Tools and Techniques for Secure-by-Design DLT System
Tools and Techniques for Secure-by-Design DLT System The third area of research concerns with techniques and tools for facilitating secure…
Now Hiring: Are you a driven and motivated 1st Line IT Support Engineer?
Tools and Techniques for Secure-by-Design DLT System The third area of research concerns with techniques and tools for facilitating secure…
Socio-technical factors in secure software engineering methodologies and practices Software development is a highly cognitive process…
Security of Machine Learning Models With the immense amount of data produced every data, manual data analyse has become an impossible task…
Posters and Infographics
Master of Computer Science Projects High-performance computing platform for DNA analysis The aim of the project is to build a forensic DNA…
Supervision
Talks An introduction to the University of Adelaide
Collaboration
2022 THM Le, MA Babar, "On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models". C Islam, MA…
Master Opportunities Several fully funded PhD positions available in the broad areas of Security of Software-intensive Systems and Services…
Secure Mobile Health Application Engineering Smartphone ownership has surpassed three billion, and it is expected to increase by several…
Security, Architecture and Platforms for Distributed Autonomous Systems In this area of research, we devise and implement (i) security…
Security Orchestration and Automation At CREST researchers are leveraging existing software engineering, analytical reasoning, natural…
Mining Open-source Repositories for Predictive Security Analytics Security is an integral requirement and concern when developing a software…
Real-time Big Data Analytics The volume, velocity, and variety of digital data is increasing day by day. It is expected that by 2020, the…
Cyber Common Operating Pictures (CCOP) Cyber security threats reside in various parts of an organisation. The lack of tools to provide a…
Automated Container Security Container Technologies is considered as one of the most uprising technologies in the computing paradigm. The…
Techniques and Frameworks for DLT System Engineering This area of research concerns with the development, cataloguing, and evaluating…
Tools and Automation Support for DLT System Engineering This area of research concerns with the development, cataloguing, and evaluation of…
CCOP Dashboard CCOP Dashboard visualizes security metrics to provide executives a concise view of their organizations' security status. It…
We are delighted to announce that our paper PUMiner: Mining security posts from Q&A websites using PU learning has been accepted for…