- Network Security and Intrusion Detection
- Information and Cyber Security
- Advanced Malware Detection Techniques
- Smart Grid Security and Resilience
- Cybersecurity and Cyber Warfare Studies
- Access Control and Trust
- User Authentication and Security Systems
- Anomaly Detection Techniques and Applications
- Vehicular Ad Hoc Networks (VANETs)
- Digital and Cyber Forensics
- Security and Verification in Computing
- Software Engineering Research
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Internet Traffic Analysis and Secure E-voting
- Opportunistic and Delay-Tolerant Networks
- Distributed systems and fault tolerance
- Digital Transformation in Industry
- IoT and Edge/Fog Computing
- Risk and Safety Analysis
- Peer-to-Peer Network Technologies
- Privacy, Security, and Data Protection
- Advanced Authentication Protocols Security
- Adversarial Robustness in Machine Learning
Edith Cowan University
2019-2025
De Montfort University
2012-2022
University of Guelma
2022
Badji Moktar-Annaba University
2022
ACT Government
2022
ORCID
2020
The King's College
2018
King Saud University
2018
Guangdong University of Petrochemical Technology
2018
Technische Hochschule Ingolstadt
2015
The recent outbreak of COVID-19 has taken the world by surprise, forcing lockdowns and straining public health care systems. is known to be a highly infectious virus, infected individuals do not initially exhibit symptoms, while some remain asymptomatic. Thus, non-negligible fraction population can, at any given time, hidden source transmissions. In response, many governments have shown great interest in smartphone contact tracing apps that help automate difficult task all contacts newly...
In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized federated learning. Specifically, the has been generated using purpose-built IoT/IIoT testbed with large representative set devices, sensors, protocols cloud/edge configurations. The data are from various devices (more than 10 types) such as Low-cost...
This paper presents a comprehensive survey of the existing blockchain protocols for Internet Things (IoT) networks. We start by describing blockchains and summarizing surveys that deal with technologies. Then, we provide an overview application domains technologies in IoT, e.g, Vehicles, Energy, Cloud, Fog computing, etc. Moreover, classification threat models, which are considered IoT networks, into five main categories, namely, identity-based attacks, manipulation-based cryptanalytic...
In this paper, a comprehensive survey of authentication protocols for Internet Things (IoT) is presented. Specifically more than forty developed or applied in the context IoT are selected and examined detail. These categorized based on target environment: (1) Machine to Communications (M2M), (2) Vehicles (IoV), (3) Energy (IoE), (4) Sensors (IoS). Threat models, countermeasures, formal security verification techniques used addition taxonomy comparison that terms network model, specific...
This paper proposes a novel intrusion detection system (IDS) that combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm Forest PA. Specifically, the first second method take as inputs features of data set, classify network traffic Attack/Benign. The third uses initial set in addition to outputs inputs. experimental results obtained by analyzing proposed IDS using CICIDS2017 dataset, attest their superiority terms...
This paper proposes a novel intrusion detection system (IDS), named RDTIDS, for Internet-of-Things (IoT) networks. The RDTIDS combines different classifier approaches which are based on decision tree and rules-based concepts, namely, REP Tree, JRip algorithm Forest PA. Specifically, the first second method take as inputs features of data set, classify network traffic Attack/Benign. third uses initial set in addition to outputs inputs. experimental results obtained by analyzing proposed IDS...
In this article, we present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet Things (IoT) applications. Specifically, first provide review learning-based and privacy systems several types IoT applications, including, Industrial IoT, Edge Computing, Drones, Healthcare Things, Vehicles, etc. Second, use blockchain malware/intrusion detection applications is discussed. Then, vulnerabilities systems. Finally, three...
Digital twins (DTs) are an emerging digitalization technology with a huge impact on today's innovations in both industry and research. DTs can significantly enhance our society quality of life through the virtualization real-world physical system, providing greater insights about their operations assets, as well enhancing resilience real-time monitoring proactive maintenance. also pose significant security risks, intellectual property is encoded more accessible, continued synchronization to...
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets, services that are vital for functioning well-being of a society, economy, or nation. However, rapid proliferation dynamism today's cyber threats in digital environments may disrupt CI functionalities, which would have debilitating impact on public safety, economic stability, national security. This has led much interest effective cybersecurity solutions regarding automation intelligent...
Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring managing electric power generation, transmission distribution. In the age of Internet Things, SCADA has evolved into big, complex distributed that prone to be conventional in addition new threats. Many security methods can applied such systems, having mind both high efficiency, real time intrusion identification low overhead required.
Digital devices are becoming increasingly ubiquitous and interconnected. Their evolution to intelligent parts of a digital ecosystem creates novel applications with so far unresolved security issues. A particular example is vehicle. As vehicles evolve from simple means transportation smart entities new sensing communication capabilities, they become active members city. The Internet Vehicles (IoV) consists that communicate each other public networks through V2V (vehicle-to-vehicle), V2I...
One of the barriers for adoption electric vehicles (EVs) is anxiety around limited driving range. Recent proposals have explored charging EVs on move, using dynamic wireless which enables power exchange between vehicle and grid while moving. In this paper, we focus intelligent routing in need so that they can make most efficient use so-called mobile energy disseminators (MEDs) operate as stations. We present a method MEDs road network, based constraint logic programming optimization...
Abstract There continue to be numerous breaches publicised pertaining cybersecurity despite security practices being applied within industry for many years. This paper is intended the first in a number of papers as research into assurance processes. compiled based on current related and impact human element it. The objective this work identify elements that would benefit from further development literature review findings. results outlined present need field look established areas effective...
The Electric Vehicles (EVs) market has seen rapid growth recently despite the anxiety about driving range. Recent proposals have explored charging EVs on move, using dynamic wireless that enables power exchange between vehicle and grid while is moving. Specifically, part of literature focuses intelligent routing in need charging. Inter-Vehicle communications (IVC) play an integral role around a static station or road network. However, IVC vulnerable to variety cyber attacks such as spoofing....
Existing cyber security solutions have been basically developed using knowledge-based models that often cannot trigger new cyber-attack families. With the boom of Artificial Intelligence (AI), especially Deep Learning (DL) algorithms, those plugged-in with AI to discover, trace, mitigate or respond incidents events. The algorithms demand a large number heterogeneous data sources train and validate systems. This paper presents description datasets, so-called ToN_IoT, which involve federated...
Digital twin technology today is diverse and emerging its full potential not yet widely understood. The concept of a digital allows for the analysis, design, optimisation evolution systems to take place fully digital, or in conjunction with cyber-physical system improve speed, accuracy efficiency when compared traditional engineering approaches. twins continue be that enables new paradigms, such as Industry 4.0 Factories Future well generating improved efficiencies within existing systems....