Dr Mohiuddin Ahmed

Enterprise Fellow

School of Computer Science and Information Technology

College of Engineering and Information Technology

Available For Media Comment.


My research focuses on three pillars: 1) Offensive Security & Ransomware Resilience; 2) Data Analytics; and, last but not least, 3) Cyber Governance. In one sentence, my research focuses on understanding the tactics of cybercriminals and developing appropriate countermeasures. My research is not limited to producing high-quality researchers through HDR supervision; it also integrates research findings into teaching to produce industry-ready graduates. 

Year Citation
2025 Johnstone, M. N., Yang, W., & Ahmed, M. (2025). Using Machine Learning to Detect Vault (Anti-Forensic) Apps. Future Internet, 17(5), 186.
DOI
2025 Gaber, M., Ahmed, M., & Janicke, H. (2025). Defeating evasive malware with Peekaboo: Extracting authentic malware behavior with dynamic binary instrumentation. Journal of Information Security and Applications, 95, 104290.
DOI
2025 Gaber, M., Ahmed, M., & Janicke, H. (2025). Zero day malware detection with Alpha: Fast DBI with Transformer models for real world application. Computers and Electrical Engineering, 128, 110751.
DOI
2025 Ahmed, M., & Gaber, M. (2025). An investigation on cyber espionage ecosystem. Journal of Cyber Security Technology, 9(4), 344-368.
DOI
2025 Griffiths, T., Ahmed, M., & Islam, C. (2025). Software-based testbed for security evaluation of PMU and PDC communications. Journal of Cyber Security Technology, 1-20.
DOI
2024 Dart, M., & Ahmed, M. (2024). Operational shock: A method for estimating cyber security incident costs for large Australian healthcare providers. Journal of Cyber Security Technology, 8(4), 260-285.
DOI Scopus5
2024 Gaber, M. G., Ahmed, M., & Janicke, H. (2024). Malware Detection with Artificial Intelligence: A Systematic Literature Review. ACM Computing Surveys, 56(6), 1-33.
DOI Scopus79
2024 Ahmed, M., & Rashid, A. N. M. B. (2024). EDSUCh: A robust ensemble data summarization method for effective medical diagnosis. Digital Communications and Networks, 10(1), 182-189.
DOI Scopus3 WoS1
2024 Hur, A., Janjua, N., & Ahmed, M. (2024). Unifying context with labeled property graph: A pipeline-based system for comprehensive text representation in NLP. Expert Systems with Applications, 239, 16 pages.
DOI Scopus10 WoS7
2023 Hasan, M. T., Hossain, M. A. E., Mukta, M. S. H., Akter, A., Ahmed, M., & Islam, S. (2023). A Review on Deep-Learning-Based Cyberbullying Detection. Future Internet, 15(5), 47 pages.
DOI Scopus63 WoS23
2023 Stroebel, L., Llewellyn, M., Hartley, T., Ip, T. S., & Ahmed, M. (2023). A systematic literature review on the effectiveness of deepfake detection techniques. Journal of Cyber Security Technology, 7(2), 83-113.
DOI Scopus37
2023 Amin, S. A., Mukta, M. S. H., Saikat, M. S. M., Hossain, M. I., Islam, M. A., Ahmed, M., & Azam, S. (2023). Data Driven Classification of Opioid Patients Using Machine Learning-An Investigation. IEEE Access, 11, 396-409.
DOI Scopus3 WoS1
2023 Dart, M., & Ahmed, M. (2023). Evaluating Staff Attitudes, Intentions, and Behaviors Related to Cyber Security in Large Australian Health Care Environments: Mixed Methods Study.. JMIR human factors, 10(1), e48220.
DOI Scopus3 Europe PMC1
2023 Suleski, T., & Ahmed, M. (2023). A Data Taxonomy for Adaptive Multifactor Authentication in the Internet of Health Care Things. Journal of Medical Internet Research, 25, e44114.
DOI Scopus7 Europe PMC1
2022 Riddell, L., Ahmed, M., & Haskell-Dowland, P. (2022). Establishment and mapping of heterogeneous anomalies in network intrusion datasets. Connection Science, 34(1), 2755-2783.
DOI Scopus1 WoS1
2022 Ahmed, M., Moustafa, N., Suaib Akhter, A. F. M., Razzak, I., Surid, E., Anwar, A., . . . Zengin, A. (2022). A Blockchain-Based Emergency Message Transmission Protocol for Cooperative VANET. IEEE Transactions on Intelligent Transportation Systems, 23(10), 19624-19633.
DOI Scopus39 WoS27
2022 Ahmed, M., Cox, D., Simpson, B., & Aloufi, A. (2022). ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things. Applied Sciences, 12(4), 1990.
DOI Scopus22 WoS16
