Top of page
Global Site Navigation

School of Science

Local Section Navigation

Help us improve our content by rating this page.

Page rating system

Please leave a comment about your rating so we can better understand how we might improve the page.

You are here: Main Content

Dr Junaid Chaudhry

Post Doctoral Research Fellow

Contact Information Telephone: +61 8 6304 5209, Mobile: 0402182786, Email: j.chaudhry@ecu.edu.au, Campus: Joondalup,
Staff Member Details
Telephone: +61 8 6304 5209
Mobile: 0402182786
Email: j.chaudhry@ecu.edu.au
Campus: Joondalup  

 

Junaid is a Post-Doctoral Research Fellow at the Security Research Institute within the School of Science.

Background

    Junaid has 15 years of information and cyber security experience in academia, industry and law- enforcement.  Trained at Harvard Business School, University of Amsterdam, and Kaspersky Lab, he also has project management and cyber security management capabilities.    Currently he is employed at the ECU Security Research Institute (ECUSRI) where he is conducting cyber security research to help safeguard some of the most vulnerable members of our society, those within the public healthcare sector.  He has authored three books, over 50 research papers and holds several patents.  Junaid’s pragmatic approach to research supervision and project management has earned him skills and experience in the supervision of diverse set of students. He received awards for his research achievements from Government of South Korea, Qatar, and Pakistan and from Saudi Arabia. He is a Senior Member of IEEE, High Technology Crime Investigation Association (HTCIA), Australian Computing Society, Australian Information Security Association, and frequently volunteers his time for public speaking events, conference organisation, and editing of scientific journals.

  • Guest Professor/Security Consultant, 5/2015 – 10/2016,  University of Amsterdam, Amsterdam, The Netherlands
  • Team Lead R&D and Training (Cyber Security), 02/2013- 3/2015, Information Security Center, Ministry of Interior, Doha,  Qatar
  • Postdoctoral Research Fellow, 02/2012- 07/2013,   Department of Computer Engineering, Qatar University, Qatar
  • Senior Lecturer, 02/2010- 01/2012,   School of Computer Science, Universiti Teknologi Malaysia, Malaysia
  • AssisTeam Lead R&D and Training (Cyber Security), 02/2013- 3/2015, Information Security Center, Ministry of Interior, Doha,  Qatar.  tant Professor, 01/2009- 01/2010,   University of Hail, Saudi Arabia
  • Project Officer, 08/2003- 01/2008,  National Center of Excellence in Ubiquitous Networks, South Korea
  • Software Engineer, 04/1999- 05/2003,  WebTechnos. Net, Lahore, Pakistan

Professional Memberships

  • IEEE, Senior Member
  • Australian Computing Society (CP)
  • Australian Information Security Association
  • Event Processing Society
  • Pakistan Society of Criminology (Life Member)

Awards and Recognition

National and International Awards

  • 2015: University of Amsterdam Fellowship, University of Amsterdam, The Netherlands
  • 2014: Distinction in Certified Malware Analysts training, Organised by the Ministry of Interior, Qatar
  • 2012:Distinguised Alumni Leadership Award, University of of Management and Technology, Lahore, Pakistan
  • 2011: Universiti Teknologi Malaysia Scholarship for Teachers Training at Harvard Business School, Teaching by CASE Methods

University and National Teaching Awards

  • 2015 Basis Kwalificatie Onderwijs (BKO) – University Teaching Qualification, University of Amsterdam, The Netherlands.
  • 2011 Teaching Excellence Award: Lecturer of the year, Universiti Teknologi Malaysia (UTM), Malaysia

National and International Research Positions

  • Team Lead R&D and Training (Cyber Security), 02/2013- 3/2015, Information Security Center, Ministry of Interior, Doha,  Qatar.
  • Postdoctoral Research Fellow, 02/2012- 07/2013,   Department of Computer Engineering, Qatar University, Qatar.
  • FONDAZIONE BRUNO KESSLER Short Fellowship, “On Development of Lazy Algorithms for higher hit rate in Multisource Data Synchronisation Models”, Trento-Italy, 2009.

Research Areas and Interests

  • Cyber security issues in medical devices and public Healthcare settings
  • Network forensics
  • Context aware cyber security
  • Cross disciplinary research in cyber security

Qualifications

  • Doctor of Information and Communication Engineering, Korea, Republic of (South), 2009.

Research

Recent Research Grants

  • Establishing the Collaboration Between Universiti Teknologi Malaysia (UTM) & Edith Cowan University (ECU),  Edith Cowan University,  ECU Collaboration Enhancement Scheme - 2017 Round 1,  2017 - 2018,  $9,741.

