- Security and Verification in Computing
- Advanced Malware Detection Techniques
- Smart Grid Security and Resilience
- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Cloud Data Security Solutions
- Access Control and Trust
- Information and Cyber Security
- Adversarial Robustness in Machine Learning
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Anomaly Detection Techniques and Applications
- Digital and Cyber Forensics
- Distributed systems and fault tolerance
- Network Security and Intrusion Detection
- Smart Grid Energy Management
- Scientific Computing and Data Management
- Business Process Modeling and Analysis
- Spam and Phishing Detection
- Digital Media Forensic Detection
- Domain Adaptation and Few-Shot Learning
- Internet Traffic Analysis and Secure E-voting
- Peer-to-Peer Network Technologies
Monash University
2016-2025
Australian Regenerative Medicine Institute
2019-2025
University of Lisbon
2022
University of Bari Aldo Moro
2022
University of Sannio
2022
University of Warwick
2022
University of Coimbra
2022
Instituto Superior Técnico
2022
University of Kent
2022
Commonwealth Scientific and Industrial Research Organisation
2020
Transfer learning provides an effective solution for feasibly and fast customize accurate <i>Student</i> models, by transferring the learned knowledge of pre-trained <i>Teacher</i> models over large datasets via fine-tuning. Many Teacher used in transfer are publicly available maintained public platforms, increasing their vulnerability to backdoor attacks. In this article, we demonstrate a threat tasks on both image time-series data leveraging accessible aimed at defeating three commonly...
Cybersecurity cannot be addressed by technology alone; the most intractable aspects are in fact sociotechnical. As a result, 'human factor' has been recognised as being weakest and obscure link creating safe secure digital environments. This study examines subjective often complex nature of human factors cybersecurity context through systematic literature review 27 articles which span across technical, behavior social sciences perspectives. Results from our suggest that there is still...
Utility companies are expected to leverage privately owned distributed energy resources (DERs) create virtual power plants (VPPs), which offer promising solutions for maintaining the demand-supply balance efficiently and reducing emissions. Smart inverters play a crucial role in integrating DERs into VPPs, making security of smart reliability inverter data essential successful implementation secure effective VPPs. However, traditional public-key infrastructure X.509 digital certificate-based...
With the increasing advancement of Internet Things (IoT) enabled systems, smart medical devices open numerous opportunities for healthcare sector. The success using such in industry depends strongly on secured and reliable data transmission. Physicians diagnose that prescribe medicines and/or give guidelines/instructions/treatment plans patients. Therefore, a physician is always concerned about trustworthiness, because if it not guaranteed, savior can become an involuntary foe! This paper...
Falls are one of the major health concerns for elderly people. These falls often result in severe injuries which lead into huge medical expenses. Over recent years, many ICT based fall detection and prevention solutions emerged to address risk factors associated with falls. However, despite these research studies, predicting likelihood still remains as a challenge both IT domains. Data related being scattered among different healthcare providers can be attributed main reason this challenge....
Due to the increasing integration of distributed energy generation in electric grid, transactive markets (TEMs) have recently emerged balance demand and supply dynamically across grid. TEM enables peer (P2P) trading brings flexibility by reducing users’ It also enhances system’s efficiency reduces pressure on electricity networks. However, it is vulnerable major cyber attacks as users equipped with smart devices are participating autonomously market, an extensive amount information exchanged...
Wearable fitness devices are widely used to track an individual’s health and physical activities improve the quality of services. These sense a considerable amount sensitive data processed by centralized third party. While many researchers have thoroughly evaluated privacy issues surrounding wearable trackers, no study has addressed in trackers giving control user. Blockchain is emerging technology with outstanding advantages resolving consent management concerns. As there fully...
Wireless Body Area Networks (WBANs) are an emerging industrial technology for monitoring physiological data. These networks employ medical wearable and implanted biomedical sensors aimed at improving quality of life by providing body-oriented services through a variety sensing gadgets. The collect vital data from the body forward this information to other nodes further using short-range wireless communication technology. In paper, we provide multi-aspect review recent advancements made in...
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain cross-domain environments (CDEs) is important for distributed services. However, traditional Attribute-Based Access Control (ABAC) models are incompatible with CDEs. To fill this gap, approaches that apply cryptographic primitives, e.g., attribute-based encryption (ABE), have been proposed. The computation and storage overhead in most ABE constructions non-negligible increases the complexity of...
Non-repudiation of digital evidence is required by various use cases in today's business for example the area medical products but also public like congestion charges. These have common that at a certain time an record generated to attest occurrence event. To allow non-repudiation such it provide on used device itself, its configuration, and software running Digital signatures as today authenticity integrity record. However signature gives no information about state Measurement Instrument...
A successful application of an Internet Things (IoT) based network depends on the accurate and delivery data collected from numerous sources. significant concern in IoT systems arises when end-users do not have sufficient transparency are unaware any potential manipulation risk each step involved propagation. One solution is to integrate security metadata IoT-based security-aware provenance graphs that provides better with awareness at In this paper, we into graph predefined policies. We...
The integration of modern information and communication technologies with the energy infrastructure as incarnated by Smart Grid vision raises new threats in term identity theft, privacy breaches failure to ensure data compliance. In this paper, we discuss need for strong user-centric protection a context propose manager allow users (individual non-individual consumers) be involved management their privacy. manger is designed software component running on Energy Gateway (SEG) deployed at...
Distributed demand response (DR) schemes for smart energy networks rely on data from various sources, many of them outside the network operator's perimeter. Therefore, compromised inputs false injection attacks (FDIAs) can be detrimental to expectations stakeholders, pro-vide financial benefits malicious actors, compromise commercial viability scheme and have potential disrupt supply. Due heterogeneity FDIAs are arduous prevent with standard security controls. Thus, detecting is necessary...
The smart grid optimises energy transmission efficiency and provides practical solutions for saving life convenience. Along with a decentralised, transparent fair trading model, the attracts many users to participate. In recent years, researchers have contributed development of grids in terms network information security so that security, reliability stability systems can be guaranteed. However, our investigation reveals various malicious behaviours during transactions operations, such as...
The emerging proliferation of information and communication technology throughout the electricity grid enables technologies, such as Demand Response (DR) schemes, eventually creating a Smart Grid. This development is expected to produce effective DR systems where consumers get reduced costs while their utility companies reduce services due peak demand reductions with increasing efficiency. False data injection/data integrity attacks on these can potentially result in sub-optimal solutions...
Detection-based defense approaches are effective against adversarial attacks without compromising the structure of protected model. However, they could be bypassed by stronger and limited in their ability to handle high-fidelity images. In this paper, we explore an detection-based on images (including high-resolution images) extending investigation beyond a single-instance perspective incorporate its transformations as well. Our intuition is that essential characteristics valid image...