Dr Morshed Chowdhury

STAFF PROFILE

Position

Honorary Fellow

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

Publications

Filter by

2024

Comprehensive analysis of BIM adoption: From narrow focus to holistic understanding

M Chowdhury, M Hosseini, D Edwards, I Martek, S Shuchi

(2024), Vol. 160, pp. 105301-105301, Automation in Construction, C1

journal article
2023

Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks

Keshav Sood, Mohammad Nosouhi, Dinh Nguyen, Frank Jiang, Morshed Chowdhury, Robin Doss

(2023), Vol. 18, pp. 965-979, IEEE Transactions on Information Forensics and Security, Piscataway, N.J., C1

journal article
2022

An Adaptive Energy-Aware Stochastic Task Execution Algorithm in Virtualized Networked Datacenters

Z Zhou, K Li, J Abawajy, M Shojafar, M Chowdhury, F Li, K Li

(2022), Vol. 7, pp. 371-385, IEEE Transactions on Sustainable Computing, C1

journal article

DEHM: An Improved Differential Evolution Algorithm using Hierarchical Multi-strategy in a Cybertwin 6G Network

Z Zhou, J Abawajy, M Shojafar, M Chowdhury

(2022), pp. 1-10, IEEE Transactions on Industrial Informatics, Piscataway, NJ, C1

journal article

Evaluating Public Service Delivery Smartness and Impact on Citizens’ Well-being

F Hartanti, J Abawajy, M Chowdhury

(2022), Vol. 10, pp. 69106-69124, IEEE Access, C1

journal article

Redefining the construction managerial landscape to facilitate Industry 4.0 implementation: scientometric mapping of research frontiers

A Ghosh, J Abawajy, M Chowdhury

(2022), Construction Innovation, C1

journal article

Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis

V Kanthuru, S Rajasegarar, P Rathore, R Doss, L Pan, B Ray, M Chowdhury, C Srimathi, M Durai

(2022), Vol. 13725, pp. 118-130, ADMA 2022 : Proceedings of the Advanced Data Mining and Applications International Conference 2022, Brisbane, Qld., E1

conference
2021

An empirical analysis of graph-based linear dimensionality reduction techniques

L Al-Omairi, J Abawajy, M Chowdhury, T Al-Quraishi

(2021), Vol. 33, Concurrency and Computation: Practice and Experience, C1

journal article

An extended reselling protocol for existing anti-counterfeiting schemes

G Khalil, R Doss, M Chowdhury

(2021), Vol. 10, Journal of Sensor and Actuator Networks, C1

journal article

A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things

Morshed Chowdhury, Biplob Ray, Sujan Chowdhury, Sutharshan Rajasegarar

(2021), Vol. 2, pp. 1-23, ACM Transactions on Internet of Things, New York, N.Y., C1

journal article

Drivers Fatigue Level Prediction using Facial, and Head Behavior Information

H Kassem, M Chowdhury, J Abawajy

(2021), Vol. 9, pp. 121686-121697, IEEE Access, Piscataway, N.J., C1

journal article

Citizens' Trust Measurement in Smart Government Services

F Hartanti, J Abawajy, M Chowdhury, W Shalannanda

(2021), Vol. 9, pp. 150663-150676, IEEE Access, Piscataway, N.J., C1

journal article

The effectiveness of web-based technology platforms in facilitating construction project collaboration: A qualitative analysis of 1,152 user reviews

M Chowdhury, M Hosseini, I Martek, D Edwards, J Wang

(2021), Vol. 26, pp. 953-973, Journal of Information Technology in Construction, C1

journal article

Cost-Aware Big Data Stream Processing in Cloud Environment

A Al-Mansoori, J Abawajy, M Chowdhury

(2021), Vol. 363, pp. 120-136, CloudComp 2020 : Proceedings of the 10th EAI International Conference on Cloud Computing, Qufu, China, E1

conference

A Brief Introduction on Proposed Early Bushfires Detection Model

G Khalil, T Al, A Ayoob, M Chowdhury, D Khalil, Z Ayoob

(2021), pp. 1-5, ICECCME 2021 : Proceedings of the Electrical, Computer, Communication & Mechatronics Engineering 2021 Conference, Mauritius, Mauritius, E1

conference
2020

A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services

M Chowdhury, J Abawajy, A Kelarev, H Jelinek

(2020), Vol. 8, pp. 473-483, IEEE Transactions on Cloud Computing, C1

journal article

Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection

J Abawajy, M Chowdhury, A Kelarev

(2020), Vol. 8, pp. 398-407, IEEE Transactions on Cloud Computing, C1

journal article

An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments

Z Zhou, F Li, H Zhu, H Xie, J Abawajy, M Chowdhury

(2020), Vol. 32, pp. 1531-1541, Neural Computing and Applications, C1

journal article

A Novel RFID-Based Anti-Counterfeiting Scheme for Retail Environments

G Khalil, R Doss, M Chowdhury

(2020), Vol. 8, pp. 47952-47962, IEEE Access, C1

journal article

A new secure RFID anti-counterfeiting and anti-theft scheme for merchandise

G Khalil, R Doss, M Chowdhury

(2020), Vol. 9, Journal of Sensor and Actuator Networks, C1

journal article

Uav swarm mission planning in dynamic environment using consensus-based bundle algorithm

Y Zhang, W Feng, G Shi, F Jiang, M Chowdhury, S Ling

(2020), Vol. 20, Sensors (Switzerland), Switzerland, C1

journal article

Efficiency broadcast base safety message BSM through VANET based on Transmit Packet Coding (TPC)

