Computer networks

Survey

19 Apr 2017

The Australian government has released this comprehensive cyber security survey, published by the Australian Cyber Security Centre (ACSC), of Australian government and major businesses of national significance.

This report should be viewed as a companion to the ACSC 2016 Threat Report . Both reports...

Journal article

16 Mar 2017

This article argues that the Australian Depertment o Defence needs to urgently conduct operationally-focused cyber-survivability trials that leverage its alliance with the United States.

Audio interview

13 Jan 2017

The new Ambassador for Cyber Affairs says Australia is a target for cyber espionage, but he has not singled out any specific nation as a threat.

As the United States is grappling with explosive findings that Russia engaged in hacking during the Presidential election,...

Journal article

10 Jan 2017

The increasing use of Wi-Fi in schools and other places has given rise to public concern that the radiofrequency (RF) electromagnetic fields from Wi-Fi have the potential to adversely affect children. The current study measured typical and peak RF levels from Wi-Fi and other sources...

Research report

6 Jan 2017

On December 9, 2016, President Barack Obama directed the Intelligence Community to conduct a full review and produce a comprehensive intelligence report assessing Russian activities and intentions in recent U.S. elections. We have completed this report and briefed President Obama as well as President-elect Trump...

Research report

4 Jan 2017

CSIS began work in late 2014 with leading experts to develop recommendations on cybersecurity for the next presidential administration. The CSIS Cyber Policy Task Force divided its work among two groups, one in Washington D.C. and the other in Silicon Valley. Each group brought a...

Technical report

29 Dec 2016

The F.B.I. and Department of Homeland Security have released this report which details the ways that Russia acted to influence the American election through cyberespionage.

Guide

15 Dec 2016

In light of an increasing number of cybersecurity events, organizations can improve resilience by ensuring that their risk management processes include comprehensive recovery planning. Identifying and prioritizing organization resources helps to guide effective plans and realistic test scenarios. This preparation enables rapid recovery from incidents...

Research report

5 Dec 2016

The rapid growth of the internet is transforming how we engage and communicate. It also creates new opportunities for fraud and data theft. One way cybercriminals exploit the vulnerabilities of new technologies and potential victims is the use of deceptive emails on a massive scale....

Research report

5 Dec 2016

The growing use of online and cloud services in the community means electronic evidence is moving beyond the physical jurisdiction of Australian law enforcement agencies. This paper looks at the legal and technical issues inherent in collecting electronic evidence from online and cloud services. The...

Research report

9 Nov 2016

Overview

Passenger train services for the Victorian public are an essential service, much like electricity, water, gas and port services. Train services rely on a range of systems and equipment, including control systems that monitor and control service delivery.

We reviewed the...

Research report

12 Oct 2016

The Australian Cyber Security Centre (ACSC) Threat Report continues to reflect the experience, focus, and mandates of the ACSC's member organisations. This report provides an insight into what the centre has been seeing, learning, and responding to, focusing on specific areas of change or new...

Research report

27 Sep 2016

The 2016 Cyber Maturity report is the culmination of 12 months’ research by the ASPI International Cyber Policy Centre. The report assesses the approach of 23 regional countries to the challenges and opportunities that cyberspace presents, in terms of their governance structure, legislation, law enforcement,...

Audio interview

7 Jul 2016

A recent legislative amendment in Bulgaria means that it's now law that software developed for the government must be open source.

From now on, Bulgarian government contracts which include computer software, programming interfaces and databases must be freely available for others to read, modify...

Research report

21 Jun 2016

Overview

This paper provides an assessment and overview of the ADF’s command, control, computing, communications, intelligence, surveillance and reconnaissance (known commonly as ‘C4ISR’) capabilities in the context of the ADF’s goal of pursuing a network-centric warfare capability. The paper is the final part...

Research report

14 Jun 2016

A fundamental shift is occurring in the management of cyber risk. The idea that cyberattacks are increasingly likely—and perhaps inevitable—is beginning to take hold among executives and boards. Business leaders are realizing that we have interconnected our world mostly using technologies designed for sharing information,...

Journal article

27 Apr 2015

This paper proposes an analysis of digital convergence through the concepts of French philosopher Gilbert Simondon, who develops a theory of technicity as a mode of existence of humanity on par with religion, science and art, and describes an evolution of technicity that culminates in...

Journal article

15 Jan 2015

Keyword search is the most popular technique for querying large tree-structured datasets, often of unknown structure, in the web. Recent keyword search approaches return lowest common ancestors (LCAs) of the keyword matches ranked with respect to their relevance to the keyword query. A major challenge...

Research report

30 May 2012

This briefing document was developed in conjunction with “Public Networks for Public Safety: A Workshop on the Present and Future of Mesh Networking,” which was held on March 30, 2012, at Harvard University.

The workshop was intended as a starting point for conversation about...

Literature review

1 Mar 2012

The purpose of this review is to investigate the key issues surrounding young people and ICT in the context of social connectedness, engagement and education. Our review has led to an identification of gaps in knowledge and the development of research questions for further enquiry....

Overview

 

Items: 61