Profile image of Robin Ram Mohan Doss

Prof Robin Ram Mohan Doss

STAFF PROFILE

Position

Director, Centre for Cyber Resilience and Trust (CREST)

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Qualifications

Doctor of Philosophy, Royal Melb Inst. of Technology, 2004
Master of Engineering, Royal Melb Inst. of Technology, 2003

Contact

robin.doss@deakin.edu.au
+61 3 925 17305

Biography

Professor Robin Doss is the Director of the University's Strategic Research and Innovation Centre (SRIC) for Cyber Resilience and Trust (CREST). In addition, he leads Deakin University's participation in the Cyber Security Cooperative Research Centre (CSCRC) and is the theme leader for the CSCRC's research theme on "Development of Next Generation Authentication Technologies". 

Read more on Robin's profile

Research interests

My research interests are in the broad areas of security and privacy for smart, emerging and critical infrastructures. Honours/ PhD students who would like to work with me are requested to send me a copy of their CV and transcripts. Please do not list me as a potential supervisor without receiving my acceptance.

Research groups

Centre for Cyber Resilience and Trust (CREST)

Publications

Filter by

2024

Towards Higher Levels of Assurance in Remote Identity Proofing

Ashish Nanda, Syed Shah, Jongkil Jeong, Robin Doss, Jeb Webb

(2024), Vol. 13, pp. 62-71, IEEE Consumer Electronics Magazine, Piscataway, N.J., C1

journal article

A Taxonomy and Analysis of Misbehaviour Detection in Cooperative Intelligent Transport Systems: A Systematic Review

Mohamed Amanullah, Seng Loke, Mohan Baruwal Chhetri, Robin Doss

(2024), Vol. 56, pp. 1-38, ACM Computing Surveys, New York, N.Y., C1

journal article

A hybrid cyber defense framework for reconnaissance attack in industrial control systems

X Qin, F Jiang, C Dong, R Doss

(2024), Vol. 136, Computers and Security, C1

journal article

Examining usable security features and user perceptions of Physical Authentication Devices

A Nanda, J Jeong, S Shah, M Nosouhi, R Doss

(2024), Vol. 139, pp. 103664-103664, Computers and Security, C1

journal article

Ransomware early detection: A survey

M Cen, F Jiang, X Qin, Q Jiang, R Doss

(2024), Vol. 239, Computer Networks, C1

journal article

Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges

Y Cao, S Pokhrel, Y Zhu, R Doss, G Li

(2024), pp. 1-24, Machine Intelligence Research, Berlin, Germany, C1

journal article
2023

False data injection threats in active distribution systems: A comprehensive survey

M Husnoo, A Anwar, N Hosseinzadeh, S Islam, A Mahmood, R Doss

(2023), Vol. 140, pp. 344-364, Future Generation Computer Systems, C1

journal article

Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks

Keshav Sood, Mohammad Nosouhi, Dinh Nguyen, Frank Jiang, Morshed Chowdhury, Robin Doss

(2023), Vol. 18, pp. 965-979, IEEE Transactions on Information Forensics and Security, Piscataway, N.J., C1

journal article

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

M Nosouhi, S Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, R Doss

(2023), Vol. 18, pp. 2160-2174, IEEE Transactions on Information Forensics and Security, C1

journal article

FedDiSC: A computation-efficient federated learning framework for power systems disturbance and cyber attack discrimination

M Husnoo, A Anwar, H Reda, N Hosseinzadeh, S Islam, A Mahmood, R Doss

(2023), Vol. 14, pp. 100271-100271, Energy and AI, C1

journal article

Hybrid cyber defense strategies using Honey-X: A survey

X Qin, F Jiang, M Cen, R Doss

(2023), Vol. 230, Computer Networks, C1

journal article

Bit Flipping Key Encapsulation for the Post-Quantum Era

M Nosouhi, S Shah, L Pan, R Doss

(2023), Vol. 11, pp. 56181-56195, IEEE Access, C1

journal article

A Secure Federated Learning Framework for Residential Short Term Load Forecasting

M Husnoo, A Anwar, N Hosseinzadeh, S Islam, A Mahmood, R Doss

(2023), pp. 1-1, IEEE Transactions on Smart Grid, C1

journal article

SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems

Syed Shah, Mohammad Nosouhi, Lei Pan, Robin Doss

(2023), pp. 1-8, APKC '23 : Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, Melbourne, Vic., E1

conference

A Generic Enhancer for Backdoor Attacks on Deep Neural Networks

B Abbasi, Q Zhong, L Zhang, S Gao, A Robles-Kelly, R Doss

(2023), Vol. 1794, pp. 296-307, ICONIP 2022 : Proceedings of the 29th Neural Information Processing Conference, Virtual Event, E1

conference

An Analysis of Important Factors Affecting the Success of Blockchain Smart Contract Security Vulnerability Scanning Tools

Cynthia Chee, Shantanu Pal, Lei Pan, Robin Doss

(2023), pp. 105-113, ASIA CCS 2023 : Proceedings of the 5th ACM Asia Conference on Computer and Communications Security, Melbourne, Victoria, E1

conference

ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness

Fokke Heikamp, Lei Pan, Robin Doss, Rolando Trujillo-Rasua, Sushmita Ruj

(2023), pp. 1-10, BSCI 2023 : Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure 2023, Melbourne, VIC., E1

conference

FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination

M Husnoo, A Anwar, H Reda, N Hosseinzadeh, S Islam, A Mahmood, R Doss

(2023), pp. 1-6, INFOCOM 2023 : IEEE Conference on Computer Communications Workshops, Hoboken, New Jersey, E1

conference

WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM

F Wang, Y Wang, L Zhang, Y Hertzog, M Loewy, D Valladolid, J Medeiros, M Al-Hawawreh, R Doss

(2023), Vol. 13907 LNCS, pp. 336-354, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), E1

conference

Towards Robust Misbehavior Detection in Power Control Systems: A Gradient Quantization Approach

M Husnoo, A Anwar, R Doss, N Hosseinzadeh

(2023), pp. 29-36, ARTMAN 2023 : Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, Copenhagen, Denmark, E1

conference

Secure Data Provenance for Internet of Vehicles with Verifiable Credentials

A Nepal, R Doss, F Jiang

(2023), pp. 210-218, 2023 IEEE 14th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2023, E1

conference

Misbehaviour Detection for Smart Grids using a Privacy-centric and Computationally Efficient Federated Learning Approach

M Husnoo, A Anwar, N Hosseinzadeh, R Doss, B Sikdar

(2023), pp. 2269-2274, GLOBECOM 2023 : Proceedings of the IEEE Global Communications Conference, Kuala Lumpur, Malaysia, E1

conference

Multi-Factor Continuous Authentication of Drivers Leveraging Smartphone

Y Song, F Jiang, S Ali Shah, R Doss

(2023), pp. 1-9, SWC 2023 : Smart World Congress : Proceedings of the 20th IEEE Autonomous and Trusted Vehicles Conference, Portsmouth, United Kingdom, E1

conference
2022

A Multi‐Domain Perspective of Future Directions for VANETs for Emergency Message Dissemination

