Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr Nickson M. Karie

Cyber Security CRC Post Doctoral Researcher

Staff Member Details
Telephone: +61 8 6304 4696
Email: n.karie@ecu.edu.au
Campus: Joondalup  
Room: JO23.302  

Nickson M. Karie is a Cyber Security CRC Research Fellow at the ECU Security Research Institute within the School of Science.

Background

Aug. 2019 – Present: Research Fellow (Cyber Security CRC). ECU-Security Research Institute, School of Science - Edith Cowan University.

  • Conduct Research in Real Time Monitoring of Cyber Security Threats
  • Providing Consultancy Services in Cyber Security and Forensics

Jan 2018 – July 2019: Founder and Chair, Cyber Security and Forensics Research Group. (1 Year 7 Months). Department of Computer Science, University of Swaziland.

  • Conduct Research in Cyber Security and Forensics
  • Providing Consultancy Services in Cyber Security and Forensics

Aug. 2017 –July 2019: Senior Lecturer (2 Years). Department of Computer Science, University of Swaziland.

  • Teach Courses, Supervise Students and Conduct Research in Cyber Security and Forensics
  • Providing Consultancy Services in Cyber Security and Forensics

Aug. 2017 –July 2019: Senior Lecturer (7 Months). Department of Computer Science, Daystar University - Kenya.

  • Teach Courses, Supervise Students and Conduct Research in Cyber Security and Forensics
  • Providing Consultancy Services in Cyber Security and Forensics

Sept. 2014 –Dec 2016: Lecturer (2 Years 4 Months). Department of Computer Science and I.T, Kabarak University - Kenya.

  • Teach Courses, Supervise Students and Conduct Research in Cyber Security and Forensics
  • Providing Consultancy Services in Cyber Security and Forensics

May 2008 – Aug. 2014: Assistant Lecturer (6 Years 4 Months). Department of Computer Science and I.T, Kabarak University - Kenya.

  • Teach Courses, Supervise Students and Conduct Research in Cyber Security and Forensics
  • Providing Consultancy Services in Cyber Security and Forensics

Management Experience

Sept. 2015 –Dec 2016: Head of Department (1 Year 11 Months). Department of Computer Science and I.T, Kabarak University - Kenya.
  • Managing day to day administration and departmental activities
  • Delivering department progress reports to management on a regular basis.

Consultancy

Jan 2018 – July 2019: Consultant & Technical Advisory Committee Member- Ministry of ICT- Government of Swaziland. (1 Years 7 Months)

  • Providing Consultancy Services in Cyber Security and Forensics
  • Organising Seminars and Workshops to train Senior Police officers, Prosecutors and Lawyers on matters related to Cyber Security and Cyber Crimes in Swaziland
  • Providing technical knowledge to the Ministry on matters concerning the National Cyber Security Strategy 2022 for the Kingdom of Swaziland
  • Help in reviewing the national Cyber Laws focusing on Cyber Crimes and Electronic Communications

Jan 2018 – July 2019: Quality & Standards Review Panel Member- Higher Education Council, Government of Swaziland. (1 Years 7 Months)

  • Offering institutional and program audits, quality promotion and standards development
  • Help in Crafting Quality Cyber Security Programs for Academic Institutions in Swaziland
  • Jan 2018 -Present: Institute of Electrical and Electronics Engineers (IEEE) - Membership No. 94859160

Professional Memberships

  • Jan 2013 – Dec 2016: Institute of Information Technology Professionals South Africa (IITPSA)-Student Member (SIITPSA) - Membership No. K034995
  • 2012-2014: Special International Research Grant – University of Pretoria, South Africa
  • 2013 -2014: National Council of Science and Technology (NACOSTI) Kenya - ST&I Grant for Postgraduate (PhD & MSc /MA) 5th Call.
  • 2012-2014: Postgraduate Doctoral Research Grant – University of Pretoria, South Africa
  • 2013-2015: Postgraduate Research Support Grant – University of Pretoria, South Africa
  • 2018 – 2019: Founder and Chair, Cyber Security and Forensics Research Group. University of Swaziland.
  • Cyber Security and Forensics
  • Internet of Things Security
  • Network and systems Security
  • Intrusion Detection and Prevention
  • Information and Computer Security Architecture

Awards and Recognition

National and International Awards

  • 2012-2014: Special International Research Grant – University of Pretoria, South Africa
  • 2013 -2014: National Council of Science and Technology (NACOSTI) Kenya - ST&I Grant for Postgraduate (PhD & MSc /MA) 5th Call.
  • 2012-2014: Postgraduate Doctoral Research Grant – University of Pretoria, South Africa
  • 2013-2015: Postgraduate Research Support Grant – University of Pretoria, South Africa
  • 2018 – 2019: Founder and Chair, Cyber Security and Forensics Research Group. University of Swaziland.

