Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr Mohiuddin Ahmed

Senior Lecturer

Staff Member Details
Telephone: +61 8 6304 5121
Email: mohiuddin.ahmed@ecu.edu.au
Campus: Joondalup  
Room: JO23.245  
ORCID iD: https://orcid.org/0000-0002-4559-4768

Dr. Mohiuddin Ahmed is a Senior Lecturer of Computing and Security discipline in the School of Science. He is also coordinating the Postgraduate Cyber Security courses.

Current Teaching

  • Software Reverse Engineering
  • Enterprise Security & Governance

Current Coordination

  • J99 Graduate Certificate of Cyber Security
  • J98 Graduate Diploma of Cyber Security
  • J97 Master of Cyber Security

Background

Dr. Mohiuddin Ahmed has been educating the next generation of cyber leaders and researching to disrupt the cybercrime ecosystem. His research is focused on ensuring national security and safeguarding critical infrastructures from cyber terrorists. Mohiuddin has edited several books and contributed articles to The Conversation. His research publications in reputed venues attracted more than 4500 citations with a h-index of 28 and have been listed in the world's top 2% of scientists for the 2020-2023 citation impact. Mohiuddin secured several external and internal grants worth more than $1.7 Million and has been collaborating with academia and industry. He has been regularly invited to speak at international conferences and public organizations and interviewed by the media for expert opinion. He is also a Fellow of the Higher Education Academy, UK.

Professional Memberships

  • 2017 - International Journal of Computers and Applications (Associate Editor)
  • 2018 - Cambridge Scholars Publishing, UK (Editorial Advisory Board Member)
  • 2019 - Australian Information Security Association, AISA (Member)
  • 2020 - Institute of Electrical and Electronics Engineers, IEEE (Senior Member)
  • 2020 - Australian Computer Society, ACS (Certified Professional)
  • 2021 - Association of Computing Machinery, ACM (Distinguished Speaker)
  • 2021 - National Security Hub, University of Canberra (Affiliate Member)
  • 2022 - Frontiers in Digital Health (Associate Editor)
  • 2022 - Journal of Cyber Security Technology (Associate Editor)

Awards and Recognition

National and International Awards

  • 2023 - AISA Awards Finalist: Cyber Security Researcher of the Year
  • 2023 - Best Paper Award at 12th International Conference on Health Information Science
  • 2022 - ECU Honour Award for Outstanding Contribution to the Media
  • 2020 - Business Events Perth Aspire Award
  • 2021 - ECU Media Star Award for Most Widely Read CONVERSATION Article
  • 2021 - Best Paper Award at 14th EAI International Wireless Internet Conference
  • 2016 - UNSW Canberra PhD Thesis Writing Fellowship
  • 2015 - UNSW Canberra High Impact Research Publications Award
  • 2012 - UNSW Canberra University International Postgraduate Award

University and National Teaching Awards

  • 2018 – CIT Cyber Teaching Team Nomination for Staff Achievement Award

Research Areas and Interests

  • Cyber & National Security
  • Explainable Artificial Intelligence
  • Enterprise & Critical Infrastructure Security
  • IoT Datasets
  • Ransomware
  • Cyber Espionage

Qualifications

  • Doctor of Philosophy, The University of New South Wales, 2016.

Research Outputs

Conference Publications

  • Venkateswaran, T., Islam, SR., Hasan, MG., Ahmed, M. (2024). Aiming to Minimize Alcohol-Impaired Road Fatalities: Utilizing Fairness-Aware and Domain Knowledge-Infused Artificial Intelligence. Proceedings - 2023 IEEE International Conference on Big Data, BigData 2023 (4205-4212). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/BigData59044.2023.10386464.
  • Lu, X., Yan, S., Huang, Y., Zhang, Y., Ahmed, M. (2024). Channel Truncation Inspired Short-Packet Covert Communication with Poisson Packet Generation. 2023 International Conference on Wireless Communications and Signal Processing (WCSP) (737-742). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/WCSP58612.2023.10405142.

