Special Research Initiatives - Grant ID: SR1101002
Funder
Australian Research Council
Funding Amount
$21,000,000.00
Summary
Stem Cells Australia. Despite progress in stem cell research, scientists do not understand how stem cells “decide” what to become. Stem Cells Australia will draw upon strengths within Australia’s premier stem cell research universities and institutes. This collaboration between leading bioengineering, nanotechnology, stem cell and advanced molecular analysis experts, will fast-track efforts to deliver a fundamental understanding of the mechanisms of stem cell regulation and differentiation, and ....Stem Cells Australia. Despite progress in stem cell research, scientists do not understand how stem cells “decide” what to become. Stem Cells Australia will draw upon strengths within Australia’s premier stem cell research universities and institutes. This collaboration between leading bioengineering, nanotechnology, stem cell and advanced molecular analysis experts, will fast-track efforts to deliver a fundamental understanding of the mechanisms of stem cell regulation and differentiation, and the ability to control and influence this process. Stem Cells Australia will deliver new methods for stem cell propagation and manipulation, new translational technologies for therapeutic applications, and will prepare Australia’s future stem cell scientific leaders.Read moreRead less
Functional links between estuaries and their catchments: How does land use change affect estuarine ecological and bio-geochemical function? Estuaries are iconic recreational areas of high ecological and socio-economic value. Estuarine health is strongly linked to the catchments that feed them, yet we have no detailed understanding of these links. This project will use a number of state of the art approaches to better understand how land use affects estuarine health.
Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures ha ....Designing Distributed Intrusion Detection Systems for Critical Industrial Infrastructures. SCADA systems are computerized systems that control and monitor industrial and critical infrastructures, such as power grid, gas and water facilities and nuclear power plants. Many cyber-attacks on SCADA systems make such systems vulnerable. Also there is an increasing risk that SCADA vulnerabilities could be exploited by terrorist organizations. The security of SCADA systems of critical infrastructures has enormous and direct impact to our national security, economy and social life because of potential disasters that could happen from natural causes as well as malicious attacks. This project aims to investigate the relevant issues and provide efficient and reliable technological solutions to detect and prevent such problems.Read moreRead less
Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design i ....Developing smart embedded host-based intrusion detection systems. Computer intrusion is a major concern in many places. It is estimated that cybercrime cost firms US$1 trillion globally in 2008. Many serious cyber attacks, including cyber espionage, do not generate significant network traffic and can easily penetrate network-based intrusion detection systems (NIDS). Such attacks often attempt to compromise individual hosts and hence they are best detected at the host level. We aim to design innovative host-based IDS, as a complement to the NIDS, to address this issue. The outcomes of this project will strengthen the national capability to resist attacks by criminals and terrorists on Australian networked critical infrastructures and also enhance the global competitiveness of Australia’s information technology industry.Read moreRead less
Detecting Supervisory Control and Data Access (SCADA) malicious programs to protect Australian critical infrastructure. The security of SCADA systems has enormous impact to our national security and economy because they control and monitor critical infrastructure, like power, gas and water facilities and nuclear power plants, etc. This project aims to investigate the security issues and provide innovative technological solutions to detect and prevent such problems.
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE0667981
Funder
Australian Research Council
Funding Amount
$200,000.00
Summary
Kangaroo Genome Resource Management Facility. Increasingly, large Australian multicentre research programs in biological and medical sciences have a genomics component that involves integration of biological information with sequencing data. The success of these research programs depends on rapid internet access to the research information by all participating scientists. The universal design of the proposed information management system means that it can be easily adapted to support a broad ran ....Kangaroo Genome Resource Management Facility. Increasingly, large Australian multicentre research programs in biological and medical sciences have a genomics component that involves integration of biological information with sequencing data. The success of these research programs depends on rapid internet access to the research information by all participating scientists. The universal design of the proposed information management system means that it can be easily adapted to support a broad range of research programs. The development of this software program therefore has the potential to benefit research scientists, academics and students in many related fields, as well as the broader community, through enhancing research outcomes.Read moreRead less
Assessing the ecosystem-wide risks of threatened species translocation. Assessing the ecosystem-wide risks of threatened species translocation. This project aims to develop the first quantitative risk assessment framework to improve decisions about moving threatened species to new places. Moving threatened plants and animals to new environments, or reintroducing them where they previously persisted, is a growing focus of conservation. Moving species can have unanticipated effects on other specie ....Assessing the ecosystem-wide risks of threatened species translocation. Assessing the ecosystem-wide risks of threatened species translocation. This project aims to develop the first quantitative risk assessment framework to improve decisions about moving threatened species to new places. Moving threatened plants and animals to new environments, or reintroducing them where they previously persisted, is a growing focus of conservation. Moving species can have unanticipated effects on other species in the ecosystem. Although the International Union for Conservation of Nature deems ecosystem-wide risk assessments essential for conservation translocations, no framework exists to assess these risks and inform these decisions. New tools for assessing the risks of conservation translocations are expected to improve global and local conservation outcomes.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
A novel top-down approach to ecosystem management using multivariate foraging strategies of an iconic marine top-predator. Understanding predator aggregation patterns in relation to marine productivity is critical in designing ecosystem-level conservation plans for protecting marine habitats and species. The project aims to develop a new approach to measure prey abundance and availability in the marine ecosystem for the management of resources of top-predators. This will be of specific benefit i ....A novel top-down approach to ecosystem management using multivariate foraging strategies of an iconic marine top-predator. Understanding predator aggregation patterns in relation to marine productivity is critical in designing ecosystem-level conservation plans for protecting marine habitats and species. The project aims to develop a new approach to measure prey abundance and availability in the marine ecosystem for the management of resources of top-predators. This will be of specific benefit in areas where a strong need exists for conservation of prey species with economic importance too low to justify expensive at-sea research.Read moreRead less