Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr Patryk Szewczyk

Senior Lecturer

Staff Member Details
Telephone: +61 8 6304 6979
Email: p.szewczyk@ecu.edu.au
Campus: Joondalup  
Room: JO18.316  
ORCID iD: https://orcid.org/0000-0003-3040-9344

Dr Patryk Szewczyk is a cyber security and digital forensics lecturer within the School of Science.

Current Teaching

  • Cyber Security
  • Introductory Computer Forensics
  • Digital Forensics
  • Wireless and Mobile Computing Security

Current Coordination

  • L50 Graduate Certificate of Cyber Security
  • J99 Graduate Certificate of Cyber Security
  • L51 Graduate Diploma of Cyber Security
  • J98 Graduate Diploma of Cyber Security
  • L33 Master of Cyber Security
  • J97 Master of Cyber Security
  • I03  Master of Digital Forensics

Professional Associations

  • Australian Computer Society (Senior Member of the ACS - Certified Professional)
  • Australian Information Security Association
  • Australian and New Zealand Forensic Science Society
  • International Association for Intelligence Education

Awards and Recognition

National and International Awards

  • 2011 WAITTA Winner - Service Delivery & Training
  • 2010 WAITTA Finalist - Security

Other

  • 2015 Best Paper Award - Australian Information Security Management Conference
  • 2009 Best Paper Award - Australian Digital Forensics Conference

Research Areas and Interests

  • Human factors of cyber security including; Human Computer Interaction (HCI-Sec), social and psychological engineering, information security education and awareness.
  • Digital forensics and incident response.
  • Cyber-crime and abuse, digital privacy and child cyber safety education.

Qualifications

  • Doctor of Philosophy, Edith Cowan University, 2015.
  • Bachelor of Science (Computer Science) First Class Honours, Edith Cowan University, 2006.
  • Bachelor of Science (Computer Science), Edith Cowan University, 2005.

Research Outputs

Journal Articles

Journal Articles

  • Al-Fawa'reh, M., Abu-Khalaf, J., Szewczyk, P., Kang, J. (2023). MalBoT-DRL: Malware Botnet Detection Using Deep Reinforcement Learning in IoT Networks. IEEE Internet of Things Journal, 2023(Article in press), 20 pages. https://doi.org/10.1109/JIOT.2023.3324053.
  • Alatram, A., Sikos, L., Johnstone, M., Szewczyk, P., Kang, JJ. (2023). DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol. Computer Networks, 231(2023), Article number 109809. https://doi.org/10.1016/j.comnet.2023.109809.
  • Shanley, L., Johnstone, M., Szewczyk, P., Crowley, M. (2023). An Exploration Of Australian Attitudes Towards Privacy. Information and Computer Security, 31(3), 353-367. https://doi.org/10.1108/ICS-11-2022-0171.

Conference Publications

  • Scott, B., Johnstone, M., Szewczyk, P. (2022). Anatomy of an Internet Hijack And Interception Attack: A Global And Educational Perspective. Annual ADFSL Conference on Digital Forensics, Security and Law (1-18). Embry-Riddle Aeronautical University.
  • Shanley, L., Johnstone, M., Szewczyk, P., Crowley, M. (2022). A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results. Human Aspects of Information Security and Assurance (228-239). Springer. https://doi.org/10.1007/978-3-031-12172-2_18.

Conference Publications

  • An, A., Szewczyk, P., Johnstone, M., Kang, J. (2021). Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms. Proc. 31st International Telecommunication Networks and Applications Conference (172-179). IEEE.
  • Scott, B., Mason, R., Szewczyk, P. (2021). A snapshot analysis of publicly available BYOD policies. ACSW '21: 2021 Australasian Computer Science Week Multiconference Proceeding (Article number 3437394). Association for Computing Machinery. https://doi.org/10.1145/3437378.3437394.

Conference Publications

  • Hansen, L., Troiani, A., Szewczyk, P. (2020). An Evaluation of Phishing Email Awareness in an Information Warfare Age. Conference Proceedings of 18th Australian Cyber Warfare Conference 2019 (CWAR 2019) (10-20). Deakin University Centre for Cyber Security Research and Innovation.
  • Shanley, L., Johnstone, M., Crowley, M., Szewczyk, P. (2020). Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?. Human Aspects of Information Security and Assurance (3-15). Springer. https://doi.org/10.1007/978-3-030-57404-8_1.

Conference Publications

  • Goodwin, B., Szewczyk, P. (2019). Demystifying the Technical and Managerial Challenges of Authentication. Proceedings of the 6th Annual Conference on Computational Science and Computational Intelligence (26-33). IEEE. https://doi.org/10.1109/CSCI49370.2019.00012.

Journal Articles

  • Szewczyk, P., Sansurooah, K., Williams, T. (2018). An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards. International Journal of Information Security and Privacy, 12(4), 82-97. https://doi.org/10.4018/IJISP.2018100106.