Book Chapters

  • Zubair, S., Zubair, M., Ahmed, M. (2023). Investigation on the Infusion of Cybersecurity and Smart City. Cybersecurity for Smart Cities: Practices and Challenges (1-15). Springer. https://doi.org/10.1007/978-3-031-24946-4_1.
  • Akhter, AF., Hizal, S., Arnob, TZ., Noor, EB., Surid, E., Ahmed, M. (2023). An EDGE Supported Ambulance Management System for Smart Cities. Cybersecurity for Smart Cities: Practices and Challenges (151-168). Springer. https://doi.org/10.1007/978-3-031-24946-4_11.
  • Rashid, B., Ahmed, M., Barkat Ullah, A. (2023). Cyber Safe Data Repositories. Cybersecurity for Smart Cities: Practices and Challenges (87-103). Springer. https://doi.org/10.1007/978-3-031-24946-4_7.
  • Mondol, A., Sultana, J., Ahmed, M., Rashid, B. (2023). Misinformation Detection in Cyber Smart Cities. Cybersecurity for Smart Cities: Practices and Challenges (105-120). Springer. https://doi.org/10.1007/978-3-031-24946-4_8.
  • Lamers, C., Spoerl, E., Levey, G., Choudhury, N., Ahmed, M. (2023). Ransomware: A Threat to Cyber Smart Cities. Cybersecurity for Smart Cities: Practices and Challenges (185–204). Springer. https://doi.org/10.1007/978-3-031-24946-4_13.
  • Zubair, M., Zubair, S., Ahmed, M. (2023). Cyberbullying Instilled in Social Media. Cybersecurity for Smart Cities: Practices and Challenges (17-29). Springer. https://doi.org/10.1007/978-3-031-24946-4_2.

Journal Articles

  • Gaber, M., Ahmed, M., Janicke, H. (2023). Malware Detection with Artificial Intelligence: A Systematic Literature Review. ACM Computing Surveys, 2023(Article in press), 33 pages. https://doi.org/10.1145/3638552.
  • Suleski, T., Ahmed, M. (2023). A Data Taxonomy for Adaptive Multifactor Authentication in the Internet of Health Care Things. Journal of Medical Internet Research, 25(Article in press), Article number e44114. https://doi.org/10.2196/44114.
  • Al Amin, S., Mukta , MS., Saikat, MS., Hossain, MI., Islam, MA., Ahmed, M., Azam, S. (2023). Data Driven Classification of Opioid Patients Using Machine Learning-An Investigation. IEEE Access, 11(article in press), 396-409. https://doi.org/10.1109/ACCESS.2022.3230596.
  • Dart, M., Ahmed, M. (2023). Operational shock: A method for estimating cyber security incident costs for large Australian healthcare providers. Journal of Cyber Security Technology, 2023(Article in press), 26 pages. https://doi.org/10.1080/23742917.2023.2291914.
  • Dart, M., Ahmed, M. (2023). Evaluating Staff Attitudes, Intentions, and Behaviors Related to Cyber Security in Large Australian Health Care Environments: Mixed Methods Study. JMIR Human Factors, 10(1), Article number e48220. https://doi.org/10.2196/48220.
  • Rahman, MM., Khan, NI., Sarker, MI., Ahmed, M., Islam, MN. (2023). Leveraging machine learning to analyze sentiment fromCOVID-19 tweets: A global perspective. Engineering Reports, 5(3), article number e12572. https://doi.org/10.1002/eng2.12572.
  • Dart, M., Ahmed, M. (2023). CYBER-AIDD: A novel approach to implementing improved cyber security resilience for large Australian healthcare providers using a Unified Modelling Language ontology. Digital Health, 9(Article in press), 15 pages. https://doi.org/10.1177/20552076231191095.
  • Ahmed, M., Akhter, AF., Rashid, B., Pathan, AK. (2023). A dependable and secure consensus algorithm for blockchain assisted microservice architecture. Computers and Electrical Engineering, 109(August 2023), Article number 108762. https://doi.org/10.1016/j.compeleceng.2023.108762.
  • Suleski, T., Ahmed, M., Yang, W., Wang, E. (2023). A review of multi-factor authentication in the Internet of Healthcare Things. Digital Health, 9(article in press), 20 pages. https://doi.org/10.1177/20552076231177144.
  • Stroebel, L., Llewellyn, M., Hartley, T., Ip, S., Ahmed, M. (2023). A systematic literature review on the effectiveness of deepfake detection techniques. Journal of Cyber Security Technology, 7(2), 83-113. https://doi.org/10.1080/23742917.2023.2192888.
  • Hur, A., Janjua, N., Ahmed, M. (2023). Unifying context with labeled property graph: A pipeline-based system for comprehensive text representation in NLP. Expert Systems with Applications, 239(article in press), Article number 122269. https://doi.org/10.1016/j.eswa.2023.122269.
  • Hasan, MT., Hossain, MA., Hossain Mukta, MS., Akter, A., Ahmed, M., Islam, S. (2023). A Review on Deep-Learning-Based Cyberbullying Detection. Future Internet, 15(5), Article number 179. https://doi.org/10.3390/fi15050179.

