Follow

Submissions from 2023

Link

Ransomware 3.0 – A weapon for next generation information warfare, Mohiuddin Ahmed, A. N. M. Bazlur Rashid, and Al-Sakib Khan Pathan

PDF

Two rapid power iterative DOA estimators for UAV emitter using massive/ultra-massive receive array, Yiwen Chen, Qijuan Jie, Yiqiao Zhang, Feng Shu, Xichao Zhan, Shihao Yan, Wenlong Cai, Xuehui Wang, Zhongwen Sun, Peng Zhang, and Peng Chen

Link

Radar-communication waveform design with detection probability constraints, Yaohui Ding, Shihao Yan, Xiaobo Zhou, Feng Shu, and Siling Feng

PDF

Joint beamforming and phase shift design for hybrid IRS and UAV-aided directional modulation networks, Rongen Dong, Hangjia He, Feng Shu, Qi Zhang, Riqing Chen, Shihao Yan, and Jiangzhou Wang

Link

CovTiNet: Covid text identification network using attention-based positional embedding feature fusion, Md Rajib Hossain, Mohammed Moshiul Hoque, Nazmul Siddique, and Iqbal H. Sarker

Link

Deep reinforcement learning enabled covert transmission with UAV, Jinsong Hu, Mingqian Guo, Shihao Yan, Youjia Chen, Xiaobo Zhou, and Zhizhang Chen

PDF

Machine learning methods for inferring the number of UAV emitters via massive MIMO receive array, Yifan Li, Feng Shu, Jinsong Hu, Shihao Yan, Haiwei Song, Weiqiang Zhu, Da Tian, Yaoliang Song, and Jiangzhou Wang

Link

Covert communication with time uncertainty in time-critical wireless networks, Xingbo Lu, Shihao Yan, Weiwei Yang, Min Li, and Derrick Wing Kwan Ng

PDF

Survey: An overview of lightweight RFID authentication protocols suitable for the maritime internet of things, Glen Mudra, Hui Cui, and Michael N. Johnstone

Link

An exploration of Australian attitudes towards privacy, Aleatha Shanley, Mike Johnstone, Patryk Szewczyk, and Michael Crowley

PDF

Low-complexity three-dimensional AOA-cross geometric center localization methods via multi-UAV network, Baihua Shi, Yifan Li, Guilu Wu, Riqing Chen, Shihao Yan, and Feng Shu

PDF

STAR-RIS-UAV-aided coordinated multipoint cellular system for multi-user networks, Baihua Shi, Yang Wang, Danqi Li, Wenlong Cai, Jinyong Lin, Shuo Zhang, Weiping Shi, Shihao Yan, and Feng Shu

PDF

DOA estimation for hybrid massive MIMO systems using Mixed-ADCs: Performance loss and energy efficiency, Baihua Shi, Qi Zhang, Rongen Dong, Qijuan Jie, Shihao Yan, Feng Shu, and Jiangzhou Wang

PDF

On IRS-assisted covert communication with a friendly UAV, Xiaobei Xu, Linzi Hu, Sha Wei, Yuwen Qian, Shihao Yan, Feng Shu, and Jun Li

Submissions from 2022

PDF

Ransomware 2.0: An emerging threat to national security, Mohiuddin Ahmed, Sascha Dominik Dov Bachmann, Abu Barkat Ullah, and Shaun Barnett

Link

Next-generation enterprise security and governance, Mohiuddin Ahmed, Nour Mustafa, Abu Barkat, and Paul Haskell-Dowland

PDF

Real-world smartphone-based gait recognition, Hind Alobaidi, Nathan Clarke, Fudong Li, and Abdulrahman Alruban

Link

Taking care of everyone’s business: Interpreting Sicilian Mafia embedment through spatial network analysis, Michele Battisti, Andrea Mario Lavezzi, and Roberto Musotto

Link

Intrusion Detection Systems in physical security, David J. Brooks

PDF

A low-cost machine learning based network intrusion detection system with data privacy preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, and Wencheng Yang

