Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr Ahmed Ibrahim


Staff Member Details
Telephone: +61 8 6304 6872
Campus: Joondalup  
Room: JO18.338  

Ahmed is a Lecturer within the School of Science and a member of the ECU Security Research Institute.

Current Teaching

  • CSI3207 Network Security Fundamentals
  • CSG3308 Wireless Security
  • CSI5212 Network Security Fundamentals
  • CSG5308 Wireless Security
  • CSI6202 Network Security
  • CSG6206 Advanced Scripting Languages


    Dr Ahmed Ibrahim is a Lecturer (Computing and Security) at the Edith Cowan University School of Science. Dr Ibrahim’s Ph.D. research focused on detecting covertly hidden content in digital objects and electronic communication.
    He has previously worked as a Post-Doctoral Research Fellow at the ECU Security Research Institute and has held academic positions at the Maldives National University, Villa College, and National Institute of Technology Australia; and worked in the government of Maldives

Professional Memberships

  • Australian Computer Society (ACS)
  • Institute of Electrical and Electronics Engineers (IEEE)
  • Australian Information Security Association (AISA)
  • High Technology Crime Investigation Association (HTCIA)

Awards and Recognition

National and International Awards

  • 2012 – Endeavour Postgraduate Award (PhD), DEEWR Australia
  • 2007 – AusAID Leadership Awards, AusAID Australia
  • 2005 – Faculty of Computing, Engineering & Technology Prize for Outstanding Project on the BSc (Hons) in Computing, Staffordshire University

Research Areas and Interests

  • Steganography and Steganalysis: investigation of covert communication and information hiding.
  • Machine Learning: application of machine learning techniques to solve cyber security problems.
  • Areas broadly related to cyber security and digital forensics.


  • Doctor of Philosophy, Edith Cowan University, 2016.
  • Master of Computer Science, Edith Cowan University, 2008.
  • Bachelor of Science with First Class Honours, United Kingdom, 2005.

Research Outputs

Book Chapters

  • Malik, I., McAteer, I., Ibrahim, A., Hannay, P., Baig, Z., Zheng, G. (2020). Cyber Security for Network of Things (NoTs) in Military Systems: Challenges and Countermeasures. Security Analytics for the Internet of Everything (233-251). CRC Press.

Journal Articles

Book Chapters

  • Syed, N., Ibrahim, A., Baig, Z., Valli, C. (2019). Bio-inspired cyber-security for the smart grid. Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Application (373-392). Institution of Engineering and Technology (IET).

Journal Articles

  • Yang, W., Wang, S., Hu, J., Ibrahim, A., Zheng, G., Macedo, M., Johnstone, M., Valli, C. (2019). A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things. Sensors, 19(13), article no.2985.
  • McAteer, I., Ibrahim, A., Zheng, G., Yang, W., Valli, C. (2019). Integration of Biometrics and Steganography: A Comprehensive Review. Technologies, 7(2), Article no. 34.

Journal Articles

  • Ibrahim, A., Valli, C., McAteer, I., Chaudhry, J. (2018). A security review of local government using NIST CSF: a case study. Journal of Supercomputing, 74(10), 5171-5186.

Conference Publications

  • Chong, K., Ibrahim, A. (2018). Bringing defensive artificial intelligence capabilities to mobile devices. Australian Information Security Management Conference (41-50). Edith Cowan University.
  • Yang, W., Zheng, G., Ibrahim, A., Chaudhry, J., Wang, S., Hu, J., Valli, C. (2018). Application of 3D Delaunay Triangulation in Fingerprint Authentication System. Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (291-298). Springer.

Journal Articles

  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M. (2017). Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13.

Conference Publications

  • Syed, N., Baig, Z., Valli, C., Ibrahim, A. (2017). Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. Proceedings 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (748-755). IEEE.
  • Rabadia, P., Valli, C., Ibrahim, A., Baig, Z. (2017). Analysis of attempted intrusions: Intelligence gathered from SSH honeypots. The Proceedings of 15th Australian Information Security Management Conference (10p.). Edith Cowan University.
  • Woolley, C., Ibrahim, A., Hannay, P. (2017). Building a dataset for image steganography. Proceedings of the 15th Australian Digital Forensics Conference (36-45). Edith Cowan University.

Conference Publications

  • Ibrahim, A., Valli, C. (2015). Image Similarity using Dynamic Time Warping of Fractal Features. Proceedings of 13th Australian Digital Forensics Conference (111-122). ECU Security Research Institute.

Conference Publications

  • Ibrahim, A. (2014). Suitability of lacunarity measure for blind steganalysis. Proceedings of the 12th Australian Digital Forensics Conference (64-74). Security Research Institute, ECU.

Conference Publications

  • Ibrahim, A. (2007). Steganalysis in Computer Forenics. Edith Cowan University.

Research Projects

  • Prediction of radicalisation through the Internet in the Maldives using linguistics and machine learning, Maldives National Defence Force, Scholarships to Support Industry Engagement PhD Projects, 2019 ‑ 2024, $35,000.
  • Data – Increased cybersecurity risk from working at home, Department of Jobs, Tourism, Science and Innovation, Covid-19 Research Fund, 2020 ‑ 2022, $100,000.
  • Vulnerabilities in Ship Control Systems, Defence Science and Technology Group of the Department of Defence, Grant, 2017 ‑ 2018, $400,000.
  • Investigation of social media for radicalisation and terrorism in the Maldives, Edith Cowan University, Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 – 2017, 2017, $11,000.
  • Investigation of text steganography for malicious covert communication by terrorists in the dark web, Edith Cowan University, Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017, 2017, $8,200.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy, Malware detection in cyber-physical system (cps) through nature-inspired metaheuristic algorithms
  • Doctor of Philosophy, Detection of online radicalisation in the Maldivian language
  • Doctor of Philosophy, Mining SCADA alarm analysis by autonomous operator to identify cyber-physical attacks

Associate Supervisor

  • Doctor of Philosophy, Cryptography, end to end trust assurance and legal interception

Principal Supervisor

  • Doctor of Philosophy, IoT-MQTT based denial of service attack modelling and detection

Associate Supervisor

  • Master of Science (Computer Science), Physical layer security using optical steganography and encoding techniques in optical networks
Skip to top of page