidi, Shantanu Pal, Mukhtar Hussain, Kien Thanh
2023
Correlation-Based Anomaly Detection in Industrial Control Systems
Journal Article -
Zarrin Sworna, Muhammad Babar, Anjitha Sreekumar
2023
IRP2API: Automated Mapping of Cyber Security Incident Response Plan to Security Tools APIs
Journal Article -
Michael Chesser, Surya Nepal, Damith Ranasinghe
2023
Icicle: A Re-designed Emulator for Grey-Box Firmware Fuzzing
Conference Paper -
Nan Sun, Chang-Tsun Li, Hin Chan, Md Islam, Md Islam, Warren Armstrong
2023
On the Development of a Protection Profile Module for Encryption Key Management Components
Journal Article -
Roben Lunardi, Regio Michelin, Maher Alharby, Volkan Dedeoglu, Henry Nunes, Eduardo Arruda, Avelino Zorzo, Aad van Moorsel
2023
When Blockchain Meets Smart Cities: Opportunities, Security and Future Research
Book -
Luke Kane, Vicky Liu, Matthew McKague, Geoffrey Walker
2023
An Experimental Field Comparison of Wi-Fi HaLow and LoRa for the Smart Grid
Journal Article -
Ahmed Musleh, Jawad Ahmed, Nadeem Ahmed, Hunter Xu, Guo Chen, Jiankun Hu, Sanjay Jha
2023
Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems
Conference Paper -
Katie Logos, Russell Brewer, Colette Langos, Bryce Westlake
2023
Establishing a framework for the ethical and legal use of web scrapers by cybercrime and cybersecurity researchers: learnings from a systematic review of Australian research
Journal Article -
Michael Longland, David Liebowitz, Kristen Moore, Salil Kanhere
2023
Text-Conditioned Graph Generation Using Discrete Graph Variational Autoencoders
Conference Paper -
Oliver Guidetti, Craig Speelman, Peter Bouhlas
2023
Mapping between cognitive theories and psycho-physiological models of attention system performance
Journal Article -
Orvila Sarker, Sherif Haggag, Asangi Jayatilaka, Chelsea Liu
2023
Personalized Guidelines for Design, Implementation and Evaluation of Anti-Phishing Interventions
Conference Paper -
Fokke Heikamp, Lei Pan, Robin Doss, Rolando Trujillo-Rasua, Sushmita Ruj
2023
ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness
Conference Paper -
Oliver Guidetti, Craig Speelman, Peter Bouhlas
2023
The WACDT, a modern vigilance task for network defense
Journal Article -
Oliver Guidetti, Craig Speelman, Peter Bouhlas
2023
A review of cyber vigilance tasks for network defense
Journal Article -
Haobin Guan, Aryan Sharma, Deepak Mishra, Aruna Seneviratne
2023
Experimental Accuracy Comparison for 2.4GHz and 5GHz WiF Sensing Systems
Conference Paper -
Roland Croft, Ali Babar, Mehdi Kholoosi
2023
Data Quality for Software Vulnerability Datasets
Conference Paper -
Zarrin Sworna, Zahra Mousavi, Muhammad Babar
2023
NLP methods in host-based intrusion detection systems: A systematic review and future directions
Journal Article -
Kealan Dunnett, Shantanu Pal, Zahra Jadidi, Raja Jurdak
2023
A Blockchain-Based Framework for Scalable and Trustless Delegation of Cyber Threat Intelligence
Conference Paper -
Haoming Wang, Aryan Sharma, Deepak Mishra, Aruna Seneviratne, Eliathamby Ambikairajah
2023
Keystroke Recognition using WiFi Sensing: An Empirical Study on Robustness
Conference Paper -
Mehdi Kholoosi, Ali Babar, Cemal Yilmaz
2023
Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels
Conference Paper -
Kerry Farrea, Zubair Baig, Robin Doss, Dongxi Liu
2023
Low Earth Orbit LEO Satellites Role in Shaping 6G Networks Amidst Emerging Threats
Conference Paper -
Ahmed Musleh, Guo Chen, Zhao Dong, Chen Wang, Shiping Chen
2023
