Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr Mohiuddin Ahmed

Lecturer

Contact Information Telephone: +61 8 6304 5121, Email: mohiuddin.ahmed@ecu.edu.au, Campus: Joondalup, Room: JO18418B
Staff Member Details
Telephone: +61 8 6304 5121
Email: mohiuddin.ahmed@ecu.edu.au
Campus: Joondalup  
Room: JO18418B  

 

Overview of role

Dr. Mohiuddin Ahmed is a Lecturer of Computing and Security discipline in the School of Science.

Current Teaching

  • CSI2107 Software Reverse Engineering
  • CSG3309 IT Security Management

Background

Mohiuddin Ahmed has made practical and theoretical contributions in cyber security and big data analytics for several application domains. His research has a high impact on data and security analytics, false data injection attacks, and digital health. Mohiuddin has led edited multiple books and contributed articles in The Conversation. He has over 50 publications in reputed venues. Mohiuddin secured the prestigious ECU Early Career Researcher Grant for investigating effectiveness of blockchain for dependable and secure e-health. He also secured several external and internal grants within a very short time frame.

Professional Memberships

  • IEEE (Senior Member)
  • ACS
  • AISA

Awards and Recognition

National and International Awards

  • UNSW Canberra - High Impact Research Publications Award
  • UNSW Canberra - PhD Thesis Writing Fellowship
  • UNSW Canberra - University International Postgraduate Award
  • UNSW Canberra - Postgraduate Research Support Scheme

University and National Teaching Awards

  • CIT Cyber Teaching Team Nomination for Staff Achievement Award, 2018

National and International Research Positions

  • 2016 - Senior Researcher at MIMOS, Malaysian National R&D.

Research Areas and Interests

  • Cyber Security
  • Data Analytics
  • Machine Learning
  • Big Data
  • Edge Computing
  • Blockchain
  • Healthcare
  • Drones

Qualifications

  • Doctor of Philosophy, The University of New South Wales, 2016.

Research

Recent Research Grants

  • Developing autonomous solutions for building knowledge graphs to support educational outcomes in Virtuoso,  CingleVue Pty Ltd,  Scholarships to Support Industry Engagement PhD Project,  2020 - 2024,  $150,000.
  • Securing Internet of Medical Things against False Data Injection Attacks Using Blockchain,  Edith Cowan University,  ECU Early Career Researcher Grant - 2019,  2019 - 2020,  $25,000.

Recent Publications (within the last five years)

Book Chapters

  • Fahdi, H., Ahmed, M., (2020), Cryptographic Attacks, Impacts and Countermeasures. Security Analytics for Internet of Everything , 217-232, USA, CRC Press.
  • Chong, K., Ahmed, M., Islam, S., (2020), An Investigation of Performance Analysis of Machine Learning-Based Techniques for Network Anomaly Detection. Security Analytics for Internet of Everything , 117-156, USA, CRC Press.
  • Saeed, M., Rashid, T., Ahmed, M., (2020), A Benefits Realization Approach to Cyber Security Projects Implementation in the Public Sector Organizations. Security Analytics for Internet of Everything , 93-114, USA, CRC Press.
  • Sadik, S., Ahmed, M., (2020), An Overview of Dark Web. Security Analytics for Internet of Everything , 55-64, USA, CRC Press.
  • Sadik, S., Ahmed, M., Hassan, MH., (2020), BLOCKCHAIN IN HEALTHCARE. Blockchain in Data Analytics, 234-253, UK, Cambridge Scholars Publishing.
  • Furhad, MH., Sadik, S., Ahmed, M., Barkat, A., (2020), EXPLORING E-COMMERCE IN CYBER SECURITY CONTEXT THROUGH BLOCKCHAIN TECHNOLOGY. Blockchain in Data Analytics, 216-233, UK, Cambridge Scholars Publishing.
  • Seraj, R., Ahmed, M., (2020), Concept Drift for Big Data. Combating Security Challenges in the Age of Big Data, 29-43,  Springer Nature Switzerland AG, Springer , DOI: https://doi.org/10.1007/978-3-030-35642-2_2.
  • Rashid, T., Saeed, M., Ahmed, M., (2020), A NEW ERA OF PROJECT MANAGEMENT USING BLOCKCHAIN TECHNOLOGY. Blockchain in Data Analytics, 102-121, UK, Cambridge Scholars Publishing.
  • Bostami, B., Ahmed, M., (2020), BLOCKCHAIN FOR INTERNET OF THINGS. Blockchain in Data Analytics, 24-51, UK, Cambridge Scholars Publishing.
  • Bostami, B., Ahmed, M., (2020), Deep Learning Meets Malware Detection: An Investigation. Combating Security Challenges in the Age of Big Data, 137-155,  Springer Nature Switzerland AG, Springer , DOI: https://doi.org/10.1007/978-3-030-35642-2_7.
  • Ahmed, M., Choudhury, S., Al-Turjman, F., (2019), Big Data Analytics for Intelligent Internet of Things. Artificial Intelligence in IoT, 107-127, Cham, Switzerland, Springer, DOI: 10.1007/978-3-030-04110-6.
  • Bostami, B., Ahmed, M., Choudhury, S., (2019), False Data Injection Attacks in Internet of Things. Performability in Internet of Things, 47-58, Cham, Switzerland, Springer, DOI: 10.1007/978-3-319-93557-7.
  • Saeed, M., Ahmed, M., (2018), Project Management for Effective Data Analytics. Data Analytics Concepts, Techniques, and Applications, 219-234, Boca Raton, USA, CRC Press, DOI: 10.1201/9780429446177.
  • Ahmed, M., Haque, N., (2018), Anomaly Detection and Big Data in IPTV Networks. IPTV Delivery Networks: Next Generation Architectures for Live and Video-on-Demand Services, Hoboken, USA, John Wiley & Sons.
  • Hassan, MM., Ahmed, M., (2018), Blockchain in the Era of Industry 4.0. Data Analytics Concepts, Techniques, and Applications, 235-273, Boca Raton, USA, CRC Press, DOI: 10.1201/9780429446177.
  • Bostami, B., Ahmed, M., (2018), Intrusion Detection for Big Data. Data Analytics Concepts, Techniques, and Applications, 375-402, Boca Raton, USA, CRC Press, DOI: 10.1201/9780429446177.
  • Ahmed, M., Barkat, A., (2018), Health Care Security Analytics. Data Analytics Concepts, Techniques, and Applications, 403-416, Boca Raton, USA, CRC Press, DOI: 10.1201/9780429446177.
  • Ahmed, M., (2017), Infrequent Pattern Identification in SCADA Systems Using Unsupervised Learning. Security Solutions and Applied Cryptography in Smart Grid Communications, 215-225, Hershey, USA, IGI Global , DOI: 10.4018/978-1-5225-1829-7.ch011.

