Follow

Submissions from 2024

PDF

PDF malware detection: Toward machine learning modeling with explainability analysis, G. M.Sakhawat Hossain, Kaushik Deb, Helge Janicke, and Iqbal H. Sarker

PDF

Unifying context with labeled property graph: A pipeline-based system for comprehensive text representation in NLP, Ali Hur, Naeem Janjua, and Mohiuddin Ahmed

Link

Data-driven intelligence can revolutionize today’s cybersecurity world: A position paper, Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, and Seyit Camtepe

PDF

Examination of traditional botnet detection on Iot-based bots, Ashley Woodiss-Field, Michael N. Johnstone, and Paul Haskell-Dowland

Submissions from 2023

Link

Ransomware 3.0 – A weapon for next generation information warfare, Mohiuddin Ahmed, A. N. M. Bazlur Rashid, and Al-Sakib Khan Pathan

Link

A unified forensics analysis approach to digital investigation, Ali Alshuani, Nathan Clarke, and Bogdan Ghita

PDF

Two rapid power iterative DOA estimators for UAV emitter using massive/ultra-massive receive array, Yiwen Chen, Qijuan Jie, Yiqiao Zhang, Feng Shu, Xichao Zhan, Shihao Yan, Wenlong Cai, Xuehui Wang, Zhongwen Sun, Peng Zhang, and Peng Chen

Link

Intelligent reflecting surface-assisted passive covert wireless detection, Zhilin Chen, Shihao Yan, Xiaobo Zhou, Feng Shu, and Derrick W. K. Ng

Link

Radar-communication waveform design with detection probability constraints, Yaohui Ding, Shihao Yan, Xiaobo Zhou, Feng Shu, and Siling Feng

PDF

Joint beamforming and phase shift design for hybrid IRS and UAV-aided directional modulation networks, Rongen Dong, Hangjia He, Feng Shu, Qi Zhang, Riqing Chen, Shihao Yan, and Jiangzhou Wang

Link

CovTiNet: Covid text identification network using attention-based positional embedding feature fusion, Md Rajib Hossain, Mohammed Moshiul Hoque, Nazmul Siddique, and Iqbal H. Sarker

Link

Deep reinforcement learning enabled covert transmission with UAV, Jinsong Hu, Mingqian Guo, Shihao Yan, Youjia Chen, Xiaobo Zhou, and Zhizhang Chen

PDF

Going beyond: Cyber security curriculum in Western Australian primary and secondary schools. Final Report, Nicola F. Johnson, Ahmed Ibrahim, Leslie Sikos, and Marnie McKee

Link

Covert wireless communication with random frequency diverse array, Lintao Li, Zhilin Chen, Riqing Chen, Lei Yang, and Shihao Yan

PDF

Two low-complexity efficient beamformers for an IRS- and UAV-aided directional modulation network, Yeqing Lin, Feng Shu, Yuxiang Zheng, Jing Liu, Rongen Dong, Xun Chen, Yue Wu, Shihao Yan, and Jiangzhou Wang

PDF

Machine learning methods for inferring the number of UAV emitters via massive MIMO receive array, Yifan Li, Feng Shu, Jinsong Hu, Shihao Yan, Haiwei Song, Weiqiang Zhu, Da Tian, Yaoliang Song, and Jiangzhou Wang

Link

Covert communication with time uncertainty in time-critical wireless networks, Xingbo Lu, Shihao Yan, Weiwei Yang, Min Li, and Derrick Wing Kwan Ng

PDF

Survey: An overview of lightweight RFID authentication protocols suitable for the maritime internet of things, Glen Mudra, Hui Cui, and Michael N. Johnstone

Link

DBoT: Enhancing scalability and privacy in intelligent building spaces through a direct acyclic graph blockchain, Syed I. R. Naqvi, Zheng J. Bin, Ahmad Mohsin, Muhammad P. Akhter, and Muhammad M. U. Rahman

Link

An exploration of Australian attitudes towards privacy, Aleatha Shanley, Mike Johnstone, Patryk Szewczyk, and Michael Crowley