Spatio-temporal data-driven detection of false data injection attacks in power distribution systems
Journal Article -
Nathan Beu, Asangi Jayatilaka, Manssoreh Zahedi, Muhammad Babar, Laura Hartley, Winston Lewinsmith, Irina Baetu
2023
Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation
Journal Article -
Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson
2023
Software Vulnerability Detection Using Informed Code Graph Pruning
Journal Article -
Seyed Ghorashi, Tanveer Zia, Michael Bewong, Yinhao Jiang
2023
An Analytical Review of Industrial Privacy Frameworks and Regulations for Organisational Data Sharing
Journal Article -
Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen, Zike An
2022
Defending Adversarial Attacks via Semantic Feature Manipulation
Journal Article -
Mohammad Nosouhi, Syed Shah, Lei Pan, Robin Doss
2022
DU-QS22: A Dataset for Analyzing QC-MDPC-Based Quantum-Safe Cryptosystems
Journal Article -
Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone
2022
RAIDER: Reinforcement-Aided Spear Phishing Detector
Journal Article -
Hong-Yen Tran, Jiankun Hu, Hemanshu Pota
2022
A Privacy-preserving State Estimation Scheme for Smart Grids
Journal Article -
Nan Sun, Chang-Tsun Li, Hin Chan, Md Islam, Md Islam, Warren Armstrong
2022
How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond
Journal Article -
Kealan Dunnett, Shantanu Pal, Guntur Putra, Zahra Jadidi, Raja Jurdak
2022
A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain
Journal Article -
Malyun Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang
2022
Users Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review
Journal Article -
Malyun Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang
2022
Towards Improving the Adoption and Usage of National Digital Identity Systems
Journal Article -
Leonardo Iwaya, Ali Babar, Awais Rashid, Chamila Wijayarathna
2022
On the privacy of mental health apps
Journal Article -
Warren Cabral, Leslie Sikos, Craig Valli
2022
Shodan Indicators Used to Detect Standard Conpot Implementations and Their Improvement Through Sophisticated Customization
Journal Article -
Michael Zipperle, Florian Gottwalt, Elizabeth Chang, Tharam Dillon
2022
Provenance-based Intrusion Detection Systems: A Survey
Journal Article -
Chuka Oham, Regio Michelin, Raja Jurdak, Salil Kanhere, Sanjay Jha
2022
WIDE: A witness-based data priority mechanism for vehicular forensics
Journal Article -
Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-young Paik, Surya Nepal
2022
Profiler: Distributed Model to Detect Phishing
Journal Article -
Zahra Jadidi, Shantanu Pal, Nithesh Nayak, Arawinkumaar Selvakkumar, Chih-Chia Chang, Maedeh Beheshti, Alireza Jolfaei
2022
Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems
Journal Article -
Luke Kane, Vicky Liu, Matthew McKague, Geoffrey Walker
2022
Network Architecture and Authentication Scheme for LoRa 2.4 GHz Smart Homes
Journal Article -
Fokke Heikamp, Lei Pan, Rolando Trujillo-Rasua, Sushmita Ruj, Robin Doss
2022
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts
Journal Article -
Kevin Saric, Gowri Ramachandran, Shantanu Pal, Raja Jurdak, Surya Nepal
2022
A Universal Deduplication Architecture for Secure and Efficient Cloud Storage
Journal Article -
Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil Kanhere
2022
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms
Journal Article -
Xuefei Yin, Yanming Zhu, Yi Xie, Jiankun Hu
2022
PowerFDNet: Deep Learning-Based Stealthy False Data Injection Attack Detection for AC-Model Transmission Systems
