Follow

Submissions from 2022

PDF

Real-world smartphone-based gait recognition, Hind Alobaidi, Nathan Clarke, Fudong Li, and Abdulrahman Alruban

Link

Taking care of everyone’s business: Interpreting Sicilian Mafia embedment through spatial network analysis, Michele Battisti, Andrea Mario Lavezzi, and Roberto Musotto

Link

Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats, Nickson M. Karie, Nor Masri Bin Sahri, Wencheng Yang, and Michael N. Johnstone

Link

Review of blockchain forensics challenges, Victor R. Kebande, Richard A. Ikuesan, and Nickson M. Karie

Link

Understanding Mafia networks, Roberto Musotto

Link

Optimal geometric solutions to UAV-enabled covert communications in line-of-sight scenarios, Hangmei Rao, Sa Xiao, Shihao Yan, Jianquan Wang, and Wanbin Tang

Link

Faking smart industry: Exploring cyber-threat landscape deploying cloud-based honeypot, S M Zia Ur Rashid, Ashfaqul Haq, Sayed Tanimun Hasan, Hasan Furhad, Mohiuddin Ahmed, and Abu Barkat Ullah

Link

Probabilistic accumulate-then-transmit in wireless-powered covert communications, Yida Wang, Shihao Yan, Weiwei Yang, Caijun Zhong, and Derrick Wing Kwan Ng

Link

Network forensics in the era of artificial intelligence, Wencheng Yang, Michael N. Johnstone, Song Wang, Nickson M. Karie, Nor M. B. Sahri, and James J. Kang

Link

A privacy-preserving ECG-based authentication system for securing wireless body sensor networks, Wencheng Yang and Song Wang

PDF

Multimedia security and privacy protection in the internet of things: research developments and challenges, Wencheng Yang, Song Wang, Jiankun Hu, and Nickson M. Karie

Link

A linear convolution-based cancelable fingerprint biometric authentication system, Wencheng Yang, Song Wang, James Jin Kang, Michael N. Johnstone, and Aseel Bedari

Submissions from 2021

PDF

A blockchain-based authentication protocol for cooperative vehicular ad hoc network, A. F. M. S. Akhter, Mohiuddin Ahmed, A. F. M. S. Shah, Adnan Anwar, A. S. M. Kayes, and Ahmet Zengin

Link

Enhancement of healthcare data performance metrics using neural network machine learning algorithms, Qi An, Patryk Szewczyk, Michael N. Johnstone, and James Jin Kang

PDF

Whisper: A location privacy-preserving scheme using transmission range changing for internet of vehicles, Messaoud Babaghayou, Nabila Labraoui, Ado A. Abba Ari, Mohamed A. Ferrag, Leandros Maglaras, and Helge Janicke

PDF

Evaluating the impact of sandbox applications on live digital forensics investigation, Reem Bashir, Helge Janicke, and Wen Zeng

Link

Design of cancelable MCC-based fingerprint templates using dyno-key model, Aseel Bedari, Song Wang, and Wencheng Yang

PDF

Is Australia really lost in space?, Brett Biddington

Link

Advanced cowrie configuration to increase honeypot deceptiveness, Warren Z. Cabral, Craig Valli, Leslie F. Sikos, and Samuel G. Wakeling

Link

Analysis of Conpot and Its BACnet features for cyber-deception, Warren Z. Cabral, Craig Valli, Leslie F. Sikos, and Samuel G. Wakeling

Link

A novel hybrid cyber range for security exercises on cyber-physical systems, Bil Hallaq, Andrew Nicholson, Richard Smith, Leandros Maglaras, Allan Cook, Helge Janicke, and Kevin Jones

Link

Privacy-preserving analytics for social network data: A survey of currently prevalent tools, Rishabh Jindal, Ahmed Falah, Adnan Anwar, and Mohiuddin Ahmed

Link

A privacy-preserving data inference framework for internet of health things networks, James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, and Xi Zheng

Link

Reducing attack surface of edge computing IoT networks via hybrid routing using dedicated nodes, James Jin Kang, Leslie F. Sikos, and Wencheng Yang

PDF

A review of security standards and frameworks for IoT-based smart environments, Nickson M. Karie, Nor Masri Sahri, Wencheng Yang, Craig Valli, and Victor R. Kebande

Digital forensic readiness implementation in SDN: Issues and challenges, Nickson M. Karie and Craig Valli

PDF

Digital forensic readiness intelligence crime repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, and Sadi Alawadi

PDF

Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Sadi Alawadi

PDF

The efficacy of aligning lessons learnt from significant bushfire incidents to the organisational stratum, Jennifer Medbury, David J. Brooks, and Michael Coole

Link

Federated TON_IoT windows datasets for evaluating AI-based security applications, Nour Moustafa, Marwa Keshk, Essam Debie, and Helge Janicke

Link

Cursory view of IoT-forensic readiness framework based on ISO/IEC 27043 recommendations, Phathutshedzo P. Mudau, H. S. Venter, Victor R. Kebande, Richard A. Ikuesan, and Nickson M. Karie

