Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Professor Paul Haskell-Dowland

Associate Dean

Staff Member Details
Telephone: +61 8 6304 5039
Email: p.haskelldowland@ecu.edu.au
Campus: Joondalup  
Room: JO18.311  
ORCID iD: https://orcid.org/0000-0003-1365-0929

Paul is a Professor and Associate Dean (Computing and Security) in the School of Science.

Background

Professor Paul Haskell-Dowland is the Professor of Cyber Security Practice and Associate Dean for Computing and Security in the School of Science.  Paul has delivered keynotes, invited presentations, workshops, professional development/training and seminars across the world for audiences including RSA Security, ITU and IEEE. He has appeared on local, national and international media (newspaper, radio and tv) commenting on current cyber issues with a global audience reach of more than three billion people. His contributions through articles published in The Conversation have reached over three million readers. Paul has more than 25 years of experience in cyber security research and education in both the UK and Australia.

Paul is the Working Group Coordinator and the ACS/Australian Country Member Representative to the International Federation for Information Processing (IFIP) Technical Committee 11 (TC11 - Security and Privacy Protection in Information Processing Systems); secretary to IFIP Working Group 11.1 (Information Security Management); a member of the ACS Cyber Security Committee; a Senior Member of the IEEE and the ACS (Certified Professional); and, a Fellow of the Higher Education AcademyBCS and the Australian Information Security Association.  He is the author of over 90 papers in refereed international journals and conference proceedings and edited 30 books/proceedings.

Professional Memberships

  • FAISA (Fellow of the Australian Information Security Association), April 2021
  • MAISA (Member of the Australian Information Security Association), September 2019)
  • Working Group Coordinator, IFIP TC11, June 2017
  • Senior Member of the ACS - Certified Professional MACS (Snr) CP and IP3P, December 2016
  • SMIEEE (Senior Member of the IEEE), April 2016
  • Member of the Council of Professors and Heads of Computing (CPHC), September 2015
  • MIEEE (Member of the IEEE), August 2015
  • FBCS (Fellow of British Computer Society), September 2010
  • IFIP Silver Core recipient, 2010
  • Member of the IFIP TC 11 Working Group 11.12 on Human Aspects of Information Security and Assurance
  • Secretary & Webmaster, IFIP TC11 Working Group 11.1 on Information Security Management, August 2004
  • Branch Committee Member & Webmaster, BCS South West, April 2004-2016
  • MBCS (Member of British Computer Society), April 2004

Research Areas and Interests

  • Network and System Security
  • Teaching and Learning Technologies
  • Learner and Learning Analytics
  • Security Education
  • Network Monitoring
  • Misuse Detection
  • Authentication Technologies

Qualifications

  • Doctor of Philosophy, United Kingdom, 2004.
  • Postgraduate Certificate in Learning and Teaching in Higher, United Kingdom, 2001.
  • Bachelor of Science with First Class Honours, England, 1998.

Research Outputs

Journal Articles

  • Woodiss-Field, A., Johnstone, M., Haskell-Dowland, P. (2024). Examination of Traditional Botnet Detection on IoT-Based Bots. Sensors, 24(3), Article number 1027. https://doi.org/10.3390/s24031027.

Journal Articles

  • Lu, X., Huang, Y., Yan, S., Yang, W., Haskell-Dowland, P. (2023). Energy-Efficient Covert Wireless Communication Through Probabilistic Jamming. IEEE Wireless Communications Letters, 12(5), 932-936. https://doi.org/10.1109/LWC.2023.3253075.

Journal Articles

  • Riddell, L., Ahmed, M., Haskell-Dowland, P. (2022). Establishment and mapping of heterogeneous anomalies in network intrusion datasets. Connection Science, 34(1), 2755-2783. https://doi.org/10.1080/09540091.2022.2151568.
  • Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P. (2022). Anomaly Detection in Cybersecurity Datasets via Cooperative Co-Evolution-Based Feature Selection. ACM Transactions on Management Information Systems, 13(3), 1-39. https://doi.org/10.1145/3495165.
  • Mursalin, M., Ahmed, M., Haskell-Dowland, P. (2022). Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model. Sensors, 22(2022), Article Number 8988. https://doi.org/10.3390/s22228988.

