You are here

Computer network defence

JP 2068 is a multi-phased proposal to progressively develop a survivable Defence Network Operation Centre capability, which will enable Defence to more effectively manage, monitor and secure its major communications networks and information systems.

A Formal Integrity Framework with Application to a Secure Information ATM (SIATM)

The paper identifies research challenges in addressing data integrity and, critically, proposes a new model that captures and supports a broader range of integrity dimensions and briefly discusses a use case for the model involving an actual implementation of a security device (Secure Information ATM or SIATM).

Vector and Matrix Variable Definitions in DAVE-ML

The Dynamic Aerospace Vehicle Exchange Markup Language (DAVE-ML) is a syntactical language for exchanging flight vehicle dynamic model data. This report documents a DAVE-ML consistent syntax for managing data as vectors and n-dimensional matrices, including syntax for computing vectors and matrices using equations, and examples of encoding data using the syntax.

Threat Modelling Adobe PDF

In this paper we analyse current PDF exploits and the future trends and the potential threat they pose.

Reliability Engineering for Service Oriented Architecture

This report looks at how Service Oriented Architecture (SOA) based systems differ from other types of Defence software systems and discusses the important issue of Software Reliability Engineering (SRE) for SOAs.

Reliability Engineering for Service Oriented Architectures

This report looks at how Service Oriented Architecture (SOA) based systems differ from other types of Defence software systems and discusses the important issue of Software Reliability Engineering (SRE) for SOAs.

Numerical Algorithms for the Analysis of Expert Opinions Elicited in Text Format

This report describes the motivation, scope and outcomes of a recent DSTO research collaboration with industry, intended to develop a specialised computer-based text analysis capability.

MIMO wireless communications

Multiple-Input Multiple-Output (MIMO) wireless communications is a physical layer strategy that forms an important part of modern wireless communication standards such as Wi-Fi, LTE and WiMAX.

Shapes Vector

DST Group has developed a technology called Shapes Vector that enables real-time security analysis of large-scale computer networks.

Cyber

Our cyber research relates to information technology, its connectivity and the data shared. 

We investigate the use of cyberspace to actively gather and utilise electronic information from computers, information systems, auxiliary electronic systems or networks.

The cyber domain encapsulates the two axis of cyber security and cyber operations. 

Cyber security ensures confidentiality, integrity or availability for information resident on an information network. 

Pages