Conference Publications

  • Dart, M., Ahmed, M. (2023). Australia’s Notifiable Data Breach Scheme: An Analysis of Risk Management Findings for Healthcare. 12th International Conference on Health Information Science (HIS 2023) (65-78). Springer Nature. https://doi.org/10.1007/978-981-99-7108-4_6.
  • Ahmed, M., Pagutaisidro, C., Pike, A., Yang, Y., Pathan, AK. (2023). RansomCoin: A New Dataset for Analysing Cryptocurrency Transactions - Addressing a Gap in The Literature. The 2023 International Workshop on AI-Driven Trustworthy, Secure, and Privacy-Preserving Computing (AidTSP 2023) (article in press). IEEE. https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225797.
  • Moonsamy, A., Ahmed, M. (2023). Developing a Comprehensive Risk Management Framework for E-Health Care Delivery. 12th International Conference on Health Information Science (HIS 2023) (101-111). Springer Nature. https://doi.org/10.1007/978-981-99-7108-4_9.
  • Ahmed, M., Rashid, B., Pathan, AK. (2023). Ransomware 3.0 – A Weapon for Next Generation Information Warfare. International Conference on Cryptology & Network Security with Machine Learning (article in press). Springer. https://ro.ecu.edu.au/ecuworks2022-2026/2485.

Book Chapters

  • Rashid, B., Ahmed, M., Barkat Ullah, AS. (2022). Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security. Next-Generation Enterprise Security and Governance (135-162). CRC Press. https://doi.org/10.1201/9781003121541-6.
  • Ahmed, M., Zubair, S. (2022). Explainable Artificial Intelligence in Sustainable Smart Healthcare. Explainable Artificial Intelligence for Cyber Security (265-280). Springer. https://doi.org/10.1007/978-3-030-96630-0_12.
  • Jindal, R., Falah, A., Anwar, A., Ahmed, M. (2022). Privacy-preserving analytics for social network data: A survey of currently prevalent tools. Securing Social Networks in Cyberspace (17-34). CRC Press. https://doi.org/10.1201/9781003134527.
  • Khan, SU., Eusufzai, F., Redwan, MA., Ahmed, M., Sabuj, SR. (2022). Artificial Intelligence for Cyber Security: Performance Analysis of Network Intrusion Detection. Explainable Artificial Intelligence for Cyber Security (113-139). Springer. https://doi.org/10.1007/978-3-030-96630-0_6.
  • Ahmed, M., Martin, C., Walker, T., Van Rooyen, J. (2022). False Information in a Post Covid-19 World. Combating Fake News with Computational Intelligence Techniques (369-385). Springer. https://doi.org/10.1007/978-3-030-90087-8_18.
  • Saeed, MA., Rashid, T., Ahmed, M. (2022). Enabling Corporate and Institutional Governance for Effective IT Governance. Next-Generation Enterprise Security and Governance (47-68). CRC Press. https://doi.org/10.1201/9781003121541-2.