2022 Mursalin, M., Ahmed, M., & Haskell-Dowland, P. (2022). Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model. Sensors, 22(22), 8988.
DOI Scopus8 WoS5
2021 Yang, W., Wang, S., Sahri, N. M., Karie, N. M., Ahmed, M., & Valli, C. (2021). Biometrics for internet‐of‐things security: A review. Sensors, 21(18), 26 pages.
DOI Scopus111 WoS66 Europe PMC15
2021 Bazlur Rashid, A. N. M., Ahmed, M., & Pathan, A. S. K. (2021). Infrequent pattern detection for reliable network traffic analysis using robust evolutionary computation. Sensors, 21(9), 16 pages.
DOI Scopus7 WoS4
2021 Akhter, A. F. M. S., Ahmed, M., Shah, A. F. M. S., Anwar, A., Kayes, A. S. M., & Zengin, A. (2021). A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network. Sensors, 21(4), 1273.
DOI Scopus49 WoS34 Europe PMC4
2021 F. M. Suaib Akhter, A., F. M. Shahen Shah, A., Ahmed, M., Moustafa, N., Çavuşoğlu, U., & Zengin, A. (2021). A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks. Computers, Materials & Continua, 68(1), 229-246.
DOI Scopus8 WoS6
2021 Akhter, A. F. M. S., Ahmed, M., Shah, A. F. M. S., Anwar, A., & Zengin, A. (2021). A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET. Sustainability, 13(1), 400.
DOI Scopus51 WoS34
2021 Ahmed, M., Byreddy, S., Nutakki, A., Sikos, L. F., & Haskell-Dowland, P. (2021). ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things. Ad Hoc Networks, 122, 102621.
DOI Scopus101
2021 Aurisch, R., Ahmed, M., & Barkat, A. (2021). An outlook at Agile methodologies for the independent games developer. International Journal of Computers and Applications, 43(8), 812-818.
DOI Scopus5
2020 Ahmed, M., Seraj, R., & Islam, S. M. S. (2020). The k-means algorithm: A comprehensive survey and performance evaluation. Electronics Switzerland, 9(8), 1-12.
DOI Scopus1260 WoS788
2020 Sadik, S., Ahmed, M., Sikos, L. F., & Najmul Islam, A. K. M. (2020). Toward a sustainable cybersecurity ecosystem. Computers, 9(3), 1-17.
DOI Scopus58 WoS34
2020 Ahmed, M., & Pathan, A. S. K. (2020). Blockchain: Can It Be Trusted?. Computer, 53(4), 31-35.
DOI Scopus23 WoS16
2020 Rashid, A. N. M. B., Ahmed, M., Sikos, L. F., & Haskell‑Dowland, P. (2020). Correction to: Cooperative co‑evolution for feature selection in Big Data with random feature grouping. Journal of Big Data, 7(1), 1 page.
DOI
2020 Rashid, A. N. M. B., Ahmed, M., Sikos, L. F., & Haskell-Dowland, P. (2020). A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data Using Cooperative Co-Evolution. IEEE Access, 8, 150113-150129.
DOI Scopus18 WoS13
2020 Rashid, A. N. M. B., Ahmed, M., Sikos, L. F., & Haskell-Dowland, P. (2020). Cooperative co-evolution for feature selection in Big Data with random feature grouping. Journal of Big Data, 7(1), 42 pages.
DOI Scopus33 WoS23
2020 Ahmed, M., & Pathan, A. S. K. (2020). False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure. Complex Adaptive Systems Modeling, 8(1), 14 pages.
DOI Scopus117 WoS79
2020 Ahmed, M., & Najmul Islam, A. K. M. (2020). Deep Learning: Hope or Hype. Annals of Data Science, 7(3), 427-432.
DOI Scopus23
2020 Ahmed, M., & Pathan, A. S. K. (2020). Deep learning for collective anomaly detection. International Journal of Computational Science and Engineering, 21(1), 137-145.
DOI Scopus33 WoS30
2019 Ahmed, M. (2019). Use of mind stimulation therapy techniques as adjunct to clinical practice with elderly psychiatric patients. Aging Medicine and Healthcare, 10(2), 88-93.
DOI Scopus1
2019 Ahmed, M. (2019). Intelligent Big Data Summarization for Rare Anomaly Detection. IEEE Access, 7, 68669-68677.
DOI Scopus19 WoS13
2019 Ahmed, M. (2019). False image injection prevention using iChain. Applied Sciences Switzerland, 9(20), 11 pages.
DOI Scopus14 WoS9
2019 Yang, J., Onik, M. M. H., Lee, N. Y., Ahmed, M., & Kim, C. S. (2019). Proof-of-familiarity: A privacy-preserved blockchain scheme for collaborative medical decision-making. Applied Sciences Switzerland, 9(7), 24 pages.
DOI Scopus82 WoS51
2019 Ahmed, M. (2019). Data summarization: a survey. Knowledge and Information Systems, 58(2), 249-273.
DOI Scopus68 WoS51
2018 Ahmed, M. (2018). Reservoir-based network traffic stream summarization for anomaly detection. Pattern Analysis and Applications, 21(2), 579-599.
