ECU offers innovative and practical courses across a variety of disciplines and we have a vibrant research culture. ECU is a leader in developing alternative entry pathways to higher education.
We have three campuses in Western Australia. Joondalup and City Campus in the Perth metropolitan area and our South West campus in Bunbury, 200km south of the Perth CBD.
ECU provides a variety of services and facilities that go beyond the classroom, with opportunities for personal development and social interaction for students and staff.
We collaborate with all types of businesses, including new start-ups, small to medium enterprises, not-for-profits, community organisations, government and large corporates in the resources sector.
Children's University Edith Cowan aims to inspire students between seven and fourteen to develop confidence and a love of learning through validated activities beyond the school curriculum.
The Inspiring Minds scholarship program are equity scholarships that give students an opportunity to access an education that may otherwise be out of reach.
Shannahan, J., Ahmed, M. (2025). Infusing Aboriginal Perspectives in Cyber Education. EAI Endorsed Transactions on e-Learning, 11(1), 8 pages. https://doi.org/10.4108/eetel.5779.
Gaber, M., Ahmed, M., Janicke, H. (2025). Zero day ransomware detection with Pulse: Function classification with Transformer models and assembly language. Computers & Security, 148(2025), article number 104167. https://doi.org/10.1016/j.cose.2024.104167.
Gaber, M., Ahmed, M., Janicke, H. (2025). Defeating evasive malware with Peekaboo: Extracting authentic malware behavior with dynamic binary instrumentation. Journal of Information Security and Applications, 95(104290), 1-18. https://doi.org/10.1016/j.jisa.2025.104290.
Johnstone, M., Yang, W., Ahmed, M. (2025). Using Machine Learning to Detect Vault (Anti-Forensic) Apps. Future Internet, 17(5), Article number 186. https://doi.org/10.3390/fi17050186.
Gaber, M., Ahmed, M., Janicke, H. (2025). Zero day malware detection with Alpha: Fast DBI with Transformer models for real world application. Computers and Electrical Engineering, 128, Part B(110751), 1-22. https://doi.org/10.1016/j.compeleceng.2025.110751.
Ullah, AB., Ma, W., Ahmed, M., Rashid, B., Saeed, M., Arshad, O., Raghav, U. (2025). A comprehensive review of cyber security and current practices in global mining critical infrastructure. Journal of Cyber Security Technology, 2025(article in press), 27 pages. https://doi.org/10.1080/23742917.2025.2475563.
Conference Publications
Hui, X., Karumba, S., Chau, SC., Ahmed, M. (2025). Destabilizing Power Grid and Energy Market by Cyberattacks on Smart Inverters. E-Energy '25: Proceedings of the 16th ACM International Conference on Future and Sustainable Energy Systems (136-151). Association for Computing Machinery. https://doi.org/10.1145/3679240.3734613.
Moonsamy, A., Ahmed, M., Guidetti, O., Rashid, B. (2024). The Human Firewall: Mitigating Ransomware Risks in Critical Infrastructures through Human-Centric Approaches. Ransomware Evolution (192-207). CRC Press. https://doi.org/10.1201/9781003469506-14.
Moonsamy, A., Ahmed, M., Guidetti, O., Rashid, B. (2024). Integrating human factors and systemic resilience: An interdisciplinary approach to cybersecurity in critical infrastructures and utilities. Psybersecurity: Human Factors of Cyber Defence (1-34). CRC Press. https://doi.org/10.1201/9781032664859-1.
Journal Articles
Ahmed, M., Gaber, M. (2024). An investigation on cyber espionage ecosystem. Journal of Cyber Security Technology, 2024(Article in press), 25 pages. https://doi.org/10.1080/23742917.2024.2399389.
Gaber, M., Ahmed, M., Janicke, H. (2024). Malware Detection with Artificial Intelligence: A Systematic Literature Review. ACM Computing Surveys, 56(6), article number 148. https://doi.org/10.1145/3638552.
Rashid, SM., Haq, A., Hasan, ST., Furhad, MH., Ahmed, M., Barkat, A. (2024). Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot. Wireless Networks: the journal of mobile communication, computation and information, 30(5), 4527-4541. https://doi.org/10.1007/s11276-022-03057-y.