Recent Publications (within the last five years)

Books

  • Chaudhry, J., (2013), Self-Healing Systems and Wireless Networks Management., 182, United States , CRC Press, DOI: 10.1201/b15517-6.

Journal Articles

  • Chaudhry, J., Qidwai, U., Zeeshan, H., Valli, C., (2017), Secure Detection of Critical Cardiac Abnormalities for Wireless Body Area Networks. Computer Systems Science and Engineering, 33(1), 1-10, UK, CRL Publishing.
  • Chaudhry, J., Imran, S., Bashir, A., (2017), Climate Control Systems for Public Safety in Smart Cars. IEEE Internet Initiative eNewsletter, Sep2017(1), 2, IEEE.
  • Chaudhry, J., Chaudhry, S., Rittenhouse, R., (2016), Phishing Attacks and Defenses. International Journal of Security and Its Applications, 10(1), 247-256, Korea,  Science and Engineering Research Support Society, DOI: 10.14257/ijsia.2016.10.1.23.
  • Hussain, K., Hussain, A., Sharif, M., Chaudhry, J., (2016), Throughput incorporated cluster head election technique for mobile ad hoc networks. Journal of Computational and Theoretical Nanoscience, 13(1), 736-742, DOI: 10.1166/jctn.2016.4868.
  • Chaudhry, J., Tariq, U., Amin, M., Rittenhouse, R., (2014), Sinkhole vulnerabilities in wireless sensor networks. International Journal of Security and Its Applications, 8(1), 401-410, DOI: 10.14257/ijsia.2014.8.1.37.
  • Ali, S., Naveed, A., Ngadi, M., Chaudhry, J., (2014), Interference Nomenclature in Wireless Mesh Networks. Wireless Personal Communications: an international journal, 75(4), 1983-2003, Springer, DOI: 10.1007/s11277-013-1449-5.
  • Bejuri, W., Mohamad, M., Sapri, M., Rahim, M., Chaudhry, J., (2014), Performance Evaluation of Spatial Correlation-based Feature Detection and Matching for Automated Wheelchair Navigation System. International Journal of Intelligent Transportation Systems Research, 12(1), 9-19, Springer, DOI: 10.1007/s13177-013-0064-x.
  • Mohamad, M., Bejuri, W., Sapri, M., Rahim, M., Chaudhry, J., (2013), Inverse intensity chromaticity space-based feature detection and matching for mobile indoor localization. Archives Des Sciences, 66(1), 277-293.
  • Rittenhouse, R., Chaudhry, J., Lee, M., (2013), Security in Graphical Authentication. International Journal of Security and Its Applications, 7(3), 347-356.
  • Chaudhry, J., Lee, M., (2013), Security Vulnerabilities in RFID Networks. International Journal of Advanced Smart Convergence, 2(2), 27-35, DOI: 10.7236/IJASC2013.2.2.7.
  • Ahmad, M., Chaudhry, J., Ngadi, MA., (2012), Congestion Control in Multi Channel 802.11b and 802.11g Wireless Networks. Romanian Journal of Information Science and Technology, 15(2), 146-154, Bucharest, Romania, Publishing House of the Romanian Academy.
  • Behnia, A., Abd Rashid, R., Chaudhry, J., (2012), A Survey of Information Security Risk Analysis Methods. Smart Computing Review, 2(1), 79-94, Seoul, Korea, Korea Academy Industrial Cooperation Society, DOI: 10.6029/smartcr.2012.01.007.
  • Subramaniam, A., Chaudhry, J., Ahmad, M., (2012), A Study on Elliptic Curve Digital Signature Algorithm (ECDSA) for Reliable E-Commerce Applications. Journal of The Smart Computing Review, 2(1), 71-78, Seoul, Korea, Korea Academy Industrial Cooperation Society, DOI: 10.6029/smartcr.2012.01.006.