Link

Ontology-driven artificial intelligence in IoT forensics, Alexander Grojek and Leslie F. Sikos

PDF

Cyber security curriculum in Western Australian primary and secondary schools: Interim report: Curriculum mapping, Nicola Johnson, Ahmed Ibrahim, Leslie Sikos, and Cheryl Glowrey

Link

Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats, Nickson M. Karie, Nor Masri Bin Sahri, Wencheng Yang, and Michael N. Johnstone

Link

Review of blockchain forensics challenges, Victor R. Kebande, Richard A. Ikuesan, and Nickson M. Karie

Link

Reliability, security, and privacy in power grids, Leandros Maglaras, Mohamed Amine Ferrag, Helge Janicke, Nick Ayres, and Leandros Tassiulas

Link

Understanding Mafia networks, Roberto Musotto

Link

UAV-enabled cooperative jamming for covert communications based on geometric method, Hangmei Rao, Sa Xiao, Shihao Yan, Janquan Wang, and Wanbin Tang

Link

Optimal geometric solutions to UAV-enabled covert communications in line-of-sight scenarios, Hangmei Rao, Sa Xiao, Shihao Yan, Jianquan Wang, and Wanbin Tang

Link

Faking smart industry: Exploring cyber-threat landscape deploying cloud-based honeypot, S M Zia Ur Rashid, Ashfaqul Haq, Sayed Tanimun Hasan, Hasan Furhad, Mohiuddin Ahmed, and Abu Barkat Ullah

PDF

Anatomy of an internet hijack and interception attack: A global and educational perspective, Ben A. Scott, Michael N. Johnstone, and Patryk Szewczyk

Link

Probabilistic accumulate-then-transmit in wireless-powered covert communications, Yida Wang, Shihao Yan, Weiwei Yang, Caijun Zhong, and Derrick Wing Kwan Ng

Link

Covert communication with energy replenishment constraints in UAV networks, Yida Wang, Shihao Yan, Xiaobo Zhou, Yuzhen Huang, and Derrick Wing Kwan Ng

Link

Network forensics in the era of artificial intelligence, Wencheng Yang, Michael N. Johnstone, Song Wang, Nickson M. Karie, Nor M. B. Sahri, and James J. Kang

Link

A privacy-preserving ECG-based authentication system for securing wireless body sensor networks, Wencheng Yang and Song Wang

PDF

Multimedia security and privacy protection in the internet of things: research developments and challenges, Wencheng Yang, Song Wang, Jiankun Hu, and Nickson M. Karie

Link

A linear convolution-based cancelable fingerprint biometric authentication system, Wencheng Yang, Song Wang, James Jin Kang, Michael N. Johnstone, and Aseel Bedari

PDF

A review on security issues and solutions of the internet of drones, Wencheng Yang, Song Wang, Xuefei Yin, Xu Wang, and Jiankun Hu

Submissions from 2021

PDF

A blockchain-based authentication protocol for cooperative vehicular ad hoc network, A. F. M. S. Akhter, Mohiuddin Ahmed, A. F. M. S. Shah, Adnan Anwar, A. S. M. Kayes, and Ahmet Zengin

Link

Enhancement of healthcare data performance metrics using neural network machine learning algorithms, Qi An, Patryk Szewczyk, Michael N. Johnstone, and James Jin Kang

PDF

Whisper: A location privacy-preserving scheme using transmission range changing for internet of vehicles, Messaoud Babaghayou, Nabila Labraoui, Ado A. Abba Ari, Mohamed A. Ferrag, Leandros Maglaras, and Helge Janicke

PDF

Evaluating the impact of sandbox applications on live digital forensics investigation, Reem Bashir, Helge Janicke, and Wen Zeng

Link

Design of cancelable MCC-based fingerprint templates using dyno-key model, Aseel Bedari, Song Wang, and Wencheng Yang

PDF

Is Australia really lost in space?, Brett Biddington

Link

Analysis of Conpot and Its BACnet features for cyber-deception, Warren Z. Cabral, Craig Valli, Leslie F. Sikos, and Samuel Wakeling

