QUT Information Security Reading Group

We hold a fortnightly reading group for all things information security on Friday mornings from 10:00–11:00, in meeting room 837 of P Block QUT Gardens Point Campus. Visiting academics are always very welcome. If you have a paper you would like to present, please let me know.

DateLeaderPaper

17/07/2015

Nick Rodofile

Surreptitiously Weakening Cryptographic Systems

3/07/2015

Thomas Haines

Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol

19/06/2015

Udyani Mudiyanselage

SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements

5/06/2015

N/A

AusCert.

22/05/2015

Ernest Foo

Unmanned Aerial Vehicle security using Recursive parameter estimation

8/05/2015

David Myers

Discovering Block-Structured Process Models From Event Logs - A Constructive Approach

23/04/2015

Anisur Rahman

A log mining approach for process monitoring in SCADA

27/03/2015

Hassan Lahza

A module for anomaly detection in ICS networks

27/02/2015

Ben Dowling

Tor: The Second-Generation Onion Router

27/02/2015

Ben Dowling

Using traffic analysis to identify The Second Generation Onion Router

13/02/2015

David Myers

On the exploitation of process mining for security audits: the process discovery case

7/11/2014

Mal Corney

Digital forensics XML and the DFXML toolset

10/10/2014

Ernest Foo

Control systems/SCADA forensics, what's the difference?

26/09/2014

David Myers

Activity Mining by Global Trace Segmentation

12/09/2014

Dean Philp

Representation Learning: A Review and New Perspectives

29/08/2014

Kenneth Radke

pktd: A Packet Capture and Injection Daemon

14/08/2014

Michal Ren

Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations

1/08/2014

James Akande

Graph Theoretical Analysis and Design of Multistage Interconnection Networks

18/07/2014

N/A

SCADA Security Course and Crypto Winter School running - no reading group.

4/07/2014

Thomas Haines

Caveat Coercitor: coercion-evidence in electronic voting

17/06/2014

Arash Mahboubi

New security perspectives around BYOD

17/06/2014

Arash Mahboubi

A Study on Security Threats and Dynamic, Access Control Technology for BYOD, Smart-work Environment

6/06/2014

Hassan Lahza

A Survey of Intrusion Detection in Wireless Network Applications

11/04/2014

Nick Rodofile

Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks

28/03/2014

Raphael Amoah

Privacy compliance verification in cryptographic protocols

14/03/2014

Raphael Amoah

Modelling and Analysing the Contract Net Protocol - Extension Using Coloured Petri Nets

28/02/2014

Thomas Haines

Integrated Security Analysis on Cascading Failure in Complex Networks

14 Feb 2014

Chris Djamaludin

Security attacks and solutions for vehicular ad hoc networks

31 Jan 2014

Colin Fidge

Differentiating Information Transfer and Causal Effect

15 Nov 2013

N/A

Information Security academics' retreat. No reading group.

1 Nov 2013

Douglas Stebila

ZMap: Fast Internet-Wide Scanning and its Security Applications

18 Oct 2013

Nishchal Kush

Through the Eye of the PLC: Towards Semantic Security Monitoring for Industrial Control Systems

4 Oct 2013

Colin Fidge

Comparing dynamics of cascading failures between network-centric and power flow models

06 Sep 2013

Mark Branagan

Bound to Fail: Why Cyber Security Risk Cannot Be "Managed" Away

23 Aug 2013

Andrew White

Defining digital forensic examination and analysis tools using abstraction layers

23 Aug 2013

Andrew White

Modern ships Voyage Data Recorders: A forensics perspective on the Costa Concordia shipwreck

09 Aug 2013

Sajal Bhatia

SCADASim---A framework for building SCADA simulations

26 Jul 2013

James Akande

Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees

26 Jul 2013

Ken Radke

Real-time mode-machines

26 Jul 2013

Ken Radke

Specifying the mode logic of a flight guidance system in CoRE and SCR

26 Jul 2013

Ken Radke

Analyzing mode confusion via model checking