Journal Articles

  • Ahmed, M., Bachmann, S., Martin, C., Walker, T., Van Rooyen, J., Barkat, A. (2022). False Information as a Threat to Modern Society: A Systematic Review of False Information, Its Impact on Society, and Current Remedies. Journal of Information Warfare, 21(2), 105-120. https://ro.ecu.edu.au/ecuworks2022-2026/1302.
  • Ahmed, M., Bachmann , S., Barkat Ullah, A., Barnett, S. (2022). Ransomware 2.0: an emerging threat to national security. Australian Journal of Defence and Strategic Studies, 4(1), 125–132. https://doi.org/10.51174/AJDSS.0401/EMQH2521.
  • Ahmed, M., Moustafa, N., Akhter, AF., Razzak, I., Surid, E., Anwar, A., Shah, AF., Zengin, A. (2022). A Blockchain-Based Emergency Message Transmission Protocol for Cooperative VANET. IEEE Transactions on Intelligent Transportation Systems, 23(10), 19624-19633. https://doi.org/10.1109/TITS.2021.3115245.
  • Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P. (2022). Anomaly Detection in Cybersecurity Datasets via Cooperative Co-Evolution-Based Feature Selection. ACM Transactions on Management Information Systems, 13(3), 1-39. https://doi.org/10.1145/3495165.
  • Ahmed, M., Rashid, B. (2022). EDSUCh: A Robust Ensemble Data Summarization Method for Effective Medical Diagnosis. Digital Communications and Networks, 2022(article in press), 10. https://doi.org/10.1016/j.dcan.2022.07.007.
  • Riddell, L., Ahmed, M., Haskell-Dowland, P. (2022). Establishment and mapping of heterogeneous anomalies in network intrusion datasets. Connection Science, 34(1), 2755-2783. https://doi.org/10.1080/09540091.2022.2151568.
  • Mursalin, M., Ahmed, M., Haskell-Dowland, P. (2022). Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model. Sensors, 22(2022), Article Number 8988. https://doi.org/10.3390/s22228988.
  • Akhter, AF., Ahmed, M., Anwar, A., Shah, AF., Pathan, AK., Zengin, A. (2022). Blockchain in Vehicular Ad hoc Networks: Applications, Challenges and Solutions. International Journal of Sensor Networks, 40(2), 94-130. https://doi.org/10.1504/ijsnet.2022.126340.
  • Rashid, SM., Haq, A., Hasan, ST., Furhad, MH., Ahmed, M., Barkat, A. (2022). Faking smart industry: exploring cyber-threat landscape deploying cloud-based honeypot. Wireless Networks: the journal of mobile communication, computation and information, 2022(article in press), 1-15. https://doi.org/10.1007/s11276-022-03057-y.
  • Ahmed, M., Cox, D., Simpson, B., Aloufi, A. (2022). ECU-IoFT: A Dataset for Analysing Cyber-Attacks on Internet of Flying Things. Applied Sciences, 12(4), article number 1990. https://doi.org/10.3390/app12041990.

Conference Publications

  • Ahmed, M., Akhter, AF., Rashid, B., Fahmideh , M., Pathan, AK., Anwar, A. (2022). Blockchain Meets Secured Microservice Architecture: A Trustworthy Consensus Algorithm. Proceedings of the 19th International Conference on Wireless Networks and Mobile Systems (53-60). SCITEPRESS – Science and Technology Publications, Lda..
  • Evans, K., Abuadbba, A., Wu, T., Moore, K., Ahmed, M., Pogrebna, G., Nepal, S., Johnstone, M. (2022). RAIDER: Reinforcement-Aided Spear Phishing Detector. Lecture Notes in Computer Science (23-50). Springer. https://doi.org/10.1007/978-3-031-23020-2_2.
  • Rashid, B., Ahmed, M., Islam, SR. (2022). A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 Dataset. Communications in Computer and Information Science (279–291). Springer Nature. https://doi.org/10.1007/978-981-19-0468-4_21.
  • Rashid, SM., Haq, A., Hasan, ST., Furhad, MH., Ahmed, M., Barkat Ullah, AS. (2022). Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat Landscape. Cognitive Radio Oriented Wireless Networks and Wireless Internet (307–324). Springer. https://doi.org/10.1007/978-3-030-98002-3_23.
  • Rahman, S., Suleski, T., Ahmed, M., Kayes, AS. (2022). An Investigation of Vulnerabilities in Internet of Health Things. Cognitive Radio Oriented Wireless Networks and Wireless Internet (296–306). Springer. https://doi.org/10.1007/978-3-030-98002-3_22.

Book Chapters

  • Vishavnath, S., Anwar, A., Ahmed, M. (2021). Machine learning based Cyber-security defense at the age of Industry 4.0. Machine Intelligence and Data Analytics for Sustainable Future Smart Cities (355-369). Springer. https://doi.org/10.1007/978-3-030-72065-0.