DOI Scopus6 WoS6
2018 Ahmed, M., & Barkat Ullah, A. S. S. M. (2018). Infrequent pattern mining in smart healthcare environment using data summarization. Journal of Supercomputing, 74(10), 5041-5059.
DOI Scopus20 WoS14
2018 Ahmed, M. (2018). Collective Anomaly Detection Techniques for Network Traffic Analysis. Annals of Data Science, 5(4), 497-512.
DOI Scopus27
2017 Ahmed, M. (2017). Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering. Computer, 50(9), 76-82.
DOI Scopus15 WoS11
2016 Ahmed, M., Naser Mahmood, A., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19-31.
DOI Scopus1368 WoS909
2016 Ahmed, M., Bursztajn, H. J., & Abramson, R. D. (2016). Back to the future. Psychiatric Services, 67(5), 473.
DOI Scopus1 WoS1
2016 Ahmed, M., Mahmood, A. N., & Islam, M. R. (2016). A survey of anomaly detection techniques in financial domain. Future Generation Computer Systems, 55, 278-288.
DOI Scopus430 WoS313
2015 Ahmed, M., & Mahmood, A. N. (2015). Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection. Annals of Data Science, 2(1), 111-130.
DOI Scopus66
2014 Ahmed, M., Bursztajn, H. J., Jalil, B., Khan, A. N., & Rahman, R. (2014). Maintenance of recovery from severe psychotic depression following successful electroconvulsive therapy in an elderly patient with "natural support". Journal of Clinical Gerontology and Geriatrics, 5(3), 99-100.
DOI WoS1
2014 Ahmed, M., Bursztajn, H. J., Abramson, R., & Nisenbaum, S. (2014). An alternative name for schizophrenia. Lancet Psychiatry, 1(4), e5.
DOI
2014 Ahmed, M., Bursztajn, H. J., Jalil, B., Khan, A. N., & Rahman, R. (2014). Corrigendum to "Maintenance of recovery from severe psychotic depression following successful ECT in an elderly patient with natural support" [J Clin Gerontol Geriatr (2014) 99-100]. Journal of Clinical Gerontology and Geriatrics, 5(4), 145.
DOI
2007 Ahmed, M., Osser, D. N., Boisvert, C. M., Albert, L. G., & Aslam, M. (2007). Rationale for emphasis on management over treatment of schizophrenia in clinical practice. Annals of Pharmacotherapy, 41(4), 693-695.
DOI Scopus5 WoS4 Europe PMC2
2006 Ahmed, M., & Boisvert, C. M. (2006). Using computers as visual aids to enhance communication in therapy. Computers in Human Behavior, 22(5), 847-855.
DOI Scopus13 WoS10
2006 Ahmed, M., & Boisvert, C. M. (2006). Comment: Using positive psychology with special mental health populations. American Psychologist, 61(4), 333-335.
DOI Scopus18 WoS14 Europe PMC6
2005 Ahmed, M., & Boisvert, C. M. (2005). Exploring unique roles for psychologists. American Psychologist, 60(7), 732-734.
DOI Scopus2 WoS2 Europe PMC1
2003 Ahmed, M., & Boisvert, C. M. (2003). Multimodal Integrative Cognitive Stimulating Group Therapy: Moving Beyond the Reduction of Psychopathology in Schizophrenia. Professional Psychology Research and Practice, 34(6), 644-651.
DOI Scopus7 WoS5
2003 Ahmed, M., & Boisvert, C. M. (2003). Enhancing Communication Through Visual Aids in Clinical Practice. American Psychologist, 58(10), 816-817.
DOI Scopus9 WoS8 Europe PMC4
2002 Spodak, J. T., Jonas, S. P., & Ahmed, M. (2002). Harlem Hospital Center's geropsychiatric service. Computer-facilitated dialogue with patients who have schizophrenia. Psychiatric Services, 53(1), 99-100.
DOI Scopus5
2002 Ahmed, M. (2002). Computer-facilitated dialogue with patients who have schizophrenia.. Psychiatric Services Washington D C, 53(1), 99-100.
DOI Scopus8 WoS8 Europe PMC3
2002 Ahmed, M., & Boisvert, C. M. (2002). Cognitive skills group treatment for schizophrenia [3]. Psychiatric Services, 53(11), 1476-1477.
DOI Scopus4 WoS3 Europe PMC2
1998 Ahmed, M. (1998). Computer-facilitated therapy: Reality-based dialogue with people with schizophrenia. Journal of Contemporary Psychotherapy, 28(4), 397-403.
DOI Scopus5
1997 Ahmed, M., Bayog, F., & Boisvert, C. M. (1997). Computer-facilitated therapy for inpatients with schizophrenia. Psychiatric Services, 48(10), 1334-1335.
DOI Scopus17 WoS13 Europe PMC9
1994 Ahmed, M., & Goldman, J. A. (1994). Cognitive rehabilitation of adults with severe and persistent mental illness: A group model. Community Mental Health Journal, 30(4), 385-394.
DOI Scopus15 WoS11 Europe PMC6

