¹û¶³app

Cyber research

Personalise
Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured

Our record in discovery-driven cyber solutions is outstanding. Our efforts to build cyber capability for the future range from harnessing artificial intelligence to identifying cyber vulnerabilities.

Applied & industrial mathematics

From understanding the dynamics and impacts of bushfires to tracking the survival of little penguins, we use mathematical methods and scientific computing to find practical solutions to real-world problems.

Behavioural science

Using our understanding of human behaviour through aspects such as decision-making, habit and motivation, we investigate how these promote healthy, resilient adjustments to an increasing range of pressing social problems.

Complex systems security

We develop software-intensive system cyber security and resiliency to combat attacks on critical infrastructure. Using advanced modelling techniques to simulate attacks, we improve risk identification, intrusion detection, privacy preservation and system processes to respond to cyber intrusions.

Conflict & society

We explore war and peace through societal, political and military dimensions and debate issues related to social and military history.

Cultural geography

Our ¹û¶³app work at the intersection of science and art to explore the challenges posed through changes to the human way of life, applying social scientific thinking to help resolve social conflicts and environmental crises.

Cyber-physical systems

We're developing innovative research solutions and technological approaches to cyber-physical system design, management and controls that will reshape our world with more responsive, precise, robust and efficient systems.

Cyber war: ethics & policy

We tackle the ethical and moral challenges faced in modern cyber warfare to prevent systems and platforms from being disrupted or crippled by the expansion of autonomous systems in combat.

Ethics in AI

We bring human values to the forefront of technical design. We develop strategies for identifying and incorporating social and moral values into information technology design and development in defence and security.

Human factors in cyber security

We examine the financial, economic, psychological and sociological aspects that place certain individuals at higher risk of cybersecurity threats. By researching methods to detect criminals, we protect individuals from scams, terrorism, insider threats, propaganda and misinformation through fake news.

Information influence & wargaming

We focus on understanding modern conflict through gamification, simulation and wargaming. Using these tactics to study influence propagation and cyber threats, we can test capabilities, identify gaps in cyber strategies and build leaders’ abilities to make decisions in real-time.

Intelligent security

We explore machine learning, deep learning and emerging artificial intelligence techniques to help address cyber vulnerabilities quickly, and protect computer systems, networks and individuals from potential threats.

International ethics

Bringing together international relations, political theory and moral philosophy, we debate and address ethical questions in international politics.

Resilient infrastructure

Our experts are dedicated to ensuring the systems critical to the wellbeing and operation of our society can withstand, adapt to and recover quickly from anticipated or unexpected shocks and stresses, now and in the future.

Situational awareness

We identify, prioritise, record and process information critical to cybersecurity. By anticipating what might happen to systems and networks under cyber attack, situational awareness can protect sensitive data, sustain fundamental operations and protect national infrastructure from malicious attacks.

Trusted autonomy

Trusted Autonomy is an emerging field of research that focuses on understanding how human-machine interactions and artificial intelligence can be used to develop autonomous systems that have a positive impact on our society and quality of life.

Useable security & value-sensitive design

Many of the privacy and security problems in today’s online world are the result of a failure to consider system users. Useable Security & Value-Sensitive Design considers the influence that culture and technology have on one another, bringing human values to the forefront of the technology design process.