Associate Professor Benjamin Turnbull

Associate Professor Benjamin Turnbull

Associate Professor
UNSW Canberra
School of Systems & Computing

I am a leader, mentor, researcher, and education specialist, working at the forefront of cybersecurity at UNSW Canberra. 

My research is at the nexus of cyber security, simulation and emerging technology. My research goal is to provide comprehensive simulation, exercises, and decision support platforms for emerging cyber systems. I am a researcher and practitioner working in the Digital Forensics, Cyber Security, Knowledge Representation and Simulation and Scenario-based learning domains. My research interests include novel approaches to securing computers and networks, automated learning from large datasets, forensic analysis of non-traditional devices, cyber security, cyber situation awareness, and simulation design for future outcomes. In this area, I have led large numbers of externally-funded research projects to success and significant outcomes. I have significant research management experience, with a combined research income of over $3 Million AUD, from sources including CSIRO, the Australian Defence Force, DST, the Cyber Cooperative Research Centre, and the US Naval Research Laboratory. This funding has largely been applied in nature, with outputs being in software code and documentation. 

I have been teaching cybersecurity for over two decades. My teaching in cybersecurity has spanned almost every offering at UNSW Canberra – from co-developing and teaching the first UNSW Canberra cybersecurity undergraduate elective through to the scaffolded and design of all undergraduate programs and multiple postgraduate offerings. I have, and continue to be, involved at every stage – course and program design, content development, teaching (in-class and online), marking, and moderation. I have a strong history in building and running industry-relevant, modern courses, across all aspects of the university offerings. 

Notable educational design activities:

  • Co-Creator, Bachelor of Cyber Security (Pass, Honours)
  • Subject Matter Expert, Graduate Certificate, MBA-X, Cyber Security Leadership
  • Co-Creator and Co-Program Director, UNSW Online Cyber Security Masters Program 
  • Assistant Creator and Co-Program Director, Bachelor of Computing and Cyber Security
  • Creator and Director,  Bachelor of IT/Cyber Honours Program.
  • Consultant, Masters of Cyber Security – Security Operations, Forensics, Advanced Tradecraft

 

 