Year Citation
2013 Ahmed, M., & Boisvert, C. M. (2013). Mind Stimulation Therapy: Cognitive Interventions for Persons with Schizophrenia. Routledge.
DOI Scopus2

Year Citation
2021 Vishavnath, S. K., Anwar, A., & Ahmed, M. (2021). Machine Learning Based Cybersecurity Defense at the Age of Industry 4.0. In Studies in Computational Intelligence (Vol. 971, pp. 355-368). Springer International Publishing.
DOI Scopus3
2020 Bostami, B., & Ahmed, M. (2020). Deep Learning Meets Malware Detection: An Investigation. In Advanced Sciences and Technologies for Security Applications (pp. 137-155). Springer International Publishing.
DOI Scopus3
2020 Seraj, R., & Ahmed, M. (2020). Concept Drift for Big Data. In Advanced Sciences and Technologies for Security Applications (pp. 29-43). Springer International Publishing.
DOI Scopus3
2019 Ahmed, M., & Pathan, A. S. K. (2019). Investigating deep learning for collective anomaly detection - An experimental study. In Communications in Computer and Information Science (Vol. 969, pp. 211-219). Springer Singapore.
DOI Scopus4
2019 Bostami, B., Ahmed, M., & Choudhury, S. (2019). False data injection attacks in internet of things. In Eai Springer Innovations in Communication and Computing (pp. 47-58). Springer International Publishing.
DOI Scopus32
2019 Saeed, M. A., & Ahmed, M. (2019). Evaluation Metrics for Big Data Project Management. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 256, pp. 139-142). Springer International Publishing.
DOI
2019 Khandaker, S. M., Hussain, A., & Ahmed, M. (2019). Effectiveness of Hard Clustering Algorithms for Securing Cyber Space. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 256, pp. 113-120). Springer International Publishing.
DOI Scopus2
2018 Ahmed, M., & Barkat Ullah, A. S. S. M. (2018). False data injection attacks in healthcare. In Y. L. Boo, D. Stirling, L. Chi, L. Liu, K. L. Ong, & G. Williams (Eds.), Communications in Computer and Information Science (Vol. 845, pp. 192-202). SPRINGER-VERLAG BERLIN.
DOI Scopus11 WoS6
2016 Ahmed, M. (2016). Infrequent pattern identification in SCADA systems using unsupervised learning. In Security Solutions and Applied Cryptography in Smart Grid Communications (pp. 215-225). IGI Global.
DOI Scopus4
2015 Anwar, A., Mahmood, A. N., & Ahmed, M. (2015). False data injection attack targeting the LTC transformers to disrupt smart grid operation. In J. Tian, J. Jing, & M. Srivatsa (Eds.), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 153, pp. 252-266). SPRINGER.
DOI Scopus22 WoS11
2015 Ahmed, M., Mahmood, A. N., & Maher, M. J. (2015). A novel approach for network traffic summarization. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 139, pp. 51-60). Springer International Publishing.
DOI Scopus7
2015 Ahmed, M., Mahmood, A. N., & Maher, M. J. (2015). An efficient approach for complex data summarization using multiview clustering. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 139, pp. 38-47). Springer International Publishing.
DOI Scopus3
2015 Ahmed, M., & Mahmood, A. N. (2015). Network traffic pattern analysis using improved information theoretic co-clustering based collective anomaly detection. In J. Tian, J. Jing, & M. Srivatsa (Eds.), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 153, pp. 204-219). SPRINGER.
DOI Scopus22 WoS7
2015 Ahmed, M., Mahmood, A. N., & Maher, M. J. (2015). Heart disease diagnosis using co-clustering. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 139, pp. 61-70). Springer International Publishing.
DOI Scopus8

