- Digital and Cyber Forensics
- Advanced Malware Detection Techniques
- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Information and Cyber Security
- Digital Media Forensic Detection
- Ethics and Social Impacts of AI
- Privacy, Security, and Data Protection
- Remote Sensing and LiDAR Applications
- Cybercrime and Law Enforcement Studies
- Law, AI, and Intellectual Property
- Artificial Intelligence in Law
Deakin University
2019-2025
<title>Abstract</title> Exploring human trust in Artificial Intelligence (AI) Law Enforcement domain is paramount for its ethical and effective deployment. As AI systems become increasingly integrated into society, ensures transparency, accountability, fairness their Despite the rapid increase discussion about usage law enforcement various sectors globally, no secondary research explores that OCEANIA, specifically Australia. Moreover, how humans are considered an uninvestigated area this...
The COVID-19 pandemic has exposed many organizational vulnerabilities to cyber threats, with ransomware being at the top of list. These can be attributed mainly consolidated accessibility as vision enable remote connectivity their digital resources for maintaining uninterrupted and safe business operations. During period 2020–2022, there was a noted significant disparity between demand IT support services sustain operations level security controls contingent secure over various platforms....
Digital Forensic Readiness (DFR) is a significant need to facilitate effective incident response in Industrial Internet of Things (IIoT) networks. However, existing frameworks often lack specificity for IIoT environments. In this paper, we develop and implement criteria evaluation novel DFR frame-work the IIoT. We evaluate its effectiveness by aligning it with ISO/IEC 27043:2015 standard, chosen broad applicability across wide range technologies focus on readiness process groups. Our...
The unique characteristics of IIoT, including hetero-geneity, existence legacy infrastructure, and critical operational requirements, demand for tailored approaches to better compre-hend address security threats. A comprehensive investigation into the modelling analysis DoS attacks in IIoT is presented. Our research focuses on developing a attack model networks, facilitating effective response strategies. Additionally, we explore mapping these MITRE ATT&CK framework, conduct simulations...
Industrial Internet of Things (IIoT) datasets are hard to obtain due confidentiality and security reasons. Consequently, evaluation solutions tailored for IIoT systems bears a significant research gap in the industrial domain. An testbed that represents real-world scenarios comprising physical processes its related controls would enable researchers deploy analyze better, explore model vulnerabilities, understand flow data forensic purposes, viable help test validate measures. However,...