Journal Articles

  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M. (2017). Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13. https://doi.org/10.1016/j.diin.2017.06.015.
  • Szewczyk, P., Macdonald, R. (2017). Broadband Router Security: History, Challenges and Future Implications. Journal of Digital Forensics, Security and Law, 12(4), 55-73.

Conference Publications

  • James, M., Szewczyk, P. (2017). Jurisdictional Issues in Cloud Forensics. Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017) (225-234). University of Plymouth.
  • Szewczyk, P., Blackman, D., Sansurooah, K. (2017). An Analysis of Unauthorized Wireless Network Usage in Western Australia. Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017) (272-281). University of Plymouth.

Conference Publications

  • James, M., Szewczyk, P. (2016). Survey on remnant data research: The artefacts recovered and the implications in a cyber security conscious world. Proceedings of the 14th Australian Digital Forensics Conference (58-65). ECU Security Research Institute.
  • Sansurooah, K., Szewczyk, P., Blackman, D. (2016). Unauthorised Wireless Network Access Attempts in Western Australia. 2016 International Conference on Computational Science and Computational Intelligence Proceedings (999-1004). IEEE Computer Society. https://doi.org/10.1109/CSCI.2016.0191.

Conference Publications

  • Blackman, D., Szewczyk, P. (2015). The challenges of seizing and searching the contents of wi-fi devices for the modern investigator. Proceedings of the 13th Australian Digital Forensics Conference (37-48). Security Research Institute, Edith Cowan University.
  • Hampton, N., Szewczyk, P. (2015). A survey and method for analysing SoHo router firmware currency. Proceedings of the 13th Australian Information Security Management Conference (11-27). Security Research Institute, Edith Cowan University.

Conference Publications

  • El-Abed, J., Szewczyk, P. (2014). Persistent issues in encryption software: A heuristic and cognitive walkthrough. Proceedings of the 12th Australian Information Security Management Conference (64-74). Edith Cowan University. https://doi.org/10.4225/75/57b66416343d5.

Conference Publications

  • Szewczyk, P. (2013). Usability and security support offered through ADSL router user manuals. The Proceedings of 11th Australian Information Security Management Conference (93-101). Security Research Centre, Edith Cowan University.
  • Szewczyk, P., Robins, N., Sansurooah, K. (2013). Sellers continue to give away confidential information on second hand memory cards sold in Australia. The Proceedings of 11th Australian Digital Forensics Conference (135-140). Security Research Centre, Edith Cowan University.

Journal Articles

  • Szewczyk, P. (2012). An Australian Perspective on the Challenges for Computer and Network Security for Novice End-Users. Journal of Digital Forensics, Security and Law, 7(4), 51-72.

Conference Publications

  • Szewczyk, P. (2012). A Survey of Computer and Network Security Support from Computer Retailers to Consumers in Australia. The Proceedings of the 10th Australian Information Security Management Conference (111-117). Security Research Centre, Edith Cowan University.
  • Sansurooah, K., Szewczyk, P. (2012). A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011. Proceedings of the 10th Australian Information Security Management Conference (83-91). Security Research Centre, Edith Cowan University.
  • Szewczyk, P., Sansurooah, K. (2012). The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia. The Proceedings of the 10th Australian Digital Forensics Conference (41-46). Security Research Centre, Edith Cowan University.

Journal Articles

  • Szewczyk, P. (2011). Analysis of Data Remaining on Second Hand ADSL Routers. Journal of Digital Forensics, Security and Law, 6(3), 17-30.

Conference Publications

  • Szewczyk, P. (2011). Usability of Internet Security Software: Have They Got it Right?. Proceedings of the 2011 5th International Conference on Network and System Security (337-341). IEEE. https://doi.org/10.1109/ICNSS.2011.6060026.
  • Cook, D., Szewczyk, P., Sansurooah, K. (2011). Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens. Proceedings of the 9th Australian Information Security Management Conference (63-68). Security Research Centre, Edith Cowan University.
  • Barker, J., Hannay, P., Szewczyk, P. (2011). Using traffic analysis to identify The Second Generation Onion Router. Proceedings: 2011 Ninth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (72-78). IEEE. https://doi.org/10.1109/EUC.2011.76.
  • Cook, D., Szewczyk, P., Sansurooah, K. (2011). Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users. Proceedings of the 2nd International Cyber Resilience Conference (20 - 28). Security Research Centre, Edith Cowan University.
  • Szewczyk, P., Sansurooah, K. (2011). A 2011 investigation into remnant data on second hand memory cards sold in Australia. Proceedings of the 9th Australian Digital Forensics Conference (134-138). Security Research Centre, Edith Cowan University.
  • Andersson, K., Szewczyk, P. (2011). Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk. Proceedings of the 9th Australian Information Security Management Conference (19-24). Security Research Centre, Edith Cowan University.

