Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Andrew Woodward is active.

Publication


Featured researches published by Andrew Woodward.


Plant Cell Tissue and Organ Culture | 2005

The effect of salt stress and abscisic acid on proline production, chlorophyll content and growth of in vitro propagated shoots of Eucalyptus camaldulensis

Andrew Woodward; Ian J. Bennett

Three clones, selected for their variation in salt tolerance, were examined regarding their growth and physiological responses on exposure to salt (NaCl) and abscisic acid (ABA) in vitro. The shoot proline levels significantly increased in two salt tolerant clones when exposed to 100 mM NaCl in the shoot multiplication medium. In contrast, proline in a salt sensitive clone did not change in comparison to the control treatment. When 10 μM ABA was included in the medium all clones had an increase in proline regardless of whether they were salt tolerant or salt sensitive, linking proline production to the stress hormone ABA. Callus production was so variable that it was not possible to produce callus of consistent texture, colour and growth for all three clones. For the two clones where consistent growth was achievable, both the salt tolerant and salt sensitive clones increased proline production when exposed to salt. This response, however, was greater in the salt tolerant clone. Other parameters examined were growth (dry weight) and shoot chlorophyll content. These characteristics did not correlate with the salt tolerance of the clones, with similar weights being produced on non salt and salt media and similar chlorophyll in both salt sensitive and salt tolerant clones regardless of the medium in which they were grown. The production of proline is considered with regard to selection for differences in salt tolerance in vitro.


Medical Devices : Evidence and Research | 2015

Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem

Patricia A. H. Williams; Andrew Woodward

The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat.


The Journal of Digital Forensics, Security and Law | 2010

Malware Forensics: Discovery of the Intent of Deception

Murray Brand; Craig Valli; Andrew Woodward

Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis tools to focus on hiding the presence of the tool itself from being detected by the malware, and not on recording the detection and recording of analysis avoidance techniques. In addition, the coverage of anti-anti-analysis techniques in common tools and plugins is much less than the number of analysis avoidance techniques that exist. The purpose of this paper is to suggest that the discovery of the intent of deception may be a very good indicator of an underlying malicious objective of the software under investigation.


CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security | 2012

Towards effective algorithms for intelligent defense systems

Michael N. Johnstone; Andrew Woodward

With the volume of data required to be analysed and interpreted by security analysts, the possibility of human error looms large and the consequences possibly harmful for some systems in the event of an adverse event not being detected. In this paper we suggest machine learning algorithms that can assist in supporting the security function effectively and present a framework that can be used to choose the best algorithm for a specific domain. A qualitative framework was produced, and it is suggested that a naive Bayesian classifier and artificial neural network based algorithms are most likely the best candidates for the proposed application. A testing framework is proposed to conduct a quantitative evaluation of the algorithms as the next step in the determination of best fit for purpose algorithm. Future research will look to repeat this process for cyber security specific applications, and also examine GPGPU optimisations.


It Professional | 2018

Internet of Things Forensics: The Need, Process Models, and Open Issues

Maxim Chernyshev; Sherali Zeadally; Zubair A. Baig; Andrew Woodward

The Internet of Things (IoT) brings a set of unique and complex challenges to the field of digital forensics. To take advantage of the volume and variety of data captured by and stored in ubiquitous IoT services, forensic investigators need to draw upon evidence-acquisition methods and techniques from all areas of digital forensics and possibly create new IoT-specific investigation processes. Although a number of conceptual process models have been developed to address the unique characteristics of the IoT, many challenges remain unresolved.


ieee symposium on security and privacy | 2017

Mobile Forensics: Advances, Challenges, and Research Opportunities

Maxim Chernyshev; Sherali Zeadally; Zubair A. Baig; Andrew Woodward

The proliferation of mobile devices has led to advanced cybercriminal activities that exploit their ubiquity. Contemporary mobile forensics techniques and the challenges facing forensic investigators are discussed. Also identified are research opportunities that must be explored to enable more efficient mobile forensic techniques and technologies.


International Journal of Autonomous and Adaptive Communications Systems | 2017

The effectiveness of classification algorithms on IPv6 IID construction

Clinton Carpene; Michael N. Johnstone; Andrew Woodward

This study assessed the effectiveness of classifying IPv6 interface identifier (IID) address construction using machine learning algorithms. It was observed that IID construction can be reliably determined through the usage of assisted machine learning algorithms such as the naive Bayesian classifiers (NBC) or artificial neural networks (ANNs). It was also observed that the NBC classification, whilst more efficient, was less accurate than the use of ANN for classifying interface identifiers. Training times for an unoptimised ANN were seen to be far greater than NBC, which may be a considerable limitation to its effectiveness in real world applications (such as log or traffic analysis). Future research will continue to improve the classification training times for ANN situations, potentially involving general-purpose computing on graphics processing units (GPGPU) systems, as well as applying the techniques to real world applications such as IPv6 IDS sensors, honeypots or honeynets.


australasian conference on information security and privacy | 2016

A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs

Alastair Nisbet; Andrew Woodward

Wireless network technology has been available for public and private use for almost two decades. The casual approach to security with the early standards and channel selection began to cause issues when the initial security standard, WEP, was discovered to have serious flaws. The closer examination of security and efficiency that followed led to better security protocols, easier setup and better guidelines to ensure efficiency of radio communications. A survey of 5 areas throughout New Zealand was conducted and this is compared with a survey of 5 areas around Perth in Western Australia. The results indicate that whilst improvements continue to be made in security implementations, a small percentage of users do not implement their networks with the recommended settings. Whilst Australian users are slightly better at complying with recommendations, it is clear that some work still needs to be done in the areas of security and efficiency.


Archive | 2015

An Uncomfortable Change: Shifting Perceptions to Establish Pragmatic Cyber Security

Andrew Woodward; Patricia A. H. Williams

The challenges that a lack of conventionally conceptualized borders in Cyberspace create are increasing in scale and form. This position paper evaluates through the myriad of reasons for this situation, from the absence of cyber security standards, an industry which values training over education for short term gains, resulting in a long term de-skilled workforce, to a solutions space that has an excessive focus on technological control. This demands a necessary change in approach to cyber security to meet the increasingly intelligent and diverse threats. As a specialist field, cyber security requires a collective proactive approach incorporating technology, government support, policy and education. Indeed, it is possible that a reversal of currently accepted perceptions, where organizations manage their security in isolation, will result in a paradigm shift. This will demand acceptance of a shift in power and influence as nation states, crime and hacktivist groups with high levels of motivation, attempt to control and exploit Cyberspace.


Archive | 2007

Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks

Craig Valli; Andrew Woodward

Collaboration


Dive into the Andrew Woodward's collaboration.

Top Co-Authors

Avatar

Craig Valli

Edith Cowan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge