Top of page
Global Site Navigation

School of Science

Local Section Navigation

Help us improve our content by rating this page.

Page rating system

Please leave a comment about your rating so we can better understand how we might improve the page.

You are here: Main Content

Dr Junaid Chaudhry

Junaid is a Post-Doctoral Research Fellow at the Security Research Institute within the School of Science.

Background

    Junaid has 15 years of information and cyber security experience in academia, industry and law- enforcement. Trained at Harvard Business School, University of Amsterdam, and Kaspersky Lab, he also has project management and cyber security management capabilities. Currently he is employed at the ECU Security Research Institute (ECUSRI) where he is conducting cyber security research to help safeguard some of the most vulnerable members of our society, those within the public healthcare sector. He has authored three books, over 50 research papers and holds several patents. Junaid’s pragmatic approach to research supervision and project management has earned him skills and experience in the supervision of diverse set of students. He received awards for his research achievements from Government of South Korea, Qatar, and Pakistan and from Saudi Arabia. He is a Senior Member of IEEE, High Technology Crime Investigation Association (HTCIA), Australian Computing Society, Australian Information Security Association, and frequently volunteers his time for public speaking events, conference organisation, and editing of scientific journals.

  • Guest Professor/Security Consultant, 5/2015 – 10/2016, University of Amsterdam, Amsterdam, The Netherlands
  • Team Lead R&D and Training (Cyber Security), 02/2013- 3/2015, Information Security Center, Ministry of Interior, Doha, Qatar
  • Postdoctoral Research Fellow, 02/2012- 07/2013, Department of Computer Engineering, Qatar University, Qatar
  • Senior Lecturer, 02/2010- 01/2012, School of Computer Science, Universiti Teknologi Malaysia, Malaysia
  • AssisTeam Lead R&D and Training (Cyber Security), 02/2013- 3/2015, Information Security Center, Ministry of Interior, Doha, Qatar. tant Professor, 01/2009- 01/2010,  University of Hail, Saudi Arabia
  • Project Officer, 08/2003- 01/2008, National Center of Excellence in Ubiquitous Networks, South Korea
  • Software Engineer, 04/1999- 05/2003, WebTechnos. Net, Lahore, Pakistan

Professional Memberships

  • IEEE, Senior Member
  • Australian Computing Society (CP)
  • Australian Information Security Association
  • Event Processing Society
  • Pakistan Society of Criminology (Life Member)

Awards and Recognition

National and International Awards

  • 2015: University of Amsterdam Fellowship, University of Amsterdam, The Netherlands
  • 2014: Distinction in Certified Malware Analysts training, Organised by the Ministry of Interior, Qatar
  • 2012:Distinguised Alumni Leadership Award, University of of Management and Technology, Lahore, Pakistan
  • 2011: Universiti Teknologi Malaysia Scholarship for Teachers Training at Harvard Business School, Teaching by CASE Methods

University and National Teaching Awards

  • 2015 Basis Kwalificatie Onderwijs (BKO) – University Teaching Qualification, University of Amsterdam, The Netherlands.
  • 2011 Teaching Excellence Award: Lecturer of the year, Universiti Teknologi Malaysia (UTM), Malaysia

National and International Research Positions

  • Team Lead R&D and Training (Cyber Security), 02/2013- 3/2015, Information Security Center, Ministry of Interior, Doha, Qatar.
  • Postdoctoral Research Fellow, 02/2012- 07/2013, Department of Computer Engineering, Qatar University, Qatar.
  • FONDAZIONE BRUNO KESSLER Short Fellowship, “On Development of Lazy Algorithms for higher hit rate in Multisource Data Synchronisation Models”, Trento-Italy, 2009.

Research Areas and Interests

  • Cyber security issues in medical devices and public Healthcare settings
  • Network forensics
  • Context aware cyber security
  • Cross disciplinary research in cyber security

Qualifications

  • Doctor of Information and Communication Engineering, Korea, Republic of (South), 2009.

Research

Recent Research Grants

  • Establishing the Collaboration Between Universiti Teknologi Malaysia (UTM) & Edith Cowan University (ECU),  Edith Cowan University,  ECU Collaboration Enhancement Scheme - 2017 Round 1,  2017 - 2018,  $9,741.

Recent Publications (within the last five years)

Books

  • Chaudhry, J., (2013), Self-Healing Systems and Wireless Networks Management., 182, United States , CRC Press, DOI: 10.1201/b15517-6.

