Dr Mohiuddin Ahmed
Enterprise Fellow
School of Computer Science and Information Technology
College of Engineering and Information Technology
My research focuses on three pillars: 1) Offensive Security & Ransomware Resilience; 2) Data Analytics; and, last but not least, 3) Cyber Governance. In one sentence, my research focuses on understanding the tactics of cybercriminals and developing appropriate countermeasures. My research is not limited to producing high-quality researchers through HDR supervision; it also integrates research findings into teaching to produce industry-ready graduates.

| Year | Citation |
|---|---|
| 2025 | Johnstone, M. N., Yang, W., & Ahmed, M. (2025). Using Machine Learning to Detect Vault (Anti-Forensic) Apps. Future Internet, 17(5), 186. |
| 2025 | Gaber, M., Ahmed, M., & Janicke, H. (2025). Defeating evasive malware with Peekaboo: Extracting authentic malware behavior with dynamic binary instrumentation. Journal of Information Security and Applications, 95, 104290. |
| 2025 | Gaber, M., Ahmed, M., & Janicke, H. (2025). Zero day malware detection with Alpha: Fast DBI with Transformer models for real world application. Computers and Electrical Engineering, 128, 110751. |
| 2025 | Ahmed, M., & Gaber, M. (2025). An investigation on cyber espionage ecosystem. Journal of Cyber Security Technology, 9(4), 344-368. |
| 2025 | Griffiths, T., Ahmed, M., & Islam, C. (2025). Software-based testbed for security evaluation of PMU and PDC communications. Journal of Cyber Security Technology, 1-20. |
| 2024 | Dart, M., & Ahmed, M. (2024). Operational shock: A method for estimating cyber security incident costs for large Australian healthcare providers. Journal of Cyber Security Technology, 8(4), 260-285. Scopus5 |
| 2024 | Gaber, M. G., Ahmed, M., & Janicke, H. (2024). Malware Detection with Artificial Intelligence: A Systematic Literature Review. ACM Computing Surveys, 56(6), 1-33. Scopus79 |
| 2024 | Ahmed, M., & Rashid, A. N. M. B. (2024). EDSUCh: A robust ensemble data summarization method for effective medical diagnosis. Digital Communications and Networks, 10(1), 182-189. Scopus3 WoS1 |
| 2024 | Hur, A., Janjua, N., & Ahmed, M. (2024). Unifying context with labeled property graph: A pipeline-based system for comprehensive text representation in NLP. Expert Systems with Applications, 239, 16 pages. Scopus10 WoS7 |
| 2023 | Hasan, M. T., Hossain, M. A. E., Mukta, M. S. H., Akter, A., Ahmed, M., & Islam, S. (2023). A Review on Deep-Learning-Based Cyberbullying Detection. Future Internet, 15(5), 47 pages. Scopus63 WoS23 |
| 2023 | Stroebel, L., Llewellyn, M., Hartley, T., Ip, T. S., & Ahmed, M. (2023). A systematic literature review on the effectiveness of deepfake detection techniques. Journal of Cyber Security Technology, 7(2), 83-113. Scopus37 |
| 2023 | Amin, S. A., Mukta, M. S. H., Saikat, M. S. M., Hossain, M. I., Islam, M. A., Ahmed, M., & Azam, S. (2023). Data Driven Classification of Opioid Patients Using Machine Learning-An Investigation. IEEE Access, 11, 396-409. Scopus3 WoS1 |
| 2023 | Dart, M., & Ahmed, M. (2023). Evaluating Staff Attitudes, Intentions, and Behaviors Related to Cyber Security in Large Australian Health Care Environments: Mixed Methods Study.. JMIR human factors, 10(1), e48220. Scopus3 Europe PMC1 |
| 2023 | Suleski, T., & Ahmed, M. (2023). A Data Taxonomy for Adaptive Multifactor Authentication in the Internet of Health Care Things. Journal of Medical Internet Research, 25, e44114. Scopus7 Europe PMC1 |
| 2022 | Riddell, L., Ahmed, M., & Haskell-Dowland, P. (2022). Establishment and mapping of heterogeneous anomalies in network intrusion datasets. Connection Science, 34(1), 2755-2783. Scopus1 WoS1 |