Ravneet Kaur, Ramkumar Ramachandran, Robin Doss, Lei Pan

(2022), pp. 199-218, IoT-Enabled Smart Healthcare Systems, Services and Applications, London, Eng., B1

book chapter

Traceability in Supply Chains: A Cyber Security Analysis

Naeem Syed, Syed Shah, Rolando Trujillo Rasua, Robin Doss

(2022), Vol. 112, Computers and Security, C1

journal article

Improving Unlinkability of Attribute-based Authentication through Game Theory

Yevhen Zolotavkin, Jongkil Jeong, Veronika Kuchta, Maksym Slavnenko, Robin Doss

(2022), Vol. 25, pp. 1-36, ACM Transactions on Privacy and Security, New York, N.Y., C1

journal article

Towards Spoofing Resistant Next Generation IoT Networks

M Nosouhi, K Sood, M Grobler, R Doss

(2022), Vol. 17, pp. 1669-1683, IEEE Transactions on Information Forensics and Security, Piscataway, N.J., C1

journal article

Zero Trust Architecture (ZTA): A Comprehensive Survey

N Syed, S Shah, A Shaghaghi, A Anwar, Z Baig, R Doss

(2022), Vol. 10, pp. 57143-57179, IEEE Access, Piscataway, N.J., C1

journal article

Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis

Jongkil Jeong, Yevhen Zolotavkin, Robin Doss

(2022), pp. 1-30, ACM Computing Surveys, New York, N.Y., C1

journal article

GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids

T Le, M Ge, A Anwar, S Loke, R Beuran, R Doss, Y Tan

(2022), Vol. 22, Sensors, Switzerland, C1

journal article

Digital Twin For Cybersecurity: Towards Enhancing Cyber Resilience

Rajiv Faleiro, Lei Pan, Shiva Pokhrel, Robin Ram Mohan Doss

(2022), Vol. 413, pp. 57-76, Broadnets 2021: Broadband, Communications, Networks, and Systems, Virtual Event, E1

conference

A New Zero-Trust Aided Smart Key Authentication Scheme in IoV

Y Song, F Jiang, S Ali Shah, R Doss

(2022), pp. 630-636, Proceedings of the IEEE Conference on Pervasive Computing and Communications 2022 Conference, Workshops and other Affiliated Events, Pisa, Italy, E1

conference

BurST-ADMA: Towards an Australian Dataset for Misbehaviour Detection in the Internet of Vehicles

M Amanullah, M Baruwal Chhetri, S Loke, R Doss

(2022), pp. 624-629, Proceedings of the IEEE Conference on Pervasive Computing and Communications 2022 Conference, Workshops and other Affiliated Events, Pisa, Italy, E1

conference

A Bytecode-based Approach for Smart Contract Classification

C Shi, Y Xiang, J Yu, L Gao, K Sood, R Doss

(2022), pp. 1046-1054, IEEE SANER 2022 : Proceedings of the Institute of Electrical and Electronics Engineers 2022 International Conference on Software Analysis, Evolution and Reengineering 2022, Honolulu, Hawaii, E1

conference

A Compressed Sensing Based Image Compression-Encryption Coding Scheme without Auxiliary Information Transmission

J Liang, D Xiao, Y Xiang, R Doss

(2022), pp. 5573-5578, IEEE ICC 2022 : Proceedings of the Institute of Electrical and Electronics Engineers 2022 International Conference on Communications, Seoul, Republic of Korea, E1

conference

DU-QS22: A Dataset for Analyzing QC-MDPC-Based Quantum-Safe Cryptosystems

M Nosouhi, S Shah, L Pan, R Doss

(2022), Vol. 448, pp. 3-10, AC3 2022 : Proceedings of the EAI International Conference on Applied Cryptography in Computer and Communications 2022, Virtual Event, E1

conference

Towards Privacy-Preserving Neural Architecture Search

F Wang, L Zhang, L Pan, S Hu, R Doss

(2022), pp. 1-6, Proceedings - 2022 IEEE Symposium on Computers and Communications, Rhodes, Greece, E1

conference

Forward Traceability for Product Authenticity Using Ethereum Smart Contracts

F Heikamp, L Pan, R Trujillo-Rasua, S Ruj, R Doss

(2022), Vol. 13787, pp. 514-523, NSS 2022 : Proceedings of the 16th International Conference on Network and System Security 2022, Denarau Island, Fiji, E1

conference

Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis

V Kanthuru, S Rajasegarar, P Rathore, R Doss, L Pan, B Ray, M Chowdhury, C Srimathi, M Durai

(2022), Vol. 13725, pp. 118-130, ADMA 2022 : Proceedings of the Advanced Data Mining and Applications International Conference 2022, Brisbane, Qld., E1

conference

A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks

G Yang, M Ge, S Gao, X Lu, L Zhang, R Doss

(2022), Vol. 13787, pp. 406-425, NSS 2022 : Proceedings of the Network and System Security 2022 international conference, Denarau Island, Fiji, E1

conference

FedREP: Towards Horizontal Federated Load Forecasting for Retail Energy Providers

M Husnoo, A Anwar, N Hosseinzadeh, S Islam, A Mahmood, R Doss

(2022), Vol. 2022-November, APPEEC 2022 : Proceedings of the 14th Asia-Pacific Power and Energy Engineering Conference, Melbourne, Victoria, E1

conference
2021

SEPN: A Sequential Engagement Based Academic Performance Prediction Model

X Song, J Li, S Sun, H Yin, P Dawson, R Doss

(2021), Vol. 36, pp. 46-53, IEEE Intelligent Systems, C1

journal article

Data congestion in VANETs: research directions and new trends through a bibliometric analysis

T Bhatia, R Ramachandran, R Doss, L Pan

(2021), Vol. 77, pp. 6586-6628, Journal of Supercomputing, C1

journal article

Multipath TCP Meets Transfer Learning: A Novel Edge-Based Learning for Industrial IoT

S Pokhrel, L Pan, N Kumar, R Doss, H Vu

(2021), Vol. 8, pp. 10299-10307, IEEE Internet of Things Journal, C1

journal article

Secure and privacy-preserving structure in opportunistic networks

S Rashidibajgan, T Hupperich, R Doss, A Förster

(2021), Vol. 104, Computers and Security, C1

journal article

Private and trustworthy distributed lending model using Hyperledger Besu

Purathani Praitheeshan, Lei Pan, Robin Ram Mohan Doss

(2021), Vol. 2, pp. 1-19, SN computer science, Cham, Switzerland, C1

journal article

The importance of selecting clustering parameters in VANETs: A survey

R Kaur, R Ramachandran, R Doss, L Pan

(2021), Vol. 40, Computer Science Review, C1

journal article

An extended reselling protocol for existing anti-counterfeiting schemes

G Khalil, R Doss, M Chowdhury

(2021), Vol. 10, Journal of Sensor and Actuator Networks, C1

journal article

Generating Trips and Assigning Route to a SUMO Network Through the Origin-Destination Matrix: A Case Study of Mobility Routing Model for VANETs

T Bhatia, R Ramachandran, R Doss, L Pan

(2021), IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), C1

journal article

LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)

S Shah, N Syed, A Shaghaghi, A Anwar, Z Baig, R Doss

(2021), Vol. 108, Computers and Security, C1

journal article

A novel multi-stage distributed authentication scheme for smart meter communication

M Hegde, A Anwar, K Kotegar, Z Baig, R Doss

(2021), Vol. 7, pp. 1-36, PeerJ Computer Science, United States, C1

journal article

SolGuard: Preventing External Call Issues in Smart Contract-based Multi-Agent Robotic Systems

Purathani Praitheeshan, Lei Pan, Xi Zheng, Alireza Jolfaei, Robin Doss

(2021), Vol. 579, pp. 150-166, Information Sciences, Amsterdam, The Netherlands, C1

journal article

EEG-based emotion recognition via capsule network with channel-wise attention and LSTM models