Phone
+61 2 5114 5214
Location
Room 205, Building 15 UNSW at the Australian Defence Force Academy Tobruk Road Campbell ACT 2612
  • Book Chapters | 2021
    Ormrod D; Turnbull B, 2021, 'The modelling and simulation of integrated battlefield cyber-kinetic effects', in Research Anthology on Military and Defense Applications, Utilization, Education, and Ethic, pp. 300 - 322, http://dx.doi.org/10.4018/978-1-7998-9029-4.ch017
    Book Chapters | 2021
    Yamany W; Moustafa N; Turnbull B, 2021, 'Correction to: A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems', in AI 2020: Advances in Artificial Intelligence, Springer International Publishing, pp. C1 - C1, http://dx.doi.org/10.1007/978-3-030-64984-5_37
    Book Chapters | 2020
    Ormrod D; Turnbull B, 2020, 'Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success', in Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, pp. 151 - 164, http://dx.doi.org/10.4018/978-1-7998-2466-4.ch009
    Book Chapters | 2019
    Ormrod D; Turnbull B, 2019, 'Modeling and Simulation Approaches', in Cyber Resilience of Systems and Networks, Springer International Publishing, pp. 171 - 193, http://dx.doi.org/10.1007/978-3-319-77492-3_8
    Book Chapters | 2019
    Ormrod D; Turnbull B, 2019, 'Modeling and Simulation Approaches', in Kott A; Linkov I (ed.), Cyber Resilience of Systems and Networks, Springer, pp. 171 - 193, http://dx.doi.org/10.1007/978-3-319-77492-3_1
  • Journal articles | 2024
    Issa W; Moustafa N; Turnbull B; Choo KKR, 2024, 'RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks', IEEE Transactions on Information Forensics and Security, 19, pp. 3772 - 3787, http://dx.doi.org/10.1109/TIFS.2024.3368879
    Journal articles | 2024
    Yamany W; Keshk M; Moustafa N; Turnbull B, 2024, 'Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks', IEEE Transactions on Consumer Electronics, 70, pp. 1359 - 1369, http://dx.doi.org/10.1109/TCE.2023.3319039
    Journal articles | 2023
    Issa W; Moustafa N; Turnbull B; Sohrabi N; Tari Z, 2023, 'Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey', ACM Computing Surveys, 55, http://dx.doi.org/10.1145/3560816
    Journal articles | 2023
    Keshk M; Koroniotis N; Pham N; Moustafa N; Turnbull B; Zomaya AY, 2023, 'An explainable deep learning-enabled intrusion detection framework in IoT networks', Information Sciences, 639, http://dx.doi.org/10.1016/j.ins.2023.119000
    Journal articles | 2023
    Sobb T; Turnbull B; Moustafa N, 2023, 'A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities', Sensors, 23, http://dx.doi.org/10.3390/s23177391
    Journal articles | 2023
    Yamany W; Moustafa N; Turnbull B, 2023, 'OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 893 - 903, http://dx.doi.org/10.1109/TITS.2021.3130906
    Journal articles | 2023
    Yang S; Barlow M; Townsend T; Liu X; Samarasinghe D; Lakshika E; Moy G; Lynar T; Turnbull B, 2023, 'Reinforcement Learning Agents Playing Ticket to Ride-A Complex Imperfect Information Board Game With Delayed Rewards', IEEE Access, 11, pp. 60737 - 60757, http://dx.doi.org/10.1109/ACCESS.2023.3287100
    Journal articles | 2022
    Johnson N; Turnbull B; Reisslein M; Moustafa N, 2022, 'CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification', IEEE Transactions on Computational Social Systems, http://dx.doi.org/10.1109/TCSS.2022.3184387
    Journal articles | 2022
    Johnson N; Turnbull B; Reisslein M, 2022, 'Social media influence, trust, and conflict: An interview based study of leadership perceptions', Technology in Society, 68, http://dx.doi.org/10.1016/j.techsoc.2021.101836
    Journal articles | 2022
    Salim S; Moustafa N; Turnbull B; Razzak I, 2022, 'Perturbation-enabled Deep Federated Learning for Preserving Internet of Things-based Social Networks', ACM Transactions on Multimedia Computing, Communications and Applications, 18, http://dx.doi.org/10.1145/3537899
    Journal articles | 2022
    Salim S; Turnbull B; Moustafa N, 2022, 'Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems', Ad Hoc Networks, 128, http://dx.doi.org/10.1016/j.adhoc.2022.102786
    Journal articles | 2022
    Tran QN; Turnbull BP; Wang M; Hu J, 2022, 'A Privacy-Preserving Biometric Authentication System with Binary Classification in a Zero Knowledge Proof Protocol', IEEE Open Journal of the Computer Society, 3, pp. 1 - 10, http://dx.doi.org/10.1109/OJCS.2021.3138332
    Journal articles | 2021
    Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2021, 'A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks', IEEE Internet of Things Journal, 8, pp. 9463 - 9472, http://dx.doi.org/10.1109/JIOT.2020.2996590