| 2022 | Ahmed, M., Moustafa, N., Suaib Akhter, A. F. M., Razzak, I., Surid, E., Anwar, A., . . . Zengin, A. (2022). A Blockchain-Based Emergency Message Transmission Protocol for Cooperative VANET. IEEE Transactions on Intelligent Transportation Systems, 23(10), 19624-19633. Scopus39 WoS27 |
| 2022 | Ahmed, M., Cox, D., Simpson, B., & Aloufi, A. (2022). ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things. Applied Sciences, 12(4), 1990. Scopus22 WoS16 |
| 2022 | Mursalin, M., Ahmed, M., & Haskell-Dowland, P. (2022). Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model. Sensors, 22(22), 8988. Scopus8 WoS5 |
| 2021 | Yang, W., Wang, S., Sahri, N. M., Karie, N. M., Ahmed, M., & Valli, C. (2021). Biometrics for internet‐of‐things security: A review. Sensors, 21(18), 26 pages. Scopus111 WoS66 Europe PMC15 |
| 2021 | Bazlur Rashid, A. N. M., Ahmed, M., & Pathan, A. S. K. (2021). Infrequent pattern detection for reliable network traffic analysis using robust evolutionary computation. Sensors, 21(9), 16 pages. Scopus7 WoS4 |
| 2021 | Akhter, A. F. M. S., Ahmed, M., Shah, A. F. M. S., Anwar, A., Kayes, A. S. M., & Zengin, A. (2021). A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network. Sensors, 21(4), 1273. Scopus49 WoS34 Europe PMC4 |
| 2021 | F. M. Suaib Akhter, A., F. M. Shahen Shah, A., Ahmed, M., Moustafa, N., Çavuşoğlu, U., & Zengin, A. (2021). A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks. Computers, Materials & Continua, 68(1), 229-246. Scopus8 WoS6 |
| 2021 | Akhter, A. F. M. S., Ahmed, M., Shah, A. F. M. S., Anwar, A., & Zengin, A. (2021). A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET. Sustainability, 13(1), 400. Scopus51 WoS34 |
| 2021 | Ahmed, M., Byreddy, S., Nutakki, A., Sikos, L. F., & Haskell-Dowland, P. (2021). ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things. Ad Hoc Networks, 122, 102621. Scopus101 |
| 2021 | Aurisch, R., Ahmed, M., & Barkat, A. (2021). An outlook at Agile methodologies for the independent games developer. International Journal of Computers and Applications, 43(8), 812-818. Scopus5 |
| 2020 | Ahmed, M., Seraj, R., & Islam, S. M. S. (2020). The k-means algorithm: A comprehensive survey and performance evaluation. Electronics Switzerland, 9(8), 1-12. Scopus1260 WoS788 |
| 2020 | Sadik, S., Ahmed, M., Sikos, L. F., & Najmul Islam, A. K. M. (2020). Toward a sustainable cybersecurity ecosystem. Computers, 9(3), 1-17. Scopus58 WoS34 |
| 2020 | Ahmed, M., & Pathan, A. S. K. (2020). Blockchain: Can It Be Trusted?. Computer, 53(4), 31-35. Scopus23 WoS16 |
| 2020 | Rashid, A. N. M. B., Ahmed, M., Sikos, L. F., & Haskell‑Dowland, P. (2020). Correction to: Cooperative co‑evolution for feature selection in Big Data with random feature grouping. Journal of Big Data, 7(1), 1 page. |
| 2020 | Rashid, A. N. M. B., Ahmed, M., Sikos, L. F., & Haskell-Dowland, P. (2020). A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data Using Cooperative Co-Evolution. IEEE Access, 8, 150113-150129. Scopus18 WoS13 |
| 2020 | Rashid, A. N. M. B., Ahmed, M., Sikos, L. F., & Haskell-Dowland, P. (2020). Cooperative co-evolution for feature selection in Big Data with random feature grouping. Journal of Big Data, 7(1), 42 pages. Scopus33 WoS23 |
| 2020 | Ahmed, M., & Pathan, A. S. K. (2020). False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure. Complex Adaptive Systems Modeling, 8(1), 14 pages. Scopus117 WoS79 |
| 2020 | Ahmed, M., & Najmul Islam, A. K. M. (2020). Deep Learning: Hope or Hype. Annals of Data Science, 7(3), 427-432. Scopus23 |
| 2020 | Ahmed, M., & Pathan, A. S. K. (2020). Deep learning for collective anomaly detection. International Journal of Computational Science and Engineering, 21(1), 137-145. Scopus33 WoS30 |