Journal Article -
Roland Croft, Ali Babar, Huaming Chen
2022
Noisy label learning for security defects
Journal Article -
Guntur Putra, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak
2022
Toward Blockchain-Based Trust and Reputation Management for Trustworthy 6G Networks
Journal Article -
Roland Croft, Ali Babar, Li Li
2022
An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources
Journal Article -
David Hin, Andrey Kan, Huaming Chen, Ali Babar
2022
LineVD Statement-level Vulnerability Detection using Graph Neural Networks
Journal Article -
Masumi Arafune, Sidharth Rajalakshmi, Luigi Jaldon, Zahra Jadidi, Shantanu Pal, Ernest Foo, Nagarajan Venkatachalam
2022
Design and Development of Automated Threat Hunting in Industrial Control Systems
Journal Article -
Pathum Arachchige, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertok, Ibrahim Khalil
2022
Local Differential Privacy for Federated Learning
Journal Article -
Zahra Jadidi, Joshua Hagemann, Daniel Quevedo
2022
Multi-step attack detection in industrial control systems using causal analysis
Journal Article -
Jihyeon Ryu, Yifeng Zheng, Yansong Gao, Alsharif Abuadbba, Junyaup Kim, Dongho Won, Surya Nepal, Hyoungshick Kim, Cong Wang
2022
Can differential privacy practically protect collaborative deep learning inference for IoT?
Journal Article -
Kristen Moore, Cody Christopher, David Liebowitz, Surya Nepal, Renee Selvey
2022
Modelling direct messaging networks with multiple recipients for cyber deception
Miscellaneous -
H. Le, Huaming Chen, Ali Babar
2022
A survey on data-driven software vulnerability assessment and prioritization
Journal Article -
Kealan Dunnett, Shantanu Pal, Zahra Jadidi, Guntur Putra, Raja Jurdak
2022
A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain
Miscellaneous -
Wencheng Yang, Song Wang, Xuefei Yin, Xu Wang, Jiankun Hu
2022
A Review on Security Issues and Solutions of the Internet of Drones
Journal Article -
Liuyue Jiang, Nguyen Tran, Muhammad Babar
2022
Mod2Dash: A Framework for Model-Driven Dashboards Generation
Journal Article -
Jongkil Jeong, Yevhen Zolotavkin, Robin Doss
2022
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis
Journal Article -
Xuelei Wang, Colin Fidge, Ghavameddin Nourbakhsh, Ernest Foo, Zahra Jadidi, Calvin Li
2022
Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation Systems
Journal Article -
Josephine Dwan, Tamsin Paige, Rob McLaughlin
2022
Pirates of the cyber seas: Are state-sponsored hackers modern-day privateers?
Journal Article -
Wencheng Yang, Michael Johnstone, Song Wang, Nickson Karie, Nor bin Sahri, James Kang
2022
Network Forensics in the Era of Artificial Intelligence
Miscellaneous -
Roshan Rajapakse, Mansooreh Zahedi, Ali Babar, Haifeng Shen
2022
Challenges and Solutions when Adopting DevSecOps: A Systematic Review
Journal Article -
Nickson Karie, Leslie Sikos
2022
Cybersecurity Incident Response in the Enterprise
Miscellaneous -
Nan Sun, Chang-Tsun Li, Hin Chan, Ba Le, Md Islam, Leo Zhang, Md Islam, Warren Armstrong
2022
Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges
Journal Article -
Zarrin Sworna, Chadni Islam, Muhammad Babar
2022
APIRO: A Framework for Automated Security Tools API Recommendation
Journal Article -
Zahra Jadidi, Ernest Foo, Mukhtar Hussain, Colin Fidge
2022
Automated Detection-in-depth in Industrial Control Systems
Journal Article -
Jongkil Jeong, Marthie Grobler, M. Chamikara
2022
Simplifying Cyber Security Maturity Models through National Culture: A Fuzzy Logic Approach.