PDF

Low-complexity three-dimensional AOA-cross geometric center localization methods via multi-UAV network, Baihua Shi, Yifan Li, Guilu Wu, Riqing Chen, Shihao Yan, and Feng Shu

PDF

STAR-RIS-UAV-aided coordinated multipoint cellular system for multi-user networks, Baihua Shi, Yang Wang, Danqi Li, Wenlong Cai, Jinyong Lin, Shuo Zhang, Weiping Shi, Shihao Yan, and Feng Shu

PDF

DOA estimation for hybrid massive MIMO systems using Mixed-ADCs: Performance loss and energy efficiency, Baihua Shi, Qi Zhang, Rongen Dong, Qijuan Jie, Shihao Yan, Feng Shu, and Jiangzhou Wang

PDF

On IRS-assisted covert communication with a friendly UAV, Xiaobei Xu, Linzi Hu, Sha Wei, Yuwen Qian, Shihao Yan, Feng Shu, and Jun Li

Link

Signalling for covert passive sensing, Qi Zhang, Shihao Yan, Feng Shu, Yirui Cong, and Derrick W. K. Ng

Submissions from 2022

PDF

Ransomware 2.0: An emerging threat to national security, Mohiuddin Ahmed, Sascha Dominik Dov Bachmann, Abu Barkat Ullah, and Shaun Barnett

Link

Next-generation enterprise security and governance, Mohiuddin Ahmed, Nour Mustafa, Abu Barkat, and Paul Haskell-Dowland

PDF

Real-world smartphone-based gait recognition, Hind Alobaidi, Nathan Clarke, Fudong Li, and Abdulrahman Alruban

Link

Taking care of everyone’s business: Interpreting Sicilian Mafia embedment through spatial network analysis, Michele Battisti, Andrea Mario Lavezzi, and Roberto Musotto

Link

Intrusion Detection Systems in physical security, David J. Brooks

PDF

A low-cost machine learning based network intrusion detection system with data privacy preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, and Wencheng Yang

Link

Ontology-driven artificial intelligence in IoT forensics, Alexander Grojek and Leslie F. Sikos

PDF

Cyber security curriculum in Western Australian primary and secondary schools: Interim report: Curriculum mapping, Nicola Johnson, Ahmed Ibrahim, Leslie Sikos, and Cheryl Glowrey

Link

Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats, Nickson M. Karie, Nor Masri Bin Sahri, Wencheng Yang, and Michael N. Johnstone

Link

Review of blockchain forensics challenges, Victor R. Kebande, Richard A. Ikuesan, and Nickson M. Karie

Link

Reliability, security, and privacy in power grids, Leandros Maglaras, Mohamed Amine Ferrag, Helge Janicke, Nick Ayres, and Leandros Tassiulas

Link

Understanding Mafia networks, Roberto Musotto

Link

UAV-enabled cooperative jamming for covert communications based on geometric method, Hangmei Rao, Sa Xiao, Shihao Yan, Janquan Wang, and Wanbin Tang

Link

Optimal geometric solutions to UAV-enabled covert communications in line-of-sight scenarios, Hangmei Rao, Sa Xiao, Shihao Yan, Jianquan Wang, and Wanbin Tang

Link

Faking smart industry: Exploring cyber-threat landscape deploying cloud-based honeypot, S M Zia Ur Rashid, Ashfaqul Haq, Sayed Tanimun Hasan, Hasan Furhad, Mohiuddin Ahmed, and Abu Barkat Ullah

PDF

Anatomy of an internet hijack and interception attack: A global and educational perspective, Ben A. Scott, Michael N. Johnstone, and Patryk Szewczyk

Link

Probabilistic accumulate-then-transmit in wireless-powered covert communications, Yida Wang, Shihao Yan, Weiwei Yang, Caijun Zhong, and Derrick Wing Kwan Ng

Link

Covert communication with energy replenishment constraints in UAV networks, Yida Wang, Shihao Yan, Xiaobo Zhou, Yuzhen Huang, and Derrick Wing Kwan Ng

Link

Network forensics in the era of artificial intelligence, Wencheng Yang, Michael N. Johnstone, Song Wang, Nickson M. Karie, Nor M. B. Sahri, and James J. Kang