Link

Alignment-free cancelable fingerprint templates with dual protection, Muhammad Shahzad, Song Wang, Guang Deng, and Wencheng Yang

Link

Machine learning based cybersecurity defense at the age of Industry 4.0, Sourabh K. Vishavnath, Adnan Anwar, and Mohiuddin Ahmed

Link

A comparative study of ML-ELM and DNN for intrusion detection, Wencheng Yang, Song Wang, and Michael Johnstone

PDF

Biometrics for internet‐of‐things security: A review, Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli

PDF

A cancelable biometric authentication system based on feature-adaptive random projection, Wencheng Yang, Song Wang, Muhammad Shahzad, and Wei Zhou

Submissions from 2020

Link

Averaged dependence estimators for DoS attack detection in IoT networks, Zubair A. Baig, Surasak Sanguanpong, Syed Naeem Firdous, Van Nhan Vo, Tri Gia Nguyen, and Chakchai So-In

Link

Deep learning meets malware detection: An investigation, Biozid Bostami and Mohiuddin Ahmed

Link

Education for the multifaith community of cybersecurity, Steven Furnell and Matt Bishop

Link

Good guidance or mistaken misdirection: Assessing the quality of password advice, Steven Furnell and Paul Haskell-Dowland

Link

Towards a cross-cultural education framework for online safety awareness, R. Herkanaidu, Steven M. Furnell, and M. Papadaki

Link

Deceiving autonomous drones, William Hutchinson

Link

Security and privacy for a sustainable internet of things, Helge Janicke, Sharif Abuadbba, and Surya Nepal

Link

A framework of military wireless body area networks converged with low power wide area networks, James Jin Kang, Wencheng Yang, and Michael Johnstone

Link

IoT threat detection advances, challenges and future directions, Nickson M. Karie, Nor Masri Sahri, and Paul Haskell-Dowland

PDF

Real-time monitoring as a supplementary security component of vigilantism in modern network environments, Victor R. Kebande, Nickson M. Karie, and Richard A. Ikuesan

PDF

Ontology‐driven perspective of CFRaaS, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Hein S. Venter

Link

Optimizing cyber security education: Implementation of bloom’s taxonomy for future cyber security workforce, Nageswaree Kodai Ramsoonder, Selvamanee Kinnoo, Anna J. Griffin, Craig Valli, and Nicola F. Johnson

PDF

A holistic review of cybersecurity and reliability perspectives in smart airports, Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, and Helge Janicke

PDF

A novel intrusion detection system against spoofing attacks in connected electric vehicles, Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyinnais, Francisco J. Aparicio-Navarro, Antonios Argyriou, and Helge Janicke

Link

Proactive forensics: Keystroke logging from the cloud as potential digital evidence for forensic readiness purposes, Sheunesu M. Makura, H. S. Venter, Richard Adeyemi Ikuesan, Victor R. Kebande, and Nickson M. Karie

Link

A Möbius transformation based model for fingerprint minutiae variations, James Moorfield, James Wang, Wencheng Yang, Aseel Bedari, and Peter Van Der Kamp

Link

From evidence to proof: Social network analysis in Italian criminal courts of justice, Roberto Musotto

Link

The online crime-terror nexus: Using booter services (stressers) to weaponize data?, Roberto Musotto and David S. Wall

Link

America back to the Moon and on to Mars: Australian, Japanese and Indian perspectives, Aaron Pereira, Brett Biddington, Kazuto Suzuki, Rajeswari Pillai Rajagopalan, Rahul Krishna, and David Vaccaro

Link

Performance enhancement of intrusion detection system using bagging ensemble technique with feature selection, Md. Mamunur Rashid, Joarder Kamruzzaman, Mohiuddin Ahmed, Nahina Islam, Santoso Wibowo, and Steven Gordon

Link

Concept drift for big data, Raihan Seraj and Mohiuddin Ahmed

Link

AI in digital forensics: Ontology engineering for cybercrime investigations, Leslie F. Sikos

Link

Contextualized knowledge graphs in communication network and cyber-physical system modeling, Leslie F. Sikos

Link

Knowledge representation to support partially automated honeypot analysis based on Wireshark packet capture files, Leslie F. Sikos

PDF

Packet analysis for network forensics: A comprehensive survey, Leslie F. Sikos

Link

The evolution of context-aware RDF knowledge graphs, Leslie F. Sikos

PDF

Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs, Leslie F. Sikos and Dean Philp

PDF

Denial of service attack detection through machine learning for the IoT, Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, and Craig Valli

Link

Counterproductive counterterrorism?: A preliminary examination of the terrorist identity as a social construct of conditions of confinement, Nathan Thompson

Link

Dealing with radicalisation in corrective services: A global issue, Nathan Thompson

Link

‘Click for urgent coronavirus update’: how working from home may be exposing us to cybercrime, Craig Valli

Link

Information warfare by proxy: Malware in PLC firmware, Lachlan Walling, Michael N. Johnstone, and Peter Hannay

