• Development of intelligent methods—such as adversarial machine learning and cyber threat intelligence—for automatically detecting, responding to, and preventing advanced persistent threats.

  • Software Defined Networking (SDN) enables improved visibility, management and control of networks using software decoupled from switching hardware. Use-cases include analytics of video traffic in carrier networks and flexible cyber-security for enterprise networks.

  • Model checking methodology automates the verification of computer software and hardware designs, based on algorithms that enable complete analysis of all possible behaviours of a system. Standard model checkers only consider how a system state evolves; whilst MCK model checker analyses how the knowledge of system components evolve over time.

  • Wireless Communications Lab (WCL) conducts innovative and cutting-edge research in wireless communications; specialising in ultra-reliable M2M and IoT communication technologies for 5G and industrial applications.

  • Quadseal is a mitigation technique to stop attackers from obtaining secret keys from block ciphers. Where a conventional encrypting device is accessible it is possible to obtain the secret key in less than 10 minutes. With Quadseal the attacker is stymied, making communications channels and other protected items far safer.

  • Terahertz (THz) radiation has strong penetrability and high bandwidth, which makes it ideal as the key technology for the next generation of non-intrusive imaging scanners and ultra-high bandwidth wireless communications beyond 100 GHz.

  • A recognised world leader in the formal verification of systems software and developer of the first operating-system kernel with an implementation correctness proof.

  • Focused on conducting research and actively contributing to the national defence strategy by educating and training front-line cyber defenders, as well as raising cyber awareness within government departments and corporations, to combat an increasing and persistent threat to global security.

  • Exploring emerging challenges across a broad range of issues arising from the intersection of law and technology. The emphasis is not on technology as such, but rather on the regulation of the social space created by computing networks - ‘cyberspace’

  • Delivering a better understanding of the security of future networks and platforms; these networks include the Internet of Things, Industry 4.0, Industrial Control Systems that run Australia’s critical infrastructure, and resilience of social networks against coercion and soft influence.

  • The Internet of Things (IoT) presents enormous opportunities to improve interaction with our immediate surroundings. Fully realising this potential requires sophisticated information analysis, with a focus on data mining and deep learning, human activity recognition, information filtering, and brain computer interfaces.