Journal Articles

  • Ahmed, M., Pathan, AK., (2020), Blockchain: Can It Be Trusted?. Computer, 53(4), 31-35, USA, DOI: 10.1109/MC.2019.2922950.
  • Ahmed, M., Pathan, M., (2020), False Data Injection Attack (FDIA): An Overview and New Metrics for Fair Evaluation of its Countermeasure. Complex Adaptive Systems Modeling, 8(4), 1-14, USA, DOI: 10.1186/s40294-020-00070-w.
  • Ahmed, M., Islam, AK., (2020), Deep Learning: Hope or Hype. Annals of Data Science, 1-6, Springer Berlin Heidelberg, DOI: 10.1007/s40745-019-00237-0.
  • Ahmed, M., (2019), Intelligent Big Data Summarization for Rare Anomaly Detection. IEEE Access, 7(2019), 68669-68677, DOI: 10.1109/ACCESS.2019.2918364.
  • Yang, J., Hasan Onik, MM., Lee, N., Ahmed, M., Kim, C., (2019), Proof-of-Familiarity: A Privacy-Preserved Blockchain Scheme for Collaborative Medical Decision-Making. Applied Sciences, 9(7), Article no.1370, DOI: 10.3390/app9071370.
  • Aurisch, R., Ahmed, M., Barkat, A., (2019), An outlook at Agile methodologies for the independent games developer. International Journal of Computers and Applications, 1-7, Taylor & Francis, UK, DOI: 10.1080/1206212X.2019.1621463.
  • Ahmed, M., (2019), False Image Injection Prevention Using iChain. MDPI Applied Sciences, 9(20), Article number 4328, DOI: 10.3390/app9204328.
  • Ahmed, M., (2019), Data summarization: a survey. Knowledge and Information Systems, 58(2), 249-273, DOI: 10.1007/s10115-018-1183-0.
  • Ahmed, M., (2018), Reservoir-based network traffic stream summarization for anomaly detection. Pattern Analysis and Applications, 21(2), 579-599, DOI: 10.1007/s10044-017-0659-y.
  • Ahmed, M., Barkat, A., (2018), Infrequent pattern mining in smart healthcare environment using data summarization. Journal of Supercomputing, 74(10), 5041-5059, DOI: 10.1007/s11227-018-2376-8.
  • Ahmed, M., (2018), Collective Anomaly Detection Techniques for Network Traffic Analysis. Annals of Data Science, 5(4), 497-512, Heidelberg, Germany, DOI: 10.1007/s40745-018-0149-0.
  • Ahmed, M., (2017), An Unsupervised Approach of Knowledge Discovery from Big Data in Social Network. EAI Endorsed Transactions on Scalable Information Systems, 4(14), article no. e3, Belgium, DOI: 10.4108/eai.25-9-2017.153148.
  • Ahmed, M., (2017), Thwarting DoS Attacks: A Framework for Detection based on Collective Anomalies and Clustering. Computer, 50(9), 76-82, DOI: 10.1109/MC.2017.3571051.
  • Ahmed, M., Mahmood, A., Hu, J., (2016), A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60(1 January 2016), 19-31, DOI: 10.1016/j.jnca.2015.11.016.
  • Ahmed, M., Mahmood, A., Islam, MR., (2016), A survey of anomaly detection techniques in financial domain. Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications, 55(1 February 2016), 278-288, DOI: 10.1016/j.future.2015.01.001.
  • Ahmed, M., Mahmood, A., (2015), Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection. Annals of Data Science, 2(1), 111-130, Heidelberg, Germany, DOI: 10.1007/s40745-015-0035-y.
  • Ahmed, M., Mahmood, A., Maher, M., (2015), An Efficient Technique for Network Traffic Summarization using Multiview Clustering and Statistical Sampling. EAI Endorsed Transactions on Scalable Information Systems, 2(5), article no. e4, Belgium, DOI: 10.4108/sis.2.5.e4.
  • Ahmed, M., Anwar, A., Mahmood, A., Shah, Z., Maher, M., (2015), An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2(3), article no. e5, Belgium, DOI: 10.4108/inis.2.3.e5.