    Journal articles | 2021
    Johnson N; Turnbull B; Maher T; Reisslein M, 2021, 'Semantically Modeling Cyber Influence Campaigns (CICs): Ontology Model and Case Studies', IEEE Access, 9, pp. 9365 - 9382, http://dx.doi.org/10.1109/ACCESS.2020.3048269
    Journal articles | 2021
    Keshk M; Turnbull B; Sitnikova E; Vatsalan D; Moustafa N, 2021, 'Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems', IEEE Access, 9, pp. 55077 - 55097, http://dx.doi.org/10.1109/ACCESS.2021.3069737
    Journal articles | 2021
    Salim S; Turnbull B; Moustafa N, 2021, 'A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks', IEEE Transactions on Computational Social Systems, http://dx.doi.org/10.1109/TCSS.2021.3134463
    Journal articles | 2021
    Samarasinghe Widana Arachchige D; Barlow M; Lakshika E; Lynar T; Moustafa N; Townsend T; Turnbull B, 2021, 'A Data Driven Review of Board Game Design and Interactions of Their Mechanics', IEEE Access, 9, pp. 114051 - 114069, http://dx.doi.org/10.1109/ACCESS.2021.3103198
    Journal articles | 2021
    Tran QN; Turnbull BP; Hu J, 2021, 'Biometrics and Privacy-Preservation: How Do They Evolve', IEEE Open Journal of the Computer Society, 2, pp. 179 - 191, http://dx.doi.org/10.1109/OJCS.2021.3068385
    Journal articles | 2021
    Tran QN; Turnbull BP; Wu HT; De Silva AJS; Kormusheva K; Hu J, 2021, 'A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture', IEEE Open Journal of the Computer Society, 2, pp. 72 - 84, http://dx.doi.org/10.1109/OJCS.2021.3053032
    Journal articles | 2020
    Alkadi O; Moustafa N; Turnbull B, 2020, 'A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions', IEEE Access, 8, pp. 104893 - 104917, http://dx.doi.org/10.1109/ACCESS.2020.2999715
    Journal articles | 2020
    Dunn C; Moustafa N; Turnbull B, 2020, 'Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things', Sustainability (Switzerland), 12, http://dx.doi.org/10.3390/SU12166434
    Journal articles | 2020
    Keshk M; Turnbull B; Moustafa N; Vatsalan D; Choo KKR, 2020, 'A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks', IEEE Transactions on Industrial Informatics, 16, pp. 5110 - 5118, http://dx.doi.org/10.1109/TII.2019.2957140
    Journal articles | 2020
    Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)
    Journal articles | 2020
    Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics
    Journal articles | 2019
    Alkadi O; Moustafa N; Turnbull B; Choo K-KR, 2019, 'An ontological graph identification method to improve Localization of IP prefix hijacking in network systems', IEEE Transactions on Information Forensics and Security
    Journal articles | 2019
    Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2019, 'Mixture localization-based outliers models for securing data migration in cloud centers', IEEE Access, 7, pp. 114607 - 114618, http://dx.doi.org/10.1109/ACCESS.2019.2935142
    Journal articles | 2019
    Koroniotis N; Moustafa N; Sitnikova E; Turnbull B, 2019, 'Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset', Future Generation Computer Systems
    Journal articles | 2019
    2019, 'The modelling and simulation of integrated battlefield cyber-kinetic effects', , http://dx.doi.org/10.4018/ijcwt.2019100101
    Journal articles | 2018
    Hassan M; Moustafa N; Sitnikova E; Turnbull B, 2018, 'Privacy-preserving big data analytics for cyber-physical systems', Wireless Networks, http://dx.doi.org/10.1007/s11276-018-01912-5
    Journal articles | 2018
    Moustafa N; Turnbull B; Raymond Choo K-K, 2018, 'An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2018.2871719
    Journal articles | 2018
    Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794
    Journal articles | 2017
    Haider W; Hu J; Slay J; Turnbull BP; Xie Y, 2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, 87, pp. 185 - 192, http://dx.doi.org/10.1016/j.jnca.2017.03.018
    Journal articles | 2017
    Ormrod D; Turnbull B, 2017, 'Attrition rates and maneuver in agent-based simulation models', Journal of Defense Modeling and Simulation, 14, pp. 257 - 272, http://dx.doi.org/10.1177/1548512917692693
    Journal articles | 2017
    Ormrod D; Turnbull B, 2017, 'Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success', International Journal of Cyber Warfare and Terrorism, 7, pp. 1 - 13, http://dx.doi.org/10.4018/ijcwt.2017100101
    Journal articles | 2016