Conference Publications

  • Chaudhry, J., Ahmad, M., Habib, M., Ashraf, R., Valli, C., (2017), Enhancements in Data-Recovery and Re-Transmit Mechanisms of Transmission Control Protocol Enabled Medical Devices. 2017 IEEE 42nd Conference on Local Computer Networks, 42(9-12 Oct 2017), 121-12721-127, Singapore, IEEE.
  • Jahan, S., Chowdhury, M., Islam, R., Chaudhry, J., (2017), Securing Healthcare Data using Biometric Authentication. Springer, 1(October 22-25, 2017), 11, Canada, Springer.
  • Younas, T., Ahmad, M., Chaudhry, J., Habib, MA., Ahmad, SH., (2017), A Review of Current Security Issues in Internet of Things., 5, Springer.
  • Chaudhry, J., Saleem, K., Islam, R., Selamat, A., Ahmed, M., Valli, C., (2017), AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments. AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments, 121-127, IEEE, DOI: 10.1109/LCN.Workshops.2017.73.
  • Saleem, K., Al-Muhtadi, J., Chaudhry, J., Orgun, M., (2017), Bio-inspired Secure IPv6 Communication Protocol for Internet of Things. IEEE Xplore, 5, Sydney, IEEE.
  • Rittenhouse, R., Chaudhry, J., (2015), A Survey of Alternative Authentication Methods. International Conference on Recent Advances in Computer Systems (RACS 2015), 38(30/11/2015-1/12/2015), 179-182, online only, Atlantis Press, DOI: 10.2991/racs-15.2016.31.
  • Chaudhry, J., Chauhdry, SA., (2015), Secure Calls and Caller ID Spoofing Countermeasures. International Conference on Recent Advances in Computer Systems (RACS 2015), 38(30/11/2015-1/12/2015), 169-172, online only, Atlantis Press, DOI: 10.2991/racs-15.2016.29.
  • Chaudhry, J., Rittenhouse, R., (2015), Phishing: Classification and CounterMeasures. Proceedings The 7th International Conference on Multimedia, Computer Graphics and Broadcasting (MulGraB 2015), 28-31, Piscataway, USA, Institute of Electrical and Electronics Engineers Inc., DOI: 10.1109/MulGraB.2015.17.
  • Javed, Y., Khan, AS., Qureshi, B., Chaudhry, J., (2015), Estimating Diabetic cases in KSA through search trends and Creating Cyber Diabetic Community. International Conference on Recent Advances in Computer Systems (RACS 2015), 38(30/11/2015-1/12/2015), 173-178, online only, Atlantis Press.
  • Chaudhry, J., Tariq, U., Arif Amin, M., Rittenhouse, R., (2013), Dealing with Sinkhole Attacks in Wireless Sensor Networks. ASTL Volume 29, 2013: Interdisciplinary Research Theory and Technology, 29(November 21-23 2013), 7-12, Sandy Bay, Australia, Science and Engineering Research Suppor SoCiety (SERSC), DOI: 10.14257/astl.2013.29.02.
  • Chaudhry, J., Qidwai, U., Malrey , L., (2012), Dynamic health level 7 packetizer for on-the-fly integrated healthcare enterprises (IHE) in disaster zones. Neural Information Processing: 19th International Conference, ICONIP 2012, 7663(12-15 Nov, 2012), 432-438, Heidelberg, Germany, Springer, DOI: 10.1007/978-3-642-34475-6_52.
  • Rittenhouse, R., Lee, M., Chaudhry, J., Qidwai, U., (2012), Power and task management in wireless body area network based medical monitoring systems. Lecture Notes in Computer Science, 7666 LNCS(12-15 Nov, 2012), 404-414, DOI: 10.1007/978-3-642-34478-7_50.
  • Qidwai, U., Chaudhry, J., Shakir, M., (2012), Ubiquitous monitoring system for critical cardiac abnormalities. 2012 IEEE-EMBS Conference on Biomedical Engineering and Sciences Proceedings, 872-877, Piscataway, USA, Institute of Electrical and Electronics Engineers Inc., DOI: 10.1109/IECBES.2012.6498125.
  • Chaudhry, J., Qidwai, U., Rittenhouse, R., Lee, M., (2012), Vulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks. Conference Proceedings 2012 International Conference on Emerging Technologies, 259-263, Piscataway, USA, Institute of Electrical and Electronics Engineers Inc., DOI: 10.1109/ICET.2012.6375433.
  • Chaudhry, J., Qidwai, U., (2012), On critical point avoidance among mobile terminals in healthcare monitoring applications: Saving lives through reliable communication software. 2012 IEEE Conference on Open Systems (ICOS 2012) Conference Proceedings, art 6417658, Piscataway, USA, Institute of Electrical and Electronics Engineers Inc., DOI: 10.1109/ICOS.2012.6417658.
  • Chaudhry, J., Qidwai, U., Ahmad, M., (2012), Performance evaluation of TCP and UDP traffic in IEEE 1451 compliant healthcare infrastructure. Neural Information Processing: 19th International Conference, ICONIP 2012, 7666(12-15 Nov, 2012), 396-403, Heidelberg, Germany, Springer, DOI: 10.1007/978-3-642-34478-7_49.
Skip to top of page