Link

Advanced cowrie configuration to increase honeypot deceptiveness, Warren Z. Cabral, Craig Valli, Leslie F. Sikos, and Samuel G. Wakeling

Link

A novel hybrid cyber range for security exercises on cyber-physical systems, Bil Hallaq, Andrew Nicholson, Richard Smith, Leandros Maglaras, Allan Cook, Helge Janicke, and Kevin Jones

Link

Privacy-preserving analytics for social network data: A survey of currently prevalent tools, Rishabh Jindal, Ahmed Falah, Adnan Anwar, and Mohiuddin Ahmed

Link

A privacy-preserving data inference framework for internet of health things networks, James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, and Xi Zheng

Link

Reducing attack surface of edge computing IoT networks via hybrid routing using dedicated nodes, James Jin Kang, Leslie F. Sikos, and Wencheng Yang

PDF

A review of security standards and frameworks for IoT-based smart environments, Nickson M. Karie, Nor Masri Sahri, Wencheng Yang, Craig Valli, and Victor R. Kebande

Digital forensic readiness implementation in SDN: Issues and challenges, Nickson M. Karie and Craig Valli

PDF

Digital forensic readiness intelligence crime repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, and Sadi Alawadi

PDF

Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Sadi Alawadi

PDF

The efficacy of aligning lessons learnt from significant bushfire incidents to the organisational stratum, Jennifer Medbury, David J. Brooks, and Michael Coole

Link

Federated TON_IoT windows datasets for evaluating AI-based security applications, Nour Moustafa, Marwa Keshk, Essam Debie, and Helge Janicke

Link

Cursory view of IoT-forensic readiness framework based on ISO/IEC 27043 recommendations, Phathutshedzo P. Mudau, H. S. Venter, Victor R. Kebande, Richard A. Ikuesan, and Nickson M. Karie

Link

Alignment-free cancelable fingerprint templates with dual protection, Muhammad Shahzad, Song Wang, Guang Deng, and Wencheng Yang

Link

Machine learning based cybersecurity defense at the age of Industry 4.0, Sourabh K. Vishavnath, Adnan Anwar, and Mohiuddin Ahmed

Link

A comparative study of ML-ELM and DNN for intrusion detection, Wencheng Yang, Song Wang, and Michael Johnstone

PDF

Biometrics for internet‐of‐things security: A review, Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli

PDF

A cancelable biometric authentication system based on feature-adaptive random projection, Wencheng Yang, Song Wang, Muhammad Shahzad, and Wei Zhou

Submissions from 2020

Link

Averaged dependence estimators for DoS attack detection in IoT networks, Zubair A. Baig, Surasak Sanguanpong, Syed Naeem Firdous, Van Nhan Vo, Tri Gia Nguyen, and Chakchai So-In

Link

Deep learning meets malware detection: An investigation, Biozid Bostami and Mohiuddin Ahmed

Link

Education for the multifaith community of cybersecurity, Steven Furnell and Matt Bishop

Link

Good guidance or mistaken misdirection: Assessing the quality of password advice, Steven Furnell and Paul Haskell-Dowland

Link

Towards a cross-cultural education framework for online safety awareness, R. Herkanaidu, Steven M. Furnell, and M. Papadaki

Link

Deceiving autonomous drones, William Hutchinson

Link

Security and privacy for a sustainable internet of things, Helge Janicke, Sharif Abuadbba, and Surya Nepal

Link

A framework of military wireless body area networks converged with low power wide area networks, James Jin Kang, Wencheng Yang, and Michael Johnstone

Link

IoT threat detection advances, challenges and future directions, Nickson M. Karie, Nor Masri Sahri, and Paul Haskell-Dowland

PDF

Real-time monitoring as a supplementary security component of vigilantism in modern network environments, Victor R. Kebande, Nickson M. Karie, and Richard A. Ikuesan

PDF

Ontology‐driven perspective of CFRaaS, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Hein S. Venter