Conference Publications

  • Woodiss-Field, A., Johnstone, M., Haskell-Dowland, P. (2022). Towards Evaluating the Effectiveness of Botnet Detection Techniques. Ubiquitous Security: First International Conference, UbiSec (292-308). Springer. https://doi.org/10.1007/978-981-19-0468-4_22.
  • Yu, X., Yan, S., Hu, J., Haskell-Dowland, P., Han, Y., Ng, D. (2022). On Relaying Strategies in Multi-Hop Covert Wireless Communications. ICC 2022 - IEEE International Conference on Communications (666-672). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICC45855.2022.9838514.

Book Chapters

  • Furnell, S., Haskell-Dowland, P., Agrawal, M., Baskerville, R., Basu, A., Bishop, M., Cuellar, J., Foresti, S., Futcher, L., Gal-Oz, N., Herath, T., Jensen, CD., Johnston, A., Joosen, W., Livraga, G., Lopez, J., Marsh, S., Martinelli, F., Massacci, F., Pasic, A., Schinagl, S., Shahim, A., Thomson, K., Vaidya, J., Vance, T., Warkentin, M. (2021). Information Security and Privacy – Challenges and Outlook. Advancing Research in Information and Communication Technology (383-401). Springer. https://doi.org/10.1007/978-3-030-81701-5_16.

Journal Articles

  • Kang, J., Dibaei, M., Luo, G., Yang, W., Haskell-Dowland, P., Zheng, X. (2021). An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study. Sensors, 21(1), Article number 312. https://doi.org/10.3390/s21010312.
  • Ahmed, M., Byreddy, S., Nutakki, A., Sikos, L., Haskell-Dowland, P. (2021). ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things. Ad Hoc Networks, 122(1 November 2021), Article number 102621. https://doi.org/10.1016/j.adhoc.2021.102621.

Journal Articles

  • Brooks, D., Coole, M., Haskell-Dowland, P. (2020). Intelligent Building Systems: Security and Facility Professionals’ Understanding of System Threats, Vulnerabilities and Mitigation Practice. Security Journal, 33(2), 244–265. https://doi.org/10.1057/s41284-019-00183-9.
  • Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P. (2020). Cooperative co-evolution for feature selection in Big Data with random feature grouping. Journal of Big Data, 7(1), Article number 107. https://doi.org/10.1186/s40537-020-00381-y.
  • Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P. (2020). A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data using Cooperative Co-Evolution. IEEE Access, 8(2020), 150113-150129. https://doi.org/10.1109/ACCESS.2020.3016679.
  • Kang, J., Yang, W., Dermody, D., Ghasemian, M., Adibi, S., Haskell-Dowland, P. (2020). No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design. IEEE Access, 8(2020), 201498-201515. https://doi.org/10.1109/ACCESS.2020.3035812.

Conference Publications

  • Ellis, M., Thompson, G., Haskell-Dowland, P. (2020). Building a Better Micro:Bit IDE – Teaching Computer Science. INTED2020 Proceedings (8425-8433). IATED Academy. https://doi.org/10.21125/inted.2020.2290.
  • Karie, N., Bin Sahri, NM., Haskell-Dowland, P. (2020). IoT Threat Detection Advances, Challenges and Future Directions. Proceedings 2020 Workshop on Emerging Technologies for Security in IoT ETSecIoT 2020 (22-29). Institute of Electrical and Electronics Engineers, Inc.. https://doi.org/10.1109/ETSecIoT50046.2020.00009.
  • Chady, T., Haskell-Dowland, P. (2020). The Hop Portal Snowglobe Architecture: Making Virtual Reality Functional. INTED2020 Proceedings (8395-8403). IATED Academy. https://doi.org/10.21125/inted.2020.2283.
  • Furnell, S., Haskell-Dowland, P. (2020). Good guidance or mistaken misdirection: Assessing the quality of password advice. Annual Information Institute Conference Proceedings (1-9). Information Institute.

