Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr Mohiuddin Ahmed

Lecturer

Staff Member Details
Telephone: +61 8 6304 5121
Email: mohiuddin.ahmed@ecu.edu.au
Campus: Joondalup  
Room: JO18.418B  
ORCID iD: https://orcid.org/0000-0002-4559-4768

Overview of role

Dr. Mohiuddin Ahmed is a Lecturer of Computing and Security discipline in the School of Science.

Current Teaching

  • CSI3350 Enterprise Security and Governance
  • CSI2107 Software Reverse Engineering

Background

Mohiuddin Ahmed has made practical and theoretical contributions in cyber security and big data analytics for several application domains. His research has a high impact on data and security analytics, false data injection attacks, and digital health. Mohiuddin has led edited multiple books and contributed articles in The Conversation. He has over 50 publications in reputed venues. Mohiuddin secured the prestigious ECU Early Career Researcher Grant for investigating effectiveness of blockchain for dependable and secure e-health. He also secured several external and internal grants within a very short time frame.

Professional Memberships

  • IEEE Senior Member
  • ACS Certified Professional
  • AISA

Awards and Recognition

National and International Awards

  • 2020 Edith Cowan University Aspire Award Winner
  • UNSW Canberra - High Impact Research Publications Award
  • UNSW Canberra - PhD Thesis Writing Fellowship
  • UNSW Canberra - University International Postgraduate Award
  • UNSW Canberra - Postgraduate Research Support Scheme

University and National Teaching Awards

  • CIT Cyber Teaching Team Nomination for Staff Achievement Award, 2018

National and International Research Positions

  • 2016 - Senior Researcher at MIMOS, Malaysian National R&D.

Research Areas and Interests

  • Cyber Security
  • Data Analytics
  • Machine Learning
  • Big Data
  • Edge Computing
  • Blockchain
  • Healthcare
  • Drones

Qualifications

  • Doctor of Philosophy, The University of New South Wales, 2016.

Research Outputs

Journal Articles

  • Rashid, B., Ahmed, M., Pathan, AK. (2021). Infrequent Pattern Detection for Reliable Network Traffic Analysis Using Robust Evolutionary Computation. Sensors, 21(9), 1-16. https://doi.org/10.3390/s21093005.
  • Akhter, AF., Ahmed, M., Shah, AF., Anwar, A., Kayes , AS., Zengin, A. (2021). A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network. Sensors, 21(4), 1-21. https://doi.org/10.3390/s21041273.
  • Akhter, AF., Shah, AF., Ahmed, M., Moustafa, N., Çavu¸soglu, U., Zengin, A. (2021). A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks. Computers, Materials and Continua, 68(1), 229–246. https://doi.org/10.32604/cmc.2021.015447.
  • Akhter, AF., Ahmed, M., Shah, AF., Anwar, A., Zengin, A. (2021). A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET. Sustainability, 13(1), 1-25. https://doi.org/10.3390/su13010400.

Book Chapters

  • Al Fahdi, H., Ahmed, M. (2020). Cryptographic Attacks, Impacts and Countermeasures. Security Analytics for the Internet of Everything (217-232). CRC Press.
  • Bostami, B., Ahmed, M. (2020). Deep Learning Meets Malware Detection: An Investigation. Combating Security Challenges in the Age of Big Data (137-155). Springer. https://doi.org/https://doi.org/10.1007/978-3-030-35642-2_7.
  • Sadik, S., Ahmed, M. (2020). An Overview of Dark Web. Security Analytics for the Internet of Everything (55-64). CRC Press.
  • Sadik, S., Ahmed, M., Hassan, MH. (2020). Blockchain in Healthcare. Blockchain in Data Analytics (234-253). Cambridge Scholars Publishing.
  • Chong, K., Ahmed, M., Islam, S. (2020). An Investigation of Performance Analysis of Machine Learning-Based Techniques for Network Anomaly Detection. Security Analytics for the Internet of Everything (117-156). CRC Press.
  • Seraj, R., Ahmed, M. (2020). Concept Drift for Big Data. Combating Security Challenges in the Age of Big Data (29-43). Springer. https://doi.org/https://doi.org/10.1007/978-3-030-35642-2_2.
  • Saeed, M., Rashid, T., Ahmed, M. (2020). A Benefits Realization Approach to Cyber Security Projects Implementation in the Public Sector Organizations. Security Analytics for the Internet of Everything (93-114). CRC Press.
  • Furhad, MH., Sadik, S., Ahmed, M., Barkat, A. (2020). Exploring E-Commerce in Cyber Security Context Through Blockchain Technology. Blockchain in Data Analytics (216-233). Cambridge Scholars Publishing.
  • Rashid, T., Saeed, M., Ahmed, M. (2020). A New Era of Project Management Using Blockchain Technology. Blockchain in Data Analytics (102-121). Cambridge Scholars Publishing.
  • Bostami, B., Ahmed, M. (2020). Blockchain for Internet of Things. Blockchain in Data Analytics (24-51). Cambridge Scholars Publishing.

Journal Articles

Conference Publications

  • Furhad, MH., Ahmed, M., Barkat, A. (2020). A Study on Monitoring Coastal Areas for Having a Better Underwater Surveillance Perspective. Proceedings of International Joint Conference on Computational Intelligence IJCCI 2018 (163-174). Springer. https://doi.org/10.1007/978-981-13-7564-4_14.

