Latest News

[October 2015] I have been invited to the joint Working Groups that will co-design a new national Cyber Security Strategy to assist the Government with next steps to improve Australia‚Äôs cyber security. This initiative is coordinated by the Department of the Prime Minister and Cabinet.

[August 2015] Congratulations to Mohsen Rezvani, as his thesis entitled Trust-Based Data Aggregation for WSNs in the Presence of Faults and Collusion Attacks has been accepted for award of PhD degree.

[July 2015] I have been invited to join the editorial board of the IEEE Transactions on Secure and Dependable Computing (TDSC).

[June 2015] Our paper entitled Interdependent Security Risk Analysis of Hosts and Flows has been accepted as a Regular Paper in an upcoming issue of the Transactions on IEEE Transactions on Information Forensics & Security.

[February 2015] Our new project on High Level Security Policy Specification for Software-Defined Networks has been selected for the Google Faculty Research Award.

[September 2014] Our paper entitled Multiuser MIMO Scheduling for Mobile Video Applications has been accepted in IEEE Transactions on Wireless Communications.

[September 2014] Our paper entitled High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks has been accepted in IEEE Transactions on Mobile Computing.

[September 2014] Our paper entitled A Remote Attestation Protocol with Trusted Platform Modules (TPMs) has been accepted in Security and Communication Networks.

[August 2014] Our paper entitled Securing First-Hop Data Provenance for Bodyworn Devices using Wireless Link Fingerprints has been accepted as a Regular Paper in an upcoming issue of the Transactions on IEEE Transactions on Information Forensics & Security.

[May 2014] Invited to the TPC of  prestigious security conferences ACM Wisec 2014 and ACM CCS 2014.

[April 2014] Our paper entitled Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks has been accepted as a Regular Paper in an upcoming issue of the Transactions on Dependable and Secure Computing.

[November 2013] Our paper entitled Provenance-Aware Security Risk Analysis for Hosts and Network Flows has been accepted to the regular Technical track of the IFIP/IEEE Network Operations and Management Symposium (NOMS 2014).

[August 2013] Our paper entitled A Robust Iterative Filtering Technique for Wireless Sensor Networks in the Presence of Malicious Attacks was accepted at ACM SenSys 2013.

[August 2013] Our paper entitled DEMO Abstract: Securing Data Provenance in Body Area Networks using Lightweight Wireless Link Fingerprints was accepted at ACM SenSys 2013.