Submissions from 2024
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems, Hang T. Bui, Hamed Aboutorab, Arash Mahboubi, Yansong Gao, Nazatul H. Sultan, Aufeef Chauhan, Mohammad Z. Parvez, Michael Bewong, Rafiqul Islam, Zahid Islam, Seyit A. Camtepe, Praveen Gauravaram, Dineshkumar Singh, M. A. Babar, and Shihao Yan
PDF malware detection: Toward machine learning modeling with explainability analysis, G. M.Sakhawat Hossain, Kaushik Deb, Helge Janicke, and Iqbal H. Sarker
An enhanced feature-based hybrid approach for adversarial PDF malware detection, G. M.Sakhawat Hossain, Kaushik Deb, and Iqbal H. Sarker
Unifying context with labeled property graph: A pipeline-based system for comprehensive text representation in NLP, Ali Hur, Naeem Janjua, and Mohiuddin Ahmed
Voice synthesis improvement by machine learning of natural prosody, Joseph Kane, Michael N. Johnstone, and Patryk Szewczyk
Data-driven intelligence can revolutionize today’s cybersecurity world: A position paper, Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, and Seyit Camtepe
Examination of traditional botnet detection on Iot-based bots, Ashley Woodiss-Field, Michael N. Johnstone, and Paul Haskell-Dowland
Submissions from 2023
Ransomware 3.0 – A weapon for next generation information warfare, Mohiuddin Ahmed, A. N. M. Bazlur Rashid, and Al-Sakib Khan Pathan
A unified forensics analysis approach to digital investigation, Ali Alshuani, Nathan Clarke, and Bogdan Ghita
Two rapid power iterative DOA estimators for UAV emitter using massive/ultra-massive receive array, Yiwen Chen, Qijuan Jie, Yiqiao Zhang, Feng Shu, Xichao Zhan, Shihao Yan, Wenlong Cai, Xuehui Wang, Zhongwen Sun, Peng Zhang, and Peng Chen
Intelligent reflecting surface-assisted passive covert wireless detection, Zhilin Chen, Shihao Yan, Xiaobo Zhou, Feng Shu, and Derrick W. K. Ng
Radar-communication waveform design with detection probability constraints, Yaohui Ding, Shihao Yan, Xiaobo Zhou, Feng Shu, and Siling Feng
Joint beamforming and phase shift design for hybrid IRS and UAV-aided directional modulation networks, Rongen Dong, Hangjia He, Feng Shu, Qi Zhang, Riqing Chen, Shihao Yan, and Jiangzhou Wang
CovTiNet: Covid text identification network using attention-based positional embedding feature fusion, Md Rajib Hossain, Mohammed Moshiul Hoque, Nazmul Siddique, and Iqbal H. Sarker
Deep reinforcement learning enabled covert transmission with UAV, Jinsong Hu, Mingqian Guo, Shihao Yan, Youjia Chen, Xiaobo Zhou, and Zhizhang Chen
Going beyond: Cyber security curriculum in Western Australian primary and secondary schools. Final Report, Nicola F. Johnson, Ahmed Ibrahim, Leslie Sikos, and Marnie McKee
Covert wireless communication with random frequency diverse array, Lintao Li, Zhilin Chen, Riqing Chen, Lei Yang, and Shihao Yan
Two low-complexity efficient beamformers for an IRS- and UAV-aided directional modulation network, Yeqing Lin, Feng Shu, Yuxiang Zheng, Jing Liu, Rongen Dong, Xun Chen, Yue Wu, Shihao Yan, and Jiangzhou Wang
Machine learning methods for inferring the number of UAV emitters via massive MIMO receive array, Yifan Li, Feng Shu, Jinsong Hu, Shihao Yan, Haiwei Song, Weiqiang Zhu, Da Tian, Yaoliang Song, and Jiangzhou Wang
Covert communication with time uncertainty in time-critical wireless networks, Xingbo Lu, Shihao Yan, Weiwei Yang, Min Li, and Derrick Wing Kwan Ng
Survey: An overview of lightweight RFID authentication protocols suitable for the maritime internet of things, Glen Mudra, Hui Cui, and Michael N. Johnstone
DBoT: Enhancing scalability and privacy in intelligent building spaces through a direct acyclic graph blockchain, Syed I. R. Naqvi, Zheng J. Bin, Ahmad Mohsin, Muhammad P. Akhter, and Muhammad M. U. Rahman