Ahmed, M., Rashid, B. (2024). EDSUCh: A Robust Ensemble Data Summarization Method for Effective Medical Diagnosis. Digital Communications and Networks, 10(1), 182-189. https://doi.org/10.1016/j.dcan.2022.07.007.
Dart, M., Ahmed, M. (2024). Operational shock: A method for estimating cyber security incident costs for large Australian healthcare providers. Journal of Cyber Security Technology, 8(4), 260-285. https://doi.org/10.1080/23742917.2023.2291914.
Hur, A., Janjua, N., Ahmed, M. (2024). Unifying context with labeled property graph: A pipeline-based system for comprehensive text representation in NLP. Expert Systems with Applications, 239(2024), article number 122269. https://doi.org/10.1016/j.eswa.2023.122269.
Conference Publications
Karumba, S., Chau, SC., Pearce, H., Ahmed, M., Janicke, H. (2024). Systematic Study of Cybersecurity Threats for Smart Inverters. Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems (669–675). Association for Computing Machinery. https://doi.org/10.1145/3632775.3661994.
Lu, X., Yan, S., Huang, Y., Zhang, Y., Ahmed, M. (2024). Channel Truncation Inspired Short-Packet Covert Communication with Poisson Packet Generation. 2023 International Conference on Wireless Communications and Signal Processing (WCSP) (737-742). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/WCSP58612.2023.10405142.
Venkateswaran, T., Islam, SR., Hasan, MG., Ahmed, M. (2024). Aiming to Minimize Alcohol-Impaired Road Fatalities: Utilizing Fairness-Aware and Domain Knowledge-Infused Artificial Intelligence. Proceedings - 2023 IEEE International Conference on Big Data, BigData 2023 (4205-4212). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/BigData59044.2023.10386464.
Griffiths, T., Ahmed, M., Yan, S. (2024). WIP: Performance Metrics of PUF-based Authentication Protocols for Smart Grid: A Review. 2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) (4 pages). IEEE. https://doi.org/10.1109/WoWMoM60985.2024.00012.
Lamers, C., Spoerl, E., Levey, G., Choudhury, N., Ahmed, M. (2023). Ransomware: A Threat to Cyber Smart Cities. Cybersecurity for Smart Cities: Practices and Challenges (185–204). Springer. https://doi.org/10.1007/978-3-031-24946-4_13.
Akhter, AF., Hizal, S., Arnob, TZ., Noor, EB., Surid, E., Ahmed, M. (2023). An EDGE Supported Ambulance Management System for Smart Cities. Cybersecurity for Smart Cities: Practices and Challenges (151-168). Springer. https://doi.org/10.1007/978-3-031-24946-4_11.
Zubair, M., Zubair, S., Ahmed, M. (2023). Cyberbullying Instilled in Social Media. Cybersecurity for Smart Cities: Practices and Challenges (17-29). Springer. https://doi.org/10.1007/978-3-031-24946-4_2.
Zubair, S., Zubair, M., Ahmed, M. (2023). Investigation on the Infusion of Cybersecurity and Smart City. Cybersecurity for Smart Cities: Practices and Challenges (1-15). Springer. https://doi.org/10.1007/978-3-031-24946-4_1.
Mondol, A., Sultana, J., Ahmed, M., Rashid, B. (2023). Misinformation Detection in Cyber Smart Cities. Cybersecurity for Smart Cities: Practices and Challenges (105-120). Springer. https://doi.org/10.1007/978-3-031-24946-4_8.
Rashid, B., Ahmed, M., Barkat Ullah, A. (2023). Cyber Safe Data Repositories. Cybersecurity for Smart Cities: Practices and Challenges (87-103). Springer. https://doi.org/10.1007/978-3-031-24946-4_7.
Journal Articles
Rahman, MM., Khan, NI., Sarker, MI., Ahmed, M., Islam, MN. (2023). Leveraging machine learning to analyze sentiment fromCOVID-19 tweets: A global perspective. Engineering Reports, 5(3), article number e12572. https://doi.org/10.1002/eng2.12572.
Suleski, T., Ahmed, M., Yang, W., Wang, E. (2023). A review of multi-factor authentication in the Internet of Healthcare Things. Digital Health, 9(2023), pp. https://doi.org/10.1177/20552076231177144.