Journal Articles

  • Ahmed, M., Byreddy, S., Nutakki, A., Sikos, L., Haskell-Dowland, P. (2021). ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things. Ad Hoc Networks, 122(1 November 2021), Article number 102621. https://doi.org/10.1016/j.adhoc.2021.102621.
  • Rashid, B., Ahmed, M., Pathan, AK. (2021). Infrequent Pattern Detection for Reliable Network Traffic Analysis Using Robust Evolutionary Computation. Sensors, 21(9), Article number 3005. https://doi.org/10.3390/s21093005.
  • Akhter, AF., Ahmed, M., Shah, AF., Anwar, A., Kayes , AS., Zengin, A. (2021). A Blockchain-Based Authentication Protocol for Cooperative Vehicular Ad Hoc Network. Sensors, 21(4), Article number 1273. https://doi.org/10.3390/s21041273.
  • Ahmed, M., Zubair, S., Akhter, AS., Ullah, AS. (2021). Yet another investigation on blockchain in smart healthcare. International Journal of Agile Systems and Management, 14(4), 614-634. https://doi.org/10.1504/IJASM.2021.120243.
  • Akhter, AF., Ahmed, M., Shah, AF., Anwar, A., Zengin, A. (2021). A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET. Sustainability, 13(1), 1-25. https://doi.org/10.3390/su13010400.
  • Yang, W., Wang, S., Bin Sahri, NM., Karie, N., Ahmed, M., Valli, C. (2021). Biometrics for Internet‐of‐Things Security: A Review. Sensors, 21(18), Article number 6163. https://doi.org/10.3390/s21186163.
  • Aurisch, R., Ahmed, M., Barkat, A. (2021). An outlook at Agile methodologies for the independent games developer. International Journal of Computers and Applications, 43(8), 812-818. https://doi.org/10.1080/1206212X.2019.1621463.
  • Akhter, AF., Shah, AF., Ahmed, M., Moustafa, N., Çavu¸soglu, U., Zengin, A. (2021). A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks. Computers, Materials and Continua, 68(1), 229–246. https://doi.org/10.32604/cmc.2021.015447.

Conference Publications

  • Hur, A., Janjua, N., Ahmed, M. (2021). A Survey on State-of-the-art Techniques for Knowledge Graphs Construction and Challenges ahead. Proceedings - 2021 IEEE 4th International Conference on Artificial Intelligence and Knowledge Engineering, AIKE 2021 (99-103). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/AIKE52691.2021.00021.

Book Chapters

  • Chong, K., Ahmed, M., Islam, S. (2020). An Investigation of Performance Analysis of Machine Learning-Based Techniques for Network Anomaly Detection. Security Analytics for the Internet of Everything (117-156). CRC Press.
  • Al Fahdi, H., Ahmed, M. (2020). Cryptographic Attacks, Impacts and Countermeasures. Security Analytics for the Internet of Everything (217-232). CRC Press.
  • Sadik, S., Ahmed, M. (2020). An Overview of Dark Web. Security Analytics for the Internet of Everything (55-64). CRC Press. https://ro.ecu.edu.au/ecuworkspost2013/11914.
  • Sadik, S., Ahmed, M., Hassan, MH. (2020). Blockchain in Healthcare. Blockchain in Data Analytics (234-253). Cambridge Scholars Publishing.
  • Saeed, M., Rashid, T., Ahmed, M. (2020). A Benefits Realization Approach to Cyber Security Projects Implementation in the Public Sector Organizations. Security Analytics for the Internet of Everything (93-114). CRC Press.
  • Furhad, MH., Sadik, S., Ahmed, M., Barkat, A. (2020). Exploring E-Commerce in Cyber Security Context Through Blockchain Technology. Blockchain in Data Analytics (216-233). Cambridge Scholars Publishing.
  • Bostami, B., Ahmed, M. (2020). Blockchain for Internet of Things. Blockchain in Data Analytics (24-51). Cambridge Scholars Publishing.
  • Rashid, T., Saeed, M., Ahmed, M. (2020). A New Era of Project Management Using Blockchain Technology. Blockchain in Data Analytics (102-121). Cambridge Scholars Publishing.
  • Bostami, B., Ahmed, M. (2020). Deep Learning Meets Malware Detection: An Investigation. Combating Security Challenges in the Age of Big Data (137-155). Springer. https://doi.org/10.1007/978-3-030-35642-2_7.
  • Seraj, R., Ahmed, M. (2020). Concept Drift for Big Data. Combating Security Challenges in the Age of Big Data (29-43). Springer. https://doi.org/10.1007/978-3-030-35642-2_2.