    Ormrod D; Turnbull B, 2016, 'The cyber conceptual framework for developing military doctrine', Defence Studies, 16, pp. 270 - 298, http://dx.doi.org/10.1080/14702436.2016.1187568
    Journal articles | 2015
    Turnbull B; Randhawa S, 2015, 'Automated event and social network extraction from digital evidence sources with ontological mapping', Digital Investigation, 13, pp. 94 - 106, http://dx.doi.org/10.1016/j.diin.2015.04.004
    Journal articles | 2010
    Osborne G; Turnbull B; Slay J, 2010, 'The 'Explore, Investigate and Correlate' (EIC) conceptual framework for digital forensics information visualisation', ARES 2010 - 5th International Conference on Availability, Reliability, and Security, pp. 629 - 634, http://dx.doi.org/10.1109/ARES.2010.74
    Journal articles | 2009
    Slay J; Turnbull B; Blundell B; McKemmish R, 2009, 'Message from WSDF workshop co-chairs', Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, http://dx.doi.org/10.1109/ARES.2009.175
    Journal articles | 2008
    Broadway J; Turnbull B; Slay J, 2008, 'Improving the analysis of lawfully intercepted network packet data captured for forensic analysis', ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, pp. 1361 - 1368, http://dx.doi.org/10.1109/ARES.2008.122
    Journal articles | 2008
    Pavlic T; Slay J; Turnbull B, 2008, 'Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications', JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 3, pp. 35 - 55, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000214231400003&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Journal articles | 2008
    Pavlic T; Slay J; Turnbull B, 2008, 'Extracting evidence using google desktop search', IFIP International Federation for Information Processing, 285, pp. 43 - 50, http://dx.doi.org/10.1007/978-0-387-84927-0_4
    Journal articles | 2008
    Turnbull B; Slay J, 2008, 'Wi-Fi network signals as a source of digital evidence: Wireless network forensics', ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, pp. 1355 - 1360, http://dx.doi.org/10.1109/ARES.2008.135
    Journal articles | 2007
    Turnbull B; Slay J, 2007, 'Wireless forensic analysis tools for use in the electronic evidence collection process', Proceedings of the Annual Hawaii International Conference on System Sciences, http://dx.doi.org/10.1109/HICSS.2007.617
    Journal articles | 2006
    Slay J; Turnbull B, 2006, 'Computer Security Education and Research in Australia', IEEE Security & Privacy Magazine, 4, pp. 60 - 63, http://dx.doi.org/10.1109/msp.2006.115
    Journal articles | 2006
    Slay J; Turnbull B, 2006, 'The need for a technical approach to digital forensic evidence collection for wireless technologies', Proceedings of the 2006 IEEE Workshop on Information Assurance, 2006, pp. 124 - 132
    Journal articles | 2005
    Blundell B; Dong HX; Slay J; Turnbull B; Wilsdon T, 2005, 'Development of a "zero-skills" forensic laptop registration and identification tool', 4th European Conference on Information Warfare and Security 2005, ECIW 2005, pp. 39 - 45
    Journal articles | 2005
    Slay J; Turnbull B, 2005, 'The 802.11 technology gap - Case studies in crime', IEEE Region 10 Annual International Conference, Proceedings/TENCON, 2007, http://dx.doi.org/10.1109/TENCON.2005.300890
    Journal articles | 2005
    Turnbull B; Blundell B; Slay J, 2005, 'Googling forensics', Proceedings of 3rd Australian Computer, Network and Information Forensics Conference, pp. 62 - 67
  • Conference Papers | 2023
    Wilden AJ; Nasim M; Williams P; Legrand T; Turnbull BP; Williams PAH, 2023, 'On Benchmarking and Validation in Wargames', in European Conference on Information Warfare and Security, ECCWS, pp. 533 - 543
    Conference Papers | 2021
    Koroniotis N; Moustafa N; Turnbull B; Schiliro F; Gauravaram P; Janicke H, 2021, 'A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments', in Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, pp. 887 - 894, http://dx.doi.org/10.1109/TrustCom53373.2021.00125
    Preprints | 2021
    Koroniotis N; Moustafa N; Turnbull B; Schiliro F; Gauravaram P; Janicke H, 2021, A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments, , http://dx.doi.org/10.48550/arxiv.2109.09259
    Conference Papers | 2020
    Alkadi O; Moustafa N; Turnbull B, 2020, 'A Collaborative Intrusion Detection System using Deep Blockchain Framework for Securing Cloud Networks', 2020 Amsterdam, Netherlands, presented at Intelligent Systems Conference (IntelliSys), 2020 Amsterdam, Netherlands, 03 September 2020 - 04 September 2020