Miscellaneous -
Roland Croft, Yongzheng Xie, Muhammad Babar
2022
Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review
Journal Article -
Mubin Haque, Ali Babar
2022
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities
Miscellaneous -
Guntur Putra, Changhoon Kang, Salil Kanhere, James Hong
2022
DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains
Miscellaneous -
Vishal Venkatraman, Shantanu Pal, Zahra Jadidi, Alireza Jolfaei
2022
A Conceptual Trust Management Framework under Uncertainty for Smart Vehicular Networks
Miscellaneous -
Adam Tonkin, William Kosasih, Marthie Grobler, Mehwish Nasim
2022
Simulating cyber security management: A gamified approach to executive decision making
Journal Article -
Liam Riddell, Mohiuddin Ahmed, Paul Haskell-Dowland
2022
Establishment and mapping of heterogeneous anomalies in network intrusion datasets
Journal Article -
Cody Christopher, Kristen Moore, David Liebowitz
2022
SchemaDB: A Dataset for Structures in Relational Data
Journal Article -
Cassandra Cross
2022
Meeting the Challenges of Fraud in a Digital World
Journal Article -
Guntur Putra, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak
2022
Blockchain for Trust and Reputation Management in Cyber-Physical Systems
Journal Article -
Nadeem Ahmed, Regio Michelin, Wanli Xue, Guntur Putra, Sushmita Ruj, Salil Kanhere, Sanjay Jha
2022
DIMY: Enabling privacy-preserving contact tracing
Journal Article -
Rizka Purwanto, Arindam Pal, Alan Blair, Sanjay Jha
2022
PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool
Journal Article -
Roelien Timmer, David Liebowitz, Surya Nepal, Salil Kanhere
2022
TSM: Measuring the Enticement of Honeyfiles with Natural Language Processing
Conference Paper -
Wencheng Yang, Song Wang, James Kang, Michael Johnstone, Aseel Bedari
2022
A linear convolution-based cancelable fingerprint biometric authentication system
Journal Article -
Pathum Arachchige, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertok, Ibrahim Khalil
2022
Local Differential Privacy for~Federated Learning
Conference Paper -
Weitao Xu, Wanli Xue, Qi Lin, Guohao Lan, Xingyu Feng, Bo Wei, Chengwen Luo, Wei Li, Albert Zomaya
2022
PrivGait: An Energy-Harvesting-Based Privacy-Preserving User-Identification System by Gait Analysis
Journal Article -
Liam Riddell, Mohiuddin Ahmed, Paul Haskell-Dowland
2022
Establishment and mapping of heterogeneous anomalies~in network intrusion datasets
Journal Article -
Aryan Sharma, Wenqi Jiang, Deepak Mishra, Sanjay Jha, Aruna Seneviratne
2022
Optimised CNN for Human Counting Using Spectrograms of Probabilistic WiFi CSI
Journal Article -
Cassandra Cross
2022
Using artificial intelligence (AI) and deepfakes to deceive victims: the need to rethink current romance fraud prevention messaging
Journal Article -
Wencheng Yang, Song Wang, Jiankun HuHu, Nickson Karie
2022
Multimedia security and privacy protection in the internet of things: research developments and challenges
Journal Article -
Stella Ho, Youyang Qu, Bruce Gu, Longxiang Gao, Jianxin Li, Yong Xiang
2021
DP-GAN: Differentially private consecutive data publishing using generative adversarial nets
Journal Article -
Alexa Palassis, Craig Speelman, Julie Pooley
