I currently hold the Cloud Technology Endowed Professorship at The University of Texas at San Antonio (UTSA), USA. I am also the Ph.D. IT Program Advisor at UTSA Department of Information Systems and Cyber Security, and hold a courtesy appointment at UniSA. I can be contacted at raymond.choo@utsa.edu or raymond.choo@fulbrightmail.org.
I am the founding co-editor-in-chief of ACM Distributed Ledger Technologies: Research & Practice, and founding chair of IEEE Technology and Engineering Management Society (TEMS)’s Technical Committee on Blockchain and Distributed Ledger Technologies. I also serve as the Department Editor of IEEE Transactions on Engineering Management, and the Associate Editor of IEEE Transactions on... Read more
About me
I currently hold the Cloud Technology Endowed Professorship at The University of Texas at San Antonio (UTSA), USA. I am also the Ph.D. IT Program Advisor at UTSA Department of Information Systems and Cyber Security, and hold a courtesy appointment at UniSA. I can be contacted at raymond.choo@utsa.edu or raymond.choo@fulbrightmail.org.
I am the founding co-editor-in-chief of ACM Distributed Ledger Technologies: Research & Practice, and founding chair of IEEE Technology and Engineering Management Society (TEMS)’s Technical Committee on Blockchain and Distributed Ledger Technologies. I also serve as the Department Editor of IEEE Transactions on Engineering Management, and the Associate Editor of IEEE Transactions on Dependable and Secure Computing and IEEE Transactions on Big Data.
About me
Doctor of Philosophy Queensland University of Technology
Master of Information Technology University of South Australia
Bachelor of Applied Science (Honours) (Industrial and Applied Maths) University of South Australia
Bachelor of Science United Kingdom University
Research
Excludes commercial-in-confidence projects.
Evidence-based digital forensic framework for drug (and other serious and organised) crime law enforcement investigations in the cloud computing environment, National Drug Law Enforcement Research Fund, 01/09/2013 - 29/02/2016
Research
Research outputs for the last seven years are shown below. Some long-standing staff members may have older outputs included. To see earlier years visit ORCID, ResearcherID or Scopus
Open access indicates that an output is open access.
Year | Output |
---|---|
2023 |
3
3
|
2021 |
2
1
|
2020 |
8
5
|
2020 |
Open access
4
3
|
Year | Output |
---|---|
2017 |
5
|
2015 |
4
|
2014 |
Quick, DP, Martini, B & Choo, KKR 2014, Cloud Storage Forensics, Elsevier, Amsterdam.
104
|
2013 |
Open access
|
2013 |
Open access
|
2012 |
Open access
|
2012 |
Open access
|
2009 |
Choo, KK 2009, Secure key establishment, Springer, US.
16
|
Year | Output |
---|---|
2017 |
1
|
2017 |
2
|
2017 |
1
|
2017 |
8
|
2017 |
5
|
2017 |
4
|
2017 |
4
|
2017 |
1
|
2017 |
4
|
2017 |
4
|
2017 |
3
|
2017 |
2
|
2016 |
Open access
18
14
|
2015 |
11
|
2015 |
47
|
2015 |
9
|
2015 |
4
|
2015 |
Open access
28
|
2015 |
41
|
2015 |
Open access
31
|
2015 |
3
|
2014 |
|
2014 |
36
|
2014 |
Open access
|
2011 |
|
Year | Output |
---|---|
2024 |
2
|
2023 |
3
3
|
2022 |
Open access
11
8
|
2022 |