    Conference Papers | 2020
    Clark D; Turnbull B, 2020, 'Interactive 3D visualization of network traffic in time for forensic analysis', in Kerren A; Hurter C; Braz J (eds.), VISIGRAPP 2020 - Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Scitepress, MALTA, Valletta, pp. 177 - 184, presented at Proceedings of the 15th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, MALTA, Valletta, 27 February 2020 - 29 February 2020, http://dx.doi.org/10.5220/0008950601770184
    Conference Papers | 2020
    Clark DJ; Turnbull B, 2020, 'Experiment Design for Complex Immersive Visualisation', in 2020 Military Communications and Information Systems Conference, MilCIS 2020 - Proceedings, http://dx.doi.org/10.1109/MilCIS49828.2020.9282380
    Conference Papers | 2020
    Hassan M; Moustafa N; Sitnikova E; Turnbull B; Vatsalan D, 2020, 'Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems', Tokyo, Japan, presented at The 16th International Conference on Mobility, Sensing and Networking (MSN 2020), Tokyo, Japan, 19 December 2020
    Conference Papers | 2020
    Moustafa N; Salim S; Turnbull B, 2020, 'Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020
    Conference Papers | 2020
    Sobb T; Sample C; Shelton C; Turnbull B, 2020, 'Modelling the supply chain: Trust but verify in complex systems', in Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020, pp. 439 - 447, http://dx.doi.org/10.34190/ICCWS.20.039
    Conference Papers | 2020
    Sobb TM; Turnbull B, 2020, 'Assessment of cyber security implications of new technology integrations into military supply chains', in Proceedings - 2020 IEEE Symposium on Security and Privacy Workshops, SPW 2020, pp. 128 - 135, http://dx.doi.org/10.1109/SPW50608.2020.00038
    Conference Papers | 2020
    Yamany W; Moustafa N; Turnbull B, 2020, 'A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems', Canberra, Australia, presented at The 33rd Australasian Joint Conference on Artificial Intelligence (AJCAI 2020), Canberra, Australia, 16 December 2020
    Conference Papers | 2019
    Ormrod D; Scott K; Scheinman L; Kodalle T; Sample C; Turnbull B, 2019, 'The persuasion game: Developing a serious game based model for information warfare and influence studies', in European Conference on Information Warfare and Security, ECCWS, Coimbra, Portugal, pp. 328 - 337, presented at Future European Conference on Cyber Warfare and Security, Coimbra, Portugal, 04 July 2019
    Conference Papers | 2019
    Turnbull B; Ormrod D; Moustafa N; Micallef N, 2019, 'Agile technology development to improve scenario-based learning exercises', in European Conference on Information Warfare and Security, ECCWS, Portugal, pp. 518 - 526, presented at ECCWS, Portugal, 04 July 2019 - 05 July 2019
    Preprints | 2018
    Koroniotis N; Moustafa N; Sitnikova E; Turnbull B, 2018, Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset, , http://dx.doi.org/10.48550/arxiv.1811.00701
    Conference Papers | 2018
    Moustafa N; Turnbull B; Choo K-KR, 2018, 'Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks', Bellevue, Washington, USA, presented at 2018 IEEE International Conference on Industrial Internet, Bellevue, Washington, USA, 21 October 2018 - 23 October 2018, http://dx.doi.org/10.1109/ICII.2018.00023
    Conference Papers | 2018
    Ormrod D; Turnbull B, 2018, 'Cyber resilience as an information operations action to assure the mission', in European Conference on Information Warfare and Security, ECCWS, pp. 343 - 350
    Conference Papers | 2018
    Randhawa S; Turnbull B; Yuen J; Dean J, 2018, 'Mission-centric Automated Cyber Red Teaming', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3230833.3234688
    Conference Papers | 2018
    Taylor J; Turnbull B; Creech G, 2018, 'Volatile memory forensics acquisition efficacy: A comparative study towards analysing firmware-based rootkits', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3230833.3232810
    Conference Papers | 2017
    Ormrod D; Turnbull B, 2017, 'A framework for the modelling and simulation of battlespace integrated cyber-kinetic effects', in European Conference on Information Warfare and Security, ECCWS, pp. 288 - 297
    Conference Papers | 2016
    Ormrod D; Turnbull BP, 2016, 'The Military Cyber-Maturity Model - Preparing Modern Cyber-Enabled Military Forces for Future Conflicts', in Proceedings of 11th International Conference on Cyber Warfare and Security:, Boston, presented at 11th International Conference on Cyber Warfare and Security: ICCWS2016, Boston, 17 March 2016 - 18 March 2016
