Select Publications

Journal articles

Akter M; Moustafa N; Turnbull B, 2024, 'SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems', Cognitive Computation, 16, pp. 2626 - 2641, http://dx.doi.org/10.1007/s12559-024-10310-3

Yamany W; Keshk M; Moustafa N; Turnbull B, 2024, 'Swarm Optimization-Based Federated Learning for the Cyber Resilience of Internet of Things Systems Against Adversarial Attacks', IEEE Transactions on Consumer Electronics, 70, pp. 1359 - 1369, http://dx.doi.org/10.1109/TCE.2023.3319039

Salim S; Turnbull B; Moustafa N, 2024, 'A Blockchain-Enabled Explainable Federated Learning for Securing Internet-of-Things-Based Social Media 3.0 Networks', IEEE Transactions on Computational Social Systems, 11, pp. 4681 - 4697, http://dx.doi.org/10.1109/TCSS.2021.3134463

Johnson N; Turnbull B; Reisslein M; Moustafa N, 2024, 'CNA-TCC: Campaign Network Attribute Based Thematic Campaign Classification', IEEE Transactions on Computational Social Systems, 11, pp. 4636 - 4648, http://dx.doi.org/10.1109/TCSS.2022.3184387

Issa W; Moustafa N; Turnbull B; Choo KKR, 2024, 'RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks', IEEE Transactions on Information Forensics and Security, 19, pp. 3772 - 3787, http://dx.doi.org/10.1109/TIFS.2024.3368879

Issa W; Moustafa N; Turnbull B; Sohrabi N; Tari Z, 2023, 'Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey', ACM Computing Surveys, 55, http://dx.doi.org/10.1145/3560816

Sobb T; Turnbull B; Moustafa N, 2023, 'A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities', Sensors, 23, http://dx.doi.org/10.3390/s23177391

Keshk M; Koroniotis N; Pham N; Moustafa N; Turnbull B; Zomaya AY, 2023, 'An explainable deep learning-enabled intrusion detection framework in IoT networks', Information Sciences, 639, http://dx.doi.org/10.1016/j.ins.2023.119000

Yamany W; Moustafa N; Turnbull B, 2023, 'OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, 24, pp. 893 - 903, http://dx.doi.org/10.1109/TITS.2021.3130906

Yang S; Barlow M; Townsend T; Liu X; Samarasinghe D; Lakshika E; Moy G; Lynar T; Turnbull B, 2023, 'Reinforcement Learning Agents Playing Ticket to Ride-A Complex Imperfect Information Board Game With Delayed Rewards', IEEE Access, 11, pp. 60737 - 60757, http://dx.doi.org/10.1109/ACCESS.2023.3287100

Salim S; Moustafa N; Turnbull B; Razzak I, 2022, 'Perturbation-enabled Deep Federated Learning for Preserving Internet of Things-based Social Networks', ACM Transactions on Multimedia Computing, Communications and Applications, 18, http://dx.doi.org/10.1145/3537899

Salim S; Turnbull B; Moustafa N, 2022, 'Data analytics of social media 3.0: Privacy protection perspectives for integrating social media and Internet of Things (SM-IoT) systems', Ad Hoc Networks, 128, http://dx.doi.org/10.1016/j.adhoc.2022.102786

Johnson N; Turnbull B; Reisslein M, 2022, 'Social media influence, trust, and conflict: An interview based study of leadership perceptions', Technology in Society, 68, http://dx.doi.org/10.1016/j.techsoc.2021.101836

Tran QN; Turnbull BP; Wang M; Hu J, 2022, 'A Privacy-Preserving Biometric Authentication System with Binary Classification in a Zero Knowledge Proof Protocol', IEEE Open Journal of the Computer Society, 3, pp. 1 - 10, http://dx.doi.org/10.1109/OJCS.2021.3138332

Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2021, 'A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks', IEEE Internet of Things Journal, 8, pp. 9463 - 9472, http://dx.doi.org/10.1109/JIOT.2020.2996590

Samarasinghe Widana Arachchige D; Barlow M; Lakshika E; Lynar T; Moustafa N; Townsend T; Turnbull B, 2021, 'A Data Driven Review of Board Game Design and Interactions of Their Mechanics', IEEE Access, 9, pp. 114051 - 114069, http://dx.doi.org/10.1109/ACCESS.2021.3103198

Tran QN; Turnbull BP; Wu HT; De Silva AJS; Kormusheva K; Hu J, 2021, 'A Survey on Privacy-Preserving Blockchain Systems (PPBS) and a Novel PPBS-Based Framework for Smart Agriculture', IEEE Open Journal of the Computer Society, 2, pp. 72 - 84, http://dx.doi.org/10.1109/OJCS.2021.3053032

Tran QN; Turnbull BP; Hu J, 2021, 'Biometrics and Privacy-Preservation: How Do They Evolve', IEEE Open Journal of the Computer Society, 2, pp. 179 - 191, http://dx.doi.org/10.1109/OJCS.2021.3068385

Keshk M; Turnbull B; Sitnikova E; Vatsalan D; Moustafa N, 2021, 'Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems', IEEE Access, 9, pp. 55077 - 55097, http://dx.doi.org/10.1109/ACCESS.2021.3069737

Johnson N; Turnbull B; Maher T; Reisslein M, 2021, 'Semantically Modeling Cyber Influence Campaigns (CICs): Ontology Model and Case Studies', IEEE Access, 9, pp. 9365 - 9382, http://dx.doi.org/10.1109/ACCESS.2020.3048269

Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics

Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)

Dunn C; Moustafa N; Turnbull B, 2020, 'Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things', Sustainability (Switzerland), 12, http://dx.doi.org/10.3390/SU12166434