17
12
|
2022 |
32
25
|
2022 |
78
61
|
2021 |
2
1
|
2021 |
Open access
13
13
|
2021 |
72
52
|
2021 |
22
18
|
2021 |
22
7
|
2021 |
25
22
|
2020 |
8
5
|
2020 |
171
110
|
2020 |
75
|
2020 |
60
44
|
2020 |
Open access
32
27
1
|
2020 |
Open access
4
3
|
2020 |
75
59
|
2019 |
267
189
|
2019 |
Open access
6
6
|
2019 |
Open access
224
170
|
2019 |
79
62
|
2019 |
23
20
|
2019 |
Open access
23
19
|
2019 |
91
75
|
2019 |
Open access
310
244
|
2019 |
Open access
42
28
|
2019 |
33
27
|
2018 |
1
|
2018 |
65
54
|
2018 |
55
38
|
2018 |
6
5
|
2018 |
3
2
|
2018 |
21
20
|
2018 |
38
24
|
2018 |
23
21
|
2018 |
56
41
|
2018 |
50
38
|
2018 |
Open access
332
216
|
2018 |
117
100
|
2018 |
Open access
57
49
2
|
2018 |
81
53
|
2018 |
31
23
|
2018 |
50
40
|
2018 |
22
16
|
2018 |
Open access
148
112
|
2018 |
210
185
|
2018 |
Open access
43
22
|
2018 |
54
38
|
2018 |
Open access
45
26
|
2018 |
114
67
|
2018 |
10
6
|
2018 |
50
42
|
2018 |
11
|
2018 |
22
15
|
2018 |
Open access
31
26
|
2018 |
Open access
8
7
|
2017 |
58
39
|
2017 |
17
7
|
2017 |
21
16
|
2017 |
19
16
|
2017 |
12
|
2017 |
5
3
|
2017 |
44
25
|
2017 |
26
20
|
2017 |
9
7
|
2017 |
Open access
30
26
|
2017 |
36
27
|
2017 |
104
16
|
2017 |
27
24
|
2017 |
39
28
|
2017 |
39
26
|
2017 |
62
49
|
2017 |
32
23
2
|
2017 |
7
5
2
|
2017 |
65
50
|
2017 |
63
50
|
2017 |
16
13
|
2017 |
15
11
|
2017 |
287
223
|
2017 |
36
27
|
2017 |
139
113
|
2017 |
118
92
|
2017 |
35
22
|
2017 |
201
92
|
2017 |
Open access
3
3
|
2017 |
3
|
2017 |
64
54
|
2017 |
82
55
|
2017 |
Open access
266
192
|
2017 |
30
22
|
2017 |
4
3
1
|
2017 |
13
11
|
2017 |
28
22
|
2017 |
38
30
|
2017 |
Open access
4
4
|
2017 |
43
36
|
2017 |
18
17
|
2017 |
Open access
39
33
|
2017 |
Open access
13
7
|
2017 |
147
117
|
2017 |
27
15
|
2017 |
45
38
|
2017 |
11
6
|
2016 |
146
118
|
2016 |
Open access
42
30
|
2016 |
Open access
32
26
|
2016 |
39
30
1
|
2016 |
Open access
23
31
|
2016 |
22
16
|
2016 |
4
3
|
2016 |
36
32
|
2016 |
Open access
48
27
|
2016 |
Open access
19
16
|
2016 |
78
56
|
2016 |
32
23
|
2016 |
107
81
|
2016 |
Open access
8
6
|
2016 |
Open access
17
|
2016 |
33
25
|
2016 |
93
70
|
2016 |
7
5
|
2016 |
176
135
|
2016 |
Open access
19
15
|
2016 |
27
18
|
2016 |
75
62
|
2016 |
177
131
|
2016 |
4
4
|
2016 |
Open access
209
180
|
2016 |
Open access
7
5
|
2016 |
Open access
|
2016 |
73
38
|
2016 |
Open access
274
176
|
2016 |
267
190
|
2016 |
69
51
|
2016 |
100
87
|
2016 |
26
22
|
2016 |
18
13
|
2016 |
73
56
|
2016 |
94
75
|
2016 |
Open access
18
9
|
2016 |
Open access
1
2
|
2016 |
Open access
8
5
|
2016 |
39
31
|
2016 |
4
3
|
2016 |
166
104
|
2016 |
18
16
|
2016 |
87
62
|
2016 |
Open access
89
84
|
2016 |
Open access
64
64
|
2016 |
17
6
|
2016 |
Open access
87
64
|
2016 |
Open access
17
13
|
2016 |
60
46
|
2015 |
Open access
147
118
|
2015 |
2
7
|
2015 |
Open access
4
8
|
2015 |
Open access
96
71
2
|
2015 |
Open access
15
12
|
2015 |
|
2015 |
24
20
|
2015 |
Open access
63
61
|
2015 |
Open access
76
60
|
2015 |
48
37
|
2015 |
Open access
62
57
|
2015 |
Open access
5
4
|
2015 |
Open access
12
9
|
2015 |
70
90
|
2015 |
|
2014 |
Choo, K-K R 2014, 'Mobile cloud storage users', IEEE cloud computing, vol. 1, no. 3, pp. 20-23.
