Submissions from 2023
Radar-communication waveform design with detection probability constraints, Yaohui Ding, Shihao Yan, Xiaobo Zhou, Feng Shu, and Siling Feng
CovTiNet: Covid text identification network using attention-based positional embedding feature fusion, Md Rajib Hossain, Mohammed Moshiul Hoque, Nazmul Siddique, and Iqbal H. Sarker
Deep reinforcement learning enabled covert transmission with UAV, Jinsong Hu, Mingqian Guo, Shihao Yan, Youjia Chen, Xiaobo Zhou, and Zhizhang Chen
Covert communication with time uncertainty in time-critical wireless networks, Xingbo Lu, Shihao Yan, Weiwei Yang, Min Li, and Derrick Wing Kwan Ng
An exploration of Australian attitudes towards privacy, Aleatha Shanley, Mike Johnstone, Patryk Szewczyk, and Michael Crowley
Submissions from 2022
Ransomware 2.0: An emerging threat to national security, Mohiuddin Ahmed, Sascha Dominik Dov Bachmann, Abu Barkat Ullah, and Shaun Barnett
Next-generation enterprise security and governance, Mohiuddin Ahmed, Nour Mustafa, Abu Barkat, and Paul Haskell-Dowland
Real-world smartphone-based gait recognition, Hind Alobaidi, Nathan Clarke, Fudong Li, and Abdulrahman Alruban
Taking care of everyone’s business: Interpreting Sicilian Mafia embedment through spatial network analysis, Michele Battisti, Andrea Mario Lavezzi, and Roberto Musotto
Intrusion Detection Systems in physical security, David J. Brooks
A low-cost machine learning based network intrusion detection system with data privacy preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, and Wencheng Yang
Ontology-driven artificial intelligence in IoT forensics, Alexander Grojek and Leslie F. Sikos
Cyber security curriculum in Western Australian primary and secondary schools: Interim report: Curriculum mapping, Nicola Johnson, Ahmed Ibrahim, Leslie Sikos, and Cheryl Glowrey
Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats, Nickson M. Karie, Nor Masri Bin Sahri, Wencheng Yang, and Michael N. Johnstone
Review of blockchain forensics challenges, Victor R. Kebande, Richard A. Ikuesan, and Nickson M. Karie
Understanding Mafia networks, Roberto Musotto
UAV-enabled cooperative jamming for covert communications based on geometric method, Hangmei Rao, Sa Xiao, Shihao Yan, Janquan Wang, and Wanbin Tang
Optimal geometric solutions to UAV-enabled covert communications in line-of-sight scenarios, Hangmei Rao, Sa Xiao, Shihao Yan, Jianquan Wang, and Wanbin Tang
Faking smart industry: Exploring cyber-threat landscape deploying cloud-based honeypot, S M Zia Ur Rashid, Ashfaqul Haq, Sayed Tanimun Hasan, Hasan Furhad, Mohiuddin Ahmed, and Abu Barkat Ullah
Anatomy of an internet hijack and interception attack: A global and educational perspective, Ben A. Scott, Michael N. Johnstone, and Patryk Szewczyk
Probabilistic accumulate-then-transmit in wireless-powered covert communications, Yida Wang, Shihao Yan, Weiwei Yang, Caijun Zhong, and Derrick Wing Kwan Ng
Covert communication with energy replenishment constraints in UAV networks, Yida Wang, Shihao Yan, Xiaobo Zhou, Yuzhen Huang, and Derrick Wing Kwan Ng
Network forensics in the era of artificial intelligence, Wencheng Yang, Michael N. Johnstone, Song Wang, Nickson M. Karie, Nor M. B. Sahri, and James J. Kang
A privacy-preserving ECG-based authentication system for securing wireless body sensor networks, Wencheng Yang and Song Wang
Multimedia security and privacy protection in the internet of things: research developments and challenges, Wencheng Yang, Song Wang, Jiankun Hu, and Nickson M. Karie
A linear convolution-based cancelable fingerprint biometric authentication system, Wencheng Yang, Song Wang, James Jin Kang, Michael N. Johnstone, and Aseel Bedari
A review on security issues and solutions of the internet of drones, Wencheng Yang, Song Wang, Xuefei Yin, Xu Wang, and Jiankun Hu
Submissions from 2021
A blockchain-based authentication protocol for cooperative vehicular ad hoc network, A. F. M. S. Akhter, Mohiuddin Ahmed, A. F. M. S. Shah, Adnan Anwar, A. S. M. Kayes, and Ahmet Zengin
Enhancement of healthcare data performance metrics using neural network machine learning algorithms, Qi An, Patryk Szewczyk, Michael N. Johnstone, and James Jin Kang
Whisper: A location privacy-preserving scheme using transmission range changing for internet of vehicles, Messaoud Babaghayou, Nabila Labraoui, Ado A. Abba Ari, Mohamed A. Ferrag, Leandros Maglaras, and Helge Janicke
Evaluating the impact of sandbox applications on live digital forensics investigation, Reem Bashir, Helge Janicke, and Wen Zeng
Design of cancelable MCC-based fingerprint templates using dyno-key model, Aseel Bedari, Song Wang, and Wencheng Yang