An exploration of Australian attitudes towards privacy, Aleatha Shanley, Mike Johnstone, Patryk Szewczyk, and Michael Crowley
Low-complexity three-dimensional AOA-cross geometric center localization methods via multi-UAV network, Baihua Shi, Yifan Li, Guilu Wu, Riqing Chen, Shihao Yan, and Feng Shu
STAR-RIS-UAV-aided coordinated multipoint cellular system for multi-user networks, Baihua Shi, Yang Wang, Danqi Li, Wenlong Cai, Jinyong Lin, Shuo Zhang, Weiping Shi, Shihao Yan, and Feng Shu
DOA estimation for hybrid massive MIMO systems using Mixed-ADCs: Performance loss and energy efficiency, Baihua Shi, Qi Zhang, Rongen Dong, Qijuan Jie, Shihao Yan, Feng Shu, and Jiangzhou Wang
On IRS-assisted covert communication with a friendly UAV, Xiaobei Xu, Linzi Hu, Sha Wei, Yuwen Qian, Shihao Yan, Feng Shu, and Jun Li
Signalling for covert passive sensing, Qi Zhang, Shihao Yan, Feng Shu, Yirui Cong, and Derrick W. K. Ng
Submissions from 2022
Ransomware 2.0: An emerging threat to national security, Mohiuddin Ahmed, Sascha Dominik Dov Bachmann, Abu Barkat Ullah, and Shaun Barnett
Next-generation enterprise security and governance, Mohiuddin Ahmed, Nour Mustafa, Abu Barkat, and Paul Haskell-Dowland
Real-world smartphone-based gait recognition, Hind Alobaidi, Nathan Clarke, Fudong Li, and Abdulrahman Alruban
Taking care of everyone’s business: Interpreting Sicilian Mafia embedment through spatial network analysis, Michele Battisti, Andrea Mario Lavezzi, and Roberto Musotto
Intrusion Detection Systems in physical security, David J. Brooks
A low-cost machine learning based network intrusion detection system with data privacy preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, and Wencheng Yang
Ontology-driven artificial intelligence in IoT forensics, Alexander Grojek and Leslie F. Sikos
Cyber security curriculum in Western Australian primary and secondary schools: Interim report: Curriculum mapping, Nicola Johnson, Ahmed Ibrahim, Leslie Sikos, and Cheryl Glowrey
Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats, Nickson M. Karie, Nor Masri Bin Sahri, Wencheng Yang, and Michael N. Johnstone
Review of blockchain forensics challenges, Victor R. Kebande, Richard A. Ikuesan, and Nickson M. Karie
Reliability, security, and privacy in power grids, Leandros Maglaras, Mohamed Amine Ferrag, Helge Janicke, Nick Ayres, and Leandros Tassiulas
Understanding Mafia networks, Roberto Musotto
UAV-enabled cooperative jamming for covert communications based on geometric method, Hangmei Rao, Sa Xiao, Shihao Yan, Janquan Wang, and Wanbin Tang
Optimal geometric solutions to UAV-enabled covert communications in line-of-sight scenarios, Hangmei Rao, Sa Xiao, Shihao Yan, Jianquan Wang, and Wanbin Tang
Faking smart industry: Exploring cyber-threat landscape deploying cloud-based honeypot, S M Zia Ur Rashid, Ashfaqul Haq, Sayed Tanimun Hasan, Hasan Furhad, Mohiuddin Ahmed, and Abu Barkat Ullah
Anatomy of an internet hijack and interception attack: A global and educational perspective, Ben A. Scott, Michael N. Johnstone, and Patryk Szewczyk
Probabilistic accumulate-then-transmit in wireless-powered covert communications, Yida Wang, Shihao Yan, Weiwei Yang, Caijun Zhong, and Derrick Wing Kwan Ng
Covert communication with energy replenishment constraints in UAV networks, Yida Wang, Shihao Yan, Xiaobo Zhou, Yuzhen Huang, and Derrick Wing Kwan Ng
Network forensics in the era of artificial intelligence, Wencheng Yang, Michael N. Johnstone, Song Wang, Nickson M. Karie, Nor M. B. Sahri, and James J. Kang
A privacy-preserving ECG-based authentication system for securing wireless body sensor networks, Wencheng Yang and Song Wang