Link

A privacy-preserving ECG-based authentication system for securing wireless body sensor networks, Wencheng Yang and Song Wang

PDF

Multimedia security and privacy protection in the internet of things: research developments and challenges, Wencheng Yang, Song Wang, Jiankun Hu, and Nickson M. Karie

Link

A linear convolution-based cancelable fingerprint biometric authentication system, Wencheng Yang, Song Wang, James Jin Kang, Michael N. Johnstone, and Aseel Bedari

PDF

A review on security issues and solutions of the internet of drones, Wencheng Yang, Song Wang, Xuefei Yin, Xu Wang, and Jiankun Hu

Submissions from 2021

PDF

A blockchain-based authentication protocol for cooperative vehicular ad hoc network, A. F. M. S. Akhter, Mohiuddin Ahmed, A. F. M. S. Shah, Adnan Anwar, A. S. M. Kayes, and Ahmet Zengin

Link

Enhancement of healthcare data performance metrics using neural network machine learning algorithms, Qi An, Patryk Szewczyk, Michael N. Johnstone, and James Jin Kang

PDF

Whisper: A location privacy-preserving scheme using transmission range changing for internet of vehicles, Messaoud Babaghayou, Nabila Labraoui, Ado A. Abba Ari, Mohamed A. Ferrag, Leandros Maglaras, and Helge Janicke

PDF

Evaluating the impact of sandbox applications on live digital forensics investigation, Reem Bashir, Helge Janicke, and Wen Zeng

Link

Design of cancelable MCC-based fingerprint templates using dyno-key model, Aseel Bedari, Song Wang, and Wencheng Yang

PDF

Is Australia really lost in space?, Brett Biddington

Link

Analysis of Conpot and Its BACnet features for cyber-deception, Warren Z. Cabral, Craig Valli, Leslie F. Sikos, and Samuel Wakeling

Link

Advanced cowrie configuration to increase honeypot deceptiveness, Warren Z. Cabral, Craig Valli, Leslie F. Sikos, and Samuel G. Wakeling

Link

A novel hybrid cyber range for security exercises on cyber-physical systems, Bil Hallaq, Andrew Nicholson, Richard Smith, Leandros Maglaras, Allan Cook, Helge Janicke, and Kevin Jones

Link

Privacy-preserving analytics for social network data: A survey of currently prevalent tools, Rishabh Jindal, Ahmed Falah, Adnan Anwar, and Mohiuddin Ahmed

Link

A privacy-preserving data inference framework for internet of health things networks, James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, and Xi Zheng

Link

Reducing attack surface of edge computing IoT networks via hybrid routing using dedicated nodes, James Jin Kang, Leslie F. Sikos, and Wencheng Yang

PDF

A review of security standards and frameworks for IoT-based smart environments, Nickson M. Karie, Nor Masri Sahri, Wencheng Yang, Craig Valli, and Victor R. Kebande

Digital forensic readiness implementation in SDN: Issues and challenges, Nickson M. Karie and Craig Valli

PDF

Digital forensic readiness intelligence crime repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, and Sadi Alawadi

PDF

Real-time monitoring as a supplementary security component of vigilantism in modern network environments, Victor R. Kebande, Nickson M. Karie, and Richard A. Ikuesan

PDF

Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Sadi Alawadi

PDF

The efficacy of aligning lessons learnt from significant bushfire incidents to the organisational stratum, Jennifer Medbury, David J. Brooks, and Michael Coole

Link

Federated TON_IoT windows datasets for evaluating AI-based security applications, Nour Moustafa, Marwa Keshk, Essam Debie, and Helge Janicke

Link

Cursory view of IoT-forensic readiness framework based on ISO/IEC 27043 recommendations, Phathutshedzo P. Mudau, H. S. Venter, Victor R. Kebande, Richard A. Ikuesan, and Nickson M. Karie

Link

The online crime-terror nexus: Using booter services (stressers) to weaponize data?, Roberto Musotto and David S. Wall

Link

Alignment-free cancelable fingerprint templates with dual protection, Muhammad Shahzad, Song Wang, Guang Deng, and Wencheng Yang