Link

BotNets in the Internet of Things: The next wave, Ashley Woodiss-Field and Michael N. Johnstone

Link

Security and forensics in the Internet of Things: Research advances and challenges, Wencheng Yang, Michael N. Johnstone, Leslie F. Sikos, and Song Wang

Link

Secure fingerprint authentication with homomorphic encryption, Wencheng Yang, Song Wang, Kan Yu, James Jin Kang, and Michael N. Johnstone

PDF

How location-aware access control affects user privacy and security in cloud computing systems, Wen Zeng, Reem Bashir, Trevor Wood, Francois Siewe, Helge Janicke, and Isabel Wagner

Link

Securing the elderly in cyberspace with fingerprints, Guanglou Zheng, Wencheng Yang, Mike Johnstone, Rajan Shankaran, and Craig Valli

Link

Towards IoT security automation and orchestration, Yifeng Zheng, Arindam Pal, Sharif Abuadbba, Shiva R. Pokhrel, Surya Nepal, and Helge Janicke

Submissions from 2019

Link

Securing cloud storage by transparent biometric cryptography, Leith Abed, Nathan Clarke, Bogdan Ghita, and Abdulrahman Alruban

Link

Intelligent big data summarization for rare anomaly detection, Mohiuddin Ahmed

Link

Detecting centralized architecture-based botnets using travelling salesperson non-deterministic polynomial-hard problem-TSP-NP technique, Abdullah Al-Ghushami, Nickson Karie, and Victor Kebande

Link

Information security risk communication: A user-centric approach, Manal Alohali, Nathan Clarke, and Steven Furnell

Link

A novel behaviour profiling approach to continuous authentication for mobile applications, Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, and Nathan Clarke

Link

Physical activity recognition by utilising smartphone sensor signals, Abdulrahman Alruban, Hind Alobaidi, Nathan Clarke, and Fudong Li

Link

An outlook at agile methodologies for the independent games developer, Renae Aurisch, Mohiuddin Ahmed, and Abu Barkat

Link

Information security, Zubair Baig, Sherali Zeadally, and Andrew Woodward

Link

Review and analysis of Cowrie artefacts and their potential to be used deceptively, Warren Cabral, Craig Valli, Leslie Sikos, and Samuel Wakeling

Link

The Semantic Web3D: Towards comprehensive representation of 3D content on the Semantic Web, Jakub Flotyński, Don Brutzman, Felix G. Hamza-Lup, Athanasios Malamos, Nicholas Polys, Leslie F. Sikos, and Krzysztof Walczak

Link

Deep learning-based intrusion detection for IoT networks, Mengmeng Ge, Xiping Fu, Naeem Syed, Zubair Baig, Gideon Teo, and Antonio Robles-Kelly

Link

Demystifying the technical and managerial challenges of authentication, Ben Goodwin and Patryk Szewczyk

Link

Secure smart contract supply chains, Richard Greene and Michael N. Johnstone

Link

Security and privacy based access control model for internet of connected vehicles, Muhammad Asif Habib, Mudassar Ahmad, Sohail Jabbar, Shehzad Khalid, Junaid Chaudhry, Kashif Saleem, Joel J.P.C. Rodrigues, and Muhammad Sayim Khalil

An evaluation of phishing email awareness in an information warfare age, Leon Hansan, Aaron Troiani, and Patryk Szewczyk

Link

Correction to: A security review of local government using NIST CSF: A case study, Ahmed Ibrahim, Craig Valli, Ian McAteer, and Junaid Chaudhry

PDF

Corporate security career progression: A comparative study of four Australian organisations, Codee Roy Ludbey, David J. Brooks, and Michael Coole

Link

Identification and extraction of digital forensic evidence from multimedia data sources using multi-algorithmic fusion, Shahlaa Mashhadani, Nathan Clarke, and F. Li

PDF

Integration of biometrics and steganography: A comprehensive review, Ian McAteer, Ahmed Ibrahim, Guanglou Zhang, Wencheng Yang, and Craig Valli

PDF

Forensic Analysis of the Nintendo 3DS NAND, Gus Pessolano, Huw O. L. Read, Iain Sutherland, and Konstantinos Xynos

Link

Division polynomial-based elliptic curve scalar multiplication revisited, SrinivasaRao SubramanyaRao, Zhi Hu, and Chang-An Zhao

Link

Bio-inspired cyber-security for the smart grid, Naeem Firdous Syed, Ahmed Ibrahim, Zubair Baig, and Craig Valli

Link

A comprehensive framework for understanding security culture in organizations, Alaa Tolah, Steven M. Furnell, and Maria Papadaki

Link

Towards a method for detecting botnet code on IoT devices, Ashley Woodiss-Field and Michael N. Johnstone

PDF

Proof-of-familiarity: A privacy-preserved blockchain scheme for collaborative medical decision-making, Jinhong Yang, Md Mehedi Hassan Hasan Onik, Nam-Yong Lee, Mohiuddin Ahmed, and Chul-Soo Kim

Link

Fingerprint and face scanners aren’t as secure as we think they are, Wencheng Yang and Song Wang