    Conference Papers | 2015
    O'Sullivan K; Turnbull BP, 2015, 'The Cyber Simulation Terrain: Towards an open source cyber effects simulation ontology', in Hutchinson B (ed.), roceedings of the 16th Aus tralian Information W arfare Confe rence, Perth, WA, Australia, presented at AUSTRALIAN INFORMATION WARFARE AND SECURITY CONFERENCE, Perth, WA, Australia, 30 November 2015 - 02 December 2015, http://ro.ecu.edu.au/isw/60/
    Conference Papers | 2015
    Ormrod D; Turnbull BP; O'Sullivan K, 2015, 'System of systems cyber effects simulation ontology', in Macal C; Rossetti M (ed.), Winter Simulation Conference (WSC), 2015, IEEE, Huntington Beach, CA, pp. 2475 - 2486, presented at 2015 Winter Simulation Conference (WSC), Huntington Beach, CA, 06 December 2015 - 09 December 2015, http://dx.doi.org/10.1109/WSC.2015.7408358
    Conference Papers | 2015
    Rice B; Turnbull BP, 2015, 'File System Modelling for Digital Triage: An Inductive Profiling Approach', in Valli C (ed.), The Proceedings of the 13th Australian Digital Forensics Conference, SRI Security Research Institute, Edith Cowan University, Perth, Western Australia, Perth, WA, Australia, pp. 132 - 140, presented at Australian Digital Forensics Conference, Perth, WA, Australia, 30 November 2015 - 02 December 2015, http://dx.doi.org/10.4225/75/57b3ff9efb892
    Conference Papers | 2015
    Yuen J; Turnbull BP; Hernandez J, 2015, 'Visual analytics for cyber red teaming', in Harrison L; Prigent N; Engel S; Best D (eds.), IEEE, Chicago, IL, pp. 1 - 8, presented at 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), Chicago, IL, 25 October 2015 - 25 October 2015, http://dx.doi.org/10.1109/VIZSEC.2015.7312765
    Conference Papers | 2013
    Grove D; Murray A; Gerhardy D; Turnbull B; Tobin T; Moir C, 2013, 'An overview of the Parallax BattleMind v1.5 for computer network defence', in Conferences in Research and Practice in Information Technology Series, pp. 31 - 37
    Conference Papers | 2012
    Osborne G; Turnbull B; Slay J, 2012, 'Development of info vis software for digital forensics', in Proceedings - International Computer Software and Applications Conference, pp. 213 - 217, http://dx.doi.org/10.1109/COMPSACW.2012.47
    Conference Papers | 2009
    Osborne G; Turnbull B, 2009, 'Enhancing computer forensics investigation through visualisation and data exploitation', in Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, pp. 1012 - 1017, http://dx.doi.org/10.1109/ARES.2009.120
    Conference Papers | 2009
    Shiralkar T; Lavine M; Turnbull B, 2009, 'A preliminary approach to the forensic analysis of an ultraportable ASUS Eee PC', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, pp. 116 - 121, http://dx.doi.org/10.1007/978-3-642-02312-5_13
    Conference Papers | 2009
    Singh AP; Lavine M; Turnbull B; Shiralkar T, 2009, 'Acer Aspire One Netbooks: A Forensic Challenge', in 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, IEEE, WA, Seattle, pp. 1077 - +, presented at IEEE 33rd International Computer Software and Applications Conference, WA, Seattle, 20 July 2009 - 24 July 2009, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000274261400171&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2009
    Singh AP; Lavine M; Turnbull B; Shiralkar T, 2009, 'Acer aspire one netbooks: A forensic challenge', in Proceedings - International Computer Software and Applications Conference, pp. 404 - 409, http://dx.doi.org/10.1109/COMPSAC.2009.167
    Conference Papers | 2009
    Slay J; Lin YC; Turnbull B; Beckett J; Lin P, 2009, 'Towards a formalization of digital forensics', in IFIP Advances in Information and Communication Technology, pp. 37 - 47, http://dx.doi.org/10.1007/978-3-642-04155-6_3
    Conference Papers | 2009
    Turnbull B; Osborne G; Simon M, 2009, 'Legal and technical implications of collecting wireless data as an evidence source', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, pp. 36 - 41, http://dx.doi.org/10.1007/978-3-642-02312-5_5
    Conference Papers | 2009
    Turnbull B; Taylor R; Blundell B, 2009, 'The anatomy of electronic evidence - Quantitative analysis of police e-crime data', in Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, pp. 143 - 149, http://dx.doi.org/10.1109/ARES.2009.118
    Conference Papers | 2008
    Turnbull B, 2008, 'The adaptability of electronic evidence acquisition guides for new technologies', in e-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop, http://dx.doi.org/10.4108/e-forensics.2008.2770