L Deng, X Wang, F Jiang, R Doss

(2021), Vol. 3, pp. 425-435, CCF Transactions on Pervasive Computing and Interaction, C1

journal article

Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey

M Husnoo, A Anwar, R Chakrabortty, R Doss, M Ryan

(2021), Vol. 9, pp. 153276-153304, IEEE Access, Piscataway, N.J., C1

journal article

Detecting Internet of Things Bots: A Comparative Study

B Stephens, A Shaghaghi, R Doss, S Kanhere

(2021), Vol. 9, pp. 160391-160401, IEEE Access, C1

journal article

Generating the Appropriate Route for the Detection of Data Congestion in VANETs using a Clustering Approach

Tarandeep Bhatia, Ramkumar Ketti Ramachandran, Robin Doss, Lei Pan

(2021), pp. 636-642, Confluence 2021 : Proceedings of the 11th International Conference on Cloud Computing, Data Science & Engineering, Online, E1

conference

Detecting and controlling the occurrence of data congestion in a high-density VANETs Environment

Tarandeep Bhatia, Ramkumar Ramachandran, Robin Ram Mohan Doss, Lei Pan

(2021), pp. 42-48, Proceedings of the 2021 29th Conference of Open Innovations Association (FRUCT), Tampere, Finland, E1

conference

Enhancing Privacy Through DMMA: Decision-Making Method for Authentication

Maksym Slavnenko, Maksym Slavnenko, Yevhen Zolotavkin, Yevhen Zolotavkin, Jong Jeong, Jong Jeong, Veronika Kuchta, Veronika Kuchta, Robin Doss, Robin Doss

(2021), pp. 1-12, TRUSTCOM21 : Proceedings of the 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Shenyang, China, E1

conference

Federated Learning with Extreme Label Skew: A Data Extension Approach

Saheed Tijani, Xingjun Ma, Ran Zhang, Frank Jiang, Robin Ram Mohan Doss

(2021), pp. 1-8, IJCNN 2021 : Proceedings of the International Joint Conference on Neural Networks, Shenzhen, China, E1

conference

Identifying DNS Exfiltration based on Lexical Attributes of Query Name

I Jawad, J Ahmed, I Razzak, R Doss

(2021), pp. 1-7, IJCNN 2021 : Proceedings of the 2021 International Joint Conference on Neural Networks, Shenzhen, China, E1

conference

Systematic evaluation of abnormal detection methods on gas well sensor data

Xichen Tang, Jinlong Wang, Ye Zhu, Robin Doss, Xin Han

(2021), pp. 1-6, ISCC 2021 : Proceedings of the 2021 IEEE Symposium on Computers and Communications, Athens, Greece, E1

conference

Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials

N Lalchandani, F Jiang, J Jeong, Y Zolotavkin, R Doss

(2021), pp. 1-11, PST 2021: Proceedings of the 18th Privacy, Security and Trusts 2021 International Conference, Auckland, N.Z., E1

conference
2020

A Scheme of Intelligent Traffic Light System Based on Distributed Security Architecture of Blockchain Technology

Pengjie Zeng, Xiaoliang Wang, Hao Li, Frank Jiang, Robin Doss

(2020), Vol. 8, pp. 33644-33657, IEEE Access, Piscataway, N.J., C1

journal article

Secure attribute-based search in RFID-based inventory control systems

R Doss, R Trujillo-Rasua, S Piramuthu

(2020), Vol. 132, Decision Support Systems, C1

journal article

A Novel RFID-Based Anti-Counterfeiting Scheme for Retail Environments

G Khalil, R Doss, M Chowdhury

(2020), Vol. 8, pp. 47952-47962, IEEE Access, C1

journal article

A new secure RFID anti-counterfeiting and anti-theft scheme for merchandise

G Khalil, R Doss, M Chowdhury

(2020), Vol. 9, Journal of Sensor and Actuator Networks, C1

journal article

An efficient voting based decentralized revocation protocol for vehicular ad hoc networks

M Asghar, L Pan, R Doss

(2020), Vol. 6, pp. 422-432, Digital Communications and Networks, C1

journal article

Echo-id: Smart user identification leveraging inaudible sound signals

S Ali Shah, A Shaghaghi, S Kanhere, J Zhang, A Anwar, R Doss

(2020), Vol. 8, pp. 194508-194522, IEEE Access, C1

journal article

A review of simulators used for VANETs: The case-study of vehicular mobility generators

T Bhatia, R Ketti Ramachandran, R Ram Mohan Doss, L Pan

(2020), SPIN 2020 Proceedings of the 7th International Conference on Signal Processing and Integrated Networks, Noida, India, E1

conference

Adopting SOA and microservices for inter-enterprise architecture in SME communities

A Andriyanto, R Doss, P Yustianto

(2020), pp. 282-287, ICEEIE 2019 : Emerging innovative technology for sustainable future : Proceedings of the 6th International Conference on Electrical, Electronics and Information Engineering 2019, Denpasar, Indonesia, E1

conference

IoT insider attack - survey

M Chowdhury, R Doss, B Ray, S Rajasegarar, S Chowdhury

(2020), Vol. 324, pp. 28-41, SGIoT 2019 : Proceedings of the Third European Alliance for Innovation International Conference on Smart Grid and Internet of Things 2019, TaiChung, Taiwan, E1

conference

Smart parking with Computer Vision and IoT technology

M Dixit, C Srimathi, R Doss, S Loke, M Saleemdurai

(2020), pp. 170-174, TSP : Proceedings of the 2020 43rd International Conference on Telecommunications and Signal Processing, Online from Milan, Italy, E1

conference

A survey on controlling the congestion in vehicle-to-vehicle communication

Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan

(2020), pp. 573-578, ICRITO 2020 : Trends and future directions : Proceedings of the IEEE 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1

conference

Detection and control of data congestion in vehicular broadcast networks

Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan

(2020), pp. 1044-1049, ICRITO 2020 : Trends and future directions : Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1

conference

A comprehensive review on the vehicular ad-hoc networks

Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan

(2020), pp. 515-520, ICRITO 2020 : Trends and future directions : Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1

conference

Towards decentralized IoT updates delivery leveraging blockchain and zero-knowledge proofs

Edoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil Kanhere

(2020), pp. 1-10, NCA 2020 : 2020 IEEE 19th International Symposium on Network Computing and Applications, Online from Cambridge, Mass., E1

conference

Security evaluation of smart contract-based on-chain Ethereum wallets

P Praitheeshan, L Pan, R Doss

(2020), Vol. 12570, pp. 22-41, NSS 2020 : Proceedings of the 14th International Conference on Network and System Security, Online from Melbourne, Vic., E1

conference

Digital security reference model: a survey and proposal

Suhardi, B Aziz, R Doss, P Yustianto

(2020), pp. 323-328, ICITSI 2020 : Proceedings of the 2020 International Conference on Information Technology Systems and Innovation, Bandung, Indonesia, E1

conference

A Feedback-Driven Lightweight Reputation Scheme for IoV

Rohan Dahiya, Frank Jiang, Robin Ram Mohan Doss

(2020), pp. 1060-1068, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1

conference

Avoiding Geographic Regions in Tor

Matthew Ryan, Morshed Chowdhury, Frank Jiang, Robin Ram Mohan Doss

(2020), pp. 802-809, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1

conference

Opportunistic Tracking in Cyber-Physical Systems

Samaneh Rashidibajgan, Thomas Hupperich, Robin Ram Mohan Doss, Lei Pan

(2020), pp. 1672-1679, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1

conference

Towards a lightweight continuous authentication protocol for device-to-device communication