11
|
2014 |
9
|
2014 |
21
19
|
2014 |
Choo, K-KR 2014, 'Legal issues in the cloud', IEEE cloud computing, vol. 1, no. 1, pp. 94-96.
23
|
2014 |
Open access
28
28
|
2014 |
Open access
15
14
|
2014 |
96
65
|
2014 |
Open access
23
10
|
2014 |
18
|
2014 |
46
|
2014 |
70
58
|
2014 |
Open access
15
6
|
2014 |
Open access
4
|
2014 |
Open access
6
|
2014 |
174
154
|
2014 |
Open access
57
|
2014 |
135
102
|
2014 |
8
6
|
2014 |
Open access
14
13
|
2013 |
25
22
|
2013 |
Open access
66
52
|
2013 |
10
3
|
2013 |
126
92
|
2013 |
Open access
14
11
|
2013 |
4
|
2013 |
126
130
|
2013 |
97
13
|
2013 |
106
78
|
2013 |
Open access
26
|
2012 |
22
12
|
2012 |
Open access
46
16
|
2012 |
Open access
199
143
|
2011 |
Open access
28
|
2011 |
Open access
331
237
|
2011 |
9
7
|
2010 |
Open access
|
2010 |
Open access
|
2010 |
6
|
2010 |
43
33
|
2009 |
11
6
|
2009 |
Open access
|
2009 |
18
13
|
2009 |
60
41
|
2009 |
Open access
61
41
|
2009 |
Open access
17
15
|
2008 |
88
|
2008 |
69
39
|
2008 |
17
13
|
Year | Output |
---|---|
2018 |
|
2018 |
1
|
2018 |
Open access
17
9
179
|
2018 |
2
|
2018 |
10
|
2017 |
Open access
6
2
|
2017 |
Open access
6
|
2017 |
Open access
|
2017 |
Open access
|
2017 |
24
|
2016 |
4
3
|
2016 |
1
|
2016 |
34
10
|
2016 |
6
3
|
2016 |
Open access
|
2016 |
10
3
|
2016 |
Open access
18
17
|
2016 |
Open access
|
2016 |
6
|
2016 |
6
|
2016 |
9
|
2016 |
Open access
27
18
|
2016 |
45
32
|
2015 |
21
8
|
2015 |
Open access
|
2015 |
24
|
2015 |
|
2015 |
Open access
21
13
|
2015 |
13
7
|
2015 |
Open access
31
|
2015 |
21
16
|
2015 |
Open access
|
2015 |
Open access
5
|
2015 |
Open access
4
|
2015 |
16
|
2015 |
19
13
|
2014 |
Open access
21
15
4
|
2014 |
Open access
18
10
|
2014 |
14
7
|
2014 |
Open access
31
20
|
2014 |
Open access
7
5
|
2014 |
12
9
|
2014 |
9
8
|
2014 |
Open access
5
|
2014 |
Open access
10
|
2014 |
Open access
|
2014 |
Open access
16
|
2014 |
52
39
|
2014 |
Open access
30
|
2014 |
Open access
5
|
2013 |
Open access
|
2013 |
Open access
10
5
|
2013 |
Open access
9
|
2013 |
18
|
2013 |
11
9
|
2013 |
|
2010 |
Open access
3
|
External engagement & recognition
Organisation | Country |
---|---|
Aalto University | FINLAND |
Adekunle Ajasin University | NIGERIA |
Aizu University | JAPAN |
Anhui University | CHINA |
Auckland University of Technology | NEW ZEALAND |
Australian National University | AUSTRALIA |
Bahauddin Zakariya University | PAKISTAN |
Beihang University | CHINA |
Capital Normal University | CHINA |
Cardiff University | UNITED KINGDOM |
Carnegie Mellon University | UNITED STATES |
Central South University | CHINA |
Ch. Charan Singh University | INDIA |
Chandigarh University | INDIA |
Charles Sturt University | AUSTRALIA |
Chaudhary Charan Singh University | INDIA |
China University of Geosciences | CHINA |
Chinese Academy of Sciences | CHINA |
City University of Hong Kong (CityU) | HONG KONG |
City, University of London | UNITED KINGDOM |
Clemson University | UNITED STATES |
COMSATS Institute of Information Technology | PAKISTAN |
Comsats University Islamabad | PAKISTAN |
CSIRO Australia (Commonwealth Scientific Industrial Research organisation) | AUSTRALIA |
CSIRO Data61 | AUSTRALIA |
Cyber Security Malaysia | MALAYSIA |
Cybernetica AS | ESTONIA |
Dalian University of Technology | CHINA |
Deakin University | AUSTRALIA |
Dutch National Police | NETHERLANDS |
Duy Tan University | VIET NAM |
East China Normal University | CHINA |
Edith Cowan University | AUSTRALIA |
Electronics and Telecommunications Research Institute | INDIA |
Fordham University | UNITED STATES |
Foshan University | CHINA |
