Risk-aware business process management. Risk-aware business process management will revolutionise the identification and treatment of risks in business processes by integrating the latest technologies for risk management and process management. It will provide organisations with a range of new tools and techniques for designing, deploying and monitoring risk-aware business processes.
Cost-aware business process management. The project aims to inform business process management (BPM) with the latest insights from the field of management accounting in order to make BPM systems cost-aware. By incorporating the cost dimension, organisations can obtain an accurate and immediate overview of the true cost of their processes and make cost-informed decisions.
Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detecti ....Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detection, and 3) finding unseen vulnerabilities. We therefore propose to use a series of new techniques such as efficient in-memory fuzzing, conditional formulas, and transfer learning to solve the above challenges. The project outcomes will help Australia gain cutting edge techniques in vulnerability detection. Read moreRead less
Understanding the impact of enterprise system use on system performance. To optimise organizational benefits, resource intensive enterprise systems must be appropriately used by all user cohorts. This study investigates the impact of system-use on system success. System-use patterns derived for all key user cohorts across the lifecycle phases will create management matrices to assist organizations maximise system-use.
Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and dece ....Reputation-based Trust Framework for Composed Services. This project aims at providing a uniform and efficient framework for bootstrapping, establishing, and propagating reputation in composed Web services. Reputation is used as a key criterion for establishing trust among composed Web services. Web services are de-facto the technology of choice for the deployment of an increasing number of Web-based solutions for such emerging applications as cloud computing. Because of the distributed and decentralised nature of the Web, there is a need to establish a trust framework for selecting and composing Web services. The key parameter will be based on Web service reputation in delivering services.Read moreRead less
Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective ....Developing Adversary-Aware Classifiers for Android Malware Detection. Smartphones have become increasingly ubiquitous in people’s everyday life. However, it was reported that one in every five Android applications were actually malware, considering that Android has taken 88% market share of mobile phones. As an effective technique, machine learning has been widely adopted to detect Android malware. However, recent work suggests that deliberately-crafted malware makes machine learning ineffective. In this project, we propose to develop a series of new techniques, such as 1) Android contextual analysis, 2) wrapper-based hill climbing algorithm, and 3) ensemble learning, to solve this problem. The outcomes will help Australia gain cutting edge technologies in adversarial machine learning and mobile security.Read moreRead less
Modelling and defence against malware propagation. As the internet has become vital to our day-to-day working and living, we are witnessing a remarkable upsurge in the incidents of malicious software or malware on it. This project aims to develop key technologies that can precisely model the malware propagation on the internet. The technologies will help develop effective defence against malware propagation at an early stage, with limited defence resources, so as to minimise the damage and provi ....Modelling and defence against malware propagation. As the internet has become vital to our day-to-day working and living, we are witnessing a remarkable upsurge in the incidents of malicious software or malware on it. This project aims to develop key technologies that can precisely model the malware propagation on the internet. The technologies will help develop effective defence against malware propagation at an early stage, with limited defence resources, so as to minimise the damage and provide a capability to identify and control malware spreaders. This project is significant as it can secure the internet that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia by protecting our critical infrastructure.Read moreRead less
Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory an ....Contextual Behabiour Predictions in Dynamic Mobile E-commerce. The project aims to address behaviour prediction and develop novel techniques and tools for modelling, predicting human behaviours and making effective recommendations based on ubiquitous user behaviour data in mobile e-commerce. The techniques enable multi-source data fusion, context learning and model adaptation, and dynamic recommendation with interpretability ability. Expected outcomes include advances in data analytics theory and informed decision-making. This provides significant benefits of not only placing Australia in the forefront of exploiting multimodal user behaviour big data in dynamic e-commerce but also transforming Australian government and businesses to intelligent and contextual services adaptive to complex situations.Read moreRead less
Privacy-Preserving Classification for Big-Data Driven Network Traffic. Protecting sensitive information in large network traffic flows while ensuring data usability for classification emerges as a critical problem of increasing significance. Existing techniques do not work on highly heterogeneous traffic from big-data applications for both privacy protection and classification (such as port-based and load- based methods). This project investigates new theories, methods and techniques for solving ....Privacy-Preserving Classification for Big-Data Driven Network Traffic. Protecting sensitive information in large network traffic flows while ensuring data usability for classification emerges as a critical problem of increasing significance. Existing techniques do not work on highly heterogeneous traffic from big-data applications for both privacy protection and classification (such as port-based and load- based methods). This project investigates new theories, methods and techniques for solving this problem. It proposes to develop a set of effective methods for privacy-preserving data publication through combining randomisation with anonymisation, and for classifying the published data through uncertainty leveraging by probabilistic reasoning and accuracy lifting by inter-flow correlation analysis and active learning.Read moreRead less
Reputation-based trust management in crowdsourcing environments. This project aims to address the critical need for enabling trustworthy crowd sourcing environments. Expected outcomes include innovative solutions to evaluate the reputation and expertise portfolio of workers and identify malicious workers, with the ultimate goal of making personalised recommendations of trustworthy workers with expertise to the requesters who have published tasks. This project is expected to provide key solutions ....Reputation-based trust management in crowdsourcing environments. This project aims to address the critical need for enabling trustworthy crowd sourcing environments. Expected outcomes include innovative solutions to evaluate the reputation and expertise portfolio of workers and identify malicious workers, with the ultimate goal of making personalised recommendations of trustworthy workers with expertise to the requesters who have published tasks. This project is expected to provide key solutions to globally leading crowd sourcing platforms originating in Australia and benefit Australian and worldwide Internet users.Read moreRead less