ORCID Profile
0000-0001-6143-6850
Current Organisation
Deakin University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
In Research Link Australia (RLA), "Research Topics" refer to ANZSRC FOR and SEO codes. These topics are either sourced from ANZSRC FOR and SEO codes listed in researchers' related grants or generated by a large language model (LLM) based on their publications.
Distributed Computing | Mobile Technologies | Networking and Communications
Publisher: IEEE
Date: 12-2015
Publisher: Elsevier BV
Date: 05-2021
Publisher: Elsevier BV
Date: 12-11-2021
Publisher: Springer London
Date: 2009
Publisher: IEEE
Date: 2008
Publisher: Springer Science and Business Media LLC
Date: 29-05-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2008
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 27-10-2022
DOI: 10.36227/TECHRXIV.21385929
Abstract: Zero Trust Architecture (ZTA) is a paradigm shift in how we protect data, stay connected, and access resources. ZTA is non-perimeter based defense, which has been emerging as a promising revolution in the cybersecurity field. It can be used to continuously maintain security by safeguarding against attacks both from inside and outside of the network system. However, automation and orchestration ZTA, an essential direction towards its seamless deployments over real-word networks, have been poorly understood in literature. In this paper, we first identify the bottlenecks, discuss the background of ZTA and compare it with traditional perimeter-based security architectures. More importantly, we present a comprehensive direction towards the automation and orchestration of ZTA by employing AI techniques. In other words, the key potential and roles of celebrates AI techniques for the automation and orchestration of ZTA are demonstrated for further exploration. Overall, in this review paper, we develop a foundational view on the challenges and potential enablers for the automation and orchestration of ZTA.
Publisher: IEEE
Date: 10-2013
Publisher: Elsevier BV
Date: 2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: IEEE
Date: 03-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2023
Publisher: Springer International Publishing
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Elsevier BV
Date: 07-2017
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer International Publishing
Date: 2019
Publisher: Springer Science and Business Media LLC
Date: 31-10-2017
Publisher: Emerald
Date: 11-02-2019
Publisher: IEEE
Date: 12-2006
Publisher: ACM
Date: 10-07-2023
Publisher: IEEE
Date: 12-2020
Publisher: IEEE
Date: 09-2014
Publisher: IEEE
Date: 09-2012
Publisher: IEEE
Date: 12-2020
Publisher: Springer Science and Business Media LLC
Date: 26-02-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Elsevier BV
Date: 08-2017
Publisher: Elsevier BV
Date: 05-2018
Publisher: IEEE
Date: 2005
Publisher: Elsevier BV
Date: 03-2017
Publisher: Springer Science and Business Media LLC
Date: 22-07-2017
Publisher: ACM
Date: 10-07-2023
Publisher: IEEE
Date: 11-2007
Publisher: Springer International Publishing
Date: 2015
Publisher: Elsevier BV
Date: 07-2019
Publisher: No publisher found
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: IEEE
Date: 2016
Publisher: Springer International Publishing
Date: 2019
Publisher: IEEE
Date: 09-2013
Publisher: Springer International Publishing
Date: 2019
Publisher: MDPI AG
Date: 04-07-1970
DOI: 10.3390/JSAN8030037
Abstract: Counterfeiting has always been a concern, costing a significant amount of money and causing losses in international trading markets. Radio frequency identification (RFID) tag Anti-counterfeiting is a conceptual solution that has received attention in the past few years. In this article, we present a survey study on the research topic of anti-counterfeiting products using RFID tags on merchandise. As this issue evolved in industry, there were several techniques used to address the problem each technique uses a different concept and mechanism in resolving the issue. Each technique also has different pros and cons which we will address at the end of this paper with our findings. As we explore RFID technology and its implementation, we will discuss previous research before proceeding to the core of the topic of RFID Anti-counterfeiting based on the methods used. We compare the different techniques used at the end of the paper.