Multimedia security and privacy protection in the internet of things: research developments and challenges, Wencheng Yang, Song Wang, Jiankun Hu, and Nickson M. Karie
A linear convolution-based cancelable fingerprint biometric authentication system, Wencheng Yang, Song Wang, James Jin Kang, Michael N. Johnstone, and Aseel Bedari
A review on security issues and solutions of the internet of drones, Wencheng Yang, Song Wang, Xuefei Yin, Xu Wang, and Jiankun Hu
Submissions from 2021
A blockchain-based authentication protocol for cooperative vehicular ad hoc network, A. F. M. S. Akhter, Mohiuddin Ahmed, A. F. M. S. Shah, Adnan Anwar, A. S. M. Kayes, and Ahmet Zengin
Enhancement of healthcare data performance metrics using neural network machine learning algorithms, Qi An, Patryk Szewczyk, Michael N. Johnstone, and James Jin Kang
Whisper: A location privacy-preserving scheme using transmission range changing for internet of vehicles, Messaoud Babaghayou, Nabila Labraoui, Ado A. Abba Ari, Mohamed A. Ferrag, Leandros Maglaras, and Helge Janicke
Evaluating the impact of sandbox applications on live digital forensics investigation, Reem Bashir, Helge Janicke, and Wen Zeng
Design of cancelable MCC-based fingerprint templates using dyno-key model, Aseel Bedari, Song Wang, and Wencheng Yang
Is Australia really lost in space?, Brett Biddington
Analysis of Conpot and Its BACnet features for cyber-deception, Warren Z. Cabral, Craig Valli, Leslie F. Sikos, and Samuel Wakeling
Advanced cowrie configuration to increase honeypot deceptiveness, Warren Z. Cabral, Craig Valli, Leslie F. Sikos, and Samuel G. Wakeling
A novel hybrid cyber range for security exercises on cyber-physical systems, Bil Hallaq, Andrew Nicholson, Richard Smith, Leandros Maglaras, Allan Cook, Helge Janicke, and Kevin Jones
Privacy-preserving analytics for social network data: A survey of currently prevalent tools, Rishabh Jindal, Ahmed Falah, Adnan Anwar, and Mohiuddin Ahmed
A privacy-preserving data inference framework for internet of health things networks, James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, and Xi Zheng
Reducing attack surface of edge computing IoT networks via hybrid routing using dedicated nodes, James Jin Kang, Leslie F. Sikos, and Wencheng Yang
A review of security standards and frameworks for IoT-based smart environments, Nickson M. Karie, Nor Masri Sahri, Wencheng Yang, Craig Valli, and Victor R. Kebande
Digital forensic readiness implementation in SDN: Issues and challenges, Nickson M. Karie and Craig Valli
Digital forensic readiness intelligence crime repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, and Sadi Alawadi
Real-time monitoring as a supplementary security component of vigilantism in modern network environments, Victor R. Kebande, Nickson M. Karie, and Richard A. Ikuesan
Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Sadi Alawadi
The efficacy of aligning lessons learnt from significant bushfire incidents to the organisational stratum, Jennifer Medbury, David J. Brooks, and Michael Coole
Federated TON_IoT windows datasets for evaluating AI-based security applications, Nour Moustafa, Marwa Keshk, Essam Debie, and Helge Janicke
Cursory view of IoT-forensic readiness framework based on ISO/IEC 27043 recommendations, Phathutshedzo P. Mudau, H. S. Venter, Victor R. Kebande, Richard A. Ikuesan, and Nickson M. Karie
The online crime-terror nexus: Using booter services (stressers) to weaponize data?, Roberto Musotto and David S. Wall
Alignment-free cancelable fingerprint templates with dual protection, Muhammad Shahzad, Song Wang, Guang Deng, and Wencheng Yang
