PhD scholarships: Automation of cyber software security targeting on
agriculture, smart contract and blockchain, Internet-of-Things and mobile
devices
This is a great scholarship opportunity for international students with an
interest in cybersecurity and wish to study under the supervision of novice
experts in a top-class research facility abroad
Scholarship Overview :
-
Open to: New students
-
Targeting both Domestic students, International students
-
Level of study: Higher Degree by Research
-
Study Area : Engineering and Computing
-
HDR funding type: Living stipend scholarship
-
Scholarship value: $28,597 per annum (2021 rate), indexed
annually
-
Scholarship duration: Three years with the possibility of two
6-month extensions in approved circumstances
-
Closing date: 21 February 2021
About the cyber Security Scholarship
Up to Five PhD positions are available in 2020 and 2021 in total. Two
positions for 2020 and three positions for 2021. The main interest is in
Cybersecurity.
Major research topics for prospective applicants : There are two main
research topics open for students to choose from :agriculture supply chain
and automation. Within the automation research topic, four subtopics are
provided. Detailed research topics are listed below:
1.Traceability and Provenance Across Agriculture Digital Supply
Chains:
To assure the quality of agricultural products during export
situations, there is often a need for the verification, traceability, and
provenance of the data and products. There are also open research
opportunities in agricultural digital supply chains. In this project, the
research will focus on provenance-centric approaches to (1) understanding
and modeling agricultural supply chains and their business processes, and
(2) innovate on ways to provide high-quality and high-integrity provenance
for both data and products in the agricultural sectors across
Australia.
2. Operational Technology Cyber Automation Utilizing Data Provenance and
Automated Planning:
With increased remote management of operational technology (OT), we are
witnessing an increased number of attacks and threats to devices,
communication protocols, and the data flows of critical infrastructure.
While there is ongoing work in vulnerability research and the detection of
these vulnerabilities, there are further research opportunities for the
creation of automation tools to assist asset owners and engineers to detect,
plan and to respond to the threats. Using data provenance approaches, this
research will create OT cyber automation methods which will be agnostic to
heterogeneous technology device and protocol and allow cyber response to
scale to respond to the growth of OT cyber threats. In order to conduct the
security analysis, technologies such as program analysis, formal analysis,
quantitate analysis are utilized for analyzing the system/source code,
network protocols, etc.
-
Analysis of blockchain and smart contracts: Blockchain-based applications
are emerging in various domains, as they can replace the centralized
intermediary with better trust. This research aims to conduct security
analysis targeting on blockchain and based applications in the form of
smart contracts.
-
Analysis of IoT (Internet of Things): As the adoption of the Internet of
Things (IoT) among various industries continues to rise, securing IoT
devices and their communication becomes a critical element. This research
will be focused on security analytics to IoT systems. It will develop
approaches to analyze various heterogenous devices and protocols of
IoT.
-
Deep learning for symbolic execution: Symbolic execution relies on
massive constraint solving, which is computationally expensive for
traditional algorithms. This research will explore using deep learning for
this task. It will develop approaches based on deep learning and program
analysis.
-
Analysis of mobile apps and systems: The mobile phone used in our daily
life is not only for texting and calling but for multiple purposes such as
remote controlling and sharing documents. This research focuses on
conducting security analysis to investigate whether users’ privacies are
properly protected while leveraging these newly developed
functionalities.
Some extra requirements
A working knowledge of programming languages (e.g., C/C++, Java, Python)
and some basic knowledge about software engineering, information security
and machine learning would be of benefit to someone working on this
project.
For more Cyber Security scholarships also check CSIRO/Data61 - Cyber Security Cooperative Research Centre Graduate
Scholarships
and Graduate Research Scholarships-Cyber Security
opportunity
Scholarship Eligibility
To be eligible, student must meet the university entry requirements for a higher degree by research.
How to apply for this scholarship
To apply for admission and scholarship, follow
this link. There is
no separate application for scholarship because you will have the
opportunity to request scholarship consideration on the application for
admission.
Before submitting an application you should:
When you apply, please ensure that under the scholarships and collaborative
study section you:
-
Select ‘My higher degree is not collaborative’
-
Select 'I am applying for, or have been awarded a scholarship or
sponsorship'.
-
Select ‘Other’, then ‘Research Project Scholarship’ and type in
‘SECURITY-KO’ in the 'Name of scholarship' field.
You can get more information on the official scholarship site. link is
provided below
Selection criteria for this scholarship
To be eligible to apply, you must also meet the
entry requirements for Higher Degrees by Research
at UQ. Applications will be judged on a competitive basis taking into
account the applicant’s previous academic record, publication record,
honours and awards, and employment history.
The applicant will demonstrate academic achievement in the field/s of
computer science and the potential for scholastic success.
A background or knowledge of software engineering, hardware/software
security, web security, reverse engineering and formal analysis of security
is highly desirable.
Who to contact for more information on thi scholarship
For further information on this scholarship, refer to :
Dr Siqi Ma. Email :
slivia.ma@uq.edu.au
Visit the
official scholarship site for further
information
Learn
how to contact supervisors directly when asking for a studentship position. These are very busy
people. Make sure to make your emails to them as relevant and captivating as
possible. Check this guide on
how contact potential supervisors. Below are the main supervisors you can contact them directly
Supervisors:
Some essential tips for successful scholarship
application
As a general tip, when Applying for a scholarship ,you must keep in
mind that ,this is not just about meeting the eligibility requirement
.There are many other things you must consider. Find out below some of
the things you need to know on how to successfully apply for a
scholarships
Other related links mentioned in this post you should equally
check:
For all future updates on scholarships information and guides to
study in Australia don't forget to subscribe and follow below .Be the first to get scholarships information from our website !
Good luck with study in Australia endeavors! AND hope 2021 brings you more joy and success!
Comments
Post a Comment