Journal Articles

Conference Publications

  • Furhad, MH., Ahmed, M., Barkat, A. (2020). A Study on Monitoring Coastal Areas for Having a Better Underwater Surveillance Perspective. Proceedings of International Joint Conference on Computational Intelligence IJCCI 2018 (163-174). Springer. https://doi.org/10.1007/978-981-13-7564-4_14.
  • Rashid, MM., Kamruzzaman, J., Ahmed, M., Islam, N., Wibowo, S., Gordon, S. (2020). Performance Enhancement of Intrusion detection System Using Bagging Ensemble Technique with Feature Selection. 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) (1-5). IEEE. https://doi.org/10.1109/CSDE50874.2020.9411608.
  • Moustafa, N., Ahmed, M., Ahmed, S. (2020). Data Analytics-Enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (727-735). IEEE. https://doi.org/10.1109/TrustCom50675.2020.00100.

Book Chapters

Journal Articles

Conference Publications

  • Khandaker, S., Hussain, A., Ahmed, M. (2019). Effectiveness of Hard Clustering Algorithms for Securing Cyber Space. Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018 Proceedings (113-120). Springer, Cham. https://doi.org/10.1007/978-3-030-05928-6_11.
  • Ahmed, M., Barkat, A. (2019). Performance Analysis of Hard Clustering Techniques for Big IoT Data Analytics. Proceedings - 2019 Cybersecurity and Cyberforensics Conference, CCC 2019 (62-66). IEEE. https://doi.org/10.1109/CCC.2019.000-8.
  • Ahmed, M., Pathan, AK. (2019). Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study. Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers (211--219). Springer. https://doi.org/10.1007/978-981-13-5826-5_15.
  • Saeed, M., Ahmed, M. (2019). Evaluation Metrics for Big Data Project Management. Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018 Proceedings (139-142). Springer. https://doi.org/10.1007/978-3-030-05928-6_14.

Book Chapters

  • Saeed, M., Ahmed, M. (2018). Project Management for Effective Data Analytics. Data Analytics Concepts, Techniques, and Applications (219-234). CRC Press. https://doi.org/10.1201/9780429446177-9.
  • Hassan, MM., Ahmed, M. (2018). Blockchain in the Era of Industry 4.0. Data Analytics Concepts, Techniques, and Applications (235-273). CRC Press. https://doi.org/10.1201/9780429446177-10.
  • Ahmed, M., Barkat, A. (2018). Health Care Security Analytics. Data Analytics Concepts, Techniques, and Applications (403-416). CRC Press. https://doi.org/10.1201/9780429446177-16.
  • Bostami, B., Ahmed, M. (2018). Intrusion Detection for Big Data. Data Analytics Concepts, Techniques, and Applications (375-402). CRC Press. https://doi.org/10.1201/9780429446177-15.
  • Ahmed, M., Haque, N. (2018). Anomaly Detection and Big Data in IPTV Networks. IPTV Delivery Networks: Next Generation Architectures for Live and Video-on-Demand Services (). John Wiley & Sons.

Journal Articles

Conference Publications

  • Ahmed, M., Ullah, A. (2018). False Data Injection Attacks in Healthcare. Data Mining. AusDM 2017. Communications in Computer and Information Science, vol 845 (192-202). Springer. https://doi.org/10.1007/978-981-13-0292-3_12.

Book Chapters

  • Ahmed, M. (2017). Infrequent Pattern Identification in SCADA Systems Using Unsupervised Learning. Security Solutions and Applied Cryptography in Smart Grid Communications (215-225). IGI Global. https://doi.org/10.4018/978-1-5225-1829-7.ch011.

Journal Articles

Conference Publications

  • Ahmed, M., Choudhury, N., Uddin, S. (2017). Anomaly detection on big data in financial markets. ASONAM '17 Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 (998-1001). ACM. https://doi.org/10.1145/3110025.3119402.

Journal Articles

  • Ahmed, M., Mahmood, A., Islam, MR. (2016). A survey of anomaly detection techniques in financial domain. Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications, 55(1 February 2016), 278-288. https://doi.org/10.1016/j.future.2015.01.001.
  • Ahmed, M., Mahmood, A., Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60(1 January 2016), 19-31. https://doi.org/10.1016/j.jnca.2015.11.016.

Journal Articles

  • Ahmed, M., Anwar, A., Mahmood, A., Shah, Z., Maher, M. (2015). An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2(3), article no. e5. https://doi.org/10.4108/inis.2.3.e5.
  • Ahmed, M., Mahmood, A., Maher, M. (2015). An Efficient Technique for Network Traffic Summarization using Multiview Clustering and Statistical Sampling. EAI Endorsed Transactions on Scalable Information Systems, 2(5), article no. e4. https://doi.org/10.4108/sis.2.5.e4.
  • Ahmed, M., Mahmood, A. (2015). Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection. Annals of Data Science, 2(1), 111-130. https://doi.org/10.1007/s40745-015-0035-y.