Is Australia really lost in space?, Brett Biddington
Advanced cowrie configuration to increase honeypot deceptiveness, Warren Z. Cabral, Craig Valli, Leslie F. Sikos, and Samuel G. Wakeling
Analysis of Conpot and Its BACnet features for cyber-deception, Warren Z. Cabral, Craig Valli, Leslie F. Sikos, and Samuel G. Wakeling
A novel hybrid cyber range for security exercises on cyber-physical systems, Bil Hallaq, Andrew Nicholson, Richard Smith, Leandros Maglaras, Allan Cook, Helge Janicke, and Kevin Jones
Privacy-preserving analytics for social network data: A survey of currently prevalent tools, Rishabh Jindal, Ahmed Falah, Adnan Anwar, and Mohiuddin Ahmed
A privacy-preserving data inference framework for internet of health things networks, James Jin Kang, Mahdi Dibaei, Gang Luo, Wencheng Yang, and Xi Zheng
Reducing attack surface of edge computing IoT networks via hybrid routing using dedicated nodes, James Jin Kang, Leslie F. Sikos, and Wencheng Yang
A review of security standards and frameworks for IoT-based smart environments, Nickson M. Karie, Nor Masri Sahri, Wencheng Yang, Craig Valli, and Victor R. Kebande
Digital forensic readiness implementation in SDN: Issues and challenges, Nickson M. Karie and Craig Valli
Digital forensic readiness intelligence crime repository, Victor R. Kebande, Nickson M. Karie, Kim-Kwang R. Choo, and Sadi Alawadi
Digital forensic readiness in operational cloud leveraging ISO/IEC 27043 guidelines on security monitoring, Sheunesu Makura, H. S. Venter, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Sadi Alawadi
The efficacy of aligning lessons learnt from significant bushfire incidents to the organisational stratum, Jennifer Medbury, David J. Brooks, and Michael Coole
Federated TON_IoT windows datasets for evaluating AI-based security applications, Nour Moustafa, Marwa Keshk, Essam Debie, and Helge Janicke
Cursory view of IoT-forensic readiness framework based on ISO/IEC 27043 recommendations, Phathutshedzo P. Mudau, H. S. Venter, Victor R. Kebande, Richard A. Ikuesan, and Nickson M. Karie
Alignment-free cancelable fingerprint templates with dual protection, Muhammad Shahzad, Song Wang, Guang Deng, and Wencheng Yang
Machine learning based cybersecurity defense at the age of Industry 4.0, Sourabh K. Vishavnath, Adnan Anwar, and Mohiuddin Ahmed
A comparative study of ML-ELM and DNN for intrusion detection, Wencheng Yang, Song Wang, and Michael Johnstone
Biometrics for internet‐of‐things security: A review, Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, and Craig Valli
A cancelable biometric authentication system based on feature-adaptive random projection, Wencheng Yang, Song Wang, Muhammad Shahzad, and Wei Zhou
Submissions from 2020
Averaged dependence estimators for DoS attack detection in IoT networks, Zubair A. Baig, Surasak Sanguanpong, Syed Naeem Firdous, Van Nhan Vo, Tri Gia Nguyen, and Chakchai So-In
Deep learning meets malware detection: An investigation, Biozid Bostami and Mohiuddin Ahmed
Education for the multifaith community of cybersecurity, Steven Furnell and Matt Bishop
Good guidance or mistaken misdirection: Assessing the quality of password advice, Steven Furnell and Paul Haskell-Dowland
Towards a cross-cultural education framework for online safety awareness, R. Herkanaidu, Steven M. Furnell, and M. Papadaki
Deceiving autonomous drones, William Hutchinson
Security and privacy for a sustainable internet of things, Helge Janicke, Sharif Abuadbba, and Surya Nepal
A framework of military wireless body area networks converged with low power wide area networks, James Jin Kang, Wencheng Yang, and Michael Johnstone
IoT threat detection advances, challenges and future directions, Nickson M. Karie, Nor Masri Sahri, and Paul Haskell-Dowland
Real-time monitoring as a supplementary security component of vigilantism in modern network environments, Victor R. Kebande, Nickson M. Karie, and Richard A. Ikuesan
Ontology‐driven perspective of CFRaaS, Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan, and Hein S. Venter
Optimizing cyber security education: Implementation of bloom’s taxonomy for future cyber security workforce, Nageswaree Kodai Ramsoonder, Selvamanee Kinnoo, Anna J. Griffin, Craig Valli, and Nicola F. Johnson
A holistic review of cybersecurity and reliability perspectives in smart airports, Nickolaos Koroniotis, Nour Moustafa, Francesco Schiliro, Praveen Gauravaram, and Helge Janicke
A novel intrusion detection system against spoofing attacks in connected electric vehicles, Dimitrios Kosmanos, Apostolos Pappas, Leandros Maglaras, Sotiris Moschoyinnais, Francisco J. Aparicio-Navarro, Antonios Argyriou, and Helge Janicke