A Ayoob, G Khalil, L Yingzhuang, M Chowdhury, T Al

(2020), pp. 383-387, LifeTech 2020 : Proceedings of the 2020 IEEE 2nd Global Conference on Life Sciences and Technologies, Kyoto, Japan, E1

conference

IoT insider attack - survey

M Chowdhury, R Doss, B Ray, S Rajasegarar, S Chowdhury

(2020), Vol. 324, pp. 28-41, SGIoT 2019 : Proceedings of the Third European Alliance for Innovation International Conference on Smart Grid and Internet of Things 2019, TaiChung, Taiwan, E1

conference

BDSP in the cloud: scheduling and load balancing utlizing SDN and CEP

A Al-Mansoori, J Abawajy, M Chowdhury

(2020), pp. 827-835, CCGRID 2020 : Proceedings of the 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, Melbourne, Vic., E1

conference

Yawn based driver fatigue level prediction

H Kassem, M Chowdhury, J Abawajy, A Al-Sudani

(2020), pp. 372-382, CATA 2020 : Proceedings of 35th International Conference on Computers and Their Applications, Online, E1

conference

Utility-aware graph dimensionality reduction approach

L Al Omairi, J Abawajy, M Chowdhury

(2020), pp. 327-333, CATA 2020 : Proceedings of 35th International Conference on Computers and Their Applications, Online, E1

conference

Avoiding Geographic Regions in Tor

Matthew Ryan, Morshed Chowdhury, Frank Jiang, Robin Ram Mohan Doss

(2020), pp. 802-809, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1

conference

Performance evaluation of Aloha and CSMA for LoRaWAN network

M Baddula, B Ray, M Chowdhury

(2020), pp. 1-6, CSDE 2020: IEEE Asia-Pacific Conference on Computer Science and Data Engineering,, Gold Coast, Qld., E1

conference
2019

A comparison survey study on RFID based anti-counterfeiting systems

G Khalil, R Doss, M Chowdhury

(2019), Vol. 8, Journal of Sensor and Actuator Networks, C1

journal article

Intrusion detection system classifier for VANET based on pre-processing feature extraction

Ayoob Ayoob, Ghaith Khalil, Morshed Chowdhury, Robin Ram Mohan Doss

(2019), Vol. 1113, pp. 3-22, FNSS 2019 : Future Network Systems and Security 5th International Conference, FNSS 2019 Melbourne, VIC, Australia, November 27–29, 2019 Proceedings, Melbourne, Victoria, E1

conference

High-dimensionality graph data reduction based on proposing a new algorithm

Lamyaa Al-Omairi, J Abawajy, M Chowdhury, T Al-Quraishi

(2019), Vol. 63, Proceedings of 32nd International Conference on Computer Applications in Industry and Engineering, San Diego, California, E1

conference

Performance evaluation of LoRaWAN for mission-critical IoT networks

A Ahmad, B Ray, M Chowdhury

(2019), Vol. 1113, pp. 37-51, FNSS 2019 : Proceedings of the Future Network Systems and Security International Conference, Melbourne, Vic., E1

conference

Ad-hoc framework for efficient network security for unmanned aerial vehicles (UAV)

M Haque, M Chowdhury

(2019), Vol. 1113, pp. 23-36, FNSS 2019 : Proceedings of the 5th International Conference on Future Network Systems and Security 2019, Melbourne, Vic., E1

conference

Insider attacks on Zigbee based IoT networks by exploiting AT commands

W Piracha, M Chowdhury, B Ray, S Rajasegarar, R Doss

(2019), Vol. 1116, pp. 77-91, ATIS 2019 : Proceedings of the 10th Applications and Techniques in Information Security Conference 2019, Tamil Nadul, India, E1

conference
2018

A survey in RFID ownership transfer protocols

Gaith Al, Torana Al, M Chowdhury, R Doss

(2018), pp. 83-91, RFID technology: design principles, applications and controversies, Hauppauge, N.Y., B1

book chapter

Universal and secure object ownership transfer protocol for the Internet of Things

B Ray, J Abawajy, M Chowdhury, A Alelaiwi

(2018), Vol. 78, pp. 838-849, Future Generation Computer Systems, C1

journal article

Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center

Z Zhou, J Abawajy, F Li, Z Hu, M Chowdhury, A Alelaiwi, K Li

(2018), Vol. 6, pp. 27080-27090, IEEE Access, C1

journal article

Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms

Z Zhou, J Abawajy, M Chowdhury, Z Hu, K Li, H Cheng, A Alelaiwi, F Li

(2018), Vol. 86, pp. 836-850, Future Generation Computer Systems, C1

journal article

Border surveillance with WSN systems in a distributed manner

H Mostafaei, M Chowdhurry, M Obaidat

(2018), Vol. 12, pp. 3703-3712, IEEE systems journal, Piscataway, N.J., C1

journal article

SDN enabled BDSP in public cloud for resource optimization

A Al-Mansoori, J Abawajy, M Chowdhury

(2018), Wireless networks, New York, N.Y., C1

journal article

Cloud-based load balancing using double Q-learning for improved quality of service

D Tennakoon, M Chowdhury, T Luan

(2018), Wireless networks, New York, N.Y., C1

journal article

Frequency switch, secret sharing and recursive use of hash functions secure (low cost) ad hoc networks

P Sarkar, M Chowdhury, J Abawajy

(2018), Vol. 580, pp. 315-328, ATCI 2017 : International Conference on Applications and Techniques in Cyber Security and Intelligence, Ningbo, China, E1

conference

Publicly verifiable secret sharing scheme in hierarchical settings using CLSC over IBC

P Sarkar, S Nandi, M Chowdhury

(2018), Vol. 580, pp. 194-205, ATCI 2017 : Proceedings of the International Conference on Applications and Techniques in Cyber Security and Intelligence, Ningbo, China, E1

conference

Breast cancer recurrence prediction using random forest model

T Al-Quraishi, J Abawajy, M Chowdhury, S Rajasegarar, A Abdalrada

(2018), Vol. 700, pp. 318-329, SCDM 2018 : Concise and informative : Proceedings of the 3rd International Conference on Soft Computing and Data Mining, Johor, Malaysia, E1

conference

Relationship between Angiotensin Converting Enzyme gene and Cardiac Autonomic Neuropathy among Australian population

A Abdalrada, J Abawajy, M Chowdhury, S Rajasegarar, T Al-Quraishi, H Jelinek

(2018), Vol. 700, pp. 135-146, SCDM 2018 : Proceedings of the 3rd International Conference on Soft Computing and Data Mining 2018, Johor, Malaysia, E1

conference

A new cyber security framework towards secure data communication for unmanned aerial vehicle (UAV)