Al Amin, S., Mukta , MS., Saikat, MS., Hossain, MI., Islam, MA., Ahmed, M., Azam, S. (2023). Data Driven Classification of Opioid Patients Using Machine Learning-An Investigation. IEEE Access, 11(2023), 396-409. https://doi.org/10.1109/ACCESS.2022.3230596.
Ahmed, M., Akhter, AF., Rashid, B., Pathan, AK. (2023). A dependable and secure consensus algorithm for blockchain assisted microservice architecture. Computers and Electrical Engineering, 109(August 2023), Article number 108762. https://doi.org/10.1016/j.compeleceng.2023.108762.
Dart, M., Ahmed, M. (2023). CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology. Digital Health, 9(2023), pp. https://doi.org/10.1177/20552076231191095.
Hasan, MT., Hossain, MA., Hossain Mukta, MS., Akter, A., Ahmed, M., Islam, S. (2023). A Review on Deep-Learning-Based Cyberbullying Detection. Future Internet, 15(5), Article number 179. https://doi.org/10.3390/fi15050179.
Dart, M., Ahmed, M. (2023). Evaluating Staff Attitudes, Intentions, and Behaviors Related to Cyber Security in Large Australian Health Care Environments: Mixed Methods Study. JMIR Human Factors, 10(1), Article number e48220. https://doi.org/10.2196/48220.
Stroebel, L., Llewellyn, M., Hartley, T., Ip, S., Ahmed, M. (2023). A systematic literature review on the effectiveness of deepfake detection techniques. Journal of Cyber Security Technology, 7(2), 83-113. https://doi.org/10.1080/23742917.2023.2192888.
Suleski, T., Ahmed, M. (2023). A Data Taxonomy for Adaptive Multifactor Authentication in the Internet of Health Care Things. Journal of Medical Internet Research, 25(2023), article number e44114. https://doi.org/10.2196/44114.
Conference Publications
Ahmed, M., Pagutaisidro, C., Pike, A., Yang, Y., Pathan, AK. (2023). RansomCoin: A New Dataset for Analysing Cryptocurrency Transactions - Addressing a Gap in The Literature. The 2023 International Workshop on AI-Driven Trustworthy, Secure, and Privacy-Preserving Computing (AidTSP 2023) (article in press). IEEE. https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225797.
Moonsamy, A., Ahmed, M. (2023). Developing a Comprehensive Risk Management Framework for E-Health Care Delivery. 12th International Conference on Health Information Science (HIS 2023) (101-111). Springer Nature. https://doi.org/10.1007/978-981-99-7108-4_9.
Dart, M., Ahmed, M. (2023). Australia’s Notifiable Data Breach Scheme: An Analysis of Risk Management Findings for Healthcare. 12th International Conference on Health Information Science (HIS 2023) (65-78). Springer Nature. https://doi.org/10.1007/978-981-99-7108-4_6.
Ahmed, M., Rashid, B., Pathan, AK. (2023). Ransomware 3.0 – A Weapon for Next Generation Information Warfare. International Conference on Cryptology & Network Security with Machine Learning (article in press). Springer. https://ro.ecu.edu.au/ecuworks2022-2026/2485.
Saeed, MA., Rashid, T., Ahmed, M. (2022). Enabling Corporate and Institutional Governance for Effective IT Governance. Next-Generation Enterprise Security and Governance (47-68). CRC Press. https://doi.org/10.1201/9781003121541-2.
Ahmed, M., Zubair, S. (2022). Explainable Artificial Intelligence in Sustainable Smart Healthcare. Explainable Artificial Intelligence for Cyber Security (265-280). Springer. https://doi.org/10.1007/978-3-030-96630-0_12.
Ahmed, M., Martin, C., Walker, T., Van Rooyen, J. (2022). False Information in a Post Covid-19 World. Combating Fake News with Computational Intelligence Techniques (369-385). Springer. https://doi.org/10.1007/978-3-030-90087-8_18.
Rashid, B., Ahmed, M., Barkat Ullah, AS. (2022). Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security. Next-Generation Enterprise Security and Governance (135-162). CRC Press. https://doi.org/10.1201/9781003121541-6.