2021
An Exploration of the Psychological Impact of Hacking Victimization
Journal Article -
Nickson Karie, Nor Sahri, Wencheng Yang, Craig Valli, Victor Kebande
2021
A Review of Security Standards and Frameworks for IoT-based Smart Environments
Journal Article -
Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit Camtepe, Hyoungshick Kim, Surya Nepal
2021
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things
Journal Article -
Triet Le, David Hin, Roland Croft, Ali Babar
2021
Deepcva: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning
Miscellaneous -
Roland Croft, Dominic Newlands, Ziyu Chen, Ali Babar
2021
An Empirical Study of Rule-based and Learning-based Approaches for Static Application Security Testing
Miscellaneous -
Wencheng Yang, Song Wang, Nor Sahri, Nickson Karie, Mohiuddin Ahmed, Craig Valli
2021
Biometrics for Internet-of-Things Security: A Review
Journal Article -
Roshan Rajapakse, Mansooreh Zahedi, Muhammad Babar
2021
An Empirical Analysis of Practitioners Perspectives on Security Tool Integration into DevOps
Miscellaneous -
Shantanu Pal, Zahra Jadidi
2021
Analysis of Security Issues and Countermeasures for the Industrial Internet of Things
Journal Article -
Yashothara Shanmugarasa, Hye-young Paik, Salil Kanhere, Liming Zhu
2021
Automated Privacy Preferences for Smart Home Data Sharing Using Personal Data Stores
Journal Article -
Guntur Putra, Volkan Dedeoglu, Abhinav Pathak, Salil Kanhere, Raja Jurdak
2021
Decentralised Trustworthy Collaborative Intrusion Detection System for IoT
Miscellaneous -
Nikesh Lalchandani, Frank Jiang, Jongkil Jeong, Yevhen Zolotavkin, Robin Doss
2021
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials
Miscellaneous -
Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, Helge Janicke
2021
The SAir-IIoT Cyber Testbed as a Service: A Novel Cybertwins Architecture in IIoT-Based Smart Airports
Journal Article -
Maksym Slavnenko, Yevhen Zolotavkin, Jay Jeong, Veronika Kuchta, Robin Doss
2021
Enhancing Privacy Through DMMA: Decision-Making Method for Authentication
Miscellaneous -
Xuelei Wang, Colin Fidge, Ghavameddin Nourbakhsh, Ernest Foo, Zahra Jadidi, Calvin Li
2021
Feature Selection for Precise Anomaly Detection in Substation Automation Systems
Miscellaneous -
Ayman Ibaida, Alsharif Abuadbba, Naveen Chilamkurti
2021
Privacy-preserving compression model for efficient IoMT ECG sharing
Journal Article -
Zaiwen Feng, Wolfgang Mayer, Markus Stumptner, Georg Grossmann, Selasi Kwashie, Da Ning, Keqing He
2021
ASMaaS: Automatic Semantic Modeling as a Service
Miscellaneous -
Xuanyu Duan, Mengmeng Ge, Triet Le, Faheem Ullah, Shang Gao, Xuequan Lu, Ali Babar
2021
Automated Security Assessment for the Internet of Things
Miscellaneous -
Wencheng Yang, Song Wang
2021
A Privacy-Preserving ECG-Based Authentication System for Securing Wireless Body Sensor Networks
Journal Article -
Mingyu Guo, Guanhua Wang, Hideaki Hata, Muhammad Babar
2021
Revenue Maximizing Markets for Zero-day Exploits
Journal Article -
David Holmes, Maria Papathanasaki, Leandros Maglaras, Mohamed Ferrag, Surya Nepal, Helge Janicke
2021
Digital Twins and Cyber Security: Solution or Challenge?