| 2019 | Ahmed, M. (2019). Use of mind stimulation therapy techniques as adjunct to clinical practice with elderly psychiatric patients. Aging Medicine and Healthcare, 10(2), 88-93. Scopus1 |
| 2019 | Ahmed, M. (2019). Intelligent Big Data Summarization for Rare Anomaly Detection. IEEE Access, 7, 68669-68677. Scopus19 WoS13 |
| 2019 | Ahmed, M. (2019). False image injection prevention using iChain. Applied Sciences Switzerland, 9(20), 11 pages. Scopus14 WoS9 |
| 2019 | Yang, J., Onik, M. M. H., Lee, N. Y., Ahmed, M., & Kim, C. S. (2019). Proof-of-familiarity: A privacy-preserved blockchain scheme for collaborative medical decision-making. Applied Sciences Switzerland, 9(7), 24 pages. Scopus82 WoS51 |
| 2019 | Ahmed, M. (2019). Data summarization: a survey. Knowledge and Information Systems, 58(2), 249-273. Scopus68 WoS51 |
| 2018 | Ahmed, M. (2018). Reservoir-based network traffic stream summarization for anomaly detection. Pattern Analysis and Applications, 21(2), 579-599. Scopus6 WoS6 |
| 2018 | Ahmed, M., & Barkat Ullah, A. S. S. M. (2018). Infrequent pattern mining in smart healthcare environment using data summarization. Journal of Supercomputing, 74(10), 5041-5059. Scopus20 WoS14 |
| 2018 | Ahmed, M. (2018). Collective Anomaly Detection Techniques for Network Traffic Analysis. Annals of Data Science, 5(4), 497-512. Scopus27 |
| 2017 | Ahmed, M. (2017). Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering. Computer, 50(9), 76-82. Scopus15 WoS11 |
| 2016 | Ahmed, M., Naser Mahmood, A., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19-31. Scopus1368 WoS909 |
| 2016 | Ahmed, M., Bursztajn, H. J., & Abramson, R. D. (2016). Back to the future. Psychiatric Services, 67(5), 473. Scopus1 WoS1 |
| 2016 | Ahmed, M., Mahmood, A. N., & Islam, M. R. (2016). A survey of anomaly detection techniques in financial domain. Future Generation Computer Systems, 55, 278-288. Scopus430 WoS313 |
| 2015 | Ahmed, M., & Mahmood, A. N. (2015). Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection. Annals of Data Science, 2(1), 111-130. Scopus66 |
| 2014 | Ahmed, M., Bursztajn, H. J., Jalil, B., Khan, A. N., & Rahman, R. (2014). Maintenance of recovery from severe psychotic depression following successful electroconvulsive therapy in an elderly patient with "natural support". Journal of Clinical Gerontology and Geriatrics, 5(3), 99-100. WoS1 |
| 2014 | Ahmed, M., Bursztajn, H. J., Abramson, R., & Nisenbaum, S. (2014). An alternative name for schizophrenia. Lancet Psychiatry, 1(4), e5. |
| 2014 | Ahmed, M., Bursztajn, H. J., Jalil, B., Khan, A. N., & Rahman, R. (2014). Corrigendum to "Maintenance of recovery from severe psychotic depression following successful ECT in an elderly patient with natural support" [J Clin Gerontol Geriatr (2014) 99-100]. Journal of Clinical Gerontology and Geriatrics, 5(4), 145. |
| 2007 | Ahmed, M., Osser, D. N., Boisvert, C. M., Albert, L. G., & Aslam, M. (2007). Rationale for emphasis on management over treatment of schizophrenia in clinical practice. Annals of Pharmacotherapy, 41(4), 693-695. Scopus5 WoS4 Europe PMC2 |
| 2006 | Ahmed, M., & Boisvert, C. M. (2006). Using computers as visual aids to enhance communication in therapy. Computers in Human Behavior, 22(5), 847-855. Scopus13 WoS10 |
| 2006 | Ahmed, M., & Boisvert, C. M. (2006). Comment: Using positive psychology with special mental health populations. American Psychologist, 61(4), 333-335. Scopus18 WoS14 Europe PMC6 |
| 2005 | Ahmed, M., & Boisvert, C. M. (2005). Exploring unique roles for psychologists. American Psychologist, 60(7), 732-734. Scopus2 WoS2 Europe PMC1 |
| 2003 | Ahmed, M., & Boisvert, C. M. (2003). Multimodal Integrative Cognitive Stimulating Group Therapy: Moving Beyond the Reduction of Psychopathology in Schizophrenia. Professional Psychology Research and Practice, 34(6), 644-651. Scopus7 WoS5 |