Journal Articles

  • Szewczyk, P. (2010). The ADSL Router Forensics Process. Journal of Network Forensics, 2(1), 4-13.

Conference Publications

  • Szewczyk, P. (2010). Security Information Supplied by Australian Internet Service Providers. Proceedings of the 8th Australian Information Security Management Conference (143-148). Security Research Centre, Edith Cowan University.
  • Szewczyk, P., Valli, C. (2010). Ignorant experts: computer and network security support from internet service providers. Proceedings 2010 4th International Conference on Network and System Security (NSS) (323-327). IEEE. https://doi.org/10.1109/NSS.2010.42.

Journal Articles

  • Szewczyk, P. (2009). ADSL Router Forensics: Methods of Acquisition. Journal of Network Forensics, 1(1), 16-29.
  • Szewczyk, P., Valli, C. (2009). Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective. Journal of Digital Forensics, Security and Law, 4(3), 5-16.

Conference Publications

  • Szewczyk, P., Furnell, S. (2009). Assessing the Online Security Awareness of Australian Internet Users. Proceedings of the Annual Security Conference (58-1to58-9). Information Institute Publishing.
  • Szewczyk, P. (2009). ADSL Router Forensics Part 2: Acquiring Evidence. Proceedings of the 7th Australian Digital Forensics Conference (109-117). Centre for Security Research, Edith Cowan University.
  • Pydayya, K., Hannay, P., Szewczyk, P. (2009). The 2009 Personal Firewall Robustness Evaluation. Proceedings of the 7th Australian Information Security Management Conference (98-102). Centre for Security Research, Edith Cowan University.

Conference Publications

  • Szewczyk, P., Brand, MW. (2008). Malware Detection and Removal: An Examination of Personal Anti-Virus Software. Proceedings of the 6th Australian Digital Forensics Conference (189-196). Centre for Security Research, Edith Cowan University.

Conference Publications

  • Szewczyk, P. (2007). An Examination of the Asus WL-HDD 2.5 as a Nepenthes Malware Collector. Proceedings of 5th Australian Digital Forensics Conference (127-134). Edith Cowan University.
  • Szewczyk, P. (2007). ADSL Router Forensics Part 1: An Introduction to a New Source of Electronic Evidence. Proceedings of the 5th Australian Digital Forensics Conference (118-126). Edith Cowan University.

Conference Publications

  • Szewczyk, P. (2006). Individuals Perceptions of Wireless Security in the Home Environment. Proceedings of 4th Australian Information Security Management Conference (176-183). Edith Cowan University, Western Australia.
  • Szewczyk, P., Valli, C. (2006). Personal Firewalls - Testing Robustness. Proceedings of the 4th Australian Digital Forensics Conference (105-112). Edith Cowan University.

Research Projects

  • BGP Anomaly Detection: A Multi-dimensional Investigation, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Top Up Scholarship, 2021 ‑ 2024, $105,000.
  • Forensic Identification of Deep Fakes, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2021 ‑ 2024, $105,000.
  • Advanced File Carving Extension for X-Ways Forensics Software, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Top Up Scholarship, 2021 ‑ 2024, $105,000.
  • Developing and Testing a Forensic Framework for Civilian Unmanned Aerial Vehicles, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2021 ‑ 2023, $120,000.
  • Forensic Investigation of Wireless Medical Systems, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 ‑ 2021, $120,000.
  • Academic Centre of Cyber Security Excellence, Department of Education, Academic Centres of Cyber Security Excellence, 2017 ‑ 2021, $950,287.

Research Student Supervision

Co-principal Supervisor

  • Doctor of Philosophy, An evolved file carving extension for X-ways forensics software
  • Doctor of Philosophy, Advancing BGP Anomaly Detection: Employing Matrix Profile and Multidimensional Recurrence Quantification Analysis BGP Anomaly Detection with Reduced Parameter Complexity

Associate Supervisor

  • Doctor of Philosophy, Self-Updating Intrusion Detection System using Reinforcement Learning
  • Doctor of Philosophy, Attitudes and Perceptions Towards Privacy and Surveillance in Australia
  • Doctor of Philosophy, Artificial intelligence audio upscaling by addition of prosody

Principal Supervisor

  • Master of Computing and Security by Research, Developing and testing a forensic framework for civilian unmanned aerial vehicles

Co-principal Supervisor

  • Master of Computing and Security by Research, Forensic Analysis on Wireless Medical Devices

Associate Supervisor

  • Master of Computing and Security by Research, A Forensic framework for Detecting Denial-of-Service Attacks in IoT Networks Using the MQTT Protocol
  • Master of Science (Computer Science), An Investigation into the Efficacy of URL Content Filtering Systems
Skip to top of page