S Shah, N Syed, A Shaghaghi, A Anwar, Z Baig, R Doss

(2020), pp. 1119-1126, Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, E1

conference

Gas Leakage Warning System

A Raghunath, S Chandrasekaran, R Doss, M Saleem Durai

(2020), Vol. 2020-January, pp. 1-5, SCOReD 2020 : Proceedings of the 2020 IEEE Student Conference on Research and Development, Batu Pahat, Malaysia, E1

conference
2019

A unifying structure of metamodel landscape

P Yustianto, R Doss, R Suhardi

(2019), Vol. 14, pp. 134-152, Journal of Modelling in Management, C1

journal article

An improved authentication scheme for internet of vehicles based on blockchain technology

X Wang, P Zeng, N Patterson, F Jiang, R Doss

(2019), Vol. 7, pp. 45061-45072, IEEE Access, C1

journal article

Privacy-preserving history-based routing in Opportunistic Networks

S Rashidibajgan, R Doss

(2019), Vol. 84, pp. 244-255, Computers and security, Amsterdam, The Netherlands, C1

journal article

A comparison survey study on RFID based anti-counterfeiting systems

G Khalil, R Doss, M Chowdhury

(2019), Vol. 8, Journal of Sensor and Actuator Networks, C1

journal article

Protean Authentication Scheme-A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments

S Sathyadevan, K Achuthan, R Doss, L Pan

(2019), Vol. 7, pp. 92419-92435, IEEE Access, C1

journal article

Consolidating service engineering ontologies : building service ontology from SOA Modeling Language (SoaML)

P Yustianto, R Doss, Suhardi, N Kurniawan

(2019), pp. 555-561, ICITSI 2018 : Proceedings of the 5th International Conference on Information Technology Systems and Innovation, Bandung and Padang, Indonesia, E1

conference

Intrusion detection system classifier for VANET based on pre-processing feature extraction

Ayoob Ayoob, Ghaith Khalil, Morshed Chowdhury, Robin Ram Mohan Doss

(2019), Vol. 1113, pp. 3-22, FNSS 2019 : Future Network Systems and Security 5th International Conference, FNSS 2019 Melbourne, VIC, Australia, November 27–29, 2019 Proceedings, Melbourne, Victoria, E1

conference

Digital forensics for drone data - intelligent clustering using self organising maps

S Mekala, Zubair Baig

(2019), Vol. 1113, FNSS 2019 : Proceedings of the 5th International Conference of Future Network Systems and Security, Melbourne, Vic., E1

conference

An efficient dynamic group-based batch verification scheme for vehicular sensor networks

L Jiang, Y Wang, J Tian, F Jiang, Nicholas Patterson, R Ram Mohan Doss

(2019), pp. 52-64, FNSS 2019 : Proceedings of the 5th International Conference of Future Network Systems and Security, Melbourne, Victoria, E1

conference

Attainable hacks on keystore files in ethereum wallets--a systematic analysis

Purathani Praitheeshan, Y Xin, Lei Pan, Robin Ram Mohan Doss

(2019), FNSS 2019 : Future Network Systems and Security, Melbourne, Australia, E1

conference

Quorum chain-based malware detection in android smart devices

F Gao, F Jiang, Y Zhang, R Doss

(2019), Vol. 1113, pp. 212-224, FNSS 2019 : Future Network Systems and Security : 5th International Conference, FNSS 2019 Melbourne, VIC, Australia, November 27–29, 2019 Proceedings, Melbourne, Vic., E1

conference

Insider attacks on Zigbee based IoT networks by exploiting AT commands

W Piracha, M Chowdhury, B Ray, S Rajasegarar, R Doss

(2019), Vol. 1116, pp. 77-91, ATIS 2019 : Proceedings of the 10th Applications and Techniques in Information Security Conference 2019, Tamil Nadul, India, E1

conference
2018

A survey in RFID ownership transfer protocols

Gaith Al, Torana Al, M Chowdhury, R Doss

(2018), pp. 83-91, RFID technology: design principles, applications and controversies, Hauppauge, N.Y., B1

book chapter

Survey on RFID security issues and scalability

Torana Al, Gaith Al, R Doss

(2018), pp. 37-50, RFID technology: design principles, applications and controversies, Hauppage, N.Y., B1

book chapter

Routing Protocols in Opportunistic Networks-A Survey

M Alajeely, R Doss, A Ahmad

(2018), Vol. 35, pp. 369-387, IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), C1

journal article

Trust strategy implementation in OppNets

A Ahmad, R Doss, M Alajeely, S Rubeaai

(2018), Vol. 100, pp. 151-181, Computing, C1

journal article

A novel approach for information discovery in wireless sensor grids

M Tissera, R Doss, G Li, V Mak-Hau, L Batten

(2018), Vol. 26, pp. 640-662, Journal of network and systems management, Berlin, Germany, C1

journal article

Packet integrity defense mechanism in OppNets

A Ahmad, R Doss, M Alajeely, S Al Rubeaai, D Ahmad

(2018), Vol. 74, pp. 71-93, Computers and security, Amsterdam, The Netherlands, C1

journal article

A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network

S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss

(2018), Vol. 120, pp. 23-31, Journal of parallel and distributed computing, Amsterdam, The Netherlands, C1

journal article

Mapping Functions Driven Robust Retinal Vessel Segmentation via Training Patches

H Xia, F Jiang, S Deng, J Xin, R Doss

(2018), Vol. 6, pp. 61973-61982, IEEE Access, C1

journal article

Identifying drawbacks in malicious PDF detectors

A Falah, L Pan, M Abdelrazek, R Doss

(2018), Vol. 878, pp. 128-139, FNSS 2018 : Proceedings of the Future Network Systems and Security Conference 2018, Paris, France, E1

conference

A new method for sharing the public keys in opportunistic networks

S Rashidibajgan, R Doss

(2018), Vol. 878, pp. 147-161, FNSS 2018 : Future network systems and security : 4th International Conference, FNSS 2018, Paris, France, July 9-11, 2018, Proceedings, Paris, France, E1

conference

A scalable and efficient PKI based authentication protocol for VANETs

M Asghar, R Doss, L Pan

(2018), pp. 1-3, ITNAC 2018 : Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference, Sydney, N.S.W., E1

conference

A literature review of inter-enterprise SOA in small and medium business communities

A Andriyanto, R Doss, L Pan, P Yustianto

(2018), pp. 547-554, ICITSI 2018 : Proceedings of the 5th International Conference on Information Technology Systems and Innovation, Bandung and Padang, Indonesia, E1

conference
2017

Defense against packet collusion attacks in opportunistic networks

M Alajeely, R Doss, A Ahmad, V Mak-Hau

(2017), Vol. 65, pp. 269-282, Computers & security, Amsterdam, The Netherlands, C1

journal article

On sensor-based solutions for simultaneous presence of multiple RFID tags

S Piramuthu, R Doss

(2017), Vol. 95, pp. 102-109, Decision support systems, Amsterdam, The Netherlands, C1

journal article

A secure search protocol for low cost passive RFID tags

S Sundaresan, R Doss, S Piramuthu, W Zhou

(2017), Vol. 122, pp. 70-82, Computer networks, Amsterdam, The Netherlands, C1

journal article

Attacks on and countermeasures for two RFID protocols

X Chen, T Cao, R Doss, J Zhai

(2017), Vol. 96, pp. 5825-5848, Wireless personal communications, New York, N.Y., C1

journal article

Portguard - An authentication tool for securing ports in an IoT gateway

S Sathyadevan, V Vejesh, R Doss, L Pan

(2017), pp. 624-629, PerCom 2017 : IEEE International Conference on Pervasive Computing and Communications Workshops, Kona, Hawaii, E1

conference

Securing OppNets from packet integrity attacks using trust and reputation

A Ahmad, R Doss, M Alajeely, K Ahmad

(2017), pp. 7-12, WAINA 2017 : Proceedings of the 31st Advanced Information Networking and Applications Workshops 2017 International Conference, Taipei, Taiwan, E1

conference

Adjusting matryoshka protocol to address the scalability issue in IoT environment

