Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Associate Professor Paul Haskell-Dowland

Associate Dean

Staff Member Details
Telephone: +61 8 6304 5039
Campus: Joondalup  
Room: JO18.312  

Paul is an Associate Professor and Associate Dean (Computing and Security) in the School of Science.


Associate Professor Paul Haskell-Dowland is the Associate Dean for Computing and Security in the School of Science at Edith Cowan University and is an associate member of the Centre for Security, Communications & Network Research at Plymouth University (UK).  Paul has delivered keynotes, invited presentations, workshops, professional development/training and seminars across the world for audiences including RSA Security, ITU and IEEE. He has appeared on local and national media (newspaper, radio and tv) commenting on current cyber issues as well as contributions through articles published in The Conversation. Paul has more than 20 years of experience in cyber security research and education in both the UK and Australia.

Paul is the Working Group Coordinator and the ACS/Australian Country Member Representative to the International Federation for Information Processing (IFIP) Technical Committee 11 (TC11 - Security and Privacy Protection in Information Processing Systems), the secretary to IFIP Working Group 11.1 (Information Security Management), and a member of the ACS Cyber Security Committee, a Fellow of the Higher Education Authority, a Senior Member of the IEEE, a Fellow of the BCS and a Senior Member of the ACS/Certified Professional. He is the author of over 90 papers in refereed international journals and conference proceedings and edited 29 proceedings.

Professional Memberships

  • Working Group Coordinator, IFIP TC11, June 2017
  • Senior Member of the ACS - Certified Professional MACS (Snr) CP and IP3P, December 2016
  • SMIEEE (Senior Member of the IEEE), April 2016
  • Member of the Council of Professors and Heads of Computing (CPHC), September 2015
  • MIEEE (Member of the IEEE), August 2015
  • FBCS (Fellow of British Computer Society), September 2010
  • IFIP Silver Core recipient, 2010
  • Member of the IFIP TC 11 Working Group 11.12 on Human Aspects of Information Security and Assurance
  • Secretary & Webmaster, IFIP TC11 Working Group 11.1 on Information Security Management, August 2004
  • Branch Committee Member & Webmaster, BCS South West, April 2004-2016
  • MBCS (Member of British Computer Society), April 2004

Research Areas and Interests

  • Network and System Security
  • Teaching and Learning Technologies
  • Learner and Learning Analytics
  • Security Education
  • Child eSafety
  • Network Monitoring
  • Misuse Detection
  • Authentication Technologies


  • Doctor of Philosophy, United Kingdom, 2004.
  • Postgraduate Certificate in Learning and Teaching in Higher, United Kingdom, 2001.
  • Bachelor of Science with First Class Honours, England, 1998.


Recent Research Grants

  • Semantic modelling of Digital Twins for Cyber Security Defence Automation,  Commonwealth Scientific and Industrial Research Organisation (CSIRO),  CSIRO - Scholarship,  2021 - 2024,  $150,000.
  • In-Circuit Forensic Analysis of IoT Memory Modules,  Cyber Security Research Centre Ltd,  Cyber Security Research Centre PhD Scholarship,  2020 - 2023,  $180,000.
  • Data – Increased cybersecurity risk from working at home,  Department of Jobs, Tourism, Science and Innovation,  Covid-19 Research Fund,  2020 - 2022,  $135,554.
  • Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization,  Cyber Security Research Centre Ltd,  Cyber Security Research Centre Masters Scholarship,  2020 - 2022,  $120,000.
  • AFP Remote Cybercrime Training,  Cyber Security Research Centre Ltd,  Cyber Security Research Centre Masters Scholarship,  2021,  $10,700.
  • Academic Centre of Cyber Security Excellence,  Department of Education, Skills and Employment,  Academic Centres of Cyber Security Excellence,  2017 - 2021,  $950,287.
  • Intelligent Building Security: An investigation into Vulnerabilities, Current Practice and Security Management Best Practice,  ASIS International,  ASIS - Grant,  2017 - 2018,  $79,339.

