Top of page
Global Site Navigation

School of Science

Local Section Navigation

Help us improve our content by rating this page.

Page rating system

Please leave a comment about your rating so we can better understand how we might improve the page.

You are here: Main Content

Dr Ahmed Ibrahim

Lecturer

Contact Information Telephone: +61 8 6304 6872, Email: ahmed.ibrahim@ecu.edu.au, Campus: Joondalup,
Staff Member Details
Telephone: +61 8 6304 6872
Email: ahmed.ibrahim@ecu.edu.au
Campus: Joondalup  

 

Ahmed is a Lecturer within the School of Science and a member of the ECU Security Research Institute.

Current Teaching

  • CSI6116 Network Security
  • CSG6223 Network Forensics
  • CSG6206 Advanced Scripting Languages

Background

    Dr Ahmed Ibrahim is a Lecturer (Computing and Security) at the Edith Cowan University School of Science. Dr Ibrahim’s Ph.D. research focused on detecting covertly hidden content in digital objects and electronic communication.
    He has previously worked as a Post-Doctoral Research Fellow at the ECU Security Research Institute and has held academic positions at the Maldives National University, Villa College, and National Institute of Technology Australia; and worked in the government of Maldives

Professional Memberships

  • Australian Computer Society (ACS)
  • Institute of Electrical and Electronics Engineers (IEEE)
  • Australian Information Security Association (AISA)
  • High Technology Crime Investigation Association (HTCIA)

Awards and Recognition

National and International Awards

  • 2012 – Endeavour Postgraduate Award (PhD), DEEWR Australia
  • 2007 – AusAID Leadership Awards, AusAID Australia
  • 2005 – Faculty of Computing, Engineering & Technology Prize for Outstanding Project on the BSc (Hons) in Computing, Staffordshire University

Research Areas and Interests

  • Steganography and Steganalysis: investigation of covert communication and information hiding.
  • Machine Learning: application of machine learning techniques to solve cyber security problems.
  • Areas broadly related to cyber security and digital forensics.

Qualifications

  • Doctor of Philosophy, Edith Cowan University, 2016.
  • Master of Computer Science, Edith Cowan University, 2008.
  • Bachelor of Science with First Class Honours, United Kingdom, 2005.

Research

Recent Research Grants

  • Vulnerabilities in Ship Control Systems,  Defence Science and Technology Group of the Department of Defence,  Grant,  2017 - 2018,  $400,000.
  • Investigation of social media for radicalisation and terrorism in the Maldives,  Edith Cowan University,  Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 – 2017,  2017,  $11,000.
  • Investigation of text steganography for malicious covert communication by terrorists in the dark web,  Edith Cowan University,  Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017,  2017,  $8,200.

Recent Publications (within the last five years)

Journal Articles

  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13, Oxon, United Kingdom, Elsevier Advanced Technology, DOI: 10.1016/j.diin.2017.06.015.

Conference Publications

  • Yang, W., Zheng, G., Ibrahim, A., Chaudhry, J., Wang, S., Hu, J., Valli, C., (2018), Application of 3D Delaunay Triangulation in Fingerprint Authentication System. Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 235(13-15 December, 2017), 291-298, Springer, Cham, Springer, DOI: 10.1007/978-3-319-90775-8_23.
  • Syed, N., Baig, Z., Valli, C., Ibrahim, A., (2017), Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. iThings-GreenCom-CPSCom-SmartData 2017, 748-755.
  • Rabadia, P., Valli, C., Ibrahim, A., Baig, Z., (2017), Analysis of attempted intrusions: Intelligence gathered from SSH honeypots. The Proceedings of 15th Australian Information Security Management Conference, 10p., Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a839e6d1d283.
  • Woolley, C., Ibrahim, A., Hannay, P., (2017), Building a dataset for image steganography. Proceedings of the 15th Australian Digital Forensics Conference, 36-45, Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a83a0541d284.
  • Ibrahim, A., Valli, C., (2015), Image Similarity using Dynamic Time Warping of Fractal Features. Proceedings of 13th Australian Digital Forensics Conference, 111-122, Perth, WA, ECU Security Research Institute.
  • Ibrahim, A., (2014), Suitability of lacunarity measure for blind steganalysis. Proceedings of the 12th Australian Digital Forensics Conference, 64-74, Perth, Western Australia, Security Research Institute, ECU, DOI: 10.4225/75/57b3e2d3fb87d.
Skip to top of page