Fujian Normal University | CHINA |
Ghent University | BELGIUM |
GraphSQL Inc | UNITED STATES |
Guangzhou University | CHINA |
Guilin University of Electronic Technology | CHINA |
Guizhou University | CHINA |
Halmstad University, Sweden | SWEDEN |
Hangzhou Dianzi University | CHINA |
Hangzhou Normal University | CHINA |
Hankuk University of Foreign Studies | KOREA, REPUBLIC OF (SOUTH) |
Henan University Of Science And Technology | CHINA |
Hong Kong Polytechnic University | HONG KONG |
Huaqiao University | CHINA |
Huawei Singapore | SINGAPORE |
Huawei Singapore Research Center | SINGAPORE |
Huazhong University of Science and Technology | CHINA |
Hubei University of Education | CHINA |
Hunan University of Science and Technology | CHINA |
Indian Institute of Information Technology Kalyani | INDIA |
Indian Institute of Technology | INDIA |
Indian Institute Of Technology Indore | INDIA |
Indonesian National Police | INDONESIA |
Inje University | KOREA, REPUBLIC OF (SOUTH) |
Institute for Infocomm Research | SINGAPORE |
International Institute of Information Technology | INDIA |
Iran Telecommunication Research Centre | IRAN |
Jiangsu Institution | CHINA |
Jilin University | CHINA |
Jinan University (China) | CHINA |
Jordan University of Science and Technology | JORDAN |
Kent State University | UNITED STATES |
Khalifa University | UNITED ARAB EMIRATES |
King Abdullah University of Science and Technology (KAUST) | SAUDI ARABIA |
King Saud University | SAUDI ARABIA |
Konkuk University | KOREA, REPUBLIC OF (SOUTH) |
Korean Intellectual Property Office | KOREA, REPUBLIC OF (SOUTH) |
Lancaster University | UNITED KINGDOM |
Luleå tekniska Universitet | SWEDEN |
Lulea University of Technology | SWEDEN |
Macquarie University | AUSTRALIA |
Mahidol University | THAILAND |
Majan University College | OMAN |
Ministry of Health of People's Republic of China | CHINA |
Ministry of Public Security (China) | CHINA |
Monash University | AUSTRALIA |
Moscow State Institute of Electronic Technology | RUSSIAN FEDERATION |
Nanjing Unary Information Technology Co Ltd | CHINA |
Nanjing University of Information Science and Technology | CHINA |
Nanjing University of Posts and Telecommunications | CHINA |
Nankai University | CHINA |
Nanyang Technological University | SINGAPORE |
National Chiao Tung University | TAIWAN |
National Institute of Technology Rourkela | INDIA |
National University of Defense Technology | CHINA |
National University of Malaysia | MALAYSIA |
National University of Sciences and Technology | PAKISTAN |
Newcastle University, United Kingdom | UNITED KINGDOM |
North Dakota State University | UNITED STATES |
NUCES | PAKISTAN |
Oakland University | UNITED STATES |
Osmania University | INDIA |
Papua New Guinea University of Technology | PAPUA NEW GUINEA |
Private Individual | UNITED KINGDOM |
Providence University | TAIWAN |
PT-INTI - PT Industri Telekomunikasi Indonesia | INDONESIA |
Pyeongtaek University | KOREA, REPUBLIC OF (SOUTH) |
Qingdao University | CHINA |
RisLab - Research and Innovation for Security Lab | ITALY |
RMIT University | AUSTRALIA |
Saint Francis Xavier University | CANADA |
Santa Clara University | UNITED STATES |
SAP Cloud platform Core | UNITED STATES |
Shabakeh Gostar | IRAN |
Shaheed Zulfikar Ali Bhutto Institute of Science and Technology | PAKISTAN |
Shandong University | CHINA |
Shanghai Institute of Technology | CHINA |
Shanghai Jiao Tong University | CHINA |
Shanghai University | CHINA |
Shiraz University of Technology | IRAN |
Sichuan University | CHINA |