Journal Articles

  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F. (2019). Behavioral Profiling for Transparent Verification in Cloud Storage Services. Journal of Information Warfare, 17(4), 88-105.

Conference Publications

  • Vasileiou, I., Haskell-Dowland, P. (2019). Addressing STEM Geek Culture Through Peer Learning. EDULEARN19 Proceedings (5289-5293). IATED Academy. https://doi.org/10.21125/edulearn.2019.1298.
  • Ellis, M., Thompson, G., Haskell-Dowland, P. (2019). From Model B To Micro:Bit – Teaching Computer Science. Proceedings of EDULEARN19 Conference (2725-2731). IATED Academy. https://doi.org/10.21125/edulearn.2019.0744.
  • Kang, J., Fahd, K., Venkatraman, S., Trujillo-Rausa, R., Haskell-Dowland, P. (2019). Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks. 2019 29th International Telecommunication Networks and Applications Conference (ITNAC) (Article number 9077977). IEEE. https://doi.org/10.1109/ITNAC46935.2019.9077977.

Journal Articles

  • Chaudhry, J., Saleem, K., Haskell-Dowland, P., Miraz, M. (2018). A Survey of Distributed Certificate Authorities in MANETs. Annals of Emerging Technologies in Computing (AETiC), 2(3), 11-18.

Conference Publications

  • Mahmoud, N., Furnell, S., Haskell-Dowland, P. (2018). Design Principles and Guidelines for Targeted Security Awareness. Proceedings of the Annual Information Institute Conference (18p.). Information Institute.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F. (2018). Misuse Detection in a Simulated IaaS Environment. Emerging Technologies for Authorization and Authentication. ETAA 2018. Lecture Notes in Computer Science (103-115). Springer. https://doi.org/10.1007/978-3-030-04372-8_9.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F. (2018). Continuous identity verification in cloud storage services using behavioural profiling. ECCWS 2018 17th European Conference on Cyber Warfare and Security (10p.).

Journal Articles

  • Korovessis, P., Furnell, S., Papadaki, M., Haskell-Dowland, P. (2017). A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2), article no.5.
  • Alharbi, N., Papadaki, M., Haskell-Dowland, P. (2017). The impact of security and its antecedents in behaviour intention of using e-government services. Behaviour and Information Technology, 36(6), 620-636. https://doi.org/10.1080/0144929X.2016.1269198.

Conference Publications

  • Al-Naffakh, NH., Clarke, N., Li, F., Haskell-Dowland, P. (2017). Unobtrusive Gait Recognition using Smartwatches. Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) (211-218). IEEE. https://doi.org/10.23919/BIOSIG.2017.8053523.
  • Mahmoud, N., Furnell, S., Haskell-Dowland, P. (2017). Towards Targeted Security Awareness Raising. Proceedings of the Annual Information Institute Conference (13p.). Information Institute.
  • Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F. (2017). Smart Watch based Body-Temperature Authentication. Proceedings of the IEEE International Conference on Computing, Networking and Informatics (ICCNI 2017) (7p.). IEEE. https://doi.org/10.1109/ICCNI.2017.8123790.
  • Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F. (2017). Transparent Authentication: Utilising Heart Rate for User Authentication. International Conference for Internet Technology and Secured Transactions (ICITST-2017) Proceedings (283-289).

Reports

  • Brooks, D., Coole, M., Haskell-Dowland, P., Griffiths, M., Lockhart, N. (2017). Building Automation & Control Systems An Investigation into Vulnerabilities, Current Practice & Security Management Best Practice. Australia. ASIS Foundation.

