Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. Th ....Learning Software Security Analysers with Imperfect Data. This project aims to systematically investigate next-generation learning-based software security analysis to detect vulnerabilities in real-world large-scale software. The expected learning-based foundation will support the handling of imperfect data in order to provide a precise, scalable and adaptive security analysis of the critical software components, thus capturing important security vulnerabilities missed by existing approaches. The success of this project will further enhance the international competitiveness of Australian research in this important field and will benefit any Australian industry and business where software systems are deeply-rooted, such as transportation, smart homes, medical devices, defence and finance.Read moreRead less
Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptiv ....Secure Management of Internet of Things Data for Critical Surveillance. This project aims to develop innovative models/algorithms to manage Internet of Things (IoT) data safely and reliably. This project expects to generate new knowledge in the area of classified information governance using innovative data collection, transmission and analysis techniques that overcome the security concerns in large-scale collaborative sensing. Expected outcomes include novel abstract interfaces for IoT, adaptive trust and integrity preserving methods, and reliable distributed data processing mechanisms to mitigate vulnerabilities in real-time IoT-enabled critical surveillance. This should provide significant benefits to Australia's economy, one of which is the enhanced consumer-centric adoption of IoT for sensitive operations.Read moreRead less
Optimal Robust Fitting under the Framework of LP-Type Problems. The project aims to develop algorithms to support the development of robust and accurate computer vision systems. Real-world visual data (images, videos) is inherently noisy and outlier prone. To build computer vision systems that work reliably in the real world, it is necessary to ensure that the underlying algorithms are robust and efficient. The project aims to devise novel algorithms that can compute the best possible result giv ....Optimal Robust Fitting under the Framework of LP-Type Problems. The project aims to develop algorithms to support the development of robust and accurate computer vision systems. Real-world visual data (images, videos) is inherently noisy and outlier prone. To build computer vision systems that work reliably in the real world, it is necessary to ensure that the underlying algorithms are robust and efficient. The project aims to devise novel algorithms that can compute the best possible result given the input data in a short amount of time. The expected outcomes would support the construction of reliable and accurate computer vision-based systems, such as large-scale 3-D reconstruction from photo collections, self-driving cars and domestic robots.Read moreRead less
WAVELET-BASED MODELLING AND MODEL PREDICTIVE CONTROL OF COMPLEX MULTIDIMENSIONAL CRYSTALLISATION PROCESSES. The results of this project will directly contribute to a better understanding of crystallisation which is an important unit operation to achieve high purity separations. Many Australian industries for example, mineral processing, sugar processing, pharmaceuticals, etc will benefit from the results in order to enhance optimal operation and control to ensure globally competitive production ....WAVELET-BASED MODELLING AND MODEL PREDICTIVE CONTROL OF COMPLEX MULTIDIMENSIONAL CRYSTALLISATION PROCESSES. The results of this project will directly contribute to a better understanding of crystallisation which is an important unit operation to achieve high purity separations. Many Australian industries for example, mineral processing, sugar processing, pharmaceuticals, etc will benefit from the results in order to enhance optimal operation and control to ensure globally competitive production which is on time, minimize wastes and raw materials and inventories. The leading edge results will increase the contributions of these industries to the Australian economy and our global competitiveness necessary to maintain our culture and the beauty of our environment. Read moreRead less
Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods an ....Preventing Exfiltration of Sensitive Data by Malicious Insiders or Malwares. Data exfiltration is a serious threat as highlighted in recent leakage of sensitive data that resulted in huge economic losses as well as unprecedented breaches of national security. The aim of this project is to develop a comprehensive and robust solution for detection and prevention of sensitive data exfiltration attempts by malware and unauthorised human users. Expected outcomes include scalable monitoring methods and efficient algorithms that will be able to prevent real-time exfiltration and identify previously undetected exfiltration of sensitive data. This should provide significant benefits to governments, defence networks as well as businesses and health sectors, as it will protect them from sophisticated cyber attacks.
