Quality of Service in 3G Wireless Systems with Hybrid Networks. The increasing demand of providing Internet-based services over the mobile handsets has led to the transition from circuit-based 2G systems to packet-based network architectures in the emerging 3G systems. A major technical challenge for this paradigm shift is maintaining quality of services (QoS) for the existing data and voice and future Internet services such as streaming multimedia over such packet switching networks. This proje ....Quality of Service in 3G Wireless Systems with Hybrid Networks. The increasing demand of providing Internet-based services over the mobile handsets has led to the transition from circuit-based 2G systems to packet-based network architectures in the emerging 3G systems. A major technical challenge for this paradigm shift is maintaining quality of services (QoS) for the existing data and voice and future Internet services such as streaming multimedia over such packet switching networks. This project aims to investigate end-to-end QoS solutions in the 3G systems. Australian mobile Internet and voice carriers will significantly benefit from this technology.Read moreRead less
Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramat ....Secure and Resistant Blockchain for Financial and Business Applications. The aim of this project is to develop a practical secure blockchain technology for the booming applications in finance and business. This project expects to address the leading security threats to the current blockchain applications. The expected outcome is an executable secure and resistant blockchain prototype through the integration of the latest developed and customized techniques. The success of the project will dramatically benefit Australian people and government, especially for the Australian ICT industry for commercializing the research outputs. Read moreRead less
Applying Method Engineering Techniques to the Construction of Agile Methodologies. Agile approaches to software development provide flexibility within the method but provide no assistance for improving the selected method. This second kind of flexibility is important to permit organizations to improve with time. To accomplish such improvement, a method engineering approach is proposed for agile method construction using the OPEN Process Framework, which consists of a metamodel and a collection ....Applying Method Engineering Techniques to the Construction of Agile Methodologies. Agile approaches to software development provide flexibility within the method but provide no assistance for improving the selected method. This second kind of flexibility is important to permit organizations to improve with time. To accomplish such improvement, a method engineering approach is proposed for agile method construction using the OPEN Process Framework, which consists of a metamodel and a collection of method components, stored in a repository. In collaboration with Eagle Datamation International, we will devise methods of constructing an agile method tailored to their business needs and then evaluate it in practice, monitoring as the method evolves and improves.Read moreRead less
Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to ....Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to prevent illegal use of copyrighted data. The project is expected to advance the theory of audio watermarking and enhance Australia's international competitiveness in this field.
Read moreRead less
A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy ....A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy even when the cloud crosses various jurisdictions with different privacy policies. The outcomes will benefit educational organisations, and lay the foundations for data sharing in other communities such as the government, banks, and other industries in Australia.Read moreRead less
Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in shor ....Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in short, to enable localised information and communication services, while preserving users' privacy, in infrastructure-deficient environments. The deployment of this system will bring great benefits to Australia’s economic growth, the quality of life, cybersecurity, and environment control in rural and regional Australia. Read moreRead less
Developing an active defence system to identify malicious domains and websites. This project aims to develop an innovative active defence system to effectively identify malicious Internet domains and websites. It can secure the cyberspace that is essential to the daily work of Australian people, thus addresses a fundamental problem in safeguarding Australia from cyber crime and terrorism.
Post adoptive behavior in IT enabled work systems: Using multi-method research to study implementation of enterprise systems in a large organization. Massive investments are made by organizations to implement enterprise wide information systems (enterprise systems) but many have failed or lack expected benefits. Current research on user acceptance is limited as they do not consider post adoptive behaviour, when the main gains are to be made. Using mixed methods, a series of studies in four set ....Post adoptive behavior in IT enabled work systems: Using multi-method research to study implementation of enterprise systems in a large organization. Massive investments are made by organizations to implement enterprise wide information systems (enterprise systems) but many have failed or lack expected benefits. Current research on user acceptance is limited as they do not consider post adoptive behaviour, when the main gains are to be made. Using mixed methods, a series of studies in four settings of a multi national organization will be conducted. A new integrated model for post adoptive behaviour will be developed and tested to inform industry and the research community. The findings will provide guidance to effective training and change management in enterprise systems implementation. Read moreRead less
Improving provision of a document store as a service in a public cloud. Improving provision of a document store as a service in a public cloud. This project aims to develop a model of document-oriented database correctness and performance that can be applied to cloud-hosted clusters. Many modern web applications rely on document-oriented databases hosted on clusters of virtualised servers from commercial cloud providers. Developers make difficult deployment decisions, such as how to combine data ....Improving provision of a document store as a service in a public cloud. Improving provision of a document store as a service in a public cloud. This project aims to develop a model of document-oriented database correctness and performance that can be applied to cloud-hosted clusters. Many modern web applications rely on document-oriented databases hosted on clusters of virtualised servers from commercial cloud providers. Developers make difficult deployment decisions, such as how to combine data sharding and replication to meet service requirements without any guidance on the degree of precision. This research will allow developers and database administrators to predict how systems will behave in conditions difficult to simulate directly. Ultimately, this is expected to improve the quality and efficiency of services built using document databases.Read moreRead less
Defence Against Phishing Attacks. Australian businesses and citizens are losing millions of dollars in cybercrimes every year. Rural and regional businesses depend on the integrity of their Internet banking service, and yet, cybercriminals are working hard to defraud these users. This project aims to build a reliable defence against phishing attacks which rely on social engineering to steal online identities, using intelligence gathered from the brazen trade of credentials in the public domain.