Book Chapters

Journal Articles

Conference Publications

  • Khandaker, S., Hussain, A., Ahmed, M. (2019). Effectiveness of Hard Clustering Algorithms for Securing Cyber Space. Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018 Proceedings (113-120). Springer, Cham. https://doi.org/10.1007/978-3-030-05928-6_11.
  • Saeed, M., Ahmed, M. (2019). Evaluation Metrics for Big Data Project Management. Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018 Proceedings (139-142). Springer. https://doi.org/10.1007/978-3-030-05928-6_14.
  • Ahmed, M., Barkat, A. (2019). Performance Analysis of Hard Clustering Techniques for Big IoT Data Analytics. Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019 (62-66). IEEE. https://doi.org/10.1109/CCC.2019.000-8.
  • Ahmed, M., Pathan, AK. (2019). Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study. Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers (211--219). Springer. https://doi.org/10.1007/978-981-13-5826-5_15.

Book Chapters

  • Ahmed, M., Haque, N. (2018). Anomaly Detection and Big Data in IPTV Networks. IPTV Delivery Networks: Next Generation Architectures for Live and Video-on-Demand Services (). John Wiley & Sons.
  • Saeed, M., Ahmed, M. (2018). Project Management for Effective Data Analytics. Data Analytics Concepts, Techniques, and Applications (219-234). CRC Press. https://doi.org/10.1201/9780429446177.
  • Hassan, MM., Ahmed, M. (2018). Blockchain in the Era of Industry 4.0. Data Analytics Concepts, Techniques, and Applications (235-273). CRC Press. https://doi.org/10.1201/9780429446177.
  • Ahmed, M., Barkat, A. (2018). Health Care Security Analytics. Data Analytics Concepts, Techniques, and Applications (403-416). CRC Press. https://doi.org/10.1201/9780429446177.
  • Bostami, B., Ahmed, M. (2018). Intrusion Detection for Big Data. Data Analytics Concepts, Techniques, and Applications (375-402). CRC Press. https://doi.org/10.1201/9780429446177.

Journal Articles

Conference Publications

  • Ahmed, M., Ullah, A. (2018). False Data Injection Attacks in Healthcare. Data Mining. AusDM 2017. Communications in Computer and Information Science, vol 845 (192-202). Springer. https://doi.org/10.1007/978-981-13-0292-3_12.

Book Chapters

  • Ahmed, M. (2017). Infrequent Pattern Identification in SCADA Systems Using Unsupervised Learning. Security Solutions and Applied Cryptography in Smart Grid Communications (215-225). IGI Global. https://doi.org/10.4018/978-1-5225-1829-7.ch011.

Journal Articles

Conference Publications

  • Ahmed, M., Choudhury, N., Uddin, S. (2017). Anomaly detection on big data in financial markets. ASONAM '17 Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 (998-1001). ACM. https://doi.org/10.1145/3110025.3119402.

Journal Articles

  • Ahmed, M., Mahmood, A., Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60(1 January 2016), 19-31. https://doi.org/10.1016/j.jnca.2015.11.016.
  • Ahmed, M., Mahmood, A., Islam, MR. (2016). A survey of anomaly detection techniques in financial domain. Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications, 55(1 February 2016), 278-288. https://doi.org/10.1016/j.future.2015.01.001.

Journal Articles

  • Ahmed, M., Anwar, A., Mahmood, A., Shah, Z., Maher, M. (2015). An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2(3), article no. e5. https://doi.org/10.4108/inis.2.3.e5.
  • Ahmed, M., Mahmood, A. (2015). Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection. Annals of Data Science, 2(1), 111-130. https://doi.org/10.1007/s40745-015-0035-y.
  • Ahmed, M., Mahmood, A., Maher, M. (2015). An Efficient Technique for Network Traffic Summarization using Multiview Clustering and Statistical Sampling. EAI Endorsed Transactions on Scalable Information Systems, 2(5), article no. e4. https://doi.org/10.4108/sis.2.5.e4.

Conference Publications

  • Anwar, A., Mahmood, A., Ahmed, M. (2015). False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (252-266). Springer, Cham. https://doi.org/10.1007/978-3-319-23802-9_20.
  • Ahmed, M., Mahmood, A., Maher, M. (2015). Heart Disease Diagnosis Using Co-clustering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (61-70). Springer, Cham. https://doi.org/10.1007/978-3-319-16868-5_6.
  • Ahmed, M., Mahmood, A. (2015). Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (204-219). Springer, Cham. https://doi.org/10.1007/978-3-319-23802-9_17.
  • Ahmed, M., Mahmood, A., Maher, M. (2015). A Novel Approach for Network Traffic Summarization. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (51-60). Springer, Cham. https://doi.org/10.1007/978-3-319-16868-5_5.
  • Ahmed, M., Mahmood, A., Maher, M. (2015). An Efficient Approach for Complex Data Summarization Using Multiview Clustering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (38-47). Springer, Cham. https://doi.org/10.1007/978-3-319-16868-5_4.

Conference Publications

  • Ahmed, M., Mahmood, A. (2014). Clustering based semantic data summarization technique: A new approach. 2014 9th IEEE Conference on Industrial Electronics and Applications (1780-1785). IEEE.
  • Ahmed, M., Mahmood, A. (2014). Network traffic analysis based on collective anomaly detection. 2014 9th IEEE Conference on Industrial Electronics and Applications (1141–1146). IEEE.

Research Projects

  • Developing autonomous solutions for building knowledge graphs to support educational outcomes in Virtuoso, CingleVue International Pty Ltd, Scholarships to Support Industry Engagement PhD Projects , 2020 ‑ 2024, $150,000.
  • Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 ‑ 2022, $120,000.
  • Securing Internet of Medical Things against False Data Injection Attacks Using Blockchain, Edith Cowan University, ECU Early Career Researcher Grant - 2019, 2019 ‑ 2020, $25,000.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy, Cooperative co-evolution-based feature selection for big data analytics
No data available
Skip to top of page