Jindal, R., Falah, A., Anwar, A., Ahmed, M. (2022). Privacy-preserving analytics for social network data: A survey of currently prevalent tools. Securing Social Networks in Cyberspace (17-34). CRC Press. https://doi.org/10.1201/9781003134527.
Khan, SU., Eusufzai, F., Redwan, MA., Ahmed, M., Sabuj, SR. (2022). Artificial Intelligence for Cyber Security: Performance Analysis of Network Intrusion Detection. Explainable Artificial Intelligence for Cyber Security (113-139). Springer. https://doi.org/10.1007/978-3-030-96630-0_6.
Journal Articles
Ahmed, M., Bachmann , S., Barkat Ullah, A., Barnett, S. (2022). Ransomware 2.0: an emerging threat to national security. Australian Journal of Defence and Strategic Studies, 4(1), 125–132. https://doi.org/10.51174/AJDSS.0401/EMQH2521.
Ahmed, M., Bachmann, S., Martin, C., Walker, T., Van Rooyen, J., Barkat, A. (2022). False Information as a Threat to Modern Society: A Systematic Review of False Information, Its Impact on Society, and Current Remedies. Journal of Information Warfare, 21(2), 105-120. https://ro.ecu.edu.au/ecuworks2022-2026/1302.
Ahmed, M., Cox, D., Simpson, B., Aloufi, A. (2022). ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things. Applied Sciences, 12(4), article number 1990. https://doi.org/10.3390/app12041990.
Ahmed, M., Moustafa, N., Akhter, AF., Razzak, I., Surid, E., Anwar, A., Shah, AF., Zengin, A. (2022). A Blockchain-Based Emergency Message Transmission Protocol for Cooperative VANET. IEEE Transactions on Intelligent Transportation Systems, 23(10), 19624-19633. https://doi.org/10.1109/TITS.2021.3115245.
Akhter, AF., Ahmed, M., Anwar, A., Shah, AF., Pathan, AK., Zengin, A. (2022). Blockchain in Vehicular Ad hoc Networks: Applications, Challenges and Solutions. International Journal of Sensor Networks, 40(2), 94-130. https://doi.org/10.1504/ijsnet.2022.126340.
Mursalin, M., Ahmed, M., Haskell-Dowland, P. (2022). Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model. Sensors, 22(2022), Article Number 8988. https://doi.org/10.3390/s22228988.
Riddell, L., Ahmed, M., Haskell-Dowland, P. (2022). Establishment and mapping of heterogeneous anomalies in network intrusion datasets. Connection Science, 34(1), 2755-2783. https://doi.org/10.1080/09540091.2022.2151568.
Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P. (2022). Anomaly Detection in Cybersecurity Datasets via Cooperative Co-Evolution-Based Feature Selection. ACM Transactions on Management Information Systems, 13(3), 1-39. https://doi.org/10.1145/3495165.
Conference Publications
Rahman, S., Suleski, T., Ahmed, M., Kayes, AS. (2022). An Investigation of Vulnerabilities in Internet of Health Things. Cognitive Radio Oriented Wireless Networks and Wireless Internet (296–306). Springer. https://doi.org/10.1007/978-3-030-98002-3_22.
Rashid, B., Ahmed, M., Islam, SR. (2022). A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 Dataset. Communications in Computer and Information Science (279–291). Springer Nature. https://doi.org/10.1007/978-981-19-0468-4_21.
Ahmed, M., Akhter, AF., Rashid, B., Fahmideh , M., Pathan, AK., Anwar, A. (2022). Blockchain Meets Secured Microservice Architecture: A Trustworthy Consensus Algorithm. Proceedings of the 19th International Conference on Wireless Networks and Mobile Systems (53-60). SCITEPRESS – Science and Technology Publications, Lda..
Evans, K., Abuadbba, A., Wu, T., Moore, K., Ahmed, M., Pogrebna, G., Nepal, S., Johnstone, M. (2022). RAIDER: Reinforcement-Aided Spear Phishing Detector. Lecture Notes in Computer Science (23-50). Springer. https://doi.org/10.1007/978-3-031-23020-2_2.