University and National Teaching Awards

  • 2012-2014: Postgraduate Doctoral Research Grant – University of Pretoria, South Africa
  • 2013-2015: Postgraduate Research Support Grant – University of Pretoria, South Africa

National and International Research Positions

  • 2018 – 2019: Founder and Chair, Cyber Security and Forensics Research Group. University of Swaziland.

Research Areas and Interests

  • Cyber Security and Forensics
  • Internet of Things Security
  • Network and systems Security
  • Intrusion Detection and Prevention
  • Information and Computer Security Architecture

Qualifications

  • Doctor of Philosophy, South Africa, 2016.
  • Master of Science in Information Technology, India, 2007.
  • Honours Diploma in Web Applications, India, 2007.
  • Bachelor of Science (Honours) Information Technology, India, 2005.

Research Outputs

Journal Articles

Journal Articles

  • Kebande, VR., Karie, N., Ikuesan, R., Venter, H. (2020). Ontology‐driven perspective of CFRaaS. Wiley Interdisciplinary Reviews: Forensic Science, 2(5), Article number e1372. https://doi.org/https://doi.org/10.1002/wfs2.1372.
  • Kebande, VR., Ikuesan, RA., Karie, N., Sadi, A., Choo, K., Al-Dhaqm, A. (2020). Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments. Forensic Science International: Reports, 2(December 2020), Article number 100122. https://doi.org/https://doi.org/10.1016/j.fsir.2020.100122.

Conference Publications

  • Karie, N., Kebande, VR., Ikuesan, RA., Sookhak, M., Venter, HS. (2020). Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud. NISS2020: Proceedings of the 3rd International Conference on Networking, Information Systems & Security (1-6). Association for Computing Machinery. https://doi.org/https://doi.org/10.1145/3386723.3387875.
  • Mlotshwa, LL., Makura, SM., Karie, N., Kebande, VR. (2020). Opportunistic security architecture for osmotic computing paradigm in dynamic IoT-Edge's resource diffusion. ICONIC '20: Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications (1-7). Association for Computing Machinery. https://doi.org/10.1145/3415088.3415097.
  • Karie, N., Bin Sahri, NM., Haskell-Dowland, P. (2020). IoT Threat Detection Advances, Challenges and Future Directions. Proceedings 2020 Workshop on Emerging Technologies for Security in IoT ETSecIoT 2020 (22-29). Institute of Electrical and Electronics Engineers, Inc.. https://doi.org/10.1109/ETSecIoT50046.2020.00009.
  • Makura, SM., Venter, HS., Ikuesan, RA., Kebande, VR., Karie, N. (2020). Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness Purposes. 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) (200-205). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICIoT48696.2020.9089494.

Journal Articles

  • Karie, N., Kebande, V., Venter, H. (2019). Diverging deep learning cognitive computing techniques into cyber forensics. Forensic Science International: Synergy, 1(2019), 61-67. https://doi.org/10.1016/j.fsisyn.2019.03.006.
  • Karie, N., Kebande, V., Venter, H., Choo, R. (2019). On the importance of standardising the process of generating digital forensic reports. Forensic Science International: Synergy, 1(November 2019), Article number 100008. https://doi.org/10.1016/j.fsir.2019.100008.

Conference Publications

  • Kebande , V., Karie, N., Wario , R., Venter, H. (2019). Forensic profiling of cyber-security adversaries based on incident similarity measures interaction index. Proceedings of 2018 International Conference on Intelligent and Innovative Computing Applications (Article number 8601279). IEEE. https://doi.org/10.1109/ICONIC.2018.8601279.
  • Kebande , V., Mlotshwa, L., Karie, N. (2019). Botnet’s Obfuscated C&C Infrastructure Take-down Approaches Based on Monitoring Centralized Zeus Bot Variant’s Propagation Model. Proceedings of 2019 IST-Africa Week Conference (IST-Africa) (Article number 8764837). IEEE. https://doi.org/10.23919/ISTAFRICA.2019.8764837.

Journal Articles

  • Karie, N., Kebande, V. (2018). Knowledge Management as a Strategic Asset in Digital Forensic Investigations. International Journal of Cyber- Security and Digital Forensics, 7(1), 10-20. https://doi.org/10.17781/p002311.
  • Kebande, V., Karie, N. (2018). A UML-Based Approach for Analysing Potential Digital Forensic Evidence. International Journal of Cyber-Security and Digital Forensics, 7(4), 354-362. https://doi.org/10.17781/P002474.
  • Kebande, V., Karie, N., Venter, H. (2018). Functional Requirements for Adding Digital Forensic Readiness as a Security Component in IoT Environments. International Journal of Advanced Science, Engineering and Information Technology, 8(2), 342-349. https://doi.org/10.18517/ijaseit.8.2.2121.
  • Kebande, V., Karie, N., Venter, H. (2018). Adding Digital Forensic Readiness as a Security Component to the IoT Domain. International Journal of Advanced Science, Engineering and Information Technology, 8(1), 1-11. https://doi.org/10.18517/ijaseit.8.1.2115.