Year Citation
2023 Dart, M., & Ahmed, M. (2023). Australia’s Notifiable Data Breach Scheme: An Analysis of Risk Management Findings for Healthcare. In Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics Vol. 14305 LNCS (pp. 65-78). Springer Nature Singapore.
DOI Scopus2
2022 Evans, K., Abuadbba, A., Wu, T., Moore, K., Ahmed, M., Pogrebna, G., . . . Johnstone, M. (2022). RAIDER: Reinforcement-Aided Spear Phishing Detector. In Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics Vol. 13787 LNCS (pp. 23-50). Springer Nature Switzerland.
DOI Scopus7
2020 Rashid, M. M., Kamruzzaman, J., Ahmed, M., Islam, N., Wibowo, S., & Gordon, S. (2020). Performance Enhancement of Intrusion detection System Using Bagging Ensemble Technique with Feature Selection. In 2020 IEEE Asia Pacific Conference on Computer Science and Data Engineering Csde 2020 (pp. 1-5). IEEE.
DOI Scopus9
2020 Moustafa, N., Ahmed, M., & Ahmed, S. (2020). Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux Datasets. In G. J. Wang, R. Ko, M. Z. A. Bhuiyan, & Y. Pan (Eds.), Proceedings 2020 IEEE 19th International Conference on Trust Security and Privacy in Computing and Communications Trustcom 2020 (pp. 727-735). PEOPLES R CHINA, Guangzhou: IEEE COMPUTER SOC.
DOI Scopus86 WoS55
2019 Ahmed, M., Jahangir Kabir, M. M., Kabir, M., & Hasan, M. M. (2019). Identification of the Risk Factors of Cervical Cancer Applying Feature Selection Approaches. In 3rd International Conference on Electrical Computer and Telecommunication Engineering Icecte 2019 (pp. 201-204). IEEE.
DOI Scopus9
2019 Ahmed, M., & Al-Shaer, E. (2019). Measures and metrics for the enforcement of critical security controls: A case study of boundary defense. In ACM International Conference Proceeding Series (pp. 1-3). ACM.
DOI Scopus1
2019 Ahmed, M., & Barkat, A. (2019). Performance analysis of hard clustering techniques for big IoT data analytics. In Proceedings 2019 Cybersecurity and Cyberforensics Conference Ccc 2019 (pp. 62-66). IEEE.
DOI Scopus6
2019 Ahmed, M., & Kabir, M. M. J. (2019). Dimensionality reduction in predicting hospital readmissions of diabetics. In 2019 5th International Conference on Advances in Electrical Engineering Icaee 2019 (pp. 155-159). BANGLADESH, Independent Univ, Dhaka: IEEE.
DOI Scopus2 WoS1
2019 Hasan, M. M., Md. Jahangir Kabir, M., Haque, M. R., & Ahmed, M. (2019). A Combined Approach Using Image Processing and Deep Learning to Detect Pneumonia from Chest X-Ray Image. In 3rd International Conference on Electrical Computer and Telecommunication Engineering Icecte 2019 (pp. 89-92). IEEE.
DOI Scopus28
2018 Alsaleh, M. N., Wei, J., Al-Shaer, E., & Ahmed, M. (2018). Gextractor: Towards automated extraction of malware deception parameters. In ACM International Conference Proceeding Series (pp. 12 pages). PR, San Juan: ASSOC COMPUTING MACHINERY.
DOI Scopus1 WoS3
2017 Ahmed, M., Choudhury, N., & Uddin, S. (2017). Anomaly detection on big data in financial markets. In Proceedings of the 2017 IEEE ACM International Conference on Advances in Social Networks Analysis and Mining Asonam 2017 (pp. 998-1001). ACM.
DOI Scopus52