Miscellaneous -
David Liebowitz, Surya Nepal, Kristen Moore, Cody Christopher, Salil Kanhere, David Nguyen, Roelien Timmer, Michael Longland, Keerth Rathakumar
2021
Deception for Cyber Defence: Challenges and Opportunities
Miscellaneous -
Roelien Timmer, David Liebowitz, Surya Nepal, Salil Kanhere
2021
Can pre-trained Transformers be used in Detecting Complex Sensitive Sentences? A Monsanto case study
Miscellaneous -
Zahra Jadidi, Yi Lu
2021
A Threat Hunting Framework for Industrial Control Systems
Journal Article -
Nickolaos Koroniotis, Nour Moustafa, Benjamin Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke
2021
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments
Miscellaneous -
Gordon Haylett, Zahra Jadidi, Kien Thanh
2021
System-Wide Anomaly Detection of Industrial Control Systems via Deep Learning and Correlation Analysis
Journal Article -
Anna Griffin, Nicola Johnson, Craig Valli, Lyn Vernon
2021
The Impact of Twenty-first Century Skills and Computing Cognition Cyber Skills on Graduates Work Readiness in Cyber Security
Journal Article -
Cassandra Cross, Thomas Holt
2021
The Use of Military Profiles in Romance Fraud Schemes
Journal Article -
Ba Le, Tanveer Zia
2021
Discrete Distribution Estimation with Local Differential Privacy: A Comparative Analysis
Journal Article -
Cassandra Cross
2021
Personal Reflections on Researching Fraud: Challenges Surrounding the Ethics of 'Doing'
Journal Article -
Shantanu Pal, Zahra Jadidi
2021
Protocol-Based and Hybrid Access Control for the IoT: Approaches and Research Opportunities
Journal Article -
Yashothara Shanmugarasa, Hye-young Paik, Salil Kanhere, Liming Zhu
2021
Towards Automated Data Sharing in Personal Data Stores
Journal Article -
Warren Cabral, Craig Valli, Leslie Sikos, Samuel Wakeling
2021
Advanced Cowrie Configuration to Increase Honeypot Deceptiveness
Journal Article -
Cheng Shen, Wanli Xue
2021
An Experiment Study on Federated Learning Testbed
Journal Article -
Nadeem Ahmed, Regio Michelin, Wanli Xue, Guntur Putra, Wei Song, Sushmita Ruj, Salil Kanhere, Sanjay Jha
2021
Towards Privacy-preserving Digital Contact Tracing
Journal Article -
Shangyu Xie, Meisam Mohammady, Han Wang, Lingyu Wang, Jaideep Vaidya, Yuan Hong
2021
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing
Journal Article -
Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ahmed, Surya Nepal, Hyoungshick Kim
2021
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN
Journal Article -
Warren Cabral, Craig Valli, Leslie Sikos, Samuel Wakeling
2021
Analysis of Conpot and Its BACnet Features for Cyber-Deception
Journal Article -
Wencheng Yang, Song Wang, Michael Johnstone
2021
A Comparative Study of ML-ELM and DNN for Intrusion Detection
Journal Article -
Nikola Pijovic
2021
The Cyberspace Great Game . The Five Eyes, the Sino-Russian Bloc and the Growing Competition to Shape Global Cyberspace Norms
Journal Article -
Shiri Krebs
2021
Predictive Technologies and Opaque Epistemology in Counterterrorism Decision-Making
Journal Article -
Cassandra Cross, Rebecca Layt
2021
I Suspect That the Pictures Are Stolen: Romance Fraud, Identity Crime, and Responding to Suspicions of Inauthentic Identities
Journal Article -
Guntur Putra, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak, Aleksandar Ignjatovic
2021
Trust-Based Blockchain Authorization for IoT
Journal Article -
Ishan Karunanayake, Nadeem Ahmed, Robert Malaney, Rafiqul Islam, Sanjay Jha
2021
De-Anonymisation Attacks on Tor: A Survey
Journal Article -
Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyiannis, Francisco Aparicio-Navarro, Antonios Argyriou, Helge Janicke