My Teaching

Teaching @ UNSW 

 

Co-Creator Bachelor of Cyber Security (Pass, Honours) - Live in 2025
    Development: In 2023, I co-designed and scaffolded this program, worked with industry and UNSW stakeholders, represented UNSW Canberra at high-level discussions, and ensured program and course approvals. 

Subject Matter Expert, Graduate Certificate, MBA-X, Cyber Security Leadership - Live in 2024
    Development: Contributed to course design and structure.   

Co-Creator and Co-Program Director, UNSW Online Cyber Security Masters Program 

This program is comprised of the following: 

  o    Cyber Security Graduate Certificate
  o    Cyber Security Graduate Diploma (Management and Leadership)
  o    Cyber Security Masters (Management and Leadership)
  o    Cyber Security Graduate Diploma (Security Engineering)
  o    Cyber Security Masters (Security Engineering)

I designed and scaffolded the program, working with industry and UNSW stakeholders. I represented UNSW Canberra at high-level discussions, I then ensured program and course approvals. 

I then ran half of this program, including 9 courses, for 2.5 years as the Co-Program Director (UNSW Canberra Director),  2019 - 2023. 

Assistant Creator and Co-Program Director, Bachelor of Computing and Cyber Security
Development: Assisted in program structure, content design and scaffolding.
Operation:  Co-Program Director (2017-2018). I was the founding Co-Director, transitioning from a Bachelor of IT to the emerging Computing and Cyber Security. 

Creator and Director,  Bachelor of IT/Cyber Honours Program.
I developed the program structure, content design and scaffolding. I then directed this program between 2015-2016 and 2019 - 2021.

Consultant, Masters of Cyber Security – Security Operations, Forensics, Advanced Tradecraft
In 2015,I consulted on program and specialisation structures. I then taught into this program 2015-2017.