2017 Husari, G., Al-Shaer, E., Ahmed, M., Chu, B., & Niu, X. (2017). TTPDrill: Automatic and accurate extraction of threat actions from unstructured text of CTI Sources. In ACM International Conference Proceeding Series Vol. Part F132521 (pp. 103-115). FL, Orlando: ASSOC COMPUTING MACHINERY.
DOI Scopus199 WoS162
2014 Ahmed, M., & Mahmood, A. N. (2014). Clustering based semantic data summarization technique: A new approach. In Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications Iciea 2014 (pp. 1780-1785). PEOPLES R CHINA, Hangzhou: IEEE.
DOI Scopus11 WoS9
2014 Ahmed, M., & Mahmood, A. N. (2014). Network traffic analysis based on collective anomaly detection. In Proceedings of the 2014 9th IEEE Conference on Industrial Electronics and Applications Iciea 2014 (pp. 1141-1146). PEOPLES R CHINA, Hangzhou: IEEE.
DOI Scopus35 WoS26
2013 Ahmed, M., & Mahmood, A. N. (2013). A novel approach for outlier detection and clustering improvement. In Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications Iciea 2013 (pp. 577-582). AUSTRALIA, Swinburne Univ Technol, Melbourne: IEEE.
DOI Scopus76 WoS44
  • Dark Web Analytics for Ransomware Threat Actor Profiling, Commonwealth Scientific and Industrial Research Organisation (CSIRO), Industry PhD (iPhD) Program, 2026 ‑ 2030, $318,926.
  • Securing DER Stability via a Trusted Sovereign Monitor for EV Charging Systems., Commonwealth Scientific and Industrial Research Organisation (CSIRO), Tender, 2025 ‑ 2026, $163,367.
  • Developing autonomous solutions for building knowledge graphs to support educational outcomes in Virtuoso, CingleVue International Pty Ltd, Scholarships to Support Industry Engagement PhD Projects , 2020 ‑ 2024, $150,000.
  • Augmenting Cyber Defence Capability (ACDC), Cyber Security Research Centre Ltd, Grant, 2022 ‑ 2024, $885,000.
  • CAESAR - Cyber Assurance in Energy Systems for Security and Resilience, Cyber Security Research Centre Ltd, Grant, 2023 ‑ 2024, $204,200.
  • Generating an Authentication Protocol for Western Australian's Smart Grid, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2022 ‑ 2024, $120,000.
  • Enabling Private and Secure Information Transmission by Covert Communications, Edith Cowan University, Early-Mid Career Researcher Grant Scheme 2022 (Stream 2), 2023 ‑ 2024, $38,322.
  • Multi-factor Authentication in Medical Contexts for Pharmaceutical Dispensary Functions , Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2021 ‑ 2023, $120,000.
  • Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 ‑ 2022, $120,000.
  • Securing Internet of Medical Things against False Data Injection Attacks Using Blockchain, Edith Cowan University, ECU Early Career Researcher Grant - 2019, 2019 ‑ 2020, $25,000.
  • Australian Cyber Defence Against Ransomware 2.0, National Security College and Defence Science and Technology Group, 2022, $10,000.
  • Cyber Security Standards (ISMS) Research on Australian Mining and Mineral Industries, Joint Accreditation System of Australia and New Zealand, 2022, $25,000. 

INFO 3043 Cybersecurity Fundamentals 

INFO 6005 Critical Infrastructure and Control System Security


Connect With Me

External Profiles

Other Links