Read moreRead less
Industrial Transformation Research Hubs - Grant ID: IH170100013
Funder
Australian Research Council
Funding Amount
$2,962,655.00
Summary
ARC Research Hub for Digital Enhanced Living. The ARC Research Hub for Digital Enhanced Living aims to address the growing challenges of aging people living in their own home or residential care. This will be through inventing new personalised medical technologies through an innovative approach, with a multi-disciplinary team leveraging diverse expertise. An enhanced capacity to create and deploy fit-for-purpose personalised health solutions will result in revenues from new and repurposed device ....ARC Research Hub for Digital Enhanced Living. The ARC Research Hub for Digital Enhanced Living aims to address the growing challenges of aging people living in their own home or residential care. This will be through inventing new personalised medical technologies through an innovative approach, with a multi-disciplinary team leveraging diverse expertise. An enhanced capacity to create and deploy fit-for-purpose personalised health solutions will result in revenues from new and repurposed devices, analytics and integration platforms. New jobs and improved care will see cost reductions, better use of resources and enhanced mental, physical and social well-being.Read moreRead less
Space-based space surveillance with robust computer vision algorithms. Space-based space surveillance with robust computer vision algorithms. This project aims to develop computer vision algorithms to detect man-made objects in space. These algorithms function on nanosatellite platforms, enabling space-based space surveillance. This technology is expected to provide always-on monitoring of the Earth's orbit to enhance existing defence infrastructure and protect vital space assets, including comm ....Space-based space surveillance with robust computer vision algorithms. Space-based space surveillance with robust computer vision algorithms. This project aims to develop computer vision algorithms to detect man-made objects in space. These algorithms function on nanosatellite platforms, enabling space-based space surveillance. This technology is expected to provide always-on monitoring of the Earth's orbit to enhance existing defence infrastructure and protect vital space assets, including communications and navigational satellites, in Earth’s orbit from collisions and covert sabotage. Increased space use by government and civilian agencies opens up opportunities for the space industry. This project is expected to develop Australia’s space surveillance capabilities, protect space assets and capture a growing market.Read moreRead less
A deep survey for compact structure in the nearby universe: key science for the upgraded Australian Long Baseline Array. This project uses advances in ICT to build a national and international network of facilities that includes existing telescopes primarily on the east coast of Australia, as well as planned facilities in Western Australia and New Zealand. One of these facilities, the New Technology Demonstrator, is a crucial part of Australia's roadmap to the Square Kilometre Array. The SKA-r ....A deep survey for compact structure in the nearby universe: key science for the upgraded Australian Long Baseline Array. This project uses advances in ICT to build a national and international network of facilities that includes existing telescopes primarily on the east coast of Australia, as well as planned facilities in Western Australia and New Zealand. One of these facilities, the New Technology Demonstrator, is a crucial part of Australia's roadmap to the Square Kilometre Array. The SKA-related science and technology demonstrations we will undertake as part of this project will contribute to Australia's bid to host this $US1b instrument. This project cements a significant Trans-Tasman collaboration and brings together researchers in astrophysics and ICT to give Australia a leading position in the field of eVLBI.Read moreRead less
Design of a Reference Methodology for Extended Enterprise Architecture. Enterprises have nowadays a very critical perception of the actual benefits of Information Technology (IT). Significant investments in IT infrastructures have been made. However, in many cases no monetary benefits could be demonstrated. Enterprises Architectures provide a way to link the business and the IT perspective. This project aims to develop an operational methodology with a solid theoretical foundation for the design ....Design of a Reference Methodology for Extended Enterprise Architecture. Enterprises have nowadays a very critical perception of the actual benefits of Information Technology (IT). Significant investments in IT infrastructures have been made. However, in many cases no monetary benefits could be demonstrated. Enterprises Architectures provide a way to link the business and the IT perspective. This project aims to develop an operational methodology with a solid theoretical foundation for the design of such Enterprise Architectures. The outcomes and the innovation of this project are an extension of the popular Zachman Framework. Integrated modelling techniques proposed within the Architecture of Integrated Information Systems will be used to populate this framework.Read moreRead less
Efficient Computational Methods for Constrained Path Problems. We consider a class of path design problems which arise when an object needs to traverse between two points through a specified region. The region may be a continuous space or the path may be restricted to the edges of a network. The path must optimise a prescribed criterion such
as risk, reliability or cost and satisfy a number of constraints.
Problems of this type readily arise in the defence, transport and
communication i ....Efficient Computational Methods for Constrained Path Problems. We consider a class of path design problems which arise when an object needs to traverse between two points through a specified region. The region may be a continuous space or the path may be restricted to the edges of a network. The path must optimise a prescribed criterion such
as risk, reliability or cost and satisfy a number of constraints.
Problems of this type readily arise in the defence, transport and
communication industries. In addition to efficient solution methods
for these problems the project will produce computational tools for
a wide range of related network routing problems.Read moreRead less