G Al, R Doss, M Chowdhury

(2017), Vol. 759, pp. 84-94, FNSS 2017 :Proceedings of the 3rd International Future Network Systems and Security Conference, Florida, USA, E1

conference

Activities and artifacts in service engineering: Case study report of service engineering framework

P Yustianto, R Doss, S Suhardi

(2017), Vol. 2018-January, pp. 373-377, ICITSI IEEE 2017 : Information Technology Systems and Innovation : 4th Proceeding of International Conference, Bandung, Indonesia, E1

conference
2016

Security and trust in opportunistic networks - A survey

M Alajeely, R Doss, A Ahmad

(2016), Vol. 33, pp. 256-268, IETE Technical Review, C1

journal article

Query verification schemes for cloud-hosted databases: a brief survey

F Riaz-ud-Din, W Zhou, R Doss

(2016), Vol. 31, pp. 543-561, International Journal of Parallel, Emergent and Distributed Systems, C1

journal article

RFID ownership transfer protocol based on cloud

T Cao, X Chen, R Doss, J Zhai, L Wise, Q Zhao

(2016), Vol. 105, pp. 47-59, Computer networks, Amsterdam, The Netherlands, C1

journal article

Establishing trust relationships in OppNets using Merkle trees

A Ahmad, M Alajeely, R Ram Mohan Doss

(2016), pp. 1-6, COMSNETS 2016: Proceedings of the 8th International Conference on Communication Systems and Networks, Bangalore, India, E1

conference

String matching query verification on the cloud-hosted databases

F Riaz-ud-Din, R Ram Mohan Doss, W Zhou

(2016), pp. 1-10, ICDCN 2016 : Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore, E1

conference

Malicious node detection in OppNets using hash chain technique

M Alajeely, A Ahmad, R Doss

(2016), pp. 925-930, ICCSNT 2015 : Proceedings of 2015 4th International Conference on Computer Science and Network Technology, Harbin, China, E1

conference

Secure RFID protocol to manage and prevent tag counterfeiting with Matryoshka concept

G Al, R Doss, M Chowdhury, B Ray

(2016), Vol. 670, pp. 126-141, FNSS 2016 : Proceedings of the Second International Conference on Future Network Systems and Security, Paris, France, E1

conference

Reputation based malicious node detection in OppNets

A Ahmad, M Alajeely, R Doss

(2016), pp. 1-6, JCSSE 2016 : Machine learning in the internet of things era : Proceedings of the 2016 13th International Joint Conference on Computer Science and Software Engineering, Khon Kaen, Thailand, E1

conference
2015

Novel approach for information discovery in autonomous wireless sensor networks

M Tissera, R Ram Mohan Doss, G Li, L Batten

(2015), Vol. 523, pp. 47-60, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1

book chapter

An efficient detection mechanism against packet faking attack in opportunistic networks

M Alajeely, A Ahmad, R Ram Mohan Doss, V Mak

(2015), Vol. 523, pp. 84-100, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1

book chapter

Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy

S Sundaresan, R Ram Mohan Doss, W Zhou, S Piramuthu

(2015), Vol. 55, pp. 112-124, Computer communications, Amsterdam, The Netherlands, C1

journal article

Secure tag search in RFID systems using mobile readers

S Sundaresan, R Ram Mohan Doss, S Piramuthu, W Zhou

(2015), Vol. 12, pp. 1-14, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal article

Zero knowledge grouping proof protocol for RFID EPC C1G2 Tags

S Sundaresan, R Doss, W Zhou

(2015), Vol. 64, pp. 2994-3008, IEEE transactions on computers, Piscataway, N.J., C1

journal article

Catabolism attack and anabolism defense: a novel attack and traceback mechanism in opportunistic networks

M Alajeely, R Doss, A Ahmad, V Mak-Hau

(2015), Vol. 71, pp. 111-118, Computer communications, Amsterdam, The Netherlands, C1

journal article

Service engineering based on service oriented architecture methodology

S Suhardi, R Ram Mohan Doss, P Yustianto

(2015), Vol. 13, pp. 1466-1477, Telkomika: telecommunication, computing, electronics and control, Yogyakarta, Indonesia, C1

journal article

Preface

R Doss, S Piramuthu, W Zhou

(2015), Cham, Switzerland, A7

edited book

Fast and energy efficient data storage for information discovery in multi-dimensional WSNs

Tissera, R Ram Mohan Doss, G Li, L Batten

(2015), pp. 88-93, ITNAC 2015: Proceedings of the 25th International Telecommunication Networks and Applications Conference, Sydney, New South Wales, E1

conference

Malicious node traceback in opportunistic networks using merkle trees

M Alajeely, A Ahmad, R Ram Mohan Doss

(2015), pp. 147-152, DSDIS 2015: Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, Sydney, New South Wales, E1

conference

Consolidating service enginering perspectives

P Yustianto, Suhardi, R Ram Mohan Doss

(2015), pp. 1-7, ICITSI 2015: Proceedings of the International Conference on Information Technology Systems and Innovation, Bandung, Indonesia, E1

conference
2014

A robust grouping proof protocol for RFID EPC C1G2 tags

S Sundaresan, R Ram Mohan Doss, S Piramuthu, W Zhou

(2014), Vol. 9, pp. 961-975, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal article

Packet faking attack: a novel attack and detection mechanism in OppNets

M Alajeely, A Ahmad, R Ram Mohan Doss, V Mak

(2014), pp. 638-642, CIS 2014 : Proceedings of the 10th International Conference on Computational Intelligence and Security, Kunming, China, E1

conference

Defense against packet dropping attacks in opportunistic networks

A Ahmad, M Alajeely, R Ram Mohan Doss

(2014), pp. 1608-1613, ACCI 2014 : Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, Delhi, India, E1

conference

Energy efficient information discovery approach for range queries in multi-dimensional WSNs

M Tissera, R Ram Mohan Doss, G Li, L Batten

(2014), pp. 1-6, ICWiSe 2014: Proceedings of the IEEE Conference on Wireless Sensors, Subang, Selangor, Malaysia, E1

conference

Secure yoking proof protocol for RFID Systems

S Sundaresan, S Sundaresan, R Doss, R Doss

(2014), pp. 1608-1613, ICACCI 2014: Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, Delhi, India, E1

conference
2013

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems

R Doss, S Sundaresan, W Zhou

(2013), Vol. 11, pp. 383-396, Ad hoc networks, New York, N.Y., C1

journal article

Secure RFID tag ownership transfer based on quadratic residues

R Doss, W Zhou, S Yu

(2013), Vol. 8, pp. 390-401, IEEE Transactions on information forensics and security, Piscataway, N.J., C1

journal article

Information discovery in multidimensional wireless sensor networks

M Tissera, R Doss, G Li, L Batten

(2013), pp. 54-59, ICOIN 2013 : Proceedings of the 27th International Conference on Information Networking, Bangkok, Thailand, E1

conference

A general cloud firewall framework with dynamic resource allocation

S Yu, R Doss, W Zhou, S Guo

(2013), pp. 1941-1945, Proceedings of the IEEE International Conference on Communications; ICC 2013, Budapest, Hungary, E1

conference

Comparative study of routing protocols for opportunistic networks

M Alajeely, A Ahmad, R Doss

(2013), pp. 209-214, ICST 2013 : Proceedings of the 7th International Conference on Sensing Technology, Wellington, New Zealand, E1

conference

Offline grouping proof protocol for RFID systems

S Sundaresan, R Doss, W Zhou

(2013), pp. 247-252, WiMob 2013 2013 : Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Lyon, France, E1

conference

An adaptive approach to information discovery in multi-dimensional wireless sensor networks