Machine learning based cybersecurity defense at the age of Industry 4.0, Sourabh K. Vishavnath, Adnan Anwar, and Mohiuddin Ahmed
A comparative study of ML-ELM and DNN for intrusion detection, Wencheng Yang, Song Wang, and Michael Johnstone
Biometrics for internet‐of‐things security: A review, Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli
A cancelable biometric authentication system based on feature-adaptive random projection, Wencheng Yang, Song Wang, Muhammad Shahzad, and Wei Zhou
Submissions from 2020
Averaged dependence estimators for DoS attack detection in IoT networks, Zubair A. Baig, Surasak Sanguanpong, Syed Naeem Firdous, Van Nhan Vo, Tri Gia Nguyen, and Chakchai So-In
Deep learning meets malware detection: An investigation, Biozid Bostami and Mohiuddin Ahmed
Education for the multifaith community of cybersecurity, Steven Furnell and Matt Bishop
Good guidance or mistaken misdirection: Assessing the quality of password advice, Steven Furnell and Paul Haskell-Dowland
Towards a cross-cultural education framework for online safety awareness, R. Herkanaidu, Steven M. Furnell, and M. Papadaki
Deceiving autonomous drones, William Hutchinson
Security and privacy for a sustainable internet of things, Helge Janicke, Sharif Abuadbba, and Surya Nepal
A framework of military wireless body area networks converged with low power wide area networks, James Jin Kang, Wencheng Yang, and Michael Johnstone
IoT threat detection advances, challenges and future directions, Nickson M. Karie, Nor Masri Sahri, and Paul Haskell-Dowland
Ontology‐driven perspective of CFRaaS, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Hein S. Venter
Optimizing cyber security education: Implementation of bloom’s taxonomy for future cyber security workforce, Nageswaree Kodai Ramsoonder, Selvamanee Kinnoo, Anna J. Griffin, Craig Valli, and Nicola F. Johnson
A holistic review of cybersecurity and reliability perspectives in smart airports, Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, and Helge Janicke
A novel intrusion detection system against spoofing attacks in connected electric vehicles, Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyinnais, Francisco J. Aparicio-Navarro, Antonios Argyriou, and Helge Janicke
Corporate security career progression: A comparative study of four Australian organisations, Codee Roy Ludbey, David J. Brooks, and Michael Coole
Proactive forensics: Keystroke logging from the cloud as potential digital evidence for forensic readiness purposes, Sheunesu M. Makura, H. S. Venter, Richard Adeyemi Ikuesan, Victor R. Kebande, and Nickson M. Karie
A Möbius transformation based model for fingerprint minutiae variations, James Moorfield, James Wang, Wencheng Yang, Aseel Bedari, and Peter Van Der Kamp
From evidence to proof: Social network analysis in Italian criminal courts of justice, Roberto Musotto
America back to the Moon and on to Mars: Australian, Japanese and Indian perspectives, Aaron Pereira, Brett Biddington, Kazuto Suzuki, Rajeswari Pillai Rajagopalan, Rahul Krishna, and David Vaccaro
Performance enhancement of intrusion detection system using bagging ensemble technique with feature selection, Md. Mamunur Rashid, Joarder Kamruzzaman, Mohiuddin Ahmed, Nahina Islam, Santoso Wibowo, and Steven Gordon
Concept drift for big data, Raihan Seraj and Mohiuddin Ahmed
AI in digital forensics: Ontology engineering for cybercrime investigations, Leslie F. Sikos
Contextualized knowledge graphs in communication network and cyber-physical system modeling, Leslie F. Sikos
Knowledge representation to support partially automated honeypot analysis based on Wireshark packet capture files, Leslie F. Sikos