| 2003 | Ahmed, M., & Boisvert, C. M. (2003). Enhancing Communication Through Visual Aids in Clinical Practice. American Psychologist, 58(10), 816-817. Scopus9 WoS8 Europe PMC4 |
| 2002 | Spodak, J. T., Jonas, S. P., & Ahmed, M. (2002). Harlem Hospital Center's geropsychiatric service. Computer-facilitated dialogue with patients who have schizophrenia. Psychiatric Services, 53(1), 99-100. Scopus5 |
| 2002 | Ahmed, M. (2002). Computer-facilitated dialogue with patients who have schizophrenia.. Psychiatric Services Washington D C, 53(1), 99-100. Scopus8 WoS8 Europe PMC3 |
| 2002 | Ahmed, M., & Boisvert, C. M. (2002). Cognitive skills group treatment for schizophrenia [3]. Psychiatric Services, 53(11), 1476-1477. Scopus4 WoS3 Europe PMC2 |
| 1998 | Ahmed, M. (1998). Computer-facilitated therapy: Reality-based dialogue with people with schizophrenia. Journal of Contemporary Psychotherapy, 28(4), 397-403. Scopus5 |
| 1997 | Ahmed, M., Bayog, F., & Boisvert, C. M. (1997). Computer-facilitated therapy for inpatients with schizophrenia. Psychiatric Services, 48(10), 1334-1335. Scopus17 WoS13 Europe PMC9 |
| 1994 | Ahmed, M., & Goldman, J. A. (1994). Cognitive rehabilitation of adults with severe and persistent mental illness: A group model. Community Mental Health Journal, 30(4), 385-394. Scopus15 WoS11 Europe PMC6 |
| Year | Citation |
|---|---|
| 2013 | Ahmed, M., & Boisvert, C. M. (2013). Mind Stimulation Therapy: Cognitive Interventions for Persons with Schizophrenia. Routledge. DOI Scopus2 |
| Year | Citation |
|---|---|
| 2021 | Vishavnath, S. K., Anwar, A., & Ahmed, M. (2021). Machine Learning Based Cybersecurity Defense at the Age of Industry 4.0. In Studies in Computational Intelligence (Vol. 971, pp. 355-368). Springer International Publishing. DOI Scopus3 |
| 2020 | Bostami, B., & Ahmed, M. (2020). Deep Learning Meets Malware Detection: An Investigation. In Advanced Sciences and Technologies for Security Applications (pp. 137-155). Springer International Publishing. DOI Scopus3 |
| 2020 | Seraj, R., & Ahmed, M. (2020). Concept Drift for Big Data. In Advanced Sciences and Technologies for Security Applications (pp. 29-43). Springer International Publishing. DOI Scopus3 |
| 2019 | Ahmed, M., & Pathan, A. S. K. (2019). Investigating deep learning for collective anomaly detection - An experimental study. In Communications in Computer and Information Science (Vol. 969, pp. 211-219). Springer Singapore. DOI Scopus4 |
| 2019 | Bostami, B., Ahmed, M., & Choudhury, S. (2019). False data injection attacks in internet of things. In Eai Springer Innovations in Communication and Computing (pp. 47-58). Springer International Publishing. DOI Scopus32 |
| 2019 | Saeed, M. A., & Ahmed, M. (2019). Evaluation Metrics for Big Data Project Management. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 256, pp. 139-142). Springer International Publishing. DOI |
| 2019 | Khandaker, S. M., Hussain, A., & Ahmed, M. (2019). Effectiveness of Hard Clustering Algorithms for Securing Cyber Space. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 256, pp. 113-120). Springer International Publishing. DOI Scopus2 |
| 2018 | Ahmed, M., & Barkat Ullah, A. S. S. M. (2018). False data injection attacks in healthcare. In Y. L. Boo, D. Stirling, L. Chi, L. Liu, K. L. Ong, & G. Williams (Eds.), Communications in Computer and Information Science (Vol. 845, pp. 192-202). SPRINGER-VERLAG BERLIN. DOI Scopus11 WoS6 |
| 2016 | Ahmed, M. (2016). Infrequent pattern identification in SCADA systems using unsupervised learning. In Security Solutions and Applied Cryptography in Smart Grid Communications (pp. 215-225). IGI Global. DOI Scopus4 |