Publisher: ACM
Date: 04-01-2016
Publisher: Association for Computing Machinery (ACM)
Date: 28-08-2024
DOI: 10.1145/3596598
Abstract: Cooperative Intelligent Transport Systems (C-ITS) is one of the proposed solutions to improve the safety and efficiency of road transport. However, C-ITS is prone to misbehaviours that can cause devastating effects such as road accidents and potential loss of life. While there are several research studies including technical studies and surveys that discuss misbehaviour detection in C-ITS, they tend to focus on specific aspects of misbehaviour detection and do not provide a comprehensive and unified coverage. With the objective of serving as a reference for future researchers, this study provides a comprehensive survey of misbehaviour detection in C-ITS. It identifies and discusses the key causes of misbehaviour in C-ITS, and the mechanisms used to detect them. Additionally, it proposes a thematic taxonomy on misbehaviour detection based on a comparative analysis of the technical studies. Furthermore, the existing solutions from the state-of-the-art and their shortcomings are also presented. Finally, this study highlights several significant research challenges and discusses future research directions in the area of misbehaviour detection in C-ITS. In doing so, this study contributes to the existing literature in an important field of study.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2015
Publisher: Springer International Publishing
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2014
Publisher: Association for Computing Machinery (ACM)
Date: 07-12-2023
DOI: 10.1145/3533705
Abstract: Continuous Authentication (CA) technologies enable users to be authenticated beyond just the point of entry. In this article, we conduct a comprehensive review of over 2,300 articles to (a) identify the main components of CA research to date, and (b) explore the current gaps and future research directions. Through a Citation Network Analysis (CNA), we identified that there are currently three primary focus research areas on CA - Keystroke Dynamics Mouse Movements and Mobile Device Touch, as well as identify an emerging trend in more recent studies on multi-modal CA authentication which utilises the numerous sensors that are embedded in modern mobile devices. This study also highlights the current gaps in the literature such as the need for a consensus over how to evaluate the application and utility of CA, and the need to examine the feasibility of CA technologies that currently exist based on more use case studies.
Publisher: Springer International Publishing
Date: 2022
Publisher: IEEE
Date: 11-2015
Publisher: Elsevier BV
Date: 10-2012
Publisher: IEEE
Date: 06-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2021
Publisher: IEEE
Date: 2007
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Springer International Publishing
Date: 2016
Publisher: Elsevier BV
Date: 10-2010
Publisher: Springer International Publishing
Date: 2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2013
Publisher: Emerald
Date: 31-12-2006
DOI: 10.1108/17427370780000144
Abstract: Routing in ad hoc networks faces significant challenges due to node mobility and dynamic network topology. In this work we propose the use of mobility prediction to reduce the search space required for route discovery. A method of mobility prediction making use of a sectorized cluster structure is described with the proposal of the Prediction based Location Aided Routing (P‐LAR) protocol. Simulation study and analytical results of P‐LAR find it to offer considerable saving in the amount of routing traffic generated during the route discovery phase.