Rashid, SM., Haq, A., Hasan, ST., Furhad, MH., Ahmed, M., Barkat Ullah, AS. (2022). Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat Landscape. Cognitive Radio Oriented Wireless Networks and Wireless Internet (307–324). Springer. https://doi.org/10.1007/978-3-030-98002-3_23.
Vishavnath, S., Anwar, A., Ahmed, M. (2021). Machine learning based Cyber-security defense at the age of Industry 4.0. Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (355-369). Springer. https://doi.org/10.1007/978-3-030-72065-0.
Journal Articles
Aurisch, R., Ahmed, M., Barkat, A. (2021). An outlook at Agile methodologies for the independent games developer. International Journal of Computers and Applications, 43(8), 812-818. https://doi.org/10.1080/1206212X.2019.1621463.
Akhter, AF., Ahmed, M., Shah, AF., Anwar, A., Zengin, A. (2021). A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET. Sustainability, 13(1), 1-25. https://doi.org/10.3390/su13010400.
Ahmed, M., Byreddy, S., Nutakki, A., Sikos, L., Haskell-Dowland, P. (2021). ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things. Ad Hoc Networks, 122(1 November 2021), Article number 102621. https://doi.org/10.1016/j.adhoc.2021.102621.
Akhter, AF., Shah, AF., Ahmed, M., Moustafa, N., Çavu¸soglu, U., Zengin, A. (2021). A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks. Computers, Materials and Continua, 68(1), 229–246. https://doi.org/10.32604/cmc.2021.015447.
Rashid, B., Ahmed, M., Pathan, AK. (2021). Infrequent Pattern Detection for Reliable Network Traffic Analysis Using Robust Evolutionary Computation. Sensors, 21(9), Article number 3005. https://doi.org/10.3390/s21093005.
Ahmed, M., Zubair, S., Akhter, AS., Ullah, AS. (2021). Yet another investigation on blockchain in smart healthcare. International Journal of Agile Systems and Management, 14(4), 614-634. https://doi.org/10.1504/IJASM.2021.120243.
Yang, W., Wang, S., Bin Sahri, NM., Karie, N., Ahmed, M., Valli, C. (2021). Biometrics for Internet‐of‐Things Security: A Review. Sensors, 21(18), Article number 6163. https://doi.org/10.3390/s21186163.
Akhter, AF., Ahmed, M., Shah, AF., Anwar, A., Kayes , AS., Zengin, A. (2021). A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network. Sensors, 21(4), Article number 1273. https://doi.org/10.3390/s21041273.
Conference Publications
Hur, A., Janjua, N., Ahmed, M. (2021). A Survey on State-of-the-art Techniques for Knowledge Graphs Construction and Challenges ahead. Proceedings - 2021 IEEE 4th International Conference on Artificial Intelligence and Knowledge Engineering, AIKE 2021 (99-103). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/AIKE52691.2021.00021.
Chong, K., Ahmed, M., Islam, S. (2020). An Investigation of Performance Analysis of Machine Learning-Based Techniques for Network Anomaly Detection. Security Analytics for the Internet of Everything (117-156). CRC Press.
Al Fahdi, H., Ahmed, M. (2020). Cryptographic Attacks, Impacts and Countermeasures. Security Analytics for the Internet of Everything (217-232). CRC Press.
Sadik, S., Ahmed, M., Hassan, MH. (2020). Blockchain in Healthcare. Blockchain in Data Analytics (234-253). Cambridge Scholars Publishing.
Saeed, M., Rashid, T., Ahmed, M. (2020). A Benefits Realization Approach to Cyber Security Projects Implementation in the Public Sector Organizations. Security Analytics for the Internet of Everything (93-114). CRC Press.
Seraj, R., Ahmed, M. (2020). Concept Drift for Big Data. Combating Security Challenges in the Age of Big Data (29-43). Springer. https://doi.org/10.1007/978-3-030-35642-2_2.
Furhad, MH., Sadik, S., Ahmed, M., Barkat, A. (2020). Exploring E-Commerce in Cyber Security Context Through Blockchain Technology. Blockchain in Data Analytics (216-233). Cambridge Scholars Publishing.
Rashid, T., Saeed, M., Ahmed, M. (2020). A New Era of Project Management Using Blockchain Technology. Blockchain in Data Analytics (102-121). Cambridge Scholars Publishing.