| 2015 | Anwar, A., Mahmood, A. N., & Ahmed, M. (2015). False data injection attack targeting the LTC transformers to disrupt smart grid operation. In J. Tian, J. Jing, & M. Srivatsa (Eds.), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 153, pp. 252-266). SPRINGER. DOI Scopus22 WoS11 |
| 2015 | Ahmed, M., Mahmood, A. N., & Maher, M. J. (2015). A novel approach for network traffic summarization. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 139, pp. 51-60). Springer International Publishing. DOI Scopus7 |
| 2015 | Ahmed, M., Mahmood, A. N., & Maher, M. J. (2015). An efficient approach for complex data summarization using multiview clustering. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 139, pp. 38-47). Springer International Publishing. DOI Scopus3 |
| 2015 | Ahmed, M., & Mahmood, A. N. (2015). Network traffic pattern analysis using improved information theoretic co-clustering based collective anomaly detection. In J. Tian, J. Jing, & M. Srivatsa (Eds.), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 153, pp. 204-219). SPRINGER. DOI Scopus22 WoS7 |
| 2015 | Ahmed, M., Mahmood, A. N., & Maher, M. J. (2015). Heart disease diagnosis using co-clustering. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 139, pp. 61-70). Springer International Publishing. DOI Scopus8 |
| Year | Citation |
|---|---|
| 2023 | Dart, M., & Ahmed, M. (2023). Australia’s Notifiable Data Breach Scheme: An Analysis of Risk Management Findings for Healthcare. In Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics Vol. 14305 LNCS (pp. 65-78). Springer Nature Singapore. DOI Scopus2 |
| 2022 | Evans, K., Abuadbba, A., Wu, T., Moore, K., Ahmed, M., Pogrebna, G., . . . Johnstone, M. (2022). RAIDER: Reinforcement-Aided Spear Phishing Detector. In Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics Vol. 13787 LNCS (pp. 23-50). Springer Nature Switzerland. DOI Scopus7 |
| 2020 | Rashid, M. M., Kamruzzaman, J., Ahmed, M., Islam, N., Wibowo, S., & Gordon, S. (2020). Performance Enhancement of Intrusion detection System Using Bagging Ensemble Technique with Feature Selection. In 2020 IEEE Asia Pacific Conference on Computer Science and Data Engineering Csde 2020 (pp. 1-5). IEEE. DOI Scopus9 |
| 2020 | Moustafa, N., Ahmed, M., & Ahmed, S. (2020). Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets. In G. J. Wang, R. Ko, M. Z. A. Bhuiyan, & Y. Pan (Eds.), Proceedings 2020 IEEE 19th International Conference on Trust Security and Privacy in Computing and Communications Trustcom 2020 (pp. 727-735). PEOPLES R CHINA, Guangzhou: IEEE COMPUTER SOC. DOI Scopus86 WoS55 |
| 2019 | Ahmed, M., Jahangir Kabir, M. M., Kabir, M., & Hasan, M. M. (2019). Identification of the Risk Factors of Cervical Cancer Applying Feature Selection Approaches. In 3rd International Conference on Electrical Computer and Telecommunication Engineering Icecte 2019 (pp. 201-204). IEEE. DOI Scopus9 |
| 2019 | Ahmed, M., & Al-Shaer, E. (2019). Measures and metrics for the enforcement of critical security controls: A case study of boundary defense. In ACM International Conference Proceeding Series (pp. 1-3). ACM. DOI Scopus1 |
| 2019 | Ahmed, M., & Barkat, A. (2019). Performance analysis of hard clustering techniques for big IoT data analytics. In Proceedings 2019 Cybersecurity and Cyberforensics Conference Ccc 2019 (pp. 62-66). IEEE. DOI Scopus6 |
| 2019 | Ahmed, M., & Kabir, M. M. J. (2019). Dimensionality reduction in predicting hospital readmissions of diabetics. In 2019 5th International Conference on Advances in Electrical Engineering Icaee 2019 (pp. 155-159). BANGLADESH, Independent Univ, Dhaka: IEEE. DOI Scopus2 WoS1 |
| 2019 | Hasan, M. M., Md. Jahangir Kabir, M., Haque, M. R., & Ahmed, M. (2019). A Combined Approach Using Image Processing and Deep Learning to Detect Pneumonia from Chest X-Ray Image. In 3rd International Conference on Electrical Computer and Telecommunication Engineering Icecte 2019 (pp. 89-92). IEEE. DOI Scopus28 |