M Haque, M Chowdhury

(2018), Vol. 239, pp. 113-122, SecureComm 2017 : Proceedings of the 13th International Security and Privacy in Communication Networks Conference, Niagara Falls, Ontario, E1

conference

A novel middleware framework for implementing bigdata analytics in multi cloud environment

S Hussain, M Chowdhury

(2018), pp. 1-8, ICSENG 2018 : Proceedings of the 2018 26th International Conference on Systems Engineering, Sydney, N.S.W., E1

conference
2017

Multilayer hybrid strategy for phishing email zero-day filtering

M Chowdhury, J Abawajy, A Kelarev, T Hochin

(2017), Vol. 29, Concurrency and Computation: Practice and Experience, C1

journal article

Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors

P Sarkar, M Chowdhury, K Sakurai

(2017), Vol. 29, pp. 1-13, Concurrency computation, Chichester, Eng., C1

journal article

Energy-efficient virtual machine consolidation algorithm in cloud data centers

Z Zhou, Z Hu, J Yu, J Abawajy, M Chowdhury

(2017), Vol. 24, pp. 2331-2341, Journal of Central South University, Hunan Sheng, China, C1-1

journal article

Secure IoT using weighted signed graphs

P Sarkar, M Chowdhury

(2017), Vol. 198, pp. 241-256, SecureComm 2016 : Proceedings of the 12th International Security and Privacy in Communication Networks Conference, Guangzhou, China, E1

conference

A multi-protocol security framework to support internet of things

B Ray, M Chowdhury, J Abawajy

(2017), Vol. 198, pp. 257-270, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Guangzhou, China, E1

conference

Adjusting matryoshka protocol to address the scalability issue in IoT environment

G Al, R Doss, M Chowdhury

(2017), Vol. 759, pp. 84-94, FNSS 2017 :Proceedings of the 3rd International Future Network Systems and Security Conference, Florida, USA, E1

conference

Is high performance computing (HPC) ready to handle big data?

B Ray, M Chowdhury, U Atif

(2017), Vol. 759, pp. 97-112, FNSS 2017 : Proceedings of the 3rd International Conference on Future Network Systems and Security 2017, Gainesville, Florida, E1

conference

A smart framework towards providing benefits for one and all

T Hochin, H Nomiya, H Lima, M Chowdhury

(2017), pp. 129-132, ACIT-CSII-BCD 2016 : Proceedings of the 4th International Conference on Applied Computing and Information Technology, 3rd International Conference on Computational Science/Intelligence and Applied Informatics, 1st International Conference on Big Data, Cloud Computing, Data Science and Engineering, Las Vegas, Nevada, E1

conference
2016

Enhancing predictive accuracy of cardiac autonomic neuropathy using blood biochemistry features and iterative multitier ensembles

J Abawajy, A Kelarev, M Chowdhury, H Jelinek

(2016), Vol. 20, pp. 408-415, IEEE journal of biomedical and health informatics, Piscataway, N.J., C1

journal article

Matrix constructions of centroid sets for classification systems

M Chowdhury, J Abawajy, H Jelinek, A Kelarev, J Ryan

(2016), Vol. 30, pp. 2397-2403, Filomat, C1

journal article

Secure Object Tracking Protocol for the Internet of Things

B Ray, M Chowdhury, J Abawajy

(2016), Vol. 3, pp. 544-553, IEEE Internet of Things Journal, C1

journal article

Inductive hierarchical identity based key agreement with pre-deployment interactions (I-H-IB-KA-pdi)

P Sarkar, M Chowdhury

(2016), Vol. 651, pp. 106-114, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1

conference

Secure RFID protocol to manage and prevent tag counterfeiting with Matryoshka concept

G Al, R Doss, M Chowdhury, B Ray

(2016), Vol. 670, pp. 126-141, FNSS 2016 : Proceedings of the Second International Conference on Future Network Systems and Security, Paris, France, E1

conference
2015

Securing sensor networks by moderating frequencies

P Sarkar, P Mahish, M Chowdhury, K Sakurai

(2015), Vol. 153, pp. 173-185, International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014 Beijing, China, September 24-26, 2014, Revised Selected papers, Part II, Berlin, Germany, B1

book chapter

Defence against code injection attacks

H Alnabulsi, Q Mamun, R Islam, M Chowdhury

(2015), Vol. 153, pp. 237-251, International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014 Beijing, China, September 24-26, 2014, Revised Selected papers, Part II, Berlin, Germany, B1

book chapter

Multi-layer attribute selection and classification algorithm for the diagnosis of cardiac autonomic neuropathy based on HRV attributes

H Jelinek, J Abawajy, J Cornforth, A Kowalczyk, M Negnevitsky, M Chowdhury, R Krones, A Kelarev

(2015), Vol. 2, pp. 396-409, AIMS medical science, Springfield, Mo., C1

journal article

Secure object tracking protocol for networked RFID systems

B Ray, M Chowdhury, J Abawajy, M Jesmin

(2015), pp. 1-7, SNPD 2015: Proceedings of the IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Takamatsu, Japan, E1

conference

A novel approach to maximize the sum-rate for MIMO broadcast channels

M Khan, R Islam, M Chowdhury

(2015), pp. 1-5, SNPD 2015: Proceedings of the IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Takamatsu, Japan, E1

conference

Connected P-percent coverage in wireless sensor networks based on degree constraint dominating set approach

H Mostafaei, M Chowdhury, R Islam, H Gholiadeh

(2015), pp. 157-160, MSWiM 2015: Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Cancun, Mexico, E1

conference

Image spam classification using neural network

M Chowdhury, J Gao, M Chowdhury

(2015), Vol. 164, pp. 622-632, SecureComm 2015 : Proceedings of the 11th International Conference on Security and Privacy in Communication Networks, Dallas, Texas, E1

conference
2014

A competitive three-level pruning technique for information security

M Chowdhury, J Abawajy, A Kelarev, K Sakurai

(2014), Vol. 490, pp. 25-32, Communications in Computer and Information Science, Berlin, Germany, B1

book chapter

Intelligent Billboard Based on Ambient System (IBBAS)