2020
A novel Intrusion Detection System against spoofing attacks in connected Electric Vehicles
Journal Article -
W. Xue, D. Vatsalan, W. Hu, A. Seneviratne
2020
Sequence Data Matching and Beyond: New Privacy-Preserving Primitives Based on Bloom Filters
Journal Article -
Jamal Hachem, Vanea Chiprianov, Muhammad Babar, Tarek Khalil, Philippe Aniorte
2020
Modeling, analyzing and predicting security cascading attacks in smart buildings systems-of-systems
Journal Article -
R. Michelin, N. Ahmed, S. Kanhere, A. Seneviratne, S. Jha
2020
Leveraging lightweight blockchain to establish data integrity for surveillance cameras
Miscellaneous -
Stella Ho, Youyang Qu, Longxing Gao, Jianxin Li, Yong Xiang
2020
Generative Adversarial Nets Enhanced Continual Data Release Using Differential Privacy
Miscellaneous -
V. Prokhorenko, Ali Babar
2020
Architectural Resilience in Cloud, Fog and Edge Systems: A Survey
Journal Article -
S. Ghorashi, T. Zia, Y. Jiang
2020
Optimisation of Lightweight Klein Encryption Algorithm With 3 S-box
Miscellaneous -
N. Karie, N. Sahri, P. Haskell-Dowland
2020
IoT Threat Detection Advances, Challenges and Future Directions
Miscellaneous -
Y. Gao, M. Kim, S. Abuadbba, Y. Kim, C. Thapa, K. Kim, S. Camtep, H. Kim, S. Nepal
2020
End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
Miscellaneous -
Jagriti Jalal, Mayank Singh, Arindam Pal, Lipika Dey, Animesh Mukherjee
2020
Identification, Tracking and Impact: Understanding the Trade Secret of Catchphrases
Miscellaneous -
R. Purwanto, A. Pal, A. Blair, S. Jha
2020
PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites
Miscellaneous -
W. Yang, M. Johnstone, L. Sikos, S. Wang
2020
Security and Forensics in the Internet of Things: Research Advances and Challenges
Miscellaneous -
N. Tran, M. Babar
2020
Anatomy, Concept, and Design Space of Blockchain Networks
Miscellaneous -
Cross Cassandra
2020
Exploiting trust for financial gain: an overview of business email compromise (BEC) fraud
Journal Article -
Md Islam, Jixue Liu, Jiuyong Li, Lin Liu, Wei Kang
2020
Evidence Weighted Tree Ensembles for Text Classification
Miscellaneous -
Marthie Grobler, M. Chamikara, Jacob Abbott, Jongkil Jeong, Surya Nepal, Cecile Paris
2020
The importance of social identity on password formulations
Journal Article -
W. Xue, W. Hu, P. Gauranvaram, A. Seneviratne, S. Jha
2020
An Efficient Privacy-preserving IoT System for Face Recognition
Miscellaneous -
Jing Yao., Yifeng Zheng., Cong Wang., Surya Nepal.
2020
Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation Awareness
Conference Paper -
Shamaila Hayat, Aimal Rextin, Adnan Idris, Mehwish Nasim
2020
Text and phone calls: user behaviour and dual-channel communication prediction
Journal Article -
W. Xue, C. Luo, Y. Shen, R. Rana, G. Lan, S. Jha, A. Seneviratne, W. Hu
2020
Towards A Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things
Journal Article -
L. Kane, J. Chen, R. Thomas, V. Liu, M. Mckague
2020
Security and Performance in IoT: A Balancing Act
Journal Article -
S. Mazumdar, S. Ruj, R. Singh, A. Pal
2020
HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments
Miscellaneous -
Aryan Sharma, Deepak Mishra, Tanveer Zia, Aruna Seneviratne
2020
A Novel Approach to Channel Profiling Using the Frequency Selectiveness of WiFi CSI Samples
Journal Article -
Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Camtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal
2020
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Miscellaneous -
Nadeem Ahmed, Regio Michelin, Wanli Xue, Sushmita Ruj, Robert Malaney, Salil Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, Sanjay Jha