Recent Publications (within the last five years)

Journal Articles

  • Kang, J., Haskell-Dowland, P., Yang, W., Zheng, X., Dibaei, M., Luo, G., (2021), An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study. Sensors, 21(1), 17 pages, Basel, Switzerland, DOI:
  • Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P., (2020), A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data using Cooperative Co-Evolution. IEEE Access, 8(2020), 150113-150129, DOI: 10.1109/ACCESS.2020.3016679.
  • Brooks, D., Coole, M., Haskell-Dowland, P., (2020), Intelligent Building Systems: Security and Facility Professionals’ Understanding of System Threats, Vulnerabilities and Mitigation Practice. Security Journal, 33(2), 244–265, United Kingdom, Palgrave Macmillan Ltd., DOI:
  • Kang, J., Haskell-Dowland, P., Yang, W., Dermody, D., Adibi, S., Ghasemian, M., (2020), No Soldiers Left Behind: An IoT-based Low-Power Military Mobile Health System Design. IEEE Access, 8(2020), 201498 - 201515, DOI: 10.1109/ACCESS.2020.3035812.
  • Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P., (2020), Cooperative co-evolution for feature selection in Big Data with random feature grouping. Journal of Big Data, 7(107), 1-42, USA, DOI: 10.1186/s40537-020-00381-y.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2019), Behavioral Profiling for Transparent Verification in Cloud Storage Services. Journal of Information Warfare, 17(4), 88-105, Virginia, United States of America, School of Computer and Information Science.
  • Chaudhry, J., Saleem, K., Haskell-Dowland, P., Miraz, M., (2018), A Survey of Distributed Certificate Authorities in MANETs. Annals of Emerging Technologies in Computing (AETiC), 2(3), 11-18, International Association of Educators and Researchers (IAER).
  • Alharbi, N., Papadaki, M., Haskell-Dowland, P., (2017), The impact of security and its antecedents in behaviour intention of using e-government services. Behaviour and Information Technology, 36(6), 620-636, Taylor & Francis, DOI: 10.1080/0144929X.2016.1269198.
  • Korovessis, P., Furnell, S., Papadaki, M., Haskell-Dowland, P., (2017), A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2), article no.5, Kennesaw State University.
  • Zaaba, ZF., Furnell, S., Haskell-Dowland, P., (2016), Literature Studies on Security Warnings Development. International Journal on Perceptive and Cognitive Computing, 2(1), 8-18, Malaysia, International Islamic University Malaysia, DOI: 10.31436/ijpcc.v2i1.22.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., (2016), Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis. The GSTF Journal on Computing, 5(1), 21-28, Singapore, Global Science and Technology Forum, DOI: 10.5176/2251-3043_4.4.348.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S., (2016), Graphical One-Time Password (GOTPass): A usability evaluation. Information Security Journal: a Global Perspective, 25(1-3), 94-108, United States, Taylor and Francis Inc., DOI: 10.1080/19393555.2016.1179374.
  • Al-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F., (2016), A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches. International Journal for Information Security Research, 6(3), 691-700, Infonomics Society, DOI: 10.20533/ijisr.2042.4639.2016.0080.