B Alrubaiey, M Chowdhury, A Sajjanhar

(2014), pp. 1-17, Applied computing and information technology, Berlin, Germany, B1

book chapter

Iterative construction of hierarchical classifiers for phishing website detection

J Abawajy, G Beliakov, A Kelarev, M Chowdhury

(2014), Vol. 9, pp. 2089-2098, Journal of Networks, Oulu, Finland, C1

journal article

Scalable RFID security framework and protocol supporting Internet of Things

B Ray, J Abawajy, M Chowdhury

(2014), Vol. 67, pp. 89-103, Computer Networks, Amsterdam, The Netherlands, C1

journal article

vPELS : An e-learning social environment for VLSI design with content security using DRM

J Dewan, M Chowdhury, L Batten

(2014), Vol. 11, pp. 263-271, E-Learning and Digital Media, London, United Kingdom, C1

journal article

Large iterative multitier ensemble classifiers for security of big data

J Abawajy, A Kelarev, M Chowdhury

(2014), Vol. 2, pp. 352-363, IEEE transactions on emerging topics in computing, New York, NY, C1

journal article

Securing a smart anti-counterfeit web application

B Chowdhury, M Chowdhury, J Abawajy

(2014), Vol. 9, pp. 2925-2933, Journal of networks, Oulu, Finland, C1

journal article

Automatic generation of meta classifiers with large levels for distributed computing and networking

Jemal Abawajy, Andrei Kelarev, Morshed Chowdhury

(2014), Vol. 9, pp. 2259-2268, Journal of Networks, Oulu, Finland, C1

journal article

Decision Trees and Multi-level Ensemble Classifiers for Neurological Diagnostics

H Jelinek, J Abawajy, A Kelarev, M Chowdhury, A Stranieri

(2014), Vol. 1, pp. 1-12, Australian Journal of Medical Science, Milton, QLD, C1

journal article

PELS: A noble architecture and framework for a personal E-learning system (PELS)

J Dewan, M Chowdhury, L Batten

(2014), Vol. 11, pp. 333-341, E-learning and digital media, London, Eng., C1

journal article

Fingertips detection for human interaction system

M Alam, G Nasierding, A Sajjanhar, M Chowdhury

(2014), pp. 1-5, ICGIP 2013 : Proceedings of the 5th International Conference on Graphic and Image Processing, Hong Kong, E1

conference

A framework for mobile elearning (mLearning) with analytical decision model

J Dewan, M Chowdhury

(2014), pp. 1-5, SNPD 2014 IEEE/ACIS 15th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing : Proceedings, Las Vegas, Nevada, E1

conference

RFID tag ownership transfer protocol for a closed loop system

G Aliyev, B Ray, M Chowdhury

(2014), pp. 575-579, Proceedings of the 3rd International Conference on Advanced Applied Informatics; IIAI-AAI 2014, Kitakyushu, Japan, E1

conference

PUF-based secure checker protocol for Networked RFID Systems

B Ray, M Chowdhury, J Abawajy

(2014), pp. 78-83, ICOS 2014: Proceedings on the 2014 IEEE Conference on Open Systems, Subang Jaya, Malaysia, E1

conference

Impact of Assurance of Learning (AOL) in programming course for novices

S Iqbal Malik, R Mathew, M Chowdhury, J Coldwell-Neilson

(2014), pp. 1-5, BCS 2014 : Proceedings of 2nd BCS The Chartered Institute for IT International Conference, Abu Dhabi, United Arab Emirates, E1

conference
2013

Steno cipher to provide data confidentiality and tampered data recovery for RFID tag

B Ray, M Chowdhury, J Abawajy

(2013), Vol. 443, pp. 37-51, Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, Berlin, Germany, B1

book chapter

Multimedia stream rate control over MANET based on router feedback

N Zaman, M Chowdhury

(2013), pp. 53-68, Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, Berlin, Germany, B1

book chapter

Security risks/vulnerability in a RFID system and possible defenses

M Chowdhury, B Ray

(2013), pp. 1-15, Advanced RFID systems, security, and applications, Hershey, Pa., B1

book chapter

Securing a web-based anti-counterfeit RFID system

B Chowdhury, M Chowdhury, J Abawajy

(2013), pp. 342-355, Security and privacy in communication networks, Cham, Switzerland, B1

book chapter

An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy

A Strainieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, H Jelinek

(2013), Vol. 58, pp. 185-193, Artificial intelligence in medicine, Amsterdam, The Netherlands, C1

journal article

An efficient algorithm for partitioning and authenticating problem-solutions of elearning contents

J Dewan, M Chowdhury, L Batten

(2013), Vol. 10, pp. 236-241, E-Learning and digital media, Oxford, England, C1

journal article

Multistage approach for clustering and classification of ECG data

J Abawajy, A Kelarev, M Chowdhury

(2013), Vol. 112, pp. 720-730, Computer methods and programs in biomedicine, Amsterdam, The Netherlands, C1

journal article

Power graphs : a survey

J Abawajy, A Kelarev, M Chowdhury

(2013), Vol. 1, pp. 125-147, Electronic journal of graph theory and applications, [Indonesia], C1

journal article

Predicting cardiac autonomic neuropathy category for diabetic data with missing values

J Abawajy, A Kelarev, M Chowdhury, A Stranieri, H Jelinek

(2013), Vol. 43, pp. 1328-1333, Computers in biology and medicine, Amsterdam, The Netherlands, C1

journal article

Critical analysis and comparative study of security for networked RFID systems

B Ray, M Chowdhury, J Abawajy

(2013), pp. 197-202, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computin, Honolulu, Hawaii, E1

conference

eLearning content authentication using bipartite matching

J Dewan, M Chowdhury, L Batten

(2013), pp. 51-55, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Honolulu, Hawaii, E1

conference

Mobile devices supported learning for novice programmers

S Iqbal, M Chowdhury, O Harsh

(2013), pp. 277-282, ICEEE 2013 : Proceedings of the 2nd International Conference on e-Learning and e-Technologies, Lodz, Poland, E1

conference

Smart Interactive Advertising Board (SIAB)

