Latest News

[April 2016] Congratulations to Girish Revadigar, CSE PhD student under the supervision of  Prof. Sanjay Jha, for being selected by the Scientific Committee of the Heidelberg Laureate Forum Foundation (HLFF) to participate in the 4th Heidelberg Laureate Forum, taking place from September 18 to 23 in Heidelberg, Germany.

[October 2015] I have been invited to the joint Working Groups that will co-design a new national Cyber Security Strategy to assist the Government with next steps to improve Australia‚Äôs cyber security. This initiative is coordinated by the Department of the Prime Minister and Cabinet.

[August 2015] Congratulations to Mohsen Rezvani, as his thesis entitled Trust-Based Data Aggregation for WSNs in the Presence of Faults and Collusion Attacks has been accepted for award of PhD degree.

[July 2015] I have been invited to join the editorial board of the IEEE Transactions on Secure and Dependable Computing (TDSC).

[June 2015] Our paper entitled Interdependent Security Risk Analysis of Hosts and Flows has been accepted as a Regular Paper in an upcoming issue of the Transactions on IEEE Transactions on Information Forensics & Security.

[February 2015] Our new project on High Level Security Policy Specification for Software-Defined Networks has been selected for the Google Faculty Research Award.

[September 2014] Our paper entitled Multiuser MIMO Scheduling for Mobile Video Applications has been accepted in IEEE Transactions on Wireless Communications.

[September 2014] Our paper entitled High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks has been accepted in IEEE Transactions on Mobile Computing.

[September 2014] Our paper entitled A Remote Attestation Protocol with Trusted Platform Modules (TPMs) has been accepted in Security and Communication Networks.

[August 2014] Our paper entitled Securing First-Hop Data Provenance for Bodyworn Devices using Wireless Link Fingerprints has been accepted as a Regular Paper in an upcoming issue of the Transactions on IEEE Transactions on Information Forensics & Security.

[May 2014] Invited to the TPC of  prestigious security conferences ACM Wisec 2014 and ACM CCS 2014.

[April 2014] Our paper entitled Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks has been accepted as a Regular Paper in an upcoming issue of the Transactions on Dependable and Secure Computing.

[November 2013] Our paper entitled Provenance-Aware Security Risk Analysis for Hosts and Network Flows has been accepted to the regular Technical track of the IFIP/IEEE Network Operations and Management Symposium (NOMS 2014).

[August 2013] Our paper entitled A Robust Iterative Filtering Technique for Wireless Sensor Networks in the Presence of Malicious Attacks was accepted at ACM SenSys 2013.

[August 2013] Our paper entitled DEMO Abstract: Securing Data Provenance in Body Area Networks using Lightweight Wireless Link Fingerprints was accepted at ACM SenSys 2013.