Biography
Professor Robin Doss is the Director of the University's Strategic Research Centre (SRC) in Cyber Security Research and Innovation (CSRI). In addition, he leads Deakin University's participation in the Cyber Security Cooperative Research Centre (CSCRC) and is the theme leader for the CSCRC's research theme on "Development of Next Generation Authentication Technologies".
Read more on Robin's profileResearch interests
My research interests are in the broad areas of security and privacy for smart, emerging and critical infrastructures. Honours/ PhD students who would like to work with me are requested to send me a copy of their CV and transcripts. Please do not list me as a potential supervisor without receiving my acceptance.
Research groups
Centre for Cyber Resilience and Trust (CREST)
Publications
False data injection threats in active distribution systems: A comprehensive survey
M Husnoo, A Anwar, N Hosseinzadeh, S Islam, A Mahmood, R Doss
(2023), Vol. 140, pp. 344-364, Future Generation Computer Systems, C1
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks
Keshav Sood, Mohammad Nosouhi, Dinh Nguyen, Frank Jiang, Morshed Chowdhury, Robin Doss
(2023), Vol. 18, pp. 965-979, IEEE Transactions on Information Forensics and Security, Piscataway, N.J., C1
Towards Higher Levels of Assurance in Remote Identity Proofing
Ashish Nanda, Syed Shah, Jongkil Jeong, Robin Doss, Jeb Webb
(2023), pp. 1-8, IEEE Consumer Electronics Magazine, Piscataway, N.J., C1
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism
M Nosouhi, S Shah, L Pan, Y Zolotavkin, A Nanda, P Gauravaram, R Doss
(2023), Vol. 18, pp. 2160-2174, IEEE Transactions on Information Forensics and Security, C1
FedDiSC: A computation-efficient federated learning framework for power systems disturbance and cyber attack discrimination
M Husnoo, A Anwar, H Reda, N Hosseinzadeh, S Islam, A Mahmood, R Doss
(2023), Vol. 14, pp. 100271-100271, Energy and AI, C1
Hybrid cyber defense strategies using Honey-X: A survey
X Qin, F Jiang, M Cen, R Doss
(2023), Vol. 230, Computer Networks, C1
Bit Flipping Key Encapsulation for the Post-Quantum Era
M Nosouhi, S Shah, L Pan, R Doss
(2023), Vol. 11, pp. 56181-56195, IEEE Access, C1
A Secure Federated Learning Framework for Residential Short Term Load Forecasting
M Husnoo, A Anwar, N Hosseinzadeh, S Islam, A Mahmood, R Doss
(2023), pp. 1-1, IEEE Transactions on Smart Grid, C1
SoK: On Efficacy of the BGF Decoder for QC-MDPC-based Quantum-Safe Cryptosystems
Syed Shah, Mohammad Nosouhi, Lei Pan, Robin Doss
(2023), pp. 1-8, APKC '23 : Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, Melbourne, Vic., E1
A Generic Enhancer for Backdoor Attacks on Deep Neural Networks
B Abbasi, Q Zhong, L Zhang, S Gao, A Robles-Kelly, R Doss
(2023), Vol. 1794, pp. 296-307, ICONIP 2022 : Proceedings of the 29th Neural Information Processing Conference, Virtual Event, E1
A Multi‐Domain Perspective of Future Directions for VANETs for Emergency Message Dissemination
Ravneet Kaur, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2022), pp. 199-218, IoT-Enabled Smart Healthcare Systems, Services and Applications, London, Eng., B1
Traceability in Supply Chains: A Cyber Security Analysis
Naeem Syed, Syed Shah, Rolando Trujillo Rasua, Robin Doss
(2022), Vol. 112, Computers and Security, C1
Improving Unlinkability of Attribute-based Authentication through Game Theory
Yevhen Zolotavkin, Jongkil Jeong, Veronika Kuchta, Maksym Slavnenko, Robin Doss
(2022), Vol. 25, pp. 1-36, ACM Transactions on Privacy and Security, New York, N.Y., C1
Towards Spoofing Resistant Next Generation IoT Networks
M Nosouhi, K Sood, M Grobler, R Doss
(2022), Vol. 17, pp. 1669-1683, IEEE Transactions on Information Forensics and Security, Piscataway, N.J., C1
Zero Trust Architecture (ZTA): A Comprehensive Survey
N Syed, S Shah, A Shaghaghi, A Anwar, Z Baig, R Doss
(2022), Vol. 10, pp. 57143-57179, IEEE Access, Piscataway, N.J., C1
Jongkil Jeong, Yevhen Zolotavkin, Robin Doss
(2022), pp. 1-30, ACM Computing Surveys, New York, N.Y., C1
GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids
T Le, M Ge, A Anwar, S Loke, R Beuran, R Doss, Y Tan
(2022), Vol. 22, Sensors, Switzerland, C1
Digital Twin For Cybersecurity: Towards Enhancing Cyber Resilience
Rajiv Faleiro, Lei Pan, Shiva Pokhrel, Robin Ram Mohan Doss
(2022), Vol. 413, pp. 57-76, Broadnets 2021: Broadband, Communications, Networks, and Systems, Virtual Event, E1
A New Zero-Trust Aided Smart Key Authentication Scheme in IoV
Y Song, F Jiang, S Ali Shah, R Doss
(2022), pp. 630-636, Proceedings of the IEEE Conference on Pervasive Computing and Communications 2022 Conference, Workshops and other Affiliated Events, Pisa, Italy, E1
BurST-ADMA: Towards an Australian Dataset for Misbehaviour Detection in the Internet of Vehicles
M Amanullah, M Baruwal Chhetri, S Loke, R Doss
(2022), pp. 624-629, Proceedings of the IEEE Conference on Pervasive Computing and Communications 2022 Conference, Workshops and other Affiliated Events, Pisa, Italy, E1
A Bytecode-based Approach for Smart Contract Classification
C Shi, Y Xiang, J Yu, L Gao, K Sood, R Doss
(2022), pp. 1046-1054, IEEE SANER 2022 : Proceedings of the Institute of Electrical and Electronics Engineers 2022 International Conference on Software Analysis, Evolution and Reengineering 2022, Honolulu, Hawaii, E1
J Liang, D Xiao, Y Xiang, R Doss
(2022), pp. 5573-5578, IEEE ICC 2022 : Proceedings of the Institute of Electrical and Electronics Engineers 2022 International Conference on Communications, Seoul, Republic of Korea, E1
DU-QS22: A Dataset for Analyzing QC-MDPC-Based Quantum-Safe Cryptosystems