Select Publications
Conference Papers
2020, 'Pelican: A Deep Residual Network for Network Intrusion Detection', in Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-W 2020, pp. 55 - 62, http://dx.doi.org/10.1109/DSN-W50199.2020.00018
,2020, 'Enhancing Network Forensics with Particle Swarm and Deep Learning: The Particle Deep Framework', Sydney, Australia, presented at 7th International Conference on Security and its Applications (CNSA 2020), Sydney, Australia, 28 March 2020 - 29 March 2020
,2019, 'Agile technology development to improve scenario-based learning exercises', in European Conference on Information Warfare and Security, ECCWS, Portugal, pp. 518 - 526, presented at ECCWS, Portugal, 04 July 2019 - 05 July 2019
,2018, 'Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks', Bellevue, Washington, USA, presented at 2018 IEEE International Conference on Industrial Internet, Bellevue, Washington, USA, 21 October 2018 - 23 October 2018, http://dx.doi.org/10.1109/ICII.2018.00023
,2018, 'Cyber intrusion detection in operations of bulk handling ports', in Josang A (ed.), European Conference on Information Warfare and Security, ECCWS, Academic Conferences and Publishing International Limited, Oslo, Norway, pp. 307 - 316, presented at 17th European Conference on Cyber Warfare and Security ECCWS 2018, Oslo, Norway, 28 June 2018 - 29 June 2018, http://dx.doi.org/10.26190/unsworks/27235
,2018, 'A Digital Identity Stack to Improve Privacy in the IoT', in IEEE 4th World Forum on Internet of Things, IEEE, Singapore, pp. 25 - 29, presented at IEEE 4th World Forum on Internet of Things, Singapore, 05 February 2018 - 08 February 2018, http://dx.doi.org/10.1109/WF-IoT.2018.8355199
,2017, 'Anomaly Detection System using Beta Mixture Models and Outlier Detection', in Das HD (ed.), School of Computer Engineering, KIIT University, presented at The International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, 15 December 2017 - 16 July 2017
,2017, 'Flow Aggregator Module for Analysing Network Traffic', in Das HD (ed.), International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, presented at International Conference on Computing Analytics and Networking (ICCAN 2017), School of Computer Engineering, KIIT University, 15 December 2017 - 16 July 2017
,2017, 'Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning', in 9th International Conference, MONAMI 2017, Springer International Publishing, Melbourne, presented at Nour Moustafa, Melbourne, 13 December 2017 - 15 December 2017, https://www.springerprofessional.de/en/designing-anomaly-detection-system-for-cloud-servers-by-frequenc/15746812
,2017, 'Probability Risk Identification Based Intrusion Detection System for SCADA Systems', in Hu J; Khalil I; Tari Z; Wen S (eds.), Mobile Networks and Management, Springer International Publishing, Melbourne, Australia, pp. 353 - 363, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_28
,2017, 'Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques', Springer International Publishing, Melbourne, Australia, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 December 2017 - 15 December 2017, https://www.springerprofessional.de/en/towards-developing-network-forensic-mechanism-for-botnet-activit/15746852
,2017, 'Privacy Preservation Intrusion Detection Technique for SCADA Systems', Canberra, presented at MilCIS 2017 IEEE Stream, Canberra, 14 November 2017 - 16 November 2017
,2017, 'Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing', Canberra, Australia, presented at Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 13 November 2017 - 14 November 2017
,2015, 'UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)', in 2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings, http://dx.doi.org/10.1109/MilCIS.2015.7348942
,2015, 'A hybrid feature selection for network intrusion detection systems: Central points', in Security Research Institute, Edith Cowan University, Edith Cowan University, Joondalup Campus, Perth, Western Australia., presented at the 16th Australian Information Warfare Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia., 30 November 2015 - 02 December 2015, http://dx.doi.org/10.4225/75/57a84d4fbefbb
,2015, 'The significant features of the UNSW-NB15 andthe KDD99 Data sets for Network IntrusionDetection Systems', IEEE, Kyoto, Japan, presented at The 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015), collocated with RAID2015, Kyoto, Japan, 05 November 2015 - 05 November 2015, http://dx.doi.org/10.13140/RG.2.1.2264.4883
,2015, 'The significant features of the UNSW-NB15 and the KDD99 data sets for Network Intrusion Detection Systems', in Proceedings - 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2015, Kyoto, Japan, pp. 25 - 31, presented at 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), Kyoto, Japan, 05 November 2015 - 05 November 2015, http://ieeexplore.ieee.org/document/7809531/
,2015, 'Creating novel features to anomaly network Detection using DARPA-2009 data set', in European Conference on Information Warfare and Security, ECCWS, pp. 204 - 212
,Conference Proceedings (Editor of)
Gallagher M; Moustafa N; Lakshika E, (eds.), 2020, 'AI 2020: Advances in Artificial Intelligence - 33rd Australasian Joint Conference, AI 2020, Canberra, ACT, Australia, November 29-30, 2020, Proceedings', Springer, Vol. 12576
Theses / Dissertations
2017, Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic, http://handle.unsw.edu.au/1959.4/58748
,Patents
2022, IoT vulnerability detection, Patent No. 2022903302, https://ipsearch.ipaustralia.gov.au/patents/2022903302
,Working Papers
2021, A Novel Multi-level Optimization Framework forEnhancing Cyber-Physical Defenses in Smart PowerSystems, http://dx.doi.org
,Preprints
2022, Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection, http://dx.doi.org/10.21203/rs.3.rs-1631421/v1
,2021, A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments, http://dx.doi.org/10.48550/arxiv.2109.09259
,2021, Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks, http://dx.doi.org/10.48550/arxiv.2108.12722
,2021, Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network, http://dx.doi.org/10.48550/arxiv.2105.09157
,2021, Security and Privacy for Artificial Intelligence: Opportunities and Challenges, http://dx.doi.org/10.48550/arxiv.2102.04661
,2020, A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models, http://dx.doi.org/10.48550/arxiv.2012.04734
,2020, Mitigating the Impact of Adversarial Attacks in Very Deep Networks, http://dx.doi.org/10.48550/arxiv.2012.04750
,2020, NetFlow Datasets for Machine Learning-based Network Intrusion Detection Systems, http://dx.doi.org/10.48550/arxiv.2011.09144
,2020, Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications, http://dx.doi.org/10.48550/arxiv.2010.08522
,2020, Pelican: A Deep Residual Network for Network Intrusion Detection, http://dx.doi.org/10.48550/arxiv.2001.08523
,2018, Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset, http://dx.doi.org/10.48550/arxiv.1811.00701
,2017, Collaborative Anomaly Detection Framework for handling Big Data of Cloud Computing, http://dx.doi.org/10.48550/arxiv.1711.02829
,2017, Privacy Preservation Intrusion Detection Technique for SCADA Systems, http://dx.doi.org/10.48550/arxiv.1711.02828
,2017, Probability Risk Identification Based Intrusion Detection System for SCADA Systems, http://dx.doi.org/10.48550/arxiv.1711.02826
,2017, RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis, http://dx.doi.org/10.48550/arxiv.1711.02824
,2017, Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques, http://dx.doi.org/10.48550/arxiv.1711.02825
,2017, A hybrid feature selection for network intrusion detection systems: Central points, http://dx.doi.org/10.48550/arxiv.1707.05505
,