M Tissera, R Doss, G Li, L Batten

(2013), pp. 203-208, ICST 2013 : Proceedings of the 7th International Conference on Sensing Technology, Wellington, New Zealand, E1

conference

RFID tags : grouping proof with forward security

S Sundaresan, R Doss, W Zhou

(2013), pp. 1-6, RFID-TA 2013 : Proceedings of the IEEE RFID-Technologies and Applications 2013 international conference, Johor Bahru, Malaysia, E1

conference

Secure ownership transfer in multi-tag/multi-owner passive RFID systems

S Sundaresan, R Doss, W Zhou

(2013), pp. 1-6, GLOBECOM 2013 : Proceedings of the IEEE Global Communications 2013 conference, Atlanta, Georgia, E1

conference
2012

A minimum disclosure approach to authentication and privacy in RFID systems

R Doss, W Zhou, S Sundaresan, S Yu, L Gao

(2012), Vol. 56, pp. 3401-3416, Computer networks, Amsterdam, The Netherlands, C1

journal article

A secure tag ownership transfer scheme in a closed loop RFID system

R Doss, W Zhou

(2012), pp. 164-169, WCNCW 2012 : Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, Paris, France, E1

conference

A serverless ultra-lightweight secure search protocol for EPC Class-1 Gen-2 UHF RFID tags

S Sundaresan, R Doss, W Zhou

(2012), pp. 580-585, ICCIS 2012 : Proceedings of the 2012 International Conference on Computer and Information Science, Kuala Lumpur, Malaysia, E1

conference

A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags

S Sundaresan, R Doss, W Zhou

(2012), pp. 30-35, PIMRC 2012 : IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sydney, New South Wales, E1

conference
2011

Implementing recovery in low-resource stationary wireless sensor networks

B Li, L Batten, R Doss

(2011), pp. 11-20, Advances in wireless, mobile networks and applications, Berlin, Germany, B1

book chapter

Traceback of DDoS attacks using entropy variations

S Yu, W Zhou, R Doss, W Jia

(2011), Vol. 22, pp. 412-425, IEEE transactions on parallel and distributed systems, United States, C1

journal article

Prevention of information harvesting in a cloud services environment

L Batten, J Abawajy, R Doss

(2011), pp. 66-72, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1

conference

A novel mutual authentication scheme with minimum disclosure for rfid systems

R Doss, W Zhou, S Yu, L Gao

(2011), pp. 544-549, ISSNIP 2011 : Proceedings of the 7th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Adelaide, S. Aust., E1

conference
2010

Network resilience in low-resource mobile wireless sensor networks

B Li, L Batten, R Doss

(2010), pp. 127-138, Security and privacy in mobile information and communication systems : second international ICST conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010 : revised selected papers, Berlin, Germany, B1

book chapter

Dynamic addressing in wireless sensor networks without location awareness

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2010), Vol. 26, pp. 443-460, Journal of information science and engineering, Taipei, Taiwan, C1

journal article

Information discovery in mission-critical wireless sensor networks

R Doss, G Li, V Mak, M Tissera

(2010), Vol. 54, pp. 2383-2399, Computer networks, Amsterdam, Netherlands, C1-1

journal article

Information discovery in mission-critical wireless sensor networks

Robin Doss, Gang Li, Vicky Mak, Menik Tissera

(2010), Vol. 54, pp. 2383-2399, COMPUTER NETWORKS, C1

journal article
2009

Energy-Efficient Medium Access Control in Wireless Sensor Networks

Gang Li, Robin Doss

(2009), pp. 419-438, Guide to Wireless Sensor Networks. Computer Communications and Networks, London, Eng., B1-1

book chapter

Improving the qos for information discovery in autonomic wireless sensor networks

R Doss, G Li, V Mak, S Yu, M Chowdhury

(2009), Vol. 5, pp. 334-349, Pervasive and mobile computing, Amsterdam, Netherlands, C1

journal article

Fast recovery from node compromise in wireless sensor networks

B Li, R Doss, L Batten, W Schott

(2009), pp. 1-6, NTMS 2009 : Proceedings of the NTMS 2009 3rd International Conference on New Technologies, Mobility and Security, Cairo, Egypt, E1

conference

Lightweight authentication for recovery in wireless sensor networks

B Li, L Batten, R Doss

(2009), pp. 465-471, MSN 2009 : Proceedings of the Mobile Ad-hoc and Sensor Networks 2009 international conference, Fujian Province, China, E1

conference
2008

The Crossroads Approach to Information Discovery in Wireless Sensor Networks

Robin Doss, Gang Li, Shui Yu, Vicky Mak, Morshed Chowdhury

(2008), Vol. 4904, pp. 310-321, Distributed Computing and Networking, Berlin, Germany, B1-1

book chapter

Information theory based detection against network behavior mimicking DDoS attacks

S Yu, W Zhou, R Doss

(2008), Vol. 12, pp. 319-321, IEEE communications letters, USA, C1

journal article

The crossroads approach to information discovery in wireless sensor networks

R Doss, G Li, S Yu, V Mak, M Chowdhury

(2008), Vol. 4904, pp. 310-321, Lecture notes in computer science, Berlin, Germany, C1

journal article

A transformation model for heterogeneous servers

S Yu, R Doss, T Thapngam, D Qian

(2008), pp. 665-671, HPCC 2008 : Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, Dalian, China, E1

conference

Exploiting affinity propagation for energy-efficient information discovery in sensor networks

R Doss, G Li

(2008), pp. 735-740, GLOBECOM 2008 : Proceedings of the IEEE Global Telecommunication Conference, New Orleans, La., E1

conference
2007

Self adjusted security architecture for mobile ad hoc networks (MANETs)

A Ghalwash, A Youssif, S Hashad, R Doss

(2007), pp. 682-687, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings, Melbourne, Australia, E1

conference

Geographic routing with cooperative relaying and leapfrogging in wireless sensor networks

P Coronel, R Doss, W Schott

(2007), pp. 646-651, IEEE GLOBECOM 2007 innovate, educate, accelerate: 50th Annual IEEE Global Telecommunications Conference, Washington, DC, USA, E1

conference
2006

Prediction based location aided routing for mobile ad hoc networks

R Doss, A Jennings, N Shenoy

(2006), Vol. 2, pp. 91-102, International journal of pervasive computing and communications, Leicester, England, C1

journal article

Lease based addressing for event-driven wireless sensor networks

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 251-256, ISCC 2006 proceedings : 11th IEEE Symposium on Computers and Communications : 26-29 June 2006, Cagliari, Sardinia, Italy, Cagliari, Sardinia, Italy, E1

conference

Address reuse in wireless sensor networks

R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference

Topology based packet marking for IP traceback

H Alwis, R Doss, P Hewage, M Chowdhury

(2006), pp. 224-228, Proceedings of the (ATNAC) Australian Telecommunication Networks and Applications Conference, Melbourne, Australia, E1

conference

A case for cross layer design: the impact of physical layer properties on routing protocol performance in MANETs

R Doss, L Pan

(2006), pp. 409-413, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference

Energy efficient on-demand addressing for wireless sensor networks

P Hewage, R Doss, H Alwis, M Chowdhury

(2006), pp. 324-328, ATNAC : Proceedings of the Australian Telecommuncation Networks and Applications Conference, 2006, Melbourne, Victoria, E1

conference
2005

Reliable event transfer in wireless sensor networks deployed for emergency response