Sichuan University of Science and Engineering | CHINA |
Singapore Management University | SINGAPORE |
Singapore Polytechnic | SINGAPORE |
Soon Chun Hyang University | KOREA, REPUBLIC OF (SOUTH) |
South Australian Police | AUSTRALIA |
South Central University for Nationalities | CHINA |
SRM University, Andhra Pradesh | INDIA |
Stockholm University | SWEDEN |
Sun Yat-Sen University | CHINA |
Sung Kyun Kwan University | KOREA, REPUBLIC OF (SOUTH) |
Technical University of Denmark | DENMARK |
Thapar Institute of Engineering & Technology | INDIA |
Thapar Institute of Engineering and Technology | INDIA |
Thapar University | INDIA |
The Chinese University of Hong Kong (CUHK) | CHINA |
The Third Research Institute of the Ministry of Public Security | CHINA |
Thompson and Thompson Legal Practitioners | UNITED STATES |
Tianjin University | CHINA |
Tokyo University of Science | JAPAN |
Ton Duc Thang University of Technology | VIET NAM |
Tsinghua University | CHINA |
Universita di Salerno | ITALY |
Universiti Putra | MALAYSIA |
University College Dublin | IRELAND |
University of Aizu | JAPAN |
University of Auckland | NEW ZEALAND |
University of Bristol | UNITED KINGDOM |
University of Canterbury | NEW ZEALAND |
University of Cape Town | SOUTH AFRICA |
University of Dhaka | BANGLADESH |
University of Electronic Science and Technology of China | CHINA |
University of Guelph | CANADA |
University of Hong Kong | HONG KONG |
University of Ibadan | NIGERIA |
University of Jordan | JORDAN |
University of Lahore | PAKISTAN |
University of Larestan | IRAN |
University of Málaga | SPAIN |
University of Malaya | MALAYSIA |
University of Melbourne | AUSTRALIA |
University of Michigan | UNITED STATES |
University of Naples Federico II | ITALY |
University of New Brunswick | CANADA |
University of New South Wales | AUSTRALIA |
University of Padua | ITALY |
University of Putra | MALAYSIA |
University of Salerno | ITALY |
University of Salford | UNITED KINGDOM |
University of Sheffield | UNITED KINGDOM |
University of Sofia | BULGARIA |
University of South Alabama | UNITED STATES |
University of South Australia | AUSTRALIA |
University of Surrey | UNITED KINGDOM |
University of Sydney | AUSTRALIA |
University of Tasmania | AUSTRALIA |
University of Technology Sydney | AUSTRALIA |
University of Texas | UNITED STATES |
University of Texas at San Antonio | UNITED STATES |
University of the West of England | UNITED KINGDOM |
University of Waikato | NEW ZEALAND |
University of Waterloo | CANADA |
University of Wollongong | AUSTRALIA |
Valencia Polytechnic University | SPAIN |
Victoria University of Wellington | NEW ZEALAND |
VNR Vignana Jyothi Institute of Engineering and Technology | INDIA |
Western University | CANADA |
Wuhan University | CHINA |
Xiamen University of Technology | CHINA |
Xidian University | CHINA |
Yanshan University | CHINA |
Zhejiang Business Technology Institute | CHINA |
Zhejiang Gongshang University | CHINA |
External engagement & recognition
Engagement/recognition | Year |
---|---|
Cybersecurity Educator of the Year - APACCybersecurity Excellence Awards (CEAs), Information Security Community on LinkedIn |
2016 |
Visiting expertINTERPOL Global Complex for Innovation |
2016 |
Best Research Paper Award20th European Symposium on Research in Computer Security (ESORICS), Vienna, Austria |
2015 |
Highly Commended Award, Best Chapter in a Book CategoryAustralia New Zealand Policing Advisory Agency, ANZPAA, National Institute of Forensic Science, NIFS |
2015 |