Bostami, B., Ahmed, M. (2020). Blockchain for Internet of Things. Blockchain in Data Analytics (24-51). Cambridge Scholars Publishing.
Bostami, B., Ahmed, M. (2020). Deep Learning Meets Malware Detection: An Investigation. Combating Security Challenges in the Age of Big Data (137-155). Springer. https://doi.org/10.1007/978-3-030-35642-2_7.
Journal Articles
Ahmed, M., Seraj, R., Islam, S. (2020). The k-means Algorithm: A Comprehensive Survey and Performance Evaluation. Electronics, 9(8), article number 1295. https://doi.org/10.3390/electronics9081295.
Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P. (2020). Cooperative co-evolution for feature selection in Big Data with random feature grouping. Journal of Big Data, 7(1), Article number 107. https://doi.org/10.1186/s40537-020-00381-y.
Ahmed, M., Pathan, A. (2020). Deep learning for collective anomaly detection. International Journal of Computational Science and Engineering, 21(1), 137-145. https://doi.org/10.1504/IJCSE.2020.105220.
Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P. (2020). A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data using Cooperative Co-Evolution. IEEE Access, 8(2020), 150113-150129. https://doi.org/10.1109/ACCESS.2020.3016679.
Sadik, S., Ahmed, M., Sikos, L., Islam, AN. (2020). Toward a Sustainable Cybersecurity Ecosystem. Computers, 9(3), 1-17. https://doi.org/10.3390/computers9030074.
Ahmed, M., Pathan, M. (2020). False Data Injection Attack (FDIA): An Overview and New Metrics for Fair Evaluation of its Countermeasure. Complex Adaptive Systems Modeling, 8(1), Article number 4. https://doi.org/10.1186/s40294-020-00070-w.
Conference Publications
Furhad, MH., Ahmed, M., Barkat, A. (2020). A Study on Monitoring Coastal Areas for Having a Better Underwater Surveillance Perspective. Proceedings of International Joint Conference on Computational Intelligence IJCCI 2018 (163-174). Springer. https://doi.org/10.1007/978-981-13-7564-4_14.
Moustafa, N., Ahmed, M., Ahmed, S. (2020). Data Analytics-Enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (727-735). IEEE. https://doi.org/10.1109/TrustCom50675.2020.00100.
Rashid, MM., Kamruzzaman, J., Ahmed, M., Islam, N., Wibowo, S., Gordon, S. (2020). Performance Enhancement of Intrusion detection System Using Bagging Ensemble Technique with Feature Selection. 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) (1-5). IEEE. https://doi.org/10.1109/CSDE50874.2020.9411608.
Ahmed, M., Choudhury, S., Al-Turjman, F. (2019). Big Data Analytics for Intelligent Internet of Things. Artificial Intelligence in IoT (107-127). Springer. https://doi.org/10.1007/978-3-030-04110-6.
Bostami, B., Ahmed, M., Choudhury, S. (2019). False Data Injection Attacks in Internet of Things. Performability in Internet of Things (47-58). Springer. https://doi.org/10.1007/978-3-319-93557-7.
Journal Articles
Yang, J., Hasan Onik, MM., Lee, N., Ahmed, M., Kim, C. (2019). Proof-of-Familiarity: A Privacy-Preserved Blockchain Scheme for Collaborative Medical Decision-Making. Applied Sciences, 9(7), Article no.1370. https://doi.org/10.3390/app9071370.
Khandaker, S., Hussain, A., Ahmed, M. (2019). Effectiveness of Hard Clustering Algorithms for Securing Cyber Space. Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018 Proceedings (113-120). Springer, Cham. https://doi.org/10.1007/978-3-030-05928-6_11.
Ahmed, M., Barkat, A. (2019). Performance Analysis of Hard Clustering Techniques for Big IoT Data Analytics. Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019 (62-66). IEEE. https://doi.org/10.1109/CCC.2019.000-8.
Saeed, M., Ahmed, M. (2019). Evaluation Metrics for Big Data Project Management. Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018 Proceedings (139-142). Springer. https://doi.org/10.1007/978-3-030-05928-6_14.
Ahmed, M., Pathan, AK. (2019). Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study. Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers (211--219). Springer. https://doi.org/10.1007/978-981-13-5826-5_15.