Link

Machine learning based cybersecurity defense at the age of Industry 4.0, Sourabh K. Vishavnath, Adnan Anwar, and Mohiuddin Ahmed

Link

A comparative study of ML-ELM and DNN for intrusion detection, Wencheng Yang, Song Wang, and Michael Johnstone

PDF

Biometrics for internet‐of‐things security: A review, Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli

PDF

A cancelable biometric authentication system based on feature-adaptive random projection, Wencheng Yang, Song Wang, Muhammad Shahzad, and Wei Zhou

Submissions from 2020

Link

Averaged dependence estimators for DoS attack detection in IoT networks, Zubair A. Baig, Surasak Sanguanpong, Syed Naeem Firdous, Van Nhan Vo, Tri Gia Nguyen, and Chakchai So-In

Link

Deep learning meets malware detection: An investigation, Biozid Bostami and Mohiuddin Ahmed

Link

Education for the multifaith community of cybersecurity, Steven Furnell and Matt Bishop

Link

Good guidance or mistaken misdirection: Assessing the quality of password advice, Steven Furnell and Paul Haskell-Dowland

Link

Towards a cross-cultural education framework for online safety awareness, R. Herkanaidu, Steven M. Furnell, and M. Papadaki

Link

Deceiving autonomous drones, William Hutchinson

Link

Security and privacy for a sustainable internet of things, Helge Janicke, Sharif Abuadbba, and Surya Nepal

Link

A framework of military wireless body area networks converged with low power wide area networks, James Jin Kang, Wencheng Yang, and Michael Johnstone

Link

IoT threat detection advances, challenges and future directions, Nickson M. Karie, Nor Masri Sahri, and Paul Haskell-Dowland

PDF

Ontology‐driven perspective of CFRaaS, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Hein S. Venter

Link

Optimizing cyber security education: Implementation of bloom’s taxonomy for future cyber security workforce, Nageswaree Kodai Ramsoonder, Selvamanee Kinnoo, Anna J. Griffin, Craig Valli, and Nicola F. Johnson

PDF

A holistic review of cybersecurity and reliability perspectives in smart airports, Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, and Helge Janicke

PDF

A novel intrusion detection system against spoofing attacks in connected electric vehicles, Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyinnais, Francisco J. Aparicio-Navarro, Antonios Argyriou, and Helge Janicke

PDF

Corporate security career progression: A comparative study of four Australian organisations, Codee Roy Ludbey, David J. Brooks, and Michael Coole

Link

Proactive forensics: Keystroke logging from the cloud as potential digital evidence for forensic readiness purposes, Sheunesu M. Makura, H. S. Venter, Richard Adeyemi Ikuesan, Victor R. Kebande, and Nickson M. Karie

Link

A Möbius transformation based model for fingerprint minutiae variations, James Moorfield, James Wang, Wencheng Yang, Aseel Bedari, and Peter Van Der Kamp

Link

From evidence to proof: Social network analysis in Italian criminal courts of justice, Roberto Musotto

Link

America back to the Moon and on to Mars: Australian, Japanese and Indian perspectives, Aaron Pereira, Brett Biddington, Kazuto Suzuki, Rajeswari Pillai Rajagopalan, Rahul Krishna, and David Vaccaro

Link

Performance enhancement of intrusion detection system using bagging ensemble technique with feature selection, Md. Mamunur Rashid, Joarder Kamruzzaman, Mohiuddin Ahmed, Nahina Islam, Santoso Wibowo, and Steven Gordon

Link

Concept drift for big data, Raihan Seraj and Mohiuddin Ahmed

Link

AI in digital forensics: Ontology engineering for cybercrime investigations, Leslie F. Sikos

Link

Contextualized knowledge graphs in communication network and cyber-physical system modeling, Leslie F. Sikos

Link

Knowledge representation to support partially automated honeypot analysis based on Wireshark packet capture files, Leslie F. Sikos

PDF

Packet analysis for network forensics: A comprehensive survey, Leslie F. Sikos

Link

The evolution of context-aware RDF knowledge graphs, Leslie F. Sikos

PDF

Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs, Leslie F. Sikos and Dean Philp