Journal Articles

  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P. (2016). Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis. The GSTF Journal on Computing, 5(1), 21-28. https://doi.org/10.5176/2251-3043_4.4.348.
  • Zaaba, ZF., Furnell, S., Haskell-Dowland, P. (2016). Literature Studies on Security Warnings Development. International Journal on Perceptive and Cognitive Computing, 2(1), 8-18. https://doi.org/10.31436/ijpcc.v2i1.22.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S. (2016). Graphical One-Time Password (GOTPass): A usability evaluation. Information Security Journal: a Global Perspective, 25(1-3), 94-108. https://doi.org/10.1080/19393555.2016.1179374.
  • Al-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F. (2016). A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches. International Journal for Information Security Research, 6(3), 691-700. https://doi.org/10.20533/ijisr.2042.4639.2016.0080.

Conference Publications

  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S. (2016). A review of graphical authentication utilising a keypad input method. Proceedings of the 8th Saudi Students Conference (359-374). World Scientific Publishing Co.. https://doi.org/10.1142/9781783269150_0031.
  • Triantafyllidis, A., Clarke, N., Haskell-Dowland, P., Vranopoulos, G. (2016). Increasing eLearning Engagement Using Mobile Technologies. ICERI2016 Conference Proceedings (8644-8653). IATED Academy.
  • Ai-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F. (2016). Activity Recognition using wearable computing. International Conference for Internet Technology and Secured Transactions, ICITST 2016 (189-195). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITST.2016.7856695.
  • Ketab, S., Clarke, N., Haskell-Dowland, P. (2016). The Value of the Biometrics in Invigilated E-Assessments. EDULEARN16 Conference Proceedings (7648-7659). IATED Academy. https://doi.org/10.21125/edulearn.2016.0687.

Journal Articles

  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S. (2015). Secure Graphical One Time Password (GOTPass): An Empirical Study. Information Security Journal: a Global Perspective, 24(4-6), 207-220. https://doi.org/10.1080/19393555.2015.1115927.

Conference Publications

  • Ketab, SS., Clarke, N., Haskell-Dowland, P. (2015). E-Invigilation of E-Assessments. Proceedings of the 9th International Technology, Education and Development Conference (1582-1591). IATED Academy.

Journal Articles

  • Jali, MZ., Furnell, S., Haskell-Dowland, P. (2014). Investigating the Viability of Multifactor Graphical Passwords for User Authentication. Information Security Journal, 23(1-2), 10-21. https://doi.org/10.1080/19393555.2014.891274.
  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P. (2014). Active Authentication for Mobile Devices Utilising Behaviour Profiling. International Journal of Information Security, 13(3), 229-244. https://doi.org/10.1007/s10207-013-0209-6.
  • Alharbi, N., Papadaki, M., Haskell-Dowland, P. (2014). Security Factors Influencing End Users' Adoption of E-Government. Journal of Internet Technology and Secured Transaction, 3(4), 320-328. https://doi.org/10.20533/jitst.2046.3723.2014.0040.

Conference Publications

  • Dorigo, ML., Harriehausen-Mühlbauer, B., Stengel, I., Haskell-Dowland, P. (2014). Nonvisual presentation, navigation and manipulation of structured documents on mobile and wearable devices. Lecture Notes in Computer Science (383-390). Springer. https://doi.org/10.1007/978-3-319-08596-8_59.
  • Knirsch, A., Wietzke, J., Moore, R., Haskell-Dowland, P. (2014). Connected in-car multimedia: Qualities affecting composability of dynamic functionality. Proceedings of the Tenth International Network Conference (81-93). Plymouth University.
  • Alharbi, N., Papadaki, M., Haskell-Dowland, P. (2014). Security Challenges of E-Government Adoption Based On End Users’ Perspective. Internet Technolgy and Secured Transactions (ICITST), 2014 9th International Conference for (78-82). IEEE. https://doi.org/10.1109/ICITST.2014.7038781.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, SM. (2014). Alternative Graphical Authentication for Online Banking Environments. Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (122-136). CSCAN.