Proactive forensics: Keystroke logging from the cloud as potential digital evidence for forensic readiness purposes, Sheunesu M. Makura, H. S. Venter, Richard Adeyemi Ikuesan, Victor R. Kebande, and Nickson M. Karie
A Möbius transformation based model for fingerprint minutiae variations, James Moorfield, James Wang, Wencheng Yang, Aseel Bedari, and Peter Van Der Kamp
From evidence to proof: Social network analysis in Italian criminal courts of justice, Roberto Musotto
The online crime-terror nexus: Using booter services (stressers) to weaponize data?, Roberto Musotto and David S. Wall
America back to the Moon and on to Mars: Australian, Japanese and Indian perspectives, Aaron Pereira, Brett Biddington, Kazuto Suzuki, Rajeswari Pillai Rajagopalan, Rahul Krishna, and David Vaccaro
Performance enhancement of intrusion detection system using bagging ensemble technique with feature selection, Md. Mamunur Rashid, Joarder Kamruzzaman, Mohiuddin Ahmed, Nahina Islam, Santoso Wibowo, and Steven Gordon
Concept drift for big data, Raihan Seraj and Mohiuddin Ahmed
AI in digital forensics: Ontology engineering for cybercrime investigations, Leslie F. Sikos
Contextualized knowledge graphs in communication network and cyber-physical system modeling, Leslie F. Sikos
Knowledge representation to support partially automated honeypot analysis based on Wireshark packet capture files, Leslie F. Sikos
Packet analysis for network forensics: A comprehensive survey, Leslie F. Sikos
The evolution of context-aware RDF knowledge graphs, Leslie F. Sikos
Provenance-aware knowledge representation: A survey of data models and contextualized knowledge graphs, Leslie F. Sikos and Dean Philp
Denial of service attack detection through machine learning for the IoT, Naeem Firdous Syed, Zubair Baig, Ahmed Ibrahim, and Craig Valli
Counterproductive counterterrorism?: A preliminary examination of the terrorist identity as a social construct of conditions of confinement, Nathan Thompson
Dealing with radicalisation in corrective services: A global issue, Nathan Thompson
‘Click for urgent coronavirus update’: how working from home may be exposing us to cybercrime, Craig Valli
Information warfare by proxy: Malware in PLC firmware, Lachlan Walling, Michael N. Johnstone, and Peter Hannay
BotNets in the Internet of Things: The next wave, Ashley Woodiss-Field and Michael N. Johnstone
Security and forensics in the Internet of Things: Research advances and challenges, Wencheng Yang, Michael N. Johnstone, Leslie F. Sikos, and Song Wang
Secure fingerprint authentication with homomorphic encryption, Wencheng Yang, Song Wang, Kan Yu, James Jin Kang, and Michael N. Johnstone
How location-aware access control affects user privacy and security in cloud computing systems, Wen Zeng, Reem Bashir, Trevor Wood, Francois Siewe, Helge Janicke, and Isabel Wagner
Securing the elderly in cyberspace with fingerprints, Guanglou Zheng, Wencheng Yang, Mike Johnstone, Rajan Shankaran, and Craig Valli
Towards IoT security automation and orchestration, Yifeng Zheng, Arindam Pal, Sharif Abuadbba, Shiva R. Pokhrel, Surya Nepal, and Helge Janicke
Submissions from 2019
Securing cloud storage by transparent biometric cryptography, Leith Abed, Nathan Clarke, Bogdan Ghita, and Abdulrahman Alruban
Intelligent big data summarization for rare anomaly detection, Mohiuddin Ahmed
Detecting centralized architecture-based botnets using travelling salesperson non-deterministic polynomial-hard problem-TSP-NP technique, Abdullah Al-Ghushami, Nickson Karie, and Victor Kebande
Information security risk communication: A user-centric approach, Manal Alohali, Nathan Clarke, and Steven Furnell
A novel behaviour profiling approach to continuous authentication for mobile applications, Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, and Nathan Clarke
Physical activity recognition by utilising smartphone sensor signals, Abdulrahman Alruban, Hind Alobaidi, Nathan Clarke, and Fudong Li
An outlook at agile methodologies for the independent games developer, Renae Aurisch, Mohiuddin Ahmed, and Abu Barkat
Information security, Zubair Baig, Sherali Zeadally, and Andrew Woodward
Review and analysis of Cowrie artefacts and their potential to be used deceptively, Warren Cabral, Craig Valli, Leslie Sikos, and Samuel Wakeling
The Semantic Web3D: Towards comprehensive representation of 3D content on the Semantic Web, Jakub Flotyński, Don Brutzman, Felix G. Hamza-Lup, Athanasios Malamos, Nicholas Polys, Leslie F. Sikos, and Krzysztof Walczak
Deep learning-based intrusion detection for IoT networks, Mengmeng Ge, Xiping Fu, Naeem Syed, Zubair Baig, Gideon Teo, and Antonio Robles-Kelly