B Al-Rubaie, M Chowdhury, A Sajjanhar

(2013), pp. 312-317, IIAI 2013 : Proceedings of the 2nd International Conference on Advanced Applied Informatics, Matsue, Japan, E1

conference

A framework for mobile elearning (mlearning) with content security and authentication

J Dewan, M Chowdhury

(2013), pp. 95-99, IIAI AAI 2013 : Proceedings of the 2nd International Conference on Advanced Applied Informatics, Matsue, Japan, E1

conference

Detection of fingertips based on the combination of color information and circle detection

M Alam, M Chowdhury

(2013), pp. 572-576, ICIIS 2013 : Proceedings of the 8th IEEE International Conference on Industrial and Information Systems, Peradeniya, Sri Lanka, E1

conference

The challenges of cloud technology adoption in E-government

M Aziz, J Abawajy, M Chowdhury

(2013), pp. 470-474, 2013 International Conference on Advanced Computer Science Applications and Technologies, Kuching, Malaysia, E1

conference
2012

Secure mobile RFID ownership transfer protocol to cover all transfer scenarios

B Ray, M Chowdhury, J Abawajy

(2012), pp. 1185-1192, ICCCT 2012 : Proceeding of the 7th International Conference on Computing and Convergence Technology, Seoul, Korea, E1

conference
2011

Key predistribution scheme using finite fields and reed muller codes

P Sarkar, M Chowdhury

(2011), pp. 67-79, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011, Berlin, Germany, B1

book chapter

Web health portal to enhance patient safety in Australian healthcare systems

B Chowdhury, M Chowdhury, C D'Souza, N Sultana

(2011), pp. 91-101, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011, Berlin, Germany, B1

book chapter

Detecting unknown anomalous program behavior using API system calls

M Islam, M Islam, M Chowdhury

(2011), pp. 383-394, Informatics engineering and information science, Berlin, Germany, B1

book chapter

Detecting unwanted email using VAT

M Islam, M Chowdhury

(2011), pp. 113-126, Software engineering, artificial intelligence, networking and parallel/distributed computing 2011, Berlin, Germany, B1

book chapter

Optimization and matrix constructions for classification of data

A Kelarev, J Yearwood, P Vamplew, J Abawajy, M Chowdhury

(2011), Vol. 41, pp. 65-73, New Zealand journal of mathematics, Auckland, New Zealand, C1

journal article

Security of RFID systems - a hybrid approach

S Mukherjee, M Hasan, B Chowdhury, M Chowdhury

(2011), pp. 58-63, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, Sydney, N. S. W., E1

conference

Smart RFID reader protocol for malware detection

B Ray, S Huda, M Chowdhury

(2011), pp. 64-69, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, Sydney, N. S. W., E1

conference

A framework for elearning with social media using DRM

J Dewan, M Chowdhury, S Hossain, J Dewan

(2011), pp. 229-234, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, Sydney, N. S. W., E1

conference

vPELS : an eLearning social environment for VLSI design with content security using DRM

J Dewan, M Chowdhury

(2011), pp. 37-42, SSNE 2011 : Proceedings of the 1st ACIS International Symposium on Software and Network Engineering, Seoul, Korea, E1

conference
2010

Dynamic addressing in wireless sensor networks without location awareness

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2010), Vol. 26, pp. 443-460, Journal of information science and engineering, Taipei, Taiwan, C1

journal article

Faster CRT-RSA Decryption towards RFID applications

S Maitra, S Sarkar, M Chowdhury

(2010), pp. 61-72, RFIDsec'10 : Proceedings of the 2010 Radio Frequency Identification System Security Workshop, Singapore, E1

conference

Enhanced RFID mutual authentication scheme based on shared secret information

B Ray, M Chowdhury

(2010), pp. 208-213, CAINE 2010 : Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, Las Vegas, Nev., E1

conference

Mutual authentication with malware protection for a RFID system

R Biplob, M Chowdhury, T Pham

(2010), pp. 24-29, ITS 2010 : Proceedings of the Annual International Conference on Information Technology Security, Phuket, Thailand, E1

conference

Secure connectivity model in wireless sensor networks (WSN) using first order Reed-Muller codes

P Sarkar, A Saha, M Chowdhury

(2010), pp. 507-512, IEEE MASS 2010 : Proceedings of the 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, San Francisco, Calif., E1

conference
2009

Improving the qos for information discovery in autonomic wireless sensor networks

R Doss, G Li, V Mak, S Yu, M Chowdhury

(2009), Vol. 5, pp. 334-349, Pervasive and mobile computing, Amsterdam, Netherlands, C1

journal article

Minimizing the drawbacks of grey-list analyser in synthesis based spam filtering

M Islam, M Chowdhury

(2009), Vol. 11, pp. 89-96, Journal of electronics and computer science, [U.S.A.], C1

journal article

Real-time early infectious outbreak detection systems using emerging technologies

B Chowdhury, M Chowdhury, N Sultana

(2009), pp. 506-508, ARTCom 2009 : Proceedings of the 2009 International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, Kerala, E1

conference
2008

Challenges relating to RFID implementation within the electronic supply chain management - a practical approach