Ahmed, M., Haque, N. (2018). Anomaly Detection and Big Data in IPTV Networks. IPTV Delivery Networks: Next Generation Architectures for Live and Video-on-Demand Services (). John Wiley & Sons.
Saeed, M., Ahmed, M. (2018). Project Management for Effective Data Analytics. Data Analytics Concepts, Techniques, and Applications (219-234). CRC Press. https://doi.org/10.1201/9780429446177-9.
Bostami, B., Ahmed, M. (2018). Intrusion Detection for Big Data. Data Analytics Concepts, Techniques, and Applications (375-402). CRC Press. https://doi.org/10.1201/9780429446177-15.
Hassan, MM., Ahmed, M. (2018). Blockchain in the Era of Industry 4.0. Data Analytics Concepts, Techniques, and Applications (235-273). CRC Press. https://doi.org/10.1201/9780429446177-10.
Ahmed, M., Barkat, A. (2018). Health Care Security Analytics. Data Analytics Concepts, Techniques, and Applications (403-416). CRC Press. https://doi.org/10.1201/9780429446177-16.
Journal Articles
Ahmed, M. (2018). Collective Anomaly Detection Techniques for Network Traffic Analysis. Annals of Data Science, 5(4), 497-512. https://doi.org/10.1007/s40745-018-0149-0.
Ahmed, M. (2018). Reservoir-based network traffic stream summarization for anomaly detection. Pattern Analysis and Applications, 21(2), 579-599. https://doi.org/10.1007/s10044-017-0659-y.
Ahmed, M., Barkat, A. (2018). Infrequent pattern mining in smart healthcare environment using data summarization. Journal of Supercomputing, 74(10), 5041-5059. https://doi.org/10.1007/s11227-018-2376-8.
Conference Publications
Ahmed, M., Ullah, A. (2018). False Data Injection Attacks in Healthcare. Data Mining. AusDM 2017. Communications in Computer and Information Science, vol 845 (192-202). Springer. https://doi.org/10.1007/978-981-13-0292-3_12.
Ahmed, M. (2017). Infrequent Pattern Identification in SCADA Systems Using Unsupervised Learning. Security Solutions and Applied Cryptography in Smart Grid Communications (215-225). IGI Global. https://doi.org/10.4018/978-1-5225-1829-7.ch011.
Journal Articles
Ahmed, M. (2017). An Unsupervised Approach of Knowledge Discovery from Big Data in Social Network. EAI Endorsed Transactions on Scalable Information Systems, 4(14), article no. e3. https://doi.org/10.4108/eai.25-9-2017.153148.
Ahmed, M. (2017). Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering. Computer, 50(9), 76-82. https://doi.org/10.1109/MC.2017.3571051.
Conference Publications
Ahmed, M., Choudhury, N., Uddin, S. (2017). Anomaly detection on big data in financial markets. ASONAM '17 Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 (998-1001). ACM. https://doi.org/10.1145/3110025.3119402.
Ahmed, M., Mahmood, A., Islam, MR. (2016). A survey of anomaly detection techniques in financial domain. Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications, 55(1 February 2016), 278-288. https://doi.org/10.1016/j.future.2015.01.001.
Ahmed, M., Mahmood, A., Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60(1 January 2016), 19-31. https://doi.org/10.1016/j.jnca.2015.11.016.
Ahmed, M., Anwar, A., Mahmood, A., Shah, Z., Maher, M. (2015). An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2(3), article no. e5. https://doi.org/10.4108/inis.2.3.e5.
Ahmed, M., Mahmood, A., Maher, M. (2015). An Efficient Technique for Network Traffic Summarization using Multiview Clustering and Statistical Sampling. EAI Endorsed Transactions on Scalable Information Systems, 2(5), article no. e4. https://doi.org/10.4108/sis.2.5.e4.
Ahmed, M., Mahmood, A. (2015). Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection. Annals of Data Science, 2(1), 111-130. https://doi.org/10.1007/s40745-015-0035-y.
Conference Publications
Ahmed, M., Mahmood, A., Maher, M. (2015). Heart Disease Diagnosis Using Co-clustering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (61-70). Springer, Cham. https://doi.org/10.1007/978-3-319-16868-5_6.