| 2018 | Alsaleh, M. N., Wei, J., Al-Shaer, E., & Ahmed, M. (2018). Gextractor: Towards automated extraction of malware deception parameters. In ACM International Conference Proceeding Series (pp. 12 pages). PR, San Juan: ASSOC COMPUTING MACHINERY. DOI Scopus1 WoS3 |
| 2017 | Ahmed, M., Choudhury, N., & Uddin, S. (2017). Anomaly detection on big data in financial markets. In Proceedings of the 2017 IEEE ACM International Conference on Advances in Social Networks Analysis and Mining Asonam 2017 (pp. 998-1001). ACM. DOI Scopus52 |
| 2017 | Husari, G., Al-Shaer, E., Ahmed, M., Chu, B., & Niu, X. (2017). TTPDrill: Automatic and accurate extraction of threat actions from unstructured text of CTI Sources. In ACM International Conference Proceeding Series Vol. Part F132521 (pp. 103-115). FL, Orlando: ASSOC COMPUTING MACHINERY. DOI Scopus199 WoS162 |
| 2014 | Ahmed, M., & Mahmood, A. N. (2014). Clustering based semantic data summarization technique: A new approach. In Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications Iciea 2014 (pp. 1780-1785). PEOPLES R CHINA, Hangzhou: IEEE. DOI Scopus11 WoS9 |
| 2014 | Ahmed, M., & Mahmood, A. N. (2014). Network traffic analysis based on collective anomaly detection. In Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications Iciea 2014 (pp. 1141-1146). PEOPLES R CHINA, Hangzhou: IEEE. DOI Scopus35 WoS26 |
| 2013 | Ahmed, M., & Mahmood, A. N. (2013). A novel approach for outlier detection and clustering improvement. In Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications Iciea 2013 (pp. 577-582). AUSTRALIA, Swinburne Univ Technol, Melbourne: IEEE. DOI Scopus76 WoS44 |
- Dark Web Analytics for Ransomware Threat Actor Profiling, Commonwealth Scientific and Industrial Research Organisation (CSIRO), Industry PhD (iPhD) Program, 2026 ‑ 2030, $318,926.
- Securing DER Stability via a Trusted Sovereign Monitor for EV Charging Systems., Commonwealth Scientific and Industrial Research Organisation (CSIRO), Tender, 2025 ‑ 2026, $163,367.
- Developing autonomous solutions for building knowledge graphs to support educational outcomes in Virtuoso, CingleVue International Pty Ltd, Scholarships to Support Industry Engagement PhD Projects , 2020 ‑ 2024, $150,000.
- Augmenting Cyber Defence Capability (ACDC), Cyber Security Research Centre Ltd, Grant, 2022 ‑ 2024, $885,000.
- CAESAR - Cyber Assurance in Energy Systems for Security and Resilience, Cyber Security Research Centre Ltd, Grant, 2023 ‑ 2024, $204,200.
- Generating an Authentication Protocol for Western Australian's Smart Grid, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2022 ‑ 2024, $120,000.
- Enabling Private and Secure Information Transmission by Covert Communications, Edith Cowan University, Early-Mid Career Researcher Grant Scheme 2022 (Stream 2), 2023 ‑ 2024, $38,322.
- Multi-factor Authentication in Medical Contexts for Pharmaceutical Dispensary Functions , Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2021 ‑ 2023, $120,000.
- Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 ‑ 2022, $120,000.
- Securing Internet of Medical Things against False Data Injection Attacks Using Blockchain, Edith Cowan University, ECU Early Career Researcher Grant - 2019, 2019 ‑ 2020, $25,000.
- Australian Cyber Defence Against Ransomware 2.0, National Security College and Defence Science and Technology Group, 2022, $10,000.
- Cyber Security Standards (ISMS) Research on Australian Mining and Mineral Industries, Joint Accreditation System of Australia and New Zealand, 2022, $25,000.
INFO 3043 Cybersecurity Fundamentals
INFO 6005 Critical Infrastructure and Control System Security
Available For Media Comment.