B Chowdhury, M Chowdhury, C D`Souza

(2008), pp. 49-59, Software engineering, artificial intelligence, networking and parallel/distributed computing, Berlin, Germany, B1

book chapter

Real-time secured RFID-based smart healthcare management system

B Chowdhury, R Khosla, M Chowdhury

(2008), Vol. 9, pp. 21-28, ACIS international journal of computer & information science, Mt. Pleasant, Mich., C1

journal article

Dynamic feature selection for spam filtering using support vector machine

M Islam, W Zhou, M Chowdhury

(2008), Vol. 9, pp. 41-50, ACIS international journal of computer & information science, Mt. Pleasant, Mich., C1

journal article

The crossroads approach to information discovery in wireless sensor networks

R Doss, G Li, S Yu, V Mak, M Chowdhury

(2008), Vol. 4904, pp. 310-321, Lecture notes in computer science, Berlin, Germany, C1

journal article

Real-time RFID-based secured loan document management system

B Chowdhury, M Chowdhury, C D`Souza

(2008), pp. 484-489, ICITA 2008 : Proceedings of the 5th International Conference on Information Technology and Applications, Cairns, Queensland, E1

conference

Email categorization using (2+1)-tier classification algorithms

M Islam, W Zhou, M Chowdhury

(2008), pp. 276-281, ICIS 2008 : Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science 2008, Portland, Oregon, E1-1

conference
2007

Dynamic feature selection for spam filtering using support vector machine

M Islam, W Zhou, M Chowdhury

(2007), pp. 757-762, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1

conference

Acoustic features extraction for emotion recognition

J Rong, Y Chen, M Chowdhury, G Li

(2007), pp. 419-424, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1

conference

Fast scene change detection based histogram

M Chowdhury, R Rahman, J Saha, S Kabir

(2007), pp. 229-233, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1

conference

Fingerprint recognition system using hybrid matching techniques

A Youssif, M Chowdhury, S Ray, H Nafaa

(2007), pp. 234-240, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1

conference

A comparison of bipartite N-Qubit states to classify entangled states under symmetric consideration

A Ahmed, A Rahman, M Anwer, N Haque, M Chowdhury

(2007), pp. 291-295, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, Melbourne, Australia, E1

conference

RFID-based real-time smart waste management system

B Chowdhury, M Chowdhury

(2007), pp. 175-180, ATNAC 2007 : Australasian Telecommunication Networks and Applications Conference 2007, Christchurch, New Zealand. Sunday 2 December-Wednesday 5 December 2007., Christchurch, New Zealand, E1

conference
2006

Lease based addressing for event-driven wireless sensor networks

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 251-256, ISCC 2006 proceedings : 11th IEEE Symposium on Computers and Communications : 26-29 June 2006, Cagliari, Sardinia, Italy, Cagliari, Sardinia, Italy, E1

conference

Address reuse in wireless sensor networks

R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference

Topology based packet marking for IP traceback

H Alwis, R Doss, P Hewage, M Chowdhury

(2006), pp. 224-228, Proceedings of the (ATNAC) Australian Telecommunication Networks and Applications Conference, Melbourne, Australia, E1

conference

Energy efficient on-demand addressing for wireless sensor networks

P Hewage, R Doss, H Alwis, M Chowdhury

(2006), pp. 324-328, ATNAC : Proceedings of the Australian Telecommuncation Networks and Applications Conference, 2006, Melbourne, Victoria, E1

conference

A new approach for security in internet mobile communication

M Islam, M Chowdhury, M Morogan

(2006), pp. 171-175, ICNEWS 2006 : proceedings of First International Conference on Next-Generation Wireless Systems 2006, Dhaka, Bangladesh, E1

conference

A novel method for person identification by comparing retinal patterns

R Rahman, M Chowdhury, S Kabir, M Khan

(2006), pp. 14-17, CAINE-2006. proceedings : 19th International Conference on Computer Applications in Industry and Engineering : (CAINE-2006) : Nov. 13-15, 2006, Las Vegas, Nevada, USA, Las Vegas, Nevada, E1

conference

Session initiation protocol (SIP) based event notification system architecture for telemedicine applications

A Sadat, S Sorwar, M Chowdhury

(2006), pp. 214-218, 5th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2006) in conjunction with 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, Software Architecture and Reuse (COMSAR 2006) : proceedings : 10-12, Honolulu, Hawaii, E1

conference
2005

Priority frequency maptable for query optimization using materialized views

M Islam, M Chowdhury

(2005), pp. 15-18, ICIT 2005 : Human computer interaction : Proceedings of the 2nd International Conference on Information Technology, Amman, Jordan, E1

conference

Spam filtering using ML algorithms

M Islam, M Chowdhury

(2005), pp. 419-426, Proceedings of the IADIS international conference WWW/Internet 2005, Lisbon, Portugal, E1

conference

An innovative spam filtering model based on support vector machine

M Islam, M Chowdhury, W Zhou

(2005), pp. 348-353, CIMCA 2005 jointly with IAWTIC 2005 : proceedings, Vienna, Austria, E1

conference

Improved learning algorithm performance using linear kernal transformation

S Ali, M Chowdhury

(2005), pp. 164-167, ISCA 2005 : Computers and their applications : proceedings of the International Society for Computers and their Applications 20th International Conference, New Orleans, Louisiana, USA, March 16-18, 2005, New Orleans, Louisiana, E1

conference

Impact of image organizations on multimedia document retrieval

N Haque, M Chowdhury, S Rahman

(2005), pp. 340-343, Fourth Annual ACIS International Conference on Computer and Information Science, Jeju Island, South Korea, E1

conference

Computer aided analysis of dental radiographic images

A Youssif, M Chowdhury, S Ray

(2005), pp. 43-43, Proceedings of the Digital Image Computing : Techniques and Applications : (DICTA 2005), Cairns, Queensland, E1

conference

An algorithm for efficient and effective retrieval of heterogeneous multimedia document collections

N Haque, M Chowdhury, T Pham

(2005), pp. 438-444, Proceedings of the International Conference on Cognition and Recognition, 22-23 December 2005, Mandya, India, E1

conference
2004

GHIRS: integration of hotel management systems by web services

Y Xiang, W Zhou, M Chowdhury

(2004), Vol. 3033, pp. 1002-1009, Lecture notes in computer science, Berlin, Germany, C1

journal article

Filtering mobile spam by support vector machine

Y Xiang, M Chowdhury, S Ali

(2004), pp. 1-4, CSITeA'04 : Third International Conference on Computer Sciences, Software Engineering, Information Technology, E-Business and Applications, Cairo, Egypt, E1

conference

Performance of statistical inference for block classification in reducing blocking artefact in video coded images