Invited ExpertUnited Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders, UNAFEI, Criminal Justice, Focus on Investigation, Prosecution, Adjudication, and International Cooperation, Training |
2015 |
Invited speaker, Cloud ForensicsASEAN Cloud Security Alliance, CSA, Summit |
2015 |
Invited speaker, Cloud Forensics, Challenges and OpportunitiesCloudAsia, Singapore |
2015 |
Invited speaker, Data collection and exfiltrationDeakin University |
2015 |
Invited speaker, Data collection and exfiltration, Challenges and opportunitiesMahidol University |
2015 |
Invited speaker, The evolving cyberthreat landscape, Challenges and future research directionNihon University |
2015 |
Invited speaker, World Internet Conference, Wuzhen SummitCyberspace Administration of China and the Peoples Government of Zhejiang Province |
2015 |
Keynote speaker, Cloud Forensics, Challenges and OpportunitiesInternational Conference on Cloud Computing Research and Innovation, ICCCRI |
2015 |
Keynote, Evidence data collection for organisational cloud service users, Why and how?CSO CXO Series Breakfast Event, Melbourne |
2015 |
One of four invited experts to lead a group of 10-12 stakeholders from law enforcement, e.g. Interpol and Australian Federal Police, academia and the private sectorInterpol Cyber Research Agenda Workshop |
2015 |
Senior MemberInstitute of Electrical and Electronics Engineers International |
2015 |
Visiting expertINTERPOL Global Complex for Innovation |
2015 |
Winning Team, Digital Forensics Research ChallengeGermanys University of Erlangen-Nuremberg |
2015 |
Cloud and Mobile Security, Challenges and Future Research DirectionsAsia Pacific University of Technology and Innovation, Kuala Lumpur, Malaysia |
2014 |
Cyber security and digital forensics. International Conference on Cyber CrimeUnited Nations Asia and Far East Institute and UAE Government |
2014 |
Cybercrime and Digital Forensics, Intelligence, Concept to Reality, AdelaideAustralian Institute of Professional Intelligence Officers |
2014 |
Invited Lecture, Cloud and mobile security and forensicsCyber Wargame Centre, Singapore Polytechnic |
2014 |
Invited Lecture, Cyber crime and mobile securityCyber Security for Analysts and Policy-makers Professional Development Program, Australian Graduate School of Policing and Security, Canberra |
2014 |
Keynote speaker, Cloud and Mobile Security, Challenges and Future Research DirectionsInternational Conference on Cyber-Crime Investigation and Cyber Security, Asia Pacific University of Technology and Innovation, Kuala Lumpur |
2014 |
Keynote speaker, Digital forensics and electronic evidence, How can we communicate concepts clearly and effectively?International Conference on Applied Linguistics and Language Teaching, National Taiwan University of Science and Technology, Taipei |
2014 |
Mobile devices and their implications for forensic investigations in AustraliaPolice Technology Forum, Canberra |
2014 |
Panel Discussion, Cryptocurrency, Financial market, innovation and analyticsInaugural CAIA-SKBI Crypto-currency Conference, Singapore Management University |
2014 |
Panel Discussion, Strengthen international cooperation to combat cyber-terrorism. World Internet Conference, Wuzhen SummitCyberspace Administration of China and the Peoples Government of Zhejiang Province |
2014 |
Strengthen international cooperation to combat cyber-terrorismCyberspace Administration of China |
2014 |
Technical Keynote Speech. Cloud and Mobile ForensicsAnti-Phishing Working Group Counter-eCrime Operations Summit, CeCOS VIII, Hong Kong |
2014 |