2020
A Survey of COVID-19 Contact Tracing Apps
Journal Article -
B. Ahmed, N. Ahmed, A. Malik, M. Jafri, T. Hafeez
2020
Fingerprinting SDN Policy Parameters: An Empirical Study
Journal Article -
Yifeng Zheng, Arindam Pal, Sharif Abuadbba, Shiva Pokhrel, Surya Nepal, Helge Janicke
2020
Towards IoT Security Automation and Orchestration
Journal Article -
Mark Nerwich, Praveen Gauravaram, Hye-young Paik, Surya Nepal
2020
Vulnerability Database as a Service for IoT
Journal Article -
Mansooreh Zahedi, Roshan Rajapakse, Muhammad Babar
2020
Mining Questions Asked about Continuous Software Engineering
Journal Article -
Derek Weber, Mehwish Nasim, Lucia Falzon, Lewis Mitchell
2020
Arson Emergency and Australia s Black Summer: Polarisation and Misinformation on Social Media
Journal Article -
Triet Le, David Hin, Roland Croft, Ali Babar
2020
PUMiner Mining Security Posts from Developer Question and Answer Websites with PU Learning
Journal Article -
Lianyang Yu, Jiangshan Yu, Yevhen Zolotavkin
2020
Game Theoretic Analysis of Reputation Approach on Block Withholding Attack
Miscellaneous -
N. Koroniotis, N. Moustafa, F. Schiliro, P. Gauravaram, H. Janicke
2020
A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports
Journal Article -
X. Han, R. Zhang, X. Liu, F. Jiang
2020
Biologically Inspired Smart Contract: A Blockchain-Based DDoS Detection System
Miscellaneous -
Y. Zheng, H. Duan, C. Wang, R. Wang, S. Nepal
2020
Securely and Efficiently Outsourcing Decision Tree Inference
Journal Article -
Jing Yao, Yifeng Zheng, Yu Guo, Cong Wang
2020
SoK: A Systematic Study of Attacks in Efficient Encrypted Cloud Data Search
Miscellaneous -
Roberto Musotto, David Wall
2020
More Amazon than Mafia: analysing a DDoS stresser service as organised cybercrime
Journal Article -
X. Liu, Y. Zheng, X. Yi, S. Nepal
2020
Privacy-Preserving Collaborative Analytics on Medical Time Series Data
Journal Article -
Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin Fidge
2020
Securing Manufacturing Using Blockchain
Miscellaneous -
Wencheng Yang, Song Wang, Kan Yu, James Kang, Michael Johnstone
2020
Secure Fingerprint Authentication with Homomorphic Encryption
Journal Article -
Cross Cassandra
2020
Theorising the impact of COVID-19 on the fraud victimisation of older persons
Journal Article -
Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim
2020
DeepCapture:Image Spam Detection Using Deep Learning and Data Augmentation
Journal Article -
Warren Cabral, Craig Valli, Leslie Sikos, Samuel Wakeling
2019
Review and Analysis of Cowrie Artefacts and Their Potential to be Used Deceptively
Journal Article -
B. Le, G. Wang, M. Nasim, M. Babar
2019
Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification
Miscellaneous -
Roben Lunardi, Regio Michelin, Charles Neu, Henry Nunes, Avelino Zorzo, Salil Kanhere
2019
Impact of Consensus on Appendable-Block Blockchain for IoT
Miscellaneous -
A. Uzunov, S. Nepal, Baruwal Chhetri
2019
Proactive Antifragility: A New Paradigm for Next-Generation Cyber Defence at the Edge
Miscellaneous -
Uzma Maroof, Arash Shaghaghi, Sanjay Jha
2019
PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices
Miscellaneous
Acknowledgement of Country
We acknowledge the many Traditional Custodians of Country throughout Australia and honour their Elders past and present.
We respect their deep enduring connection to their lands, waterways and surrounding clan groups since time immemorial. We cherish the richness of First Nations Peoples’ artistic and cultural expressions.
We are privileged to gather on this Country and through this website to share knowledge with future generations.