M Chowdhury, S Ray, T Pham

(2004), pp. 1-4, CSITeA'04 : Third International Conference on Computer Sciences, Software Engineering, Information Technology, E-Business and Applications, Cairo, Egypt, E1

conference

Performance analysis of algorithms for frequent pattern generation

M Islam, M Chowdhury, S Khan

(2004), pp. 43-55, Complex 2004: Proceedings of the 7th Asia-Pacific Complex Systems Conference, Cairns, Australia, E1

conference

Medical image classification using an efficient data mining technique

M Islam, M Chowdhury, S Khan

(2004), pp. 34-42, Complex 2004 : Proceedings of the 7th Asia-Pacific Complex Systems Conference, Cairns, Qld., E1

conference

Block identification for reducing blocking artefact in MPEG-1 video coded images using statistical inference and performance measurement using block impairment metric (BIM)

M Chowdhury, S Ray, T Pham

(2004), pp. 143-147, Computer applications in industry and engineering : proceedings of the ISCA 17th international conference : Orlando, Florida, USA, November 17-19, 2004, Orlando, USA, E1

conference

A performance comparison of three wireless multi hop ad-hoc network routing protocols when streaming MPEG4 traffic

M Chowdhury, D Perera, T Pham

(2004), pp. 516-521, Proceedings of INMIC 2004 : 8th International Multitopic Conference : December 24-26, 2004, National University of Computer and Emerging Sciences, Lahore, Pakistan, Lahore, Pakistan, E1

conference

A comparative study of image cropping algorithms on multimedia retrieval

N Haque, M Chowdhury

(2004), International Conference on Computer Sciences, Software Engineering, Information Technology, E-Business and Applications, Cairo, Egypt, E1

conference
2003

Image semantic classification by using SVM

H Wan, M Chowdhury

(2003), Vol. 14, pp. 1891-1899, Journal of software, Beijing, China, C1

journal article

图像纹理特征及其在CBIR中的应用

W Hualin, M Chowdhury, H Hong, S Zhongzhi

(2003), Vol. 15, pp. 195-199, Journal of computer aided design and computer graphics, Beijing, China, C1

journal article

A simulation model for video traffic performance via ATM over TCP/IP

M Chowdhury, Y Tu, T Pham

(2003), pp. 197-202, ISCA 2003 : Computer applications in industry and engineering : proceedings of the ISCA 16th international conference, Las Vegas, USA, E1

conference

Block identification using entropic method for reducing blocking artefacts in block based transform coded images

M Chowdhury, S Ray, T Pham

(2003), pp. 454-457, CSITeA`03 : Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business and Applications, Rio de Janeiro, Brazil, E1

conference

MPEG Traffic Performance via TCP over ATM

M Chowdhury, Y Tu, T Pham

(2003), pp. 128-132, CSITeA`03 : Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business and Applications, Rio de Janeiro, Brazil, E1

conference

Web service based wagering system for the best odds

A Sajjanhar, Z Ying, M Chowdhury

(2003), pp. 242-245, Intelligent and adaptive systems and software engineering : Proceedings of the ISCA, 12th International Conference, San Francisco, CA, USA, July 9-11, 2003, San Francisco, California, E1

conference

A vision for a multimedia knowledge management framework

W Dai, M Chowdhury, D Prager, M Alam

(2003), pp. 430-433, Computers and their applications : proceedings of the ISCA 18th international conference, Honolulu, Hawaii, USA March 26-28, 2003, Honolulu, Hawaii, USA, E1

conference

Reducing blocking artefacts in MPEG video coded images using entropic methods

M Chowdhury, S Ray, T Pham

(2003), pp. 213-216, Advances in Pattern Recognition (ICAPR-2003), Kolkata, India, E1

conference

The major drawbacks to the use of wireless communication products in education

L Batten, M Chowdhury, J Drew

(2003), pp. 1-6, AISMC 2003 : 1st Australian Information Security Management Conference, Perth, Western Australia, E1

conference

Quality-of-service routing for web-based multimedia servers

S Yu, W Zhou, M Chowdhury

(2003), pp. 1349-1353, Proceedings of the 7th Joint Conference on Information Sciences : September 26 - 30, 2003, Research Triangle Park, North Carolina, USA, Cary, N. C., E1

conference

A parameter adjustment method for relevance feedback

H Wan, M Chowdhury, A Sajjanhar

(2003), pp. 619-625, CISST 2003 : Proceedings of the international conference on imaging science, systems, and technology, Las Vegas, Nevada, E1

conference

A scheme for content based retrieval of music data in MIDI format

S Subramanya, M Chowdhury, T Pham, S Shankar

(2003), pp. 159-162, ISCA 2003 : Computer applications in industry and engineering : proceedings of the ISCA 16th international conference, Las Vegas, USA, E1

conference

Image retrieval based on the combination of color and keyword

Y Jiang, Z Zhou, M Chowdhury

(2003), pp. 450-453, CSITeA'03 : Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business and Applications, Rio de Janeiro, Brazil, E1

conference

Nonlinear discrimination using support vector machine

A Ali, M Chowdhury, S Subramanya

(2003), pp. 287-290, Computers and their applications: proceedings of the ISCA 18th international conference, Honolulu, Hawaii, E1

conference
2002

A new approach for reducing blocking artefacts using linear filter for block based transform coded images

M Chowdhury, S Ray, T Pham

(2002), pp. 1-4, ACIS 2002 : International Conference on Computer Science, Information Technology, e-Business, and Applications (CSITeA '02), Foz do Iguazu, Brazil, E1

conference

A new texture spectrum descriptor and its application in image semantic classification

H Wan, M Chowdhury, H Hu, Z Shi

(2002), pp. 176-179, Computers and their applications : proceedings of the ISCA 17th International Conference, San Francisco, California, USA, April 4-6, 2002, San Francisco, California, E1

conference

Adaptive DCT coding of images using block categorization

S Subramanya, M Chowdhury, T Pham

(2002), pp. 386-390, CISST'02 : proceedings of the International Conference on Imaging Science, Systems, and Technology : Las Vegas, Nevada, USA, June 24-27, 2002, Las Vegas, Nevada, E1

conference

Eliminating of the drawback of existing testing technique of easily testable PLAs using an improved testing algorithm with product line rearrangement