R Chellappa-Doss, D Chandra

(2005), pp. 208-213, Proceedings of the 17th IASTED International Conference on Parallel and Distributed Computing and Systems : November 14 - 16, 2005, Phoenix, AZ, USA, Phoenix, USA, E1

conference

Route maintenance using mobility prediction for mobile ad hoc networks

B Sathyaraj, R Chellappa-Doss

(2005), pp. 101-106, IEEE Mass 2005: the 2005 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Washington, D.C., E1

conference
2004

Mobility prediction based routing for minimizing control overhead in mobile ad hoc networks

R Doss, A Jennings, N Shenoy

(2004), pp. 27-31, ICWN`04 : Proceedings of the International Conference on Wireless Networks, Las Vegas, USA, E1

conference

A review of current mobility prediction techniques for ad hoc networks

R Doss, A Jennings, N Shenoy

(2004), Categorisation of failures in telecommunication networks : proceedings of the 4th IASTED International Multi-Conference Wireless and Optical Communications July 8-10, 2004, Banff, Canada, Banff, Canada, E1

conference

Mobility prediction for seamless mobility in wireless networks

R Doss, A Jennings, N Shenoy

(2004), pp. 435-443, INC 2004 : Proceedings of the 4th International Network Conference, Plymouth, UK, E1

conference

A review on current work in mobility prediction for wireless networks

R Chellappa-Doss, A Jennings, N Shenoy

(2004), pp. 1-7, Proceedings of the 3rd Asian International Mobile Computing Conference, Bangkok, Thailand, E1

conference
2003

User mobility prediction in hybrid and ad hoc wireless networks

R Chellappa-Doss, A Jennings, N Shenoy

(2003), pp. 1-5, 2003 Australian Telecommunications Networks and Applications Conference, Melbourne, Australia, E1

conference

Route discovery and reconstruction in mobile ad hoc networks

R Chellappa, A Jennings, N Shenoy

(2003), pp. 549-554, IEEE International Conference on Networks, ICON, Sydney, AUSTRALIA, E1-1

conference

Funded Projects at Deakin

Australian Competitive Grants

Secure and Efficient Communication in Vehicle-based Radio Frequency Identification Systems

Prof Wanlei Zhou, Prof Robin Ram Mohan Doss

ARC Linkage - Projects Rnd 1

  • 2012: $60,312
  • 2011: $54,402
  • 2010: $51,671

CyberNinjas: Empowering our Children to be Cyber Smart in the Metaverse

Prof Robin Ram Mohan Doss, A/Prof Radhika Gorur, Dr Sophie Mckenzie, A/Prof William Yeoh, Dr Graeme Pye

e-Safety Commissioner Online Safety Grants Program

  • 2023: $423,765

Other Public Sector Funding

Recovery Mechanisms for Wireless Sensor Devices

Prof Lynn Batten, Prof Robin Ram Mohan Doss, Mr Brian Palm

DoD Grant - Research - Department of Defence

  • 2009: $18,855
  • 2008: $67,348

Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems.

Prof Robin Ram Mohan Doss, Prof Seng Loke, A/Prof Lei Pan, Dr Rolando Trujillo Rasua, Dr Frank Jiang, Dr Leo Zhang

Department of Industry, Innovation and Science

  • 2022: $74,235
  • 2021: $123,725
  • 2019: $296,940

Zero Trust Architectures for Australia's Critical Infrastructure Security.

Prof Robin Ram Mohan Doss, Dr Zubair Baig, Dr Adnan Anwar, Dr Arash Shaghaghi

DSTO Grant - Research - Defence Science & Technology Organisation

  • 2020: $60,741

Cybersecurity Training and Innovation for IoT-Enabled Smart Energy Grids for Australian and Japanese Researchers

Dr Adnan Anwar, Dr Mengmeng Ge, Prof Seng Loke, Prof Robin Ram Mohan Doss

Aust Japan Foundation

  • 2021: $15,000

Kronos: Towards Fast Feedback Fuzzers for Discovering Vulnerabilities in Software Binaries

Prof Robin Ram Mohan Doss, Dr Shamsul Huda

Data61

  • 2023: $20,000
  • 2022: $13,333
  • 2021: $6,667

ERP16 USE OF EMERGING TECHNOLOGIES FOR NATIVE WILDLIFE POPULATION ASSESSMENT AND MANAGEMENT

Prof Don Driscoll, Prof Euan Ritchie, A/Prof Desley Whisson, A/Prof Mike Weston, A/Prof Daniel Ierodiaconou, Dr Blake Allan, Dr Shuddha Rafiq, Dr Duc Thanh Nguyen, A/Prof Tim Wilkin, Prof Robin Ram Mohan Doss, Prof Seng Loke

Department of Environment Land Water and Planning

  • 2022: $327,000

Accurate Decision-making for Network Security with Compromised Data.

Dr Keshav Sood, Prof Robin Ram Mohan Doss

Department of Defence

  • 2022: $30,000

Cyber Harm Prevention

Prof Robin Ram Mohan Doss, Dr Jay Jeong, Prof Chad Whelan, Prof Judy Currey, A/Prof William Yeoh, Prof Gang Li, Dr Adnan Anwar, Dr Paul Cooper, Mr Damien Manuel

VIC Managed Insurance Authority

  • 2023: $175,280
  • 2022: $50,763

Long-Term Privacy with Verifiable Credentials.

Prof Robin Ram Mohan Doss, Dr Anh Dinh

CSIRO Scholarship - Commonwealth Scientific and Industrial Research Organisation

  • 2024: $47,155

Useability Framework for Verifiable Credentials.

Prof Robin Ram Mohan Doss, Dr Jay Jeong, Dr Graeme Pye

CSIRO Scholarship - Commonwealth Scientific and Industrial Research Organisation

  • 2024: $47,155
  • 2023: $46,000

Industry and Other Funding

Secure and Efficient Communication in Vehicle-based Radio Frequency Identification Systems

Prof Wanlei Zhou, Prof Robin Ram Mohan Doss

Express Promotions

  • 2012: $11,000
  • 2011: $11,000
  • 2010: $11,000

Development of Cyber Security Guidelines for Critical Infrastructures.

Dr Zubair Baig, Mr Damien Manuel, Prof Robin Ram Mohan Doss

Deloitte Risk Advisory Pty Ltd

  • 2021: $14,945

Australian 5G Innovation Initiative - Round 1 Interchange: VR and AI soft skills training streamed at low latencies.

A/Prof Linda Byrne, Ms Vicki Kavadas, Prof Robin Ram Mohan Doss

Liminal VR Pty Ltd

  • 2022: $81,000

Useability Framework for Verifiable Credentials.

Prof Robin Ram Mohan Doss, Dr Jay Jeong, Dr Graeme Pye

BUPA HI Pty Ltd

  • 2023: $12,000

Other Funding Sources

AGD Data Analytics Workshop

A/Prof Jacob Cybulski, Prof Rens Scheepers, Prof Gang Li, Prof Robin Ram Mohan Doss

Data to Decisions CRC

  • 2017: $13,936

CyberCRC Theme 1.3 - Post Doc 1

Prof Robin Ram Mohan Doss

Cyber Security Research Centre Limited

  • 2021: $150,000
  • 2020: $150,000
  • 2019: $75,000

CyberCRC Theme 1.3 - Post Doc 2

Prof Robin Ram Mohan Doss

Cyber Security Research Centre Limited

  • 2021: $187,500
  • 2020: $112,500
  • 2019: $75,000

Smarter Adaptable Real-World Security: A Tool for Designing and Deploying Run-Time Adaptable Security Mechanisms for loT / CPS Systems

Prof Seng Loke, Prof Robin Ram Mohan Doss, Dr Rolando Trujillo Rasua

Cyber Security Research Centre Limited

  • 2020: $52,000

National Authentication Governance and Human Framework.

