²ÝÝ®ÊÓÆµ

Cyber research

Personalise
Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured

Our record in discovery-driven cyber solutions is outstanding. Our efforts to build cyber capability for the future range from harnessing artificial intelligence to identifying cyber vulnerabilities.

Business School Applied Economics student working on calculations at a computer

Applied & industrial mathematics

From understanding the dynamics and impacts of bushfires to tracking the survival of little penguins, we use mathematical methods and scientific computing to find practical solutions to real-world problems.

The Australian Defence Force Academy (ADFA) held its annual Open Day on 26 August 2017 providing prospective students, families and friends and the public an opportunity to see a range of exciting displays by the Navy, Army and Air Force and learn about life and study at the Academy. Defence and University staff were also on hand providing careers and course information. There were flypasts and aerial displays by the Air Force Roulettes and Australian Army Parachute Display Team; exhibits by various ADFA sports teams and club as well as an Army section attack and displays by the Air Force Military Dogs. ADFA Midshipmen and Officer Cadets navigated the above-pool obstacle course, abseiled down the side of a building and the public were also entertained by live music during the day. Tours led by ²ÝÝ®ÊÓÆµ Canberra staff highlighted the outstanding academic facilities, and the information sessions informed the public about everything you needed to know about academic life at ADFA.

Behavioural science

Using our understanding of human behaviour through aspects such as decision-making, habit and motivation, we investigate how these promote healthy, resilient adjustments to an increasing range of pressing social problems.

Electrical wires and plugs

Complex systems security

We develop software-intensive system cyber security and resiliency to combat attacks on critical infrastructure. Using advanced modelling techniques to simulate attacks, we improve risk identification, intrusion detection, privacy preservation and system processes to respond to cyber intrusions.

War-torn city

Conflict & society

We explore war and peace through societal, political and military dimensions and debate issues related to social and military history.

Cultural geography banner

Cultural geography

Our researchers work at the intersection of science and art to explore the challenges posed through changes to the human way of life, applying social scientific thinking to help resolve social conflicts and environmental crises.

Microcircuit design

Cyber-physical systems

We're developing innovative research solutions and technological approaches to cyber-physical system design, management and controls that will reshape our world with more responsive, precise, robust and efficient systems.

Security cameras

Cyber war: ethics & policy

We tackle the ethical and moral challenges faced in modern cyber warfare to prevent systems and platforms from being disrupted or crippled by the expansion of autonomous systems in combat.

Helicopter airlifting military personnel

Ethics in AI

We bring human values to the forefront of technical design. We develop strategies for identifying and incorporating social and moral values into information technology design and development in defence and security.

Young woman taking a photo with a phone

Human factors in cyber security

We examine the financial, economic, psychological and sociological aspects that place certain individuals at higher risk of cybersecurity threats. By researching methods to detect criminals, we protect individuals from scams, terrorism, insider threats, propaganda and misinformation through fake news.

Computer screen

Information influence & wargaming

We focus on understanding modern conflict through gamification, simulation and wargaming. Using these tactics to study influence propagation and cyber threats, we can test capabilities, identify gaps in cyber strategies and build leaders’ abilities to make decisions in real-time.

Hand on a keyboard in darkness

Intelligent security

We explore machine learning, deep learning and emerging artificial intelligence techniques to help address cyber vulnerabilities quickly, and protect computer systems, networks and individuals from potential threats.

International flags

International ethics

Bringing together international relations, political theory and moral philosophy, we debate and address ethical questions in international politics.

Bridge

Resilient infrastructure

Our experts are dedicated to ensuring the systems critical to the wellbeing and operation of our society can withstand, adapt to and recover quickly from anticipated or unexpected shocks and stresses, now and in the future.

Computer screen showing 'Security' link

Situational awareness

We identify, prioritise, record and process information critical to cybersecurity. By anticipating what might happen to systems and networks under cyber attack, situational awareness can protect sensitive data, sustain fundamental operations and protect national infrastructure from malicious attacks.

Human-like robot

Trusted autonomy

Trusted Autonomy is an emerging field of research that focuses on understanding how human-machine interactions and artificial intelligence can be used to develop autonomous systems that have a positive impact on our society and quality of life.

Woman entering credit card details on a laptop

Useable security & value-sensitive design

Many of the privacy and security problems in today’s online world are the result of a failure to consider system users. Useable Security & Value-Sensitive Design considers the influence that culture and technology have on one another, bringing human values to the forefront of the technology design process.