M Islam, M Chowdhury

(2002), pp. 239-242, International Society for Computers and their Applications : 15th International conference on computer applications in industry and engineering, San Diego, California, USA, E1

conference
2001

Block identifications for minimising inter-block discontinuity in MPEG-1 video coded images using statistical inference

M Chowdhury, T Pham

(2001), pp. 189-192, Computer applications in industry and engineering : proceedings of the ISCA 14th International Conference, Las Vegas, Nevada, U.S.A., November 27-29, 2001, Las Vegas, Nevada, USA, E1

conference

Retrieval of multimedia documents using low cost image ranking algorithms

N Haque, M Chowdhury

(2001), pp. 41-44, Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering., Las Vegas, Nevada, E1

conference

Designing wave digital filters with finite word length coefficient in the time and frequency domain

S Sorwar, M Chowdhury

(2001), pp. 250-253, The Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, Las Vegas, Nevada, USA, E1

conference

Image featuring for retrieval of multimedia documents

N Haque, M Chowdhury

(2001), pp. 427-432, 2001 International Conferences on Info-Tech and Info-Net : proceedings : ICCII 2001-Beijing, October 29-November 1, 2001, Beijing, China, Beijing, China, E1

conference

An intelligent forex monitoring system

A Abraham, M Chowdhury

(2001), pp. 523-528, 2001 International Conferences on Info-Tech and Info-Net : proceedings : ICCII 2001-Beijing, October 29-November 1, 2001, Beijing, China, Beijing, China, E1

conference
2000

Evaluation of Linear Filters Used With Statistical Inference for Reducing Blocking Artifacts in Video Coded Images

M Chowdhury

(2000), pp. 198-202, 15th International Conference on Computers and Their Applications 2000, CATA 2000, E1-1

conference
1998

Block Classification for Reducing Artefacts in Video Images Using Statistical Correlation

M Chowdhury, S Rahman, B Nath

(1998), pp. 102-105, 13th International Conference on Computers and Their Applications 1998, CATA 1998, E1-1

conference

Funded Projects at Deakin

No Funded Projects at Deakin found

Supervisions

Principal Supervisor
2021

Ahmed Jaber Hussein Al-Mansoori

Thesis entitled: Big Data Stream Processing in the Cloud

Doctor of Philosophy (Information Technology), School of Information Technology

2020

Md Samsul Haque

Thesis entitled: On-Demand Framework for Unmanned Aerial Vehicle Network Security

Master of Science (Information Technology), School of Information Technology

2018

Ahmad Shaker Abdalrada

Thesis entitled: The Role of Various Risk Factors in the Prevalence of Cardiac Autonomic Neuropathy and Associated Diseases.

Doctor of Philosophy (Information Technology), School of Information Technology

2017

Jahangir Dewan

Thesis entitled: System Architecture, Content Authentication and Digital Right Management (DRM) for eLearning

Doctor of Philosophy (Information Technology), School of Information Technology

2015

Biplob Ray

Thesis entitled: Security framework and protocols for the internet of things

Doctor of Philosophy (Information Technology), School of Information Technology

Executive Supervisor
2020

Tahsien Ali Hussein Al-Quraishi

Thesis entitled: Predicting breast cancer risk, recurrence and survivability

Doctor of Philosophy (Information Technology), School of Information Technology

Co-supervisor
2022

Haider Adeeb Kassem Kassem

Thesis entitled: Vision-Based Driver Fatigue Prediction

Doctor of Philosophy (Information Technology), School of Information Technology

2019

Maslina Abdul Aziz

Thesis entitled: QoS-Aware Predictive Workflow Scheduling

Doctor of Philosophy (Information Technology), School of Information Technology

Ghaith Dh Khalil

Thesis entitled: A Novel RFID Based Anti-Counterfeiting Scheme for Retailer Environments

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2021

Lamyaa Jebur Yousif Al-Omairi

Thesis entitled: Linear Dimensionality Reduction Method for Graph Data

Doctor of Philosophy (Information Technology), School of Information Technology

Sara Ghanavati

Thesis entitled: Learning-based Internet of Things Resource Management

Doctor of Philosophy (Information Technology), School of Information Technology

2019

Abdulaziz Aljunaibi

Thesis entitled: Isomorphism as a Paradigm for Strategic Change Management in AbuDhabi government

Doctor of Philosophy (Information Technology), School of Information Technology

2016

Benjamin Jonathan Townsend

Thesis entitled: A Carrier Agnostic Bio-Monitoring Communications Platform

Doctor of Philosophy (Information Technology), School of Information Technology

Baker Alrubaiey

Thesis entitled: Assuring Virtual Network Reliability and Resilience

Doctor of Philosophy (Information Technology), School of Information Technology

Sara Ghanavati

Thesis entitled: Congestion Control Mechanism for Sensor-Cloud Infrastructure

Master of Science (Information Technology), School of Information Technology

2015

Isredza Rahmi A Hamid

Thesis entitled: Phishing Detection and Traceback Mechanism

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Davood Izadi

Thesis entitled: Enhancing Wireless Sensor Networks Functionalities

Doctor of Philosophy (Information Technology), School of Information Technology

2013

Mahbub Ahmed

Thesis entitled: Security in cloud computing

Doctor of Philosophy (Information Technology), School of Information Technology

2010

Yiqing Tu

Thesis entitled: Efficient Dimensionality Reduction and One-class Classification for Content-based Image Retrieval

Doctor of Philosophy (Information Technology), School of Information Technology

2009

Ke Li

Thesis entitled: Reliable Algorithms and Attack Detection Schemes for Network Systems

Doctor of Philosophy (Information Technology), School of Information Technology

2007

Yang Xiang

Thesis entitled: A Distributed Active Defense System against DDoS Attacks

Doctor of Philosophy (Information Technology), School of Information Technology