Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results

    The challenge of meeting security requirements (of a nation-state) a...

    Leah Shanley, Michael N. Johnstone in Human Aspects of Information Security and … (2022)

  2. No Access

    Chapter and Conference Paper

    Towards Evaluating the Effectiveness of Botnet Detection Techniques

    Botnets are a group of compromised devices taken over and commanded by a malicious actor known as a botmaster. In recent years botnets have targeted Internet of Things (IoT) devices, significantly increasing t...

    Ashley Woodiss-Field, Michael N. Johnstone, Paul Haskell-Dowland in Ubiquitous Security (2022)

  3. No Access

    Chapter

    Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats

    The number of cybersecurity incidents perpetrated by adversaries using modern complex and emerging technologies is growing exponentially. To curb this threat, advanced countermeasures need to be developed and ...

    Nickson M. Karie, Nor Masri Bin Sahri in Explainable Artificial Intelligence for Cy… (2022)

  4. No Access

    Chapter

    Network Forensics in the Era of Artificial Intelligence

    Network forensics investigates a network attack by tracing the source of the attack and attributing the crime to a person, host or network. It can anticipate prospective attacks by establishing attack patterns...

    Wencheng Yang, Michael N. Johnstone in Explainable Artificial Intelligence for Cy… (2022)

  5. No Access

    Chapter and Conference Paper

    Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?

    There has always been tension between security needs (as expressed by a nation-state) and privacy needs (as expressed by the citizens of said nation-state). Achieving this balance is perhaps one of the goals o...

    Leah Shanley, Michael N. Johnstone in Human Aspects of Information Security and … (2020)

  6. No Access

    Chapter and Conference Paper

    An Exploration of Some Security Issues Within the BACnet Protocol

    Building automation systems control a range of services, commonly heating, ventilation and air-conditioning. BACnet is a leading protocol used to transmit data across building automation system networks, for t...

    Matthew Peacock, Michael N. Johnstone in Information Systems Security and Privacy (2018)

  7. No Access

    Chapter and Conference Paper

    Controlled Android Application Execution for the IoT Infrastructure

    Android malware has grown in exponential proportions in recent times. Smartphone operating systems such as Android are being used to interface with and manage various IoT systems, such as building management a...

    Michael N. Johnstone, Zubair Baig, Peter Hannay in Internet of Things. IoT Infrastructures (2016)

  8. No Access

    Chapter and Conference Paper

    Towards Effective Algorithms for Intelligent Defense Systems

    With the volume of data required to be analysed and interpreted by security analysts, the possibility of human error looms large and the consequences possibly harmful for some systems in the event of an advers...

    Michael N. Johnstone, Andrew Woodward in Cyberspace Safety and Security (2012)