Journal Articles

  • Chaudhry, J., Qidwai, U., Zeeshan, HM., Valli, C., (2017), Secure Detection of Critical Cardiac Abnormalities for Wireless Body Area Networks. Computer Systems Science and Engineering, article in press(article in press), 11p., Leicester, United Kingdom, CRL Publishing.
  • Hussain, K., Hussain, A., Sharif, M., Chaudhry, J., (2016), Throughput incorporated cluster head election technique for mobile ad hoc networks. Journal of Computational and Theoretical Nanoscience, 13(1), 736-742, DOI: 10.1166/jctn.2016.4868.
  • Chaudhry, J., Chaudhry, S., Rittenhouse, R., (2016), Phishing Attacks and Defenses. International Journal of Security and Its Applications, 10(1), 247-256, Korea, Science and Engineering Research Support Society, DOI: 10.14257/ijsia.2016.10.1.23.
  • Ali, S., Naveed, A., Ngadi, M., Chaudhry, J., (2014), Interference Nomenclature in Wireless Mesh Networks. Wireless Personal Communications: an international journal, 75(4), 1983-2003, Springer, DOI: 10.1007/s11277-013-1449-5.
  • Chaudhry, J., Tariq, U., Amin, M., Rittenhouse, R., (2014), Sinkhole vulnerabilities in wireless sensor networks. International Journal of Security and Its Applications, 8(1), 401-410, DOI: 10.14257/ijsia.2014.8.1.37.
  • Bejuri, W., Mohamad, M., Sapri, M., Rahim, M., Chaudhry, J., (2014), Performance Evaluation of Spatial Correlation-based Feature Detection and Matching for Automated Wheelchair Navigation System. International Journal of Intelligent Transportation Systems Research, 12(1), 9-19, Springer, DOI: 10.1007/s13177-013-0064-x.
  • Mohamad, M., Bejuri, W., Sapri, M., Rahim, M., Chaudhry, J., (2013), Inverse intensity chromaticity space-based feature detection and matching for mobile indoor localization. Archives Des Sciences, 66(1), 277-293.
  • Chaudhry, J., Lee, M., (2013), Security Vulnerabilities in RFID Networks. International Journal of Advanced Smart Convergence, 2(2), 27-35, DOI: 10.7236/IJASC2013.2.2.7.
  • Rittenhouse, R., Chaudhry, J., Lee, M., (2013), Security in Graphical Authentication. International Journal of Security and Its Applications, 7(3), 347-356.

Conference Publications

  • Yang, W., Zheng, G., Ibrahim, A., Chaudhry, J., Wang, S., Hu, J., Valli, C., (2018), Application of 3D Delaunay Triangulation in Fingerprint Authentication System. Mobile Networks and Management. MONAMI 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 235(13-15 December, 2017), 291-298, Springer, Cham, Springer, DOI: 10.1007/978-3-319-90775-8_23.
  • Jahan, S., Chowdhury, M., Islam, R., Chaudhry, J., (2018), Securing Healthcare Data using Biometric Authentication. Security and Privacy in Communication Networks. SecureComm 2017, 239(October 22-25, 2017), 123-132, Springer, Cham, Springer, DOI: 10.1007/978-3-319-78816-6_10.
  • Chaudhry, J., Farmand, S., Islam, S., Islam, MR., Hannay, P., Valli, C., (2018), Discovering trends for the development of novel authentication applications for dementia patients. International Conference on Applications and Techniques in Cyber Security and Intelligence, Applications and Techniques in Cyber Security and Intelligence, 580(16-18 June, 2017), 220-237, China, Springer, DOI: 10.1007/978-3-319-67071-3_29.
  • Saleem, K., Al-Muhtadi, J., Chaudhry, J., Orgun, M., (2017), Bio-inspired Secure IPv6 Communication Protocol for Internet of Things. Proceedings of the International Conference on Sensing Technology, ICST, 2017(4-6 December 2017), 292-297, Piscataway, N.J., IEEE, DOI: 10.1109/ICSensT.2017.8304428.
  • Chaudhry, J., Saleem, K., Islam, R., Selamat, A., Ahmed, M., Valli, C., (2017), AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments. Proceedings 2017 IEEE 42nd Conference on Local Computer Networks Workshops, 121-127, IEEE, DOI: 10.1109/LCN.Workshops.2017.73.
  • Chaudhry, J., Ahmad, M., Habib, MA., Ashraf, R., Valli, C., (2017), Enhancements in Data-Recovery and Re-Transmit Mechanisms of Transmission Control Protocol Enabled Medical Devices. Proceedings 2017 IEEE 42nd Conference on Local Computer Networks Workshops, 121-12721-127, IEEE.
  • Chaudhry, J., Rittenhouse, R., (2015), Phishing: Classification and CounterMeasures. Proceedings The 7th International Conference on Multimedia, Computer Graphics and Broadcasting (MulGraB 2015), 28-31, Piscataway, USA, Institute of Electrical and Electronics Engineers Inc., DOI: 10.1109/MulGraB.2015.17.
  • Rittenhouse, R., Chaudhry, J., (2015), A Survey of Alternative Authentication Methods. International Conference on Recent Advances in Computer Systems (RACS 2015), 38(30/11/2015-1/12/2015), 179-182, online only, Atlantis Press, DOI: 10.2991/racs-15.2016.31.
  • Chaudhry, J., Chauhdry, SA., (2015), Secure Calls and Caller ID Spoofing Countermeasures. International Conference on Recent Advances in Computer Systems (RACS 2015), 38(30/11/2015-1/12/2015), 169-172, online only, Atlantis Press, DOI: 10.2991/racs-15.2016.29.
  • Javed, Y., Khan, AS., Qureshi, B., Chaudhry, J., (2015), Estimating Diabetic cases in KSA through search trends and Creating Cyber Diabetic Community. International Conference on Recent Advances in Computer Systems (RACS 2015), 38(30/11/2015-1/12/2015), 173-178, online only, Atlantis Press.
  • Chaudhry, J., Tariq, U., Arif Amin, M., Rittenhouse, R., (2013), Dealing with Sinkhole Attacks in Wireless Sensor Networks. ASTL Volume 29, 2013: Interdisciplinary Research Theory and Technology, 29(November 21-23 2013), 7-12, Sandy Bay, Australia, Science and Engineering Research Suppor SoCiety (SERSC), DOI: 10.14257/astl.2013.29.02.
Skip to top of page