Prof Robin Ram Mohan Doss, A/Prof William Yeoh, Dr Graeme Pye, Dr Frank Jiang

Cyber Security Research Centre Limited

  • 2023: $23,500
  • 2022: $38,803
  • 2021: $47,000
  • 2020: $23,500

Traceability and Path Authentication in Dynamic Supply Chains.

Prof Robin Ram Mohan Doss, Dr Rolando Trujillo Rasua, A/Prof Lei Pan

Cyber Security Research Centre Limited

  • 2024: $15,000
  • 2023: $60,000
  • 2022: $61,921

Provably Secure and Efficient Machine-to-Machine Authentication Solutions for IoT Systems.

Dr Arash Shaghaghi, Prof Robin Ram Mohan Doss, Mr Dimitri Kamenski

Cyber Security Research Centre Limited

  • 2022: $49,536
  • 2021: $30,000

Lightweight Continuous Authentication for Cloud Edge Integrated Platforms

Dr Zubair Baig, A/Prof Lei Pan, Prof Robin Ram Mohan Doss

CYBER SECURITY RESEARCH CENTRE

  • 2024: $15,000
  • 2023: $60,000
  • 2022: $49,536
  • 2021: $15,000

Secure and Authenticated Access to Remote Assets Within Critical Infrastructure.

Dr Zubair Baig, A/Prof Lei Pan, Dr Keshav Sood, Prof Robin Ram Mohan Doss

Cyber Security Research Centre Limited

  • 2024: $30,000
  • 2023: $165,000
  • 2022: $111,458

Robust Authentication using Ambient Intelligence in Smart Environments (RAAISE).

Prof Robin Ram Mohan Doss, Dr Zubair Baig, Dr Adnan Anwar, Dr Frank Jiang

Cyber Security Research Centre Limited

  • 2023: $259,606
  • 2022: $159,674

Next Generation Authentication Technologies.

Prof Robin Ram Mohan Doss, A/Prof Lei Pan, Dr Zubair Baig

Cyber Security Research Centre Limited

  • 2024: $175,000
  • 2023: $306,250
  • 2022: $216,724

Augmenting Cyber Defence Capability (ACDC).

Prof Gang Li, Dr Luxing Yang, Dr Nayyar Zaidi, Dr Ye Zhu, Prof Rajesh Vasa, Prof Kon Mouzakis, Prof Robin Ram Mohan Doss, Dr Thanh Thi Nguyen

Cyber Security Research Centre Limited

  • 2024: $39,000
  • 2023: $156,000
  • 2022: $32,199

Secure Data Provenance in the Internet of Vehicles.

Prof Robin Ram Mohan Doss, Dr Frank Jiang, Mr Anuj Nepal

iMove Australia Limited

  • 2024: $2,700
  • 2023: $13,500
  • 2022: $4,507

Misbehaviour Detection in Corporate Intelligent Transportation Systems (cITS).

Prof Robin Ram Mohan Doss, Prof Seng Loke, Mr Mohamed Ahzam Amanullah

iMove Australia Limited

  • 2024: $2,300
  • 2023: $9,200
  • 2022: $3,716

Socrates: Software Security with a focus on critical technologies.

A/Prof Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, A/Prof Lennon Chang, Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang

Cyber Security Research Centre Limited

  • 2024: $30,244
  • 2023: $120,976

Privacy Respecting and Compliant Digital Credential wAlleT (PRCDCATT)

Prof Robin Ram Mohan Doss, Dr Jay Jeong, Dr Luxing Yang, Dr Anh Dinh, A/Prof Mohamed Abdelrazek, Dr Yanjun Zhang

Cyber Security Research Centre Limited

  • 2024: $81,250
  • 2023: $81,250

Supervisions

Principal Supervisor
2022

Ravneet Kaur

Thesis entitled: Emergency Message Dissemination in Vehicular Adhoc Networks

Doctor of Philosophy (Information Technology), School of Information Technology

2021

Tarandeep Bhatia

Thesis entitled: Data Congestion in Vehicular Ad-hoc Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Gurdeep Singh

Thesis entitled: Wearable IoT Framework for Patient Emergencies in Smart Healthcare

Master of Science (Information Technology), School of Information Technology

Miraj Asghar

Thesis entitled: Security and Privacy for Vehicular Adhoc Networks

Doctor of Philosophy (Information Technology), School of Information Technology

2020

Shiju Sathyadevan

Thesis entitled: Design of a Secure Architecture for the Internet of Things.

Doctor of Philosophy (Information Technology), School of Information Technology

Agustinus Andriyanto

Thesis entitled: Service-based Reference Architecture in the Context of Inter-Enterprise Architecture

Doctor of Philosophy (Information Technology), School of Information Technology

2019

Faizal Riaz-ud-Din

Thesis entitled: Pattern Matching Query Verification on the Cloud

Doctor of Philosophy (Information Technology), School of Information Technology

2018

Purnomo Yustianto

Thesis entitled: General Framework for Service Engineering Analysis and Design

Doctor of Philosophy (Information Technology), School of Information Technology

2017

Asma'a Nasser Ahmad

Thesis entitled: Establishing Trust Relationships and Secure Channels in Opportunistic Networks

Doctor of Philosophy (Information Technology), School of Information Technology

2016

Majeed Alajeely

Thesis entitled: Defence and Traceback Mechanisms in Opportunistic Wireless Networks

Doctor of Philosophy (Information Technology), School of Information Technology

2015

Warnakulasuriya Menik Randi Tissera

Thesis entitled: Information Discovery in Multi-Dimensional Autonomous Wireless Sensor Networks

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Saravanan Sundaresan

Thesis entitled: Secure Ownership Transfer Protocols for RFID EPC C1G2 Tags

Doctor of Philosophy (Information Technology), School of Information Technology

Executive Supervisor
2019

Ghaith Dh Khalil

Thesis entitled: A Novel RFID Based Anti-Counterfeiting Scheme for Retailer Environments

Doctor of Philosophy (Information Technology), School of Information Technology

Co-supervisor
2023

Iram Jawad

Thesis entitled: Detecting Anomalous Network Behaviors using Deep Learning and Data Analytics

Master of Science (Information Technology), School of Information Technology

Associate Supervisor
2022

Xiangyu Song

Thesis entitled: Effective Sequential Learning for Students' Performance Prediction

Doctor of Philosophy (Information Technology), School of Information Technology

2021

Purathani Praitheeshan

Thesis entitled: Empirical Studies of Security and Privacy on Real World Ethereum Smart Contracts

Doctor of Philosophy (Information Technology), School of Information Technology

Md Jamilur Rahman

Thesis entitled: Hand Gesture-Based Control of Multiple Robots: The Case of HEXAs

Master of Science (Information Technology), School of Information Technology

2020

Ahmed Raad Abdul Hussein Al-Sudani

Thesis entitled: Trust Management in RFID Critical Applications

Doctor of Philosophy (Information Technology), School of Information Technology

2012

Bai Li

Thesis entitled: Recovery Mechanisms on Sensor Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Theerasak Thapngam

Thesis entitled: Improvement of DDoS Attacks Detection and Web Access Anonymity

Doctor of Philosophy (Information Technology), School of Information Technology

2011

Ping Li

Thesis entitled: Detecting Stepping Stones in Internet Environments

Doctor of Philosophy (Information Technology), School of Information Technology

2009

Ke Li

Thesis entitled: Reliable Algorithms and Attack Detection Schemes for Network Systems

Doctor of Philosophy (Information Technology), School of Information Technology