Sanjay K. Jha is a Professor, head of the Networked Systems and Security Group (NetSyS) and director of CySPri Laboratory at the School of Computer Science and Engineering at the University of New South Wales. Prof. Jha holds a Ph.D. degree from the University of Technology, Sydney, Australia. Sanjay has published over 180 articles in high quality journals and conferences. He is the principal author of the book Engineering Internet QoS and a co-editor of the book Wireless Sensor Networks: A Systems Perspective. He has been very active in attracting research grants from ARC, industry and other funding agencies. Visit my google-scholar home page.
|Affiliation||Professor at the School of Computer Science and Engineering, the University of New South Wales.|
Room-501A, Level 5 , Building K-17, UNSW, NSW 2052, Australia
|sanjay AT cse.unsw.edu.au|
|Phone||+ 61 2 9385 6471|
Sanjay founded the Networked Systems and Security Group (NetSyS) in July 1999. His research work primarily focuses on higher layers of communication protocols in the areas of Adhoc/Wireless Sensor networks (Project Sensar) as well as Efficient Distribution of Content in Multi-Rate Multi-channel Wireless Mesh Networks (Project Aiolos) as well as the Secure Wireless Mesh Network (Project Swimnet). He has been the recipient of a number of competitive grants from ARC, Industry and other funding bodies, with a total value of over A$3M (jointly).
[April 2016] Congratulations to Girish Revadigar, CSE PhD student under the supervision of Prof. Sanjay Jha, for being selected by the Scientific Committee of the Heidelberg Laureate Forum Foundation (HLFF) to participate in the 4th Heidelberg Laureate Forum, taking place from September 18 to 23 in Heidelberg, Germany.
[October 2015] I have been invited to the joint Working Groups that will co-design a new national Cyber Security Strategy to assist the Government with next steps to improve Australia’s cyber security. This initiative is coordinated by the Department of the Prime Minister and Cabinet.
[August 2015] Congratulations to Mohsen Rezvani, as his thesis entitled Trust-Based Data Aggregation for WSNs in the Presence of Faults and Collusion Attacks has been accepted for award of PhD degree.
[July 2015] I have been invited to join the editorial board of the IEEE Transactions on Secure and Dependable Computing (TDSC).
[June 2015] Our paper entitled Interdependent Security Risk Analysis of Hosts and Flows has been accepted as a Regular Paper in an upcoming issue of the Transactions on IEEE Transactions on Information Forensics & Security.
[February 2015] Our new project on High Level Security Policy Specification for Software-Defined Networks has been selected for the Google Faculty Research Award.
[September 2014] Our paper entitled Multiuser MIMO Scheduling for Mobile Video Applications has been accepted in IEEE Transactions on Wireless Communications.
[September 2014] Our paper entitled High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks has been accepted in IEEE Transactions on Mobile Computing.
[September 2014] Our paper entitled A Remote Attestation Protocol with Trusted Platform Modules (TPMs) has been accepted in Security and Communication Networks.
[August 2014] Our paper entitled Securing First-Hop Data Provenance for Bodyworn Devices using Wireless Link Fingerprints has been accepted as a Regular Paper in an upcoming issue of the Transactions on IEEE Transactions on Information Forensics & Security.
[May 2014] Invited to the TPC of prestigious security conferences ACM Wisec 2014 and ACM CCS 2014.
[April 2014] Our paper entitled Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks has been accepted as a Regular Paper in an upcoming issue of the Transactions on Dependable and Secure Computing.
[November 2013] Our paper entitled Provenance-Aware Security Risk Analysis for Hosts and Network Flows has been accepted to the regular Technical track of the IFIP/IEEE Network Operations and Management Symposium (NOMS 2014).
[August 2013] Our paper entitled A Robust Iterative Filtering Technique for Wireless Sensor Networks in the Presence of Malicious Attacks was accepted at ACM SenSys 2013.
[August 2013] Our paper entitled DEMO Abstract: Securing Data Provenance in Body Area Networks using Lightweight Wireless Link Fingerprints was accepted at ACM SenSys 2013.