Publisher: Informa UK Limited
Date: 17-02-2016
Publisher: Universitas Ahmad Dahlan
Date: 12-2015
Publisher: IEEE
Date: 12-2013
Publisher: IEEE
Date: 2006
DOI: 10.1109/ISCC.2006.93
Publisher: Informa UK Limited
Date: 19-04-2017
Publisher: ACM
Date: 10-07-2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 12-2006
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Springer Singapore
Date: 2019
Publisher: Springer Science and Business Media LLC
Date: 18-08-2020
Publisher: IEEE
Date: 12-2013
Publisher: IEEE
Date: 12-2013
Publisher: Elsevier BV
Date: 2022
Publisher: IEEE
Date: 12-2020
Publisher: Springer International Publishing
Date: 2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: IEEE
Date: 11-2018
Publisher: IEEE
Date: 10-2014
Publisher: Elsevier BV
Date: 08-2009
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2012
DOI: 10.1109/TPDS.2010.97
Publisher: IEEE
Date: 2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: IEEE
Date: 12-2009
Publisher: IEEE
Date: 2009
DOI: 10.1109/MSN.2009.47
Publisher: Springer Nature Switzerland
Date: 2022
Publisher: Elsevier BV
Date: 10-2018
Publisher: IEEE
Date: 03-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2030
DOI: 10.36227/TECHRXIV.21385929.V1
Abstract: Zero Trust Architecture (ZTA) is a paradigm shift in how we protect data, stay connected, and access resources. ZTA is non-perimeter based defense, which has been emerging as a promising revolution in the cybersecurity field. It can be used to continuously maintain security by safeguarding against attacks both from inside and outside of the network system. However, automation and orchestration ZTA, an essential direction towards its seamless deployments over real-word networks, have been poorly understood in literature. In this paper, we first identify the bottlenecks, discuss the background of ZTA and compare it with traditional perimeter-based security architectures. More importantly, we present a comprehensive direction towards the automation and orchestration of ZTA by employing AI techniques. In other words, the key potential and roles of celebrates AI techniques for the automation and orchestration of ZTA are demonstrated for further exploration. Overall, in this review paper, we develop a foundational view on the challenges and potential enablers for the automation and orchestration of ZTA.
Publisher: IEEE
Date: 09-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2022
Publisher: IEEE
Date: 12-2020
Publisher: Springer London
Date: 2009
Publisher: Springer International Publishing
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Springer International Publishing
Date: 2015
Publisher: Elsevier BV
Date: 05-2020
Publisher: IEEE
Date: 06-2013
Publisher: Springer International Publishing
Date: 2015
Publisher: Elsevier BV
Date: 15-03-2021
Publisher: IEEE
Date: 12-2015
Publisher: IEEE
Date: 10-2013
Publisher: Elsevier BV
Date: 08-2016
Publisher: Elsevier BV
Date: 2013
Publisher: IEEE
Date: 12-2011
Publisher: IEEE
Date: 11-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2024
Publisher: IEEE
Date: 07-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: Association for Computing Machinery (ACM)
Date: 04-03-2022
DOI: 10.1145/3501260
Abstract: This article first formalizes the problem of unlinkable attribute-based authentication in the system where each user possesses multiple assertions and uses them interchangeably. Currently, there are no recommendations for optimal usage of assertions in such authentication systems. To mitigate this issue, we use conditional entropy to measure the uncertainty for a Relying Party who attempts to link observed assertions with user labels. Conditional entropy is the function of usage statistics for all assertions in the system. Personal decisions made by the users about the usage of assertions contribute to these statistics. This collective effect from all the users impacts the unlinkability of authentication and must be studied using game theory. We specify several instances of the game where context information that is provided to the users differs. Through game theory and based on conditional entropy, we demonstrate how each user optimizes usage for the personal set of assertions. In the experiment, we substantiate the advantage of the proposed rational decision-making approaches: Unlinkability that we obtain under Nash equilibrium is higher than in the system where users authenticate using their assertions at random. We finally propose an algorithm that calculates equilibrium and assists users with the selection of assertions. This manifests that described techniques can be executed in realistic settings. This does not require modification of existing authentication protocols and can be implemented in platform-independent identity agents. As a use case, we describe how our technique can be used in Digital Credential Wallets: We suggest that unlinkability of authentication can be improved for Verifiable Credentials.
Publisher: IEEE
Date: 04-2012
Publisher: IEEE
Date: 11-2014
DOI: 10.1109/CIS.2014.15
Publisher: Informa UK Limited
Date: 19-10-2015
Publisher: IEEE
Date: 03-2017
Publisher: IEEE
Date: 09-2008
DOI: 10.1109/HPCC.2008.42
Start Date: 08-2010
End Date: 12-2014
Amount: $159,106.00
Funder: Australian Research Council
View Funded Activity