Conference Publications

  • Clarke, N., Haskell-Dowland, P., Furnell, S. (2013). E-Invigilator: A biometric-based Supervision System for e-Assessments. 2013 International Conference on Information Society (i-Society) (238-242). IEEE.
  • Dorigo, M., Harriehausen-Muhlbauer, B., Stengel, I., Haskell-Dowland, P. (2013). Nonvisual presentation and navigation within the structure of digital text-documents on mobile devices. Universal Access in Human-Computer Interaction: Design Methods, Tools, and Interaction Techniques for eInclusion (311-320). Springer. https://doi.org/10.1007/978-3-642-39194-1-37.
  • Triantafyllidis, A., Clarke, N., Haskell-Dowland, P. (2013). Learning management systems in higher education: a faculty perspective. Proceedings of the 6th International Conference of Education, Research and Innovation (5120-5130). IATED.

Conference Publications

  • Triantafyllidis, A., Clarke, N., Haskell-Dowland, P. (2012). Learning management systems in higher education: A student perspective. Proceedings of the 5th International Conference of Education, Research and Innovation (4046-4055). IATED.

Journal Articles

  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P. (2011). Misuse Detection for Mobile Devices Using Behaviour Profiling. International Journal of Cyber Warfare and Terrorism, 1(1), 43-55. https://doi.org/10.4018/ijcwt.2011010105.
  • Sanders, B., Haskell-Dowland, P., Atkinson, S., Furnell, S. (2011). Massively Multi-Player Online Role Playing Games: What’s the Risk?. Journal of Virtual Worlds Research, 3(3), 6p.. https://doi.org/10.4101/jvwr.v3i3.874.
  • Jali, M., Furnell, S., Haskell-Dowland, P. (2011). Quantifying the effect of graphical password guidelines for better security. IFIP Advances in Information and Communication Technology, 354(2011), 80-91. https://doi.org/10.1007/978-3-642-21424-0_7.

Conference Publications

  • Dorigo, M., Harriehausen-Muhlbauer, B., Stengel, I., Haskell-Dowland, P. (2011). Survey: Improving Document Accessibility from the Blind and Visually Impaired User’s Point of View. Proceedings of the Universal Access in Human-Computer Interaction - held as part of HCI International 2011 (part IV) (129-135). Springer. https://doi.org/10.1007/978-3-642-21657-2_14.
  • Jali, MZ., Furnell, S., Haskell-Dowland, P. (2011). Multifactor graphical passwords: An assessment of end-user performance. Proceedings of the 2011 7th International Conference on Information Assurance and Security, IAS 2011 (Article no. 6122786). IEEE. https://doi.org/10.1109/ISIAS.2011.6122786.
  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P. (2011). Behaviour Profiling for Transparent Authentication for Mobile Devices. Proceedings of the 10th European Conference on Information Warfare and Security (307-314). Academic Publishing Limited.
  • Zaaba, Z., Furnell, S., Haskell-Dowland, P. (2011). End-user perception and usability of information security. Proceedings of the fifth international symposium on human aspects of information security and assurance (97-107). University of Plymouth.

Journal Articles

  • Jali, M., Furnell, S., Haskell-Dowland, P. (2010). Assessing image-based authentication techniques in a web-based environment.. Information Management & Computer Security, 18(1), 43-53.

Conference Publications

  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P. (2010). Behaviour profiling on mobile devices.. Emerging Security Technologies (EST), 2010 International Conference on (77-82). IEEE. https://doi.org/10.1109/EST.2010.26.

Conference Publications

  • Sanders, B., Haskell-Dowland, P., Furnell, S. (2009). An Assessment of People's Vulnerabilities in Relation to Personal and Sensitive Data. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009) (50-60). University of Plymouth.
  • Jali, M., Furnell, S., Haskell-Dowland, P. (2009). Evaluating Web-Based User Authentication using Graphical Techniques. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009) (108-118). University of Plymouth.