Conference Publications

  • Karie, N., Bin Sahri, NM., Haskell-Dowland, P., (2020), IoT Threat Detection Advances, Challenges and Future Directions. Proceedings 2020 Workshop on Emerging Technologies for Security in IoT ETSecIoT 2020 , 22-29, online, Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/ETSecIoT50046.2020.00009.
  • Ellis, M., Thompson, G., Haskell-Dowland, P., (2020), Building a Better Micro:Bit IDE – Teaching Computer Science. INTED2020 Proceedings, 8425-8433, Valencia, Spain, IATED Academy, DOI: 10.21125/inted.2020.2290.
  • Chady, T., Haskell-Dowland, P., (2020), The Hop Portal Snowglobe Architecture: Making Virtual Reality Functional. INTED2020 Proceedings, 8395-8403, Valencia, Spain, IATED Academy, DOI: 10.21125/inted.2020.2283.
  • Furnell, S., Haskell-Dowland, P., (2020), Good guidance or mistaken misdirection: Assessing the quality of password advice. Annual Information Institute Conference Proceedings, 1-9, online, Information Institute.
  • Vasileiou, I., Haskell-Dowland, P., (2019), Addressing STEM Geek Culture Through Peer Learning. EDULEARN19 Proceedings, 5289-5293, online, IATED Academy, DOI: 10.21125/edulearn.2019.1298.
  • Kang, J., Fahd, K., Venkatraman, S., Trujillo-Rausa, R., Haskell-Dowland, P., (2019), Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks. 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Article number 9077977, online, IEEE, DOI: 10.1109/ITNAC46935.2019.9077977.
  • Ellis, M., Thompson, G., Haskell-Dowland, P., (2019), From Model B To Micro:Bit – Teaching Computer Science. Proceedings of EDULEARN19 Conference, 2725-2731, online, IATED Academy, DOI: 10.21125/edulearn.2019.0744.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2018), Continuous identity verification in cloud storage services using behavioural profiling. ECCWS 2018 17th European Conference on Cyber Warfare and Security, 10p..
  • Mahmoud, N., Furnell, S., Haskell-Dowland, P., (2018), Design Principles and Guidelines for Targeted Security Awareness. Proceedings of the Annual Information Institute Conference, 18p., online, Information Institute.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2018), Misuse Detection in a Simulated IaaS Environment. Emerging Technologies for Authorization and Authentication. ETAA 2018. Lecture Notes in Computer Science, 11263(7 Sept 2018), 103-115, Switzerland, Springer, DOI: 10.1007/978-3-030-04372-8_9.
  • Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F., (2017), Smart Watch based Body-Temperature Authentication. Proceedings of the IEEE International Conference on Computing, Networking and Informatics (ICCNI 2017), 7p., IEEE, DOI: 10.1109/ICCNI.2017.8123790.
  • Al-Naffakh, NH., Clarke, N., Li, F., Haskell-Dowland, P., (2017), Unobtrusive Gait Recognition using Smartwatches. Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), LNI P-270(20-22 Sept 2017), 211-218, IEEE, DOI: 10.23919/BIOSIG.2017.8053523.
  • Mahmoud, N., Furnell, S., Haskell-Dowland, P., (2017), Towards Targeted Security Awareness Raising. Proceedings of the Annual Information Institute Conference, 13p., Information Institute.
  • Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F., (2017), Transparent Authentication: Utilising Heart Rate for User Authentication. International Conference for Internet Technology and Secured Transactions (ICITST-2017) Proceedings, 283-289.
  • Ketab, S., Clarke, N., Haskell-Dowland, P., (2016), The Value of the Biometrics in Invigilated E-Assessments. EDULEARN16 Conference Proceedings, 7648-7659, online only, IATED Academy, DOI: 10.21125/edulearn.2016.0687.
  • Ai-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F., (2016), Activity Recognition using wearable computing. International Conference for Internet Technology and Secured Transactions, ICITST 2016, 189-195, Piscataway, USA, Institute of Electrical and Electronics Engineers Inc., DOI: 10.1109/ICITST.2016.7856695.
  • Triantafyllidis, A., Clarke, N., Haskell-Dowland, P., Vranopoulos, G., (2016), Increasing eLearning Engagement Using Mobile Technologies. ICERI2016 Conference Proceedings, 8644-8653, online only, IATED Academy.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S., (2016), A review of graphical authentication utilising a keypad input method. Proceedings of the 8th Saudi Students Conference, 359-374, World Scientific Publishing Co., DOI: 10.1142/9781783269150_0031.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy: Establishing an Information Security Awareness and Culture
  • Doctor of Philosophy: High Performance Near-Time Processing of Bulk Data
  • Doctor of Philosophy: The Role of Security and Its Antecedents in e-Government Adoption
  • Doctor of Philosophy: Enhancing User Authentication Using Graphical Techniques
  • Doctor of Philosophy: Enhancing Usability Using Automated Security Interface Adaption (ASIA)
  • Master of Science (Computer Science),  The challenges of digital legacy management on the value of digital objects to older Australians
  • Doctor of Philosophy: Increasing eLearning Engagement Through Mobile Learning Integration
  • Doctor of Philosophy: Active Security Vulnerability Notification and Resolution
  • Doctor of Philosophy: Graphical One-Time-Password Authentication
  • Master by Research: Data Mining Applied to External Marketing Data
  • Doctor of Philosophy: Improved Composability of Software Components Through Parallel Hardware Platforms for In-Car Multimedia Systems
  • Doctor of Philosophy: Behaviour Profiling for Mobile Devices
  • Doctor of Philosophy: E-Invigilator of E-Assessment
  • Doctor of Philosophy: Opportunities and Risks in Online Gaming Environments

Associate Supervisor

  • Bioelectrical User Authentication
  • An Evaluation of Targeted Security Awareness for End Users
  • Doctor of Philosophy: Activity-Based User Authentication Using Smartwatches
  • DOKY: A Multi-Modal User Interface for Non-Visual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices
  • Continuous Identity Verification in Cloud Computing Services
Skip to top of page