Conference Publications

  • Ahmed, M., Mahmood, A., Maher, M. (2015). An Efficient Approach for Complex Data Summarization Using Multiview Clustering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (38-47). Springer, Cham. https://doi.org/10.1007/978-3-319-16868-5_4.
  • Ahmed, M., Mahmood, A., Maher, M. (2015). A Novel Approach for Network Traffic Summarization. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (51-60). Springer, Cham. https://doi.org/10.1007/978-3-319-16868-5_5.
  • Ahmed, M., Mahmood, A., Maher, M. (2015). Heart Disease Diagnosis Using Co-clustering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (61-70). Springer, Cham. https://doi.org/10.1007/978-3-319-16868-5_6.
  • Anwar, A., Mahmood, A., Ahmed, M. (2015). False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (252-266). Springer, Cham. https://doi.org/10.1007/978-3-319-23802-9_20.
  • Ahmed, M., Mahmood, A. (2015). Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (204-219). Springer, Cham. https://doi.org/10.1007/978-3-319-23802-9_17.

Conference Publications

  • Ahmed, M., Mahmood, A. (2014). Network traffic analysis based on collective anomaly detection. 2014 9th IEEE Conference on Industrial Electronics and Applications (1141–1146). IEEE.
  • Ahmed, M., Mahmood, A. (2014). Clustering based semantic data summarization technique: A new approach. 2014 9th IEEE Conference on Industrial Electronics and Applications (1780-1785). IEEE.

Research Projects

  • Generating an Authentication Protocol for Western Australian's Smart Grid, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2022 ‑ 2024, $120,000.
  • Developing autonomous solutions for building knowledge graphs to support educational outcomes in Virtuoso, CingleVue International Pty Ltd, Scholarships to Support Industry Engagement PhD Projects , 2020 ‑ 2024, $150,000.
  • Enabling Private and Secure Information Transmission by Covert Communications, Edith Cowan University, Early-Mid Career Researcher Grant Scheme 2022 (Stream 2), 2023 ‑ 2024, $38,322.
  • CAESAR - Cyber Assurance in Energy Systems for Security and Resilience, Cyber Security Research Centre Ltd, Grant, 2023 ‑ 2024, $204,200.
  • Augmenting Cyber Defence Capability (ACDC), Cyber Security Research Centre Ltd, Grant, 2022 ‑ 2024, $885,000.
  • Multi-factor Authentication in Medical Contexts for Pharmaceutical Dispensary Functions , Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2021 ‑ 2023, $120,000.
  • Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 ‑ 2022, $120,000.
  • Securing Internet of Medical Things against False Data Injection Attacks Using Blockchain, Edith Cowan University, ECU Early Career Researcher Grant - 2019, 2019 ‑ 2020, $25,000.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy, An Integrated Approach to Deep Learning for Sophisticated Malware Detection
  • Doctor of Philosophy, Integrating Cyber Insurance with Quantitative Risk Management in Critical Infrastructures: A Model-Based Strategy for Enhanced Security and Resilience
  • Doctor of Philosophy, Design and evaluation of authentication protocols for smart grid to mitigate malicious data attacks

Principal Supervisor

  • Doctor of Philosophy, Cooperative co-evolution-based feature selection for big data analytics
  • Doctor of Philosophy, Human Identification using Ear Biometrics: A Complete Pipeline from Detection to Recognition
  • Doctor of Philosophy, Cyber security risk management in large Australian healthcare systems - a mixed methods study
  • Master of Computing and Security by Research, Multi-factor Authentication in the Internet of Healthcare Things: An Adaptive Approach to Improve Dynamic Security Requirements.
  • Doctor of Philosophy, A Framework to Support Autonomous Construction of Knowledge Graphs from Unstructured Text
  • Master of Computing and Security by Research, Heterogeneous anomaly detection from network traffic streams using data summarization

Associate Supervisor

  • Doctor of Philosophy, Simulation of Optical Coherence Tomography (OCT) Signal Propagation in Heart Tissue using Monte-Carlo Method and Detection of Ablated Lesions using Machine Learning – A Potential Application for Catheter Ablation in Atrial Fibrillation
  • Doctor of Philosophy, BEWARE – A Methodical Approach To Develop BEnign and MalWARE Datasets
Skip to top of page