Research Projects

  • In-Circuit Forensic Analysis of IoT Memory Modules, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2020 ‑ 2024, $180,000.
  • Augmenting Cyber Defence Capability (ACDC), Cyber Security Research Centre Ltd, Grant, 2022 ‑ 2024, $885,000.
  • Semantic modelling of Digital Twins for Cyber Security Defence Automation, Commonwealth Scientific and Industrial Research Organisation (CSIRO), CSIRO - Scholarship, 2021 ‑ 2024, $150,000.
  • CSCRC Sharing Cybersercurity Research Data SCReeD, Cyber Security Research Centre Ltd, Grant, 2023 ‑ 2024, $100,000.
  • Data – Increased cybersecurity risk from working at home, Department of Jobs, Tourism, Science and Innovation, Covid-19 Research Fund, 2020 ‑ 2023, $100,000.
  • Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 ‑ 2022, $120,000.
  • Academic Centre of Cyber Security Excellence, Department of Education, Academic Centres of Cyber Security Excellence, 2017 ‑ 2021, $950,287.
  • Intelligent Building Security: An investigation into Vulnerabilities, Current Practice and Security Management Best Practice, ASIS International, ASIS - Grant, 2017 ‑ 2018, $79,339.

Research Student Supervision

Associate Supervisor

  • Doctor of Philosophy, In-circuit forensic analysis of IoT memory modules
  • Doctor of Philosophy, Insider Threat Detection Using a Synthetic Dataset
  • Doctor of Philosophy, Cyber Security Practices and Techniques for Insider Threat Mitigation in Critical Infrastructure

Principal Supervisor

  • Doctor of Philosophy: E-Invigilator of E-Assessment
  • Doctor of Philosophy: Opportunities and Risks in Online Gaming Environments
  • Doctor of Philosophy: Increasing eLearning Engagement Through Mobile Learning Integration
  • Doctor of Philosophy: Active Security Vulnerability Notification and Resolution
  • Doctor of Philosophy: Graphical One-Time-Password Authentication
  • Master by Research: Data Mining Applied to External Marketing Data
  • Doctor of Philosophy: Behaviour Profiling for Mobile Devices
  • Doctor of Philosophy: Establishing an Information Security Awareness and Culture
  • Doctor of Philosophy: High Performance Near-Time Processing of Bulk Data
  • Master of Science (Computer Science), The challenges of digital legacy management on the value of digital objects to older Australians
  • Doctor of Philosophy: The Role of Security and Its Antecedents in e-Government Adoption
  • Doctor of Philosophy: Enhancing User Authentication Using Graphical Techniques
  • Doctor of Philosophy: Enhancing Usability Using Automated Security Interface Adaption (ASIA)
  • Doctor of Philosophy: Improved Composability of Software Components Through Parallel Hardware Platforms for In-Car Multimedia Systems

Associate Supervisor

  • Master of Science (Computer Science), An Investigation into the Efficacy of URL Content Filtering Systems
  • Doctor of Philosophy, Cooperative co-evolution-based feature selection for big data analytics
  • Master of Computing and Security by Research, Heterogeneous anomaly detection from network traffic streams using data summarization
  • Continuous Identity Verification in Cloud Computing Services
  • Doctor of Philosophy: Activity-Based User Authentication Using Smartwatches
  • Doctor of Philosophy, Human Identification using Ear Biometrics: A Complete Pipeline from Detection to Recognition
  • Bioelectrical User Authentication
  • Doctor of Philosophy, Developing resilient approaches for detection of compromised IoT devices through machine learning
  • An Evaluation of Targeted Security Awareness for End Users
  • DOKY: A Multi-Modal User Interface for Non-Visual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices
Skip to top of page