Conference Publications

  • Furhad, MH., Ahmed, M., Barkat, A., (2020), A Study on Monitoring Coastal Areas for Having a Better Underwater Surveillance Perspective. Algorithms for Intelligent Systems, 163-174, Singapore, Springer, Singapore, DOI: 10.1007/978-981-13-7564-4_14.
  • Ahmed, M., Barkat, A., (2019), Performance Analysis of Hard Clustering Techniques for Big IoT Data Analytics. Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019, 62-66, Online, IEEE, DOI: 10.1109/CCC.2019.000-8.
  • Saeed, M., Ahmed, M., (2019), Evaluation Metrics for Big Data Project Management. Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018 Proceedings, 256(July 11-11, 2018), 139-142, Cham, Switzerland, Springer, DOI: 10.1007/978-3-030-05928-6_14.
  • Ahmed, M., Pathan, AK., (2019), Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study. Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers, 969(Sep. 19-22, 2018), 211--219, Singapore, Springer, DOI: 10.1007/978-981-13-5826-5_15.
  • Khandaker, S., Hussain, A., Ahmed, M., (2019), Effectiveness of Hard Clustering Algorithms for Securing Cyber Space. Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018 Proceedings, 256(July 11-11, 2018), 113-120, Cham, Switzerland, Springer, Cham, DOI: 10.1007/978-3-030-05928-6_11.
  • Ahmed, M., Ullah, A., (2018), False Data Injection Attacks in Healthcare. Data Mining. AusDM 2017. Communications in Computer and Information Science, vol 845, 845, , 192-202, Singapore, Springer, DOI: 10.1007/978-981-13-0292-3_12.
  • Ahmed, M., Choudhury, N., Uddin, S., (2017), Anomaly detection on big data in financial markets. ASONAM '17 Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, 998-1001, New York, NY, USA, ACM, DOI: 10.1145/3110025.3119402.
  • Ahmed, M., Mahmood, A., Maher, M., (2015), A Novel Approach for Network Traffic Summarization. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 139(September 25-26, 2014), 51-60, Cham, Switzerland, Springer, Cham, DOI: 10.1007/978-3-319-16868-5_5.
  • Ahmed, M., Mahmood, A., Maher, M., (2015), An Efficient Approach for Complex Data Summarization Using Multiview Clustering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 139(September 25-26, 2014), 38-47, Cham, Switzerland, Springer, Cham, DOI: 10.1007/978-3-319-16868-5_4.
  • Anwar, A., Mahmood, A., Ahmed, M., (2015), False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 153(24th–26th Sep 2014), 252-266, Cham, Switzerland, Springer, Cham, DOI: 10.1007/978-3-319-23802-9_20.
  • Ahmed, M., Mahmood, A., (2015), Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 153(September 24-26, 2014), 204-219, Cham, Switzerland, Springer, Cham, DOI: 10.1007/978-3-319-23802-9_17.
  • Ahmed, M., Mahmood, A., Maher, M., (2015), Heart Disease Diagnosis Using Co-clustering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 139(September 25-26, 2014), 61-70, Cham, Switzerland, Springer, Cham, DOI: 10.1007/978-3-319-16868-5_6.
Skip to top of page