Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr Ahmed Ibrahim


Contact Information Telephone: +61 8 6304 6872, Email:, Campus: Joondalup, Room: JO18338
Staff Member Details
Telephone: +61 8 6304 6872
Campus: Joondalup  
Room: JO18338  


Ahmed is a Lecturer within the School of Science and a member of the ECU Security Research Institute.

Current Teaching

  • CSI3207 Network Security Fundamentals
  • CSG3308 Wireless Security
  • CSI5212 Network Security Fundamentals
  • CSG5308 Wireless Security
  • CSI6202 Network Security
  • CSG6206 Advanced Scripting Languages


    Dr Ahmed Ibrahim is a Lecturer (Computing and Security) at the Edith Cowan University School of Science. Dr Ibrahim’s Ph.D. research focused on detecting covertly hidden content in digital objects and electronic communication.
    He has previously worked as a Post-Doctoral Research Fellow at the ECU Security Research Institute and has held academic positions at the Maldives National University, Villa College, and National Institute of Technology Australia; and worked in the government of Maldives

Professional Memberships

  • Australian Computer Society (ACS)
  • Institute of Electrical and Electronics Engineers (IEEE)
  • Australian Information Security Association (AISA)
  • High Technology Crime Investigation Association (HTCIA)

Awards and Recognition

National and International Awards

  • 2012 – Endeavour Postgraduate Award (PhD), DEEWR Australia
  • 2007 – AusAID Leadership Awards, AusAID Australia
  • 2005 – Faculty of Computing, Engineering & Technology Prize for Outstanding Project on the BSc (Hons) in Computing, Staffordshire University

Research Areas and Interests

  • Steganography and Steganalysis: investigation of covert communication and information hiding.
  • Machine Learning: application of machine learning techniques to solve cyber security problems.
  • Areas broadly related to cyber security and digital forensics.


  • Doctor of Philosophy, Edith Cowan University, 2016.
  • Master of Computer Science, Edith Cowan University, 2008.
  • Bachelor of Science with First Class Honours, United Kingdom, 2005.


Recent Research Grants

  • Prediction of radicalisation through the Internet in the Maldives using linguistics and machine learning,  Maldives National Defence Force,  Industry Engagement Scholarship to support PhD projects,  2019 - 2024,  $35,000.
  • Data – Increased cybersecurity risk from working at home,  Department of Jobs, Tourism, Science and Innovation,  Covid-19 Research Fund,  2020 - 2022,  $135,554.
  • Vulnerabilities in Ship Control Systems,  Defence Science and Technology Group of the Department of Defence,  Grant,  2017 - 2018,  $400,000.
  • Investigation of social media for radicalisation and terrorism in the Maldives,  Edith Cowan University,  Edith Cowan University, School of Science Collaborative Research Grant Scheme, 2016 – 2017,  2017,  $11,000.
  • Investigation of text steganography for malicious covert communication by terrorists in the dark web,  Edith Cowan University,  Edith Cowan University, School of Science Early Career Grant Scheme Semester 1, 2017,  2017,  $8,200.

Recent Publications (within the last five years)

Book Chapters

  • Malik, I., McAteer, I., Ibrahim, A., Hannay, P., Baig, Z., Zheng, G., (2020), Cyber Security for Network of Things (NoTs) in Military Systems: Challenges and Countermeasures. Security Analytics for the Internet of Everything, 233-251, Boca Raton, USA, CRC Press.
  • Syed, N., Ibrahim, A., Baig, Z., Valli, C., (2019), Bio-inspired cyber-security for the smart grid.  Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Application, 373-392, London, England, Institution of Engineering and Technology (IET) , DOI: 10.1049/PBSE010E_ch14.

Journal Articles

  • Syed, N., Baig, Z., Ibrahim, A., Valli, C., (2020), Denial of service attack detection through machine learning for the IoT. Journal of Information and Telecommunication, Article in press(Article in press), 1-22, Taylor & Francis, DOI:
  • Yang, W., Wang, S., Hu, J., Ibrahim, A., Zheng, G., Macedo, M., Johnstone, M., Valli, C., (2019), A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things. Sensors, 19(13), article no.2985, DOI:
  • McAteer, I., Ibrahim, A., Zheng, G., Yang, W., Valli, C., (2019), Integration of Biometrics and Steganography: A Comprehensive Review. Technologies, 7(2), Article no. 34, DOI: 10.3390/technologies7020034.
  • Ibrahim, A., Valli, C., McAteer, I., Chaudhry, J., (2018), A security review of local government using NIST CSF: a case study. Journal of Supercomputing, 74(10), 5171-5186, Springer, DOI: 10.1007/s11227-018-2479-2.
  • Baig, Z., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K., Syed, N., Peacock, M., (2017), Future Challenges for Smart Cities: Cyber-Security and Digital Forensics. Digital Investigation, 22(August 2017), 3-13, Oxon, United Kingdom, Elsevier Advanced Technology, DOI: 10.1016/j.diin.2017.06.015.

Conference Publications

  • Yang, W., Zheng, G., Ibrahim, A., Chaudhry, J., Wang, S., Hu, J., Valli, C., (2018), Application of 3D Delaunay Triangulation in Fingerprint Authentication System. Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 235(13-15 December, 2017), 291-298, Springer, Cham, Springer, DOI: 10.1007/978-3-319-90775-8_23.
  • Chong, K., Ibrahim, A., (2018), Bringing defensive artificial intelligence capabilities to mobile devices. Australian Information Security Management Conference, 41-50, Australia, Edith Cowan University, DOI: 10.25958/5c526a5866687.
  • Rabadia, P., Valli, C., Ibrahim, A., Baig, Z., (2017), Analysis of attempted intrusions: Intelligence gathered from SSH honeypots. The Proceedings of 15th Australian Information Security Management Conference, 10p., Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a839e6d1d283.
  • Woolley, C., Ibrahim, A., Hannay, P., (2017), Building a dataset for image steganography. Proceedings of the 15th Australian Digital Forensics Conference, 36-45, Perth, W.A., Edith Cowan University, DOI: 10.4225/75/5a83a0541d284.
  • Syed, N., Baig, Z., Valli, C., Ibrahim, A., (2017), Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol. Proceedings 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 748-755, online, IEEE, DOI: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.115.
  • Ibrahim, A., Valli, C., (2015), Image Similarity using Dynamic Time Warping of Fractal Features. Proceedings of 13th Australian Digital Forensics Conference, 111-122, Perth, WA, ECU Security Research Institute.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy,  IoT-MQTT based denial of service attack modelling and detection

Associate Supervisor

  • Master of Science (Computer Science),  Physical layer security using optical steganography and encoding techniques in optical networks
Skip to top of page