Ahmed, M., Mahmood, A. (2015). Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (204-219). Springer, Cham. https://doi.org/10.1007/978-3-319-23802-9_17.
Ahmed, M., Mahmood, A., Maher, M. (2015). An Efficient Approach for Complex Data Summarization Using Multiview Clustering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (38-47). Springer, Cham. https://doi.org/10.1007/978-3-319-16868-5_4.
Ahmed, M., Mahmood, A., Maher, M. (2015). A Novel Approach for Network Traffic Summarization. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (51-60). Springer, Cham. https://doi.org/10.1007/978-3-319-16868-5_5.
Anwar, A., Mahmood, A., Ahmed, M. (2015). False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (252-266). Springer, Cham. https://doi.org/10.1007/978-3-319-23802-9_20.
Ahmed, M., Mahmood, A. (2014). Network traffic analysis based on collective anomaly detection. 2014 9th IEEE Conference on Industrial Electronics and Applications (1141–1146). IEEE.
Ahmed, M., Mahmood, A. (2014). Clustering based semantic data summarization technique: A new approach. 2014 9th IEEE Conference on Industrial Electronics and Applications (1780-1785). IEEE.
Research Projects
Dark Web Analytics for Ransomware Threat Actor Profiling, Commonwealth Scientific and Industrial Research Organisation (CSIRO), Industry PhD (iPhD) Program, 2026 ‑ 2030, $318,926.
Securing DER Stability via a Trusted Sovereign Monitor for EV Charging Systems., Commonwealth Scientific and Industrial Research Organisation (CSIRO), Tender, 2025 ‑ 2026, $163,367.
Developing autonomous solutions for building knowledge graphs to support educational outcomes in Virtuoso, CingleVue International Pty Ltd, Scholarships to Support Industry Engagement PhD Projects
, 2020 ‑ 2024, $150,000.
Augmenting Cyber Defence Capability (ACDC), Cyber Security Research Centre Ltd, Grant, 2022 ‑ 2024, $885,000.
CAESAR - Cyber Assurance in Energy Systems for Security and Resilience, Cyber Security Research Centre Ltd, Grant, 2023 ‑ 2024, $204,200.
Generating an Authentication Protocol for Western Australian's Smart Grid, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2022 ‑ 2024, $120,000.
Enabling Private and Secure Information Transmission by Covert Communications, Edith Cowan University, Early-Mid Career Researcher Grant Scheme 2022 (Stream 2), 2023 ‑ 2024, $38,322.
Multi-factor Authentication in Medical Contexts for Pharmaceutical Dispensary Functions , Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2021 ‑ 2023, $120,000.
Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 ‑ 2022, $120,000.
Securing Internet of Medical Things against False Data Injection Attacks Using Blockchain, Edith Cowan University, ECU Early Career Researcher Grant - 2019, 2019 ‑ 2020, $25,000.
Doctor of Philosophy, Zero-Day Malware Detection: Leveraging Dynamic Binary Instrumentation and Transformer Models for Effective Real-World Malware Classification
Master of Computing and Security by Research, Heterogeneous anomaly detection from network traffic streams using data summarization
Doctor of Philosophy, A Framework to Support Autonomous Construction of Knowledge Graphs from Unstructured Text
Doctor of Philosophy, Cyber security risk management in large Australian healthcare systems - a mixed methods study
Master of Computing and Security by Research, Multi-factor Authentication in the Internet of Healthcare Things: An Adaptive Approach to Improve Dynamic Security Requirements.
Doctor of Philosophy, Cooperative co-evolution-based feature selection for big data analytics
Doctor of Philosophy, Human Identification using Ear Biometrics: A Complete Pipeline from Detection to Recognition
Associate Supervisor
Doctor of Philosophy, Simulation of Optical Coherence Tomography
(OCT) Signal Propagation in Heart Tissue
using Monte-Carlo Method and Detection of
Ablated Lesions using Machine Learning – A
Potential Application for Catheter Ablation in
Atrial Fibrillation
Doctor of Philosophy, BEWARE – A Methodical Approach To Develop BEnign and MalWARE Datasets
Help us improve our content
Please leave a comment about your rating so we can better understand how we might improve the page.