Link

Optimizing cyber security education: Implementation of bloom’s taxonomy for future cyber security workforce, Nageswaree Kodai Ramsoonder, Selvamanee Kinnoo, Anna J. Griffin, Craig Valli, and Nicola F. Johnson

PDF

A holistic review of cybersecurity and reliability perspectives in smart airports, Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, and Helge Janicke

PDF

A novel intrusion detection system against spoofing attacks in connected electric vehicles, Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyinnais, Francisco J. Aparicio-Navarro, Antonios Argyriou, and Helge Janicke

Link

Proactive forensics: Keystroke logging from the cloud as potential digital evidence for forensic readiness purposes, Sheunesu M. Makura, H. S. Venter, Richard Adeyemi Ikuesan, Victor R. Kebande, and Nickson M. Karie

Link

A Möbius transformation based model for fingerprint minutiae variations, James Moorfield, James Wang, Wencheng Yang, Aseel Bedari, and Peter Van Der Kamp

Link

From evidence to proof: Social network analysis in Italian criminal courts of justice, Roberto Musotto

Link

The online crime-terror nexus: Using booter services (stressers) to weaponize data?, Roberto Musotto and David S. Wall

Link

America back to the Moon and on to Mars: Australian, Japanese and Indian perspectives, Aaron Pereira, Brett Biddington, Kazuto Suzuki, Rajeswari Pillai Rajagopalan, Rahul Krishna, and David Vaccaro

Link

Performance enhancement of intrusion detection system using bagging ensemble technique with feature selection, Md. Mamunur Rashid, Joarder Kamruzzaman, Mohiuddin Ahmed, Nahina Islam, Santoso Wibowo, and Steven Gordon

Link

Concept drift for big data, Raihan Seraj and Mohiuddin Ahmed

Link

AI in digital forensics: Ontology engineering for cybercrime investigations, Leslie F. Sikos

Link

Contextualized knowledge graphs in communication network and cyber-physical system modeling, Leslie F. Sikos

Link

Knowledge representation to support partially automated honeypot analysis based on Wireshark packet capture files, Leslie F. Sikos

PDF

Packet analysis for network forensics: A comprehensive survey, Leslie F. Sikos

Link

The evolution of context-aware RDF knowledge graphs, Leslie F. Sikos

PDF

Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs, Leslie F. Sikos and Dean Philp

PDF

Denial of service attack detection through machine learning for the IoT, Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, and Craig Valli

Link

Counterproductive counterterrorism?: A preliminary examination of the terrorist identity as a social construct of conditions of confinement, Nathan Thompson

Link

Dealing with radicalisation in corrective services: A global issue, Nathan Thompson

Link

‘Click for urgent coronavirus update’: how working from home may be exposing us to cybercrime, Craig Valli

Link

Information warfare by proxy: Malware in PLC firmware, Lachlan Walling, Michael N. Johnstone, and Peter Hannay

Link

BotNets in the Internet of Things: The next wave, Ashley Woodiss-Field and Michael N. Johnstone

Link

Security and forensics in the Internet of Things: Research advances and challenges, Wencheng Yang, Michael N. Johnstone, Leslie F. Sikos, and Song Wang

Link

Secure fingerprint authentication with homomorphic encryption, Wencheng Yang, Song Wang, Kan Yu, James Jin Kang, and Michael N. Johnstone

PDF

How location-aware access control affects user privacy and security in cloud computing systems, Wen Zeng, Reem Bashir, Trevor Wood, Francois Siewe, Helge Janicke, and Isabel Wagner

Link

Securing the elderly in cyberspace with fingerprints, Guanglou Zheng, Wencheng Yang, Mike Johnstone, Rajan Shankaran, and Craig Valli

Link

Towards IoT security automation and orchestration, Yifeng Zheng, Arindam Pal, Sharif Abuadbba, Shiva R. Pokhrel, Surya Nepal, and Helge Janicke

Submissions from 2019

Link

Securing cloud storage by transparent biometric cryptography, Leith Abed, Nathan Clarke, Bogdan Ghita, and Abdulrahman Alruban