- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Cloud Data Security Solutions
- Access Control and Trust
- Privacy, Security, and Data Protection
- Blockchain Technology Applications and Security
- Advanced Malware Detection Techniques
- Advanced Steganography and Watermarking Techniques
- Opportunistic and Delay-Tolerant Networks
- IoT and Edge/Fog Computing
- Information and Cyber Security
- Caching and Content Delivery
- User Authentication and Security Systems
- Security and Verification in Computing
- Anomaly Detection Techniques and Applications
- Network Packet Processing and Optimization
- Advanced MIMO Systems Optimization
- Spam and Phishing Detection
- Adversarial Robustness in Machine Learning
- Smart Grid Security and Resilience
- Advanced Authentication Protocols Security
- Molecular Communication and Nanonetworks
- Vehicular Ad Hoc Networks (VANETs)
University of Auckland
2015-2024
University of Surrey
2023-2024
University of Balochistan
2022
Information Technology University
2022
University of Glasgow
2020
Center for Research and Telecommunication Experimentation for Networked Communities
2011-2014
University of Trento
2012-2013
Automated and smart meters are devices that able to monitor the energy consumption of electricity consumers in near real-time. They considered key technological enablers grid, as real-time data they can collect could enable new sophisticated billing schemes, facilitate more efficient power distribution system operation give rise a variety value-added services. At same time, sensitive consumer information; thus, privacy is concern major inhibitor collection practice. In this paper, we review...
Network-based Intrusion Detection System (NIDS) forms the frontline defence against network attacks that compromise security of data, systems, and networks. In recent years, Deep Neural Networks (DNNs) have been increasingly used in NIDS to detect malicious traffic due their high detection accuracy. However, DNNs are vulnerable adversarial modify an input example with imperceivable perturbation, which causes a misclassification by DNN. security-sensitive domains, such as NIDS, pose severe...
Information security has been an area of research and teaching within various computing disciplines in higher education almost since the beginnings modern computers. The need for curricula steadily grown over this period. Recently, with emerging global crisis, because limitations nascent information technology infrastructure, field "cybersecurity" is international interest support. Recent evolution cybersecurity shows that it begun to take shape as a true academic perspective, opposed simply...
For the easy and flexible management of large scale networks, Software-Defined Networking (SDN) is a strong candidate technology that offers centralisation programmable interfaces for making complex decisions in dynamic seamless manner. On one hand, there are opportunities individuals businesses to build improve services applications based on their requirements SDN. other SDN poses new array privacy security threats, such as Distributed Denial Service (DDoS) attacks. detecting mitigating...
The process of identifying the true anomalies from a given set data instances is known as anomaly detection. It has been applied to address diverse problems in multiple application domains including cybersecurity. Deep learning recently demonstrated state-of-the-art performance on key detection applications, such intrusion detection, Denial Service (DoS) attack security log analysis, and malware Despite great successes achieved by neural network architectures, models with very low test error...
Wireless body area networks (WBANs) play a vital role in shaping today's healthcare systems. Given the critical nature of WBAN one's health to automatically monitor and diagnose issues, security privacy these systems need special attention. In this paper, we first propose novel four-tier architecture remote monitoring system then identify requirements challenges at each tier. We provide concise survey literature aimed improving WBANs present comprehensive overview problem. particular, stress...
In New Zealand, there is currently no shared Electronic Health Record (EHR) system integrated between major healthcare organisations, such as hospitals, medical centres, and specialists. Thanks to its characteristics, blockchain technology can be a suitable platform for building large-scale EHR Zealand. this paper, we present MedBloc, blockchain-based secure that enables patients providers access share health records in usable yet privacy-preserving manner. MedBloc captures longitudinal view...
Software-Defined Networking (SDN) and Internet of Things (IoT) are the trends network evolution. SDN mainly focuses on upper level control management networks, while IoT aims to bring devices together enable sharing monitoring real-time behaviours through connectivity. On one hand, enables us gather status networks them remotely. other rapidly growing number challenges at access backbone layer raises security concerns attacks, such as Distributed Denial Service (DDoS). The combination leads...
Cloud computing is an emerging paradigm offering companies (virtually) unlimited data storage and computation at attractive costs. It a cost-effective model because it does not require deployment maintenance of any dedicated IT infrastructure. Despite its benefits, introduces new challenges for protecting the confidentiality data. Sensitive like medical records, business or governmental cannot be stored unencrypted on cloud. Companies need mechanisms to control access outsourced allow users...
Location-based services (LBS) in smart cities have drastically altered the way operate, giving a new dimension to life of citizens. LBS rely on location device, where proximity estimation remains at its core. The applications range from social networking and marketing vehicle-to-everything communications. In many these applications, there is an increasing need trend learn physical distance between nearby devices. This paper elaborates upon current needs compares them against available...
Network Intrusion Detection Systems (NIDSes) are crucial for securing various networks from malicious attacks. Recent developments in Deep Neural Networks (DNNs) have encouraged researchers to incorporate DNNs as the underlying detection engine NIDS. However, susceptible adversarial attacks, where subtle modifications input data result misclassification, posing a significant threat security-sensitive domains such Existing efforts defenses predominantly focus on supervised classification...
In New Zealand, the demand for healthcare services has grown gradually in last decade, and it is likely to increase further. This had led issues such as increasing treatment costs processing time patients. To address growing pressure sector, its fragmented IT landscape that compounds problems further, Zealand Ministry of Health aims establish a shared Electronic Record (EHR) system integrates all major organisations hospitals, medical centres, specialists. Due characteristics, blockchain...
A Content Delivery Network (CDN) is a distributed system composed of large number nodes that allows users to request objects from nearby nodes. CDN not only reduces end-to-end latency on the user side but also offloads Providers (CPs), providing resilience against Distributed Denial Service (DDoS) attacks. However, by caching and processing requests, providers could infer preferences popularity objects, thus resulting in information leakage. Unfortunately, such leakage may result loss...
In blockchain-based systems, malicious behaviour can be detected using auditable information in transactions managed by distributed ledgers. Besides cryptocurrency, blockchain technology has recently been used for other applications, such as file storage. However, most of existing blockchain- based storage systems not revoke a user efficiently when multiple users have access to the same that is encrypted. Actually, they need update encryption keys and distribute new remaining users, which...