Conference Publications

  • Kebande , V., Kigwana, I., Venter, H., Karie, N., Wario, R. (2018). CVSS Metric-Based Analysis, Classification and Assessment of Computer Network Threats and Vulnerabilities. Proceedings of 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD) (article no.8465420). IEEE. https://doi.org/10.1109/ICABCD.2018.8465420.
  • Kebande , V., Malapane, S., Kigwana, I., Karie, N., Venter, H., Michael, A., Wario, R. (2018). Towards an Integrated Digital Forensic Investigation Framework for an IoT-Based Ecosystem. 2018 IEEE International Conference on Smart Internet of Things (SmartIoT) (93-98). IEEE. https://doi.org/10.1109/SmartIoT.2018.00-19.

Journal Articles

  • Karie, N., Karume , S. (2017). Digital Forensic Readiness in Organizations: Issues and Challenges. Journal of Digital Forensics, Security and Law, 12(4), 43-54. https://doi.org/10.15394/jdfsl.2017.1436.
  • Maake, L., Kebande, V., Karie, N. (2017). Onto- Engineering: A Conceptual framework for Integrating Requirement Engineering Process with scientifically tuned Digital Forensics Ontologies. International Journal of Cyber-Security and Digital Forensics, 6(2), 73-83. https://doi.org/10.17781/p002271.

Conference Publications

  • Kebande , V., Karie, N., Venter, H. (2017). Cloud-Centric Framework for isolating Big data as forensic evidence from IoT infrastructures. Proceedings of the 1st International Conference on Next Generation Computing Applications (8016176). IEEE. https://doi.org/10.1109/NEXTCOMP.2017.8016176.
  • Kebande , V., Karie, N., Michael, A., Malapane, S., Venter, H. (2017). How an IoT-enabled “smart refrigerator” can play a clandestine role in perpetuating cyber-crime. Proceedings of 2017 IST-Africa Week Conference (article no.8102362). IEEE. https://doi.org/10.23919/ISTAFRICA.2017.8102362.

Journal Articles

  • Karie, N., Kebande , V. (2016). Building Ontologies for Digital Forensic Terminologies. International Journal of Cyber-Security and Digital Forensics, 5(2), 75-82. https://doi.org/10.17781/p002032.
  • Kebande , V., Karie, N. (2016). An Approach for Estimating Forensic Data Provenance of an Object in the Cloud Environment using One Dimensional Successive Bisection Method. International Journal of Computer Applications, 140(1), 34-39. https://doi.org/10.5120/ijca2016909211.
  • Kebande, V., Karie, N., Omeleze , S. (2016). A Mobile Forensic Readiness Model aimed at Minimizing Cyber Bullying. International Journal of Computer Applications, 140(1), 28-33. https://doi.org/10.5120/ijca2016909193.

Conference Publications

  • Kebande , V., Karie, N., Ventor, H. (2016). A generic Digital Forensic Readiness model for BYOD using honeypot technology. Proceedings of 2016 IST-Africa Week Conference (7530590). IEEE. https://doi.org/10.1109/ISTAFRICA.2016.7530590.
  • Karie, N., Kebande , V., Venter, H. (2016). A generic framework for digital evidence traceability. Proceedings of the 15th European Conference on Cyber Warfare and Security (361-368). Academic Conferences and Publishing International Limited.

Journal Articles

  • Kebande , V., Karie, N. (2015). A Framework for Integrating Multimodal Biometrics with Digital Forensics. International Journal of Cyber-Security and Digital Forensics, 4(4), 498-507. https://doi.org/10.17781/p001929.
  • Karie, N., Venter, H. (2015). Taxonomy of Challenges for Digital Forensics. Journal of Forensic Sciences, 60(4), 885-893. https://doi.org/10.1111/1556-4029.12809.

Journal Articles

  • Karie, N., Venter, H. (2014). Toward a general ontology for digital forensic disciplines. Journal of Forensic Sciences, 59(5), 1231-1241. https://doi.org/10.1111/1556-4029.12511.
  • Karie, N. (2014). Detecting IT Infrastructure Policy Violations in a LAN Environment Using Triggers. International Journal of Advanced Research in Computer Science & Technology, 2(4), 58-62.

Conference Publications

  • Karie, N., Venter, H. (2014). A Generic Framework for Enhancing the Quality Digital Evidence Reports. 13th European Conference on Cyber Warfare and Security ECCWS (251-257). Academic Conferences and publishing limited.

Research Projects

  • 2.4 Real Time Monitoring of Cyber Threats, Cyber Security Research Centre Ltd, Postdoctoral Research Fellowship, 2019 ‑ 2022, $500,765.
  • Anti-spear phishing by detecting Email Impersonation, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 ‑ 2020, $10,700.
  • Anti-Business Email Compromise, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 ‑ 2020, $10,700.
  • ISMS Framework, Cyber Security Research Centre Ltd, Summer Scholarship, 2019 ‑ 2020, $21,400.

Research Student Supervision

Skip to top of page