Can we keep up with the Cyber Arms Race? Kaspersky Labs Cyber Security for the Next GenerationNational University of Singapore |
2013 |
Technical measure to combat cybercrimeThe Australian National University |
2013 |
The emerging trend of AML risk in the financial services industry4th Pan-Asian Regulatory Summit, Singapore |
2013 |
Invited Lecture, Securing our cyber space and futureBangladesh Institute of International and Strategic Studies |
2012 |
Is the security forecast cloudy or is the worse yet to come? Kaspersky Labs IT Security for the Next GenerationCity University of Hong Kong |
2012 |
Keynote SpeakerEconomic Crime Asia Conference, Nanyang Technological University |
2011 |
Transnational organized groups and CybercrimeUnited Nations Office on Drugs and Crime-International Telecommunication Union, UNODC-ITU, Asia-Pacific Regional Workshop on Fighting Cybercrime, Supreme Prosecutors Office, South Korea |
2011 |
Australian Capital Territory Pearcey Award for Taking a risk and making a difference in the development of the Australian ICT industryThe Pearcey Foundation |
2010 |
Consensus IT Professional AwardAustralian Computer Society (ACS) |
2010 |
Teaching & student supervision
Supervisions from 2010 shown
Thesis title | Student status |
---|---|
Authorship attribution in social media: a focus on binary n-gram analysis introducing novel approaches | Current |
Design, implementation and evaluation of artificial intelligence-based adverse drug events techniques | Current |
New authorship attribution methods to detect and manage social manipulation and fake news in social media | Current |
A general model of forensic data recovery framework for digital CCTV systems | Completed |
A mobile forensic visualisation lifecycle | Completed |
A shared secret security broker implementation in a commercial context | Completed |
An adversary model approach to securing smart devices | Completed |
An evidence-based adversary model for ios device and app vulnerability detection and exploitation | Completed |
An evidence-based cloud incident handling framework | Completed |
An evidence-based process model for windows phone 8 forensics | Completed |
An intent-based behavioural intrusion prevention framework for PHP-based web applications | Completed |
Authorship attribution with binary N-gram analysis for detecting astroturfing in social media | Completed |
Detecting and deterring stalkers using technology | Completed |
Digital forensic data reduction and quick analysis for evidence and intelligence | Completed |
Factors influencing employees' use of enterprise social networks | Completed |
Forensic taxonomies of android apps (ForTAApps) | Completed |
ForFACTS: a forensic framework for analysis of cloud technologies and services | Completed |
Framing fake news: An analysis on its rhetorical strategies, `newsness¿ and how it creates social meaning | Completed |
Investigating social media users' collaborative information seeking behaviours during group trip planning and the execution of travelling | Completed |
Money laundering and terrorism financing in virtual environments - a feasibility study | Completed |
Privacy attitudes and behaviours in online social networking | Completed |
Secure session initiation protocol solutions for mobile ad hoc networks | Completed |
Understanding information security risk in Australian real estate sectors | Completed |
User privacy preservation on mobile devices: investigating the role of contextual integrity | Completed |
Weakening the faithfulness assumption in causal discovery | Completed |