Keshk M; Turnbull B; Moustafa N; Vatsalan D; Choo KKR, 2020, 'A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks', IEEE Transactions on Industrial Informatics, 16, pp. 5110 - 5118, http://dx.doi.org/10.1109/TII.2019.2957140

Alkadi O; Moustafa N; Turnbull B, 2020, 'A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions', IEEE Access, 8, pp. 104893 - 104917, http://dx.doi.org/10.1109/ACCESS.2020.2999715

Ormrod D; Turnbull B, 2019, 'The modelling and simulation of integrated battlefield cyber-kinetic effects', International Journal of Cyber Warfare and Terrorism, 9, pp. 1 - 26, http://dx.doi.org/10.4018/IJCWT.2019100101

Alkadi O; Moustafa N; Turnbull B; Choo K-KR, 2019, 'An ontological graph identification method to improve Localization of IP prefix hijacking in network systems', IEEE Transactions on Information Forensics and Security

Koroniotis N; Moustafa N; Sitnikova E; Turnbull B, 2019, 'Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset', Future Generation Computer Systems

Alkadi O; Moustafa N; Turnbull B; Choo KKR, 2019, 'Mixture localization-based outliers models for securing data migration in cloud centers', IEEE Access, 7, pp. 114607 - 114618, http://dx.doi.org/10.1109/ACCESS.2019.2935142

Hassan M; Moustafa N; Sitnikova E; Turnbull B, 2018, 'Privacy-preserving big data analytics for cyber-physical systems', Wireless Networks, http://dx.doi.org/10.1007/s11276-018-01912-5

Moustafa N; Turnbull B; Raymond Choo K-K, 2018, 'An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2018.2871719

Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, http://dx.doi.org/10.1109/ACCESS.2018.2844794

Ormrod D; Turnbull B, 2017, 'Developing a Military Cyber Maturity Model for Multi-Domain Battle Mission Resilience and Success', International Journal of Cyber Warfare and Terrorism, 7, pp. 1 - 13, http://dx.doi.org/10.4018/ijcwt.2017100101

Ormrod D; Turnbull B, 2017, 'Attrition rates and maneuver in agent-based simulation models', Journal of Defense Modeling and Simulation, 14, pp. 257 - 272, http://dx.doi.org/10.1177/1548512917692693

Haider W; Hu J; Slay J; Turnbull BP; Xie Y, 2017, 'Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling', Journal of Network and Computer Applications, 87, pp. 185 - 192, http://dx.doi.org/10.1016/j.jnca.2017.03.018

Ormrod D; Turnbull B, 2016, 'The cyber conceptual framework for developing military doctrine', Defence Studies, 16, pp. 270 - 298, http://dx.doi.org/10.1080/14702436.2016.1187568

Turnbull B; Randhawa S, 2015, 'Automated event and social network extraction from digital evidence sources with ontological mapping', Digital Investigation, 13, pp. 94 - 106, http://dx.doi.org/10.1016/j.diin.2015.04.004

Osborne G; Turnbull B; Slay J, 2010, 'The 'Explore, Investigate and Correlate' (EIC) conceptual framework for digital forensics information visualisation', ARES 2010 - 5th International Conference on Availability, Reliability, and Security, pp. 629 - 634, http://dx.doi.org/10.1109/ARES.2010.74

Slay J; Turnbull B; Blundell B; McKemmish R, 2009, 'Message from WSDF workshop co-chairs', Proceedings - International Conference on Availability, Reliability and Security, ARES 2009, http://dx.doi.org/10.1109/ARES.2009.175

Pavlic T; Slay J; Turnbull B, 2008, 'Extracting evidence using google desktop search', IFIP International Federation for Information Processing, 285, pp. 43 - 50, http://dx.doi.org/10.1007/978-0-387-84927-0_4

Broadway J; Turnbull B; Slay J, 2008, 'Improving the analysis of lawfully intercepted network packet data captured for forensic analysis', ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, pp. 1361 - 1368, http://dx.doi.org/10.1109/ARES.2008.122

Turnbull B; Slay J, 2008, 'Wi-Fi network signals as a source of digital evidence: Wireless network forensics', ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings, pp. 1355 - 1360, http://dx.doi.org/10.1109/ARES.2008.135

Pavlic T; Slay J; Turnbull B, 2008, 'Developing a Process Model for the Forensic Extraction of Information from Desktop Search Applications', JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 3, pp. 35 - 55, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000214231400003&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Turnbull B; Slay J, 2007, 'Wireless forensic analysis tools for use in the electronic evidence collection process', Proceedings of the Annual Hawaii International Conference on System Sciences, http://dx.doi.org/10.1109/HICSS.2007.617

Slay J; Turnbull B, 2006, 'The need for a technical approach to digital forensic evidence collection for wireless technologies', Proceedings of the 2006 IEEE Workshop on Information Assurance, 2006, pp. 124 - 132

Slay J; Turnbull B, 2006, 'Computer Security Education and Research in Australia', IEEE Security & Privacy Magazine, 4, pp. 60 - 63, http://dx.doi.org/10.1109/msp.2006.115

Blundell B; Dong HX; Slay J; Turnbull B; Wilsdon T, 2005, 'Development of a "zero-skills" forensic laptop registration and identification tool', 4th European Conference on Information Warfare and Security 2005, ECIW 2005, pp. 39 - 45

Turnbull B; Blundell B; Slay J, 2005, 'Googling forensics', Proceedings of 3rd Australian Computer, Network and Information Forensics Conference, pp. 62 - 67

Slay J; Turnbull B, 2005, 'The 802.11 technology gap - Case studies in crime', IEEE Region 10 Annual International Conference, Proceedings/TENCON, 2007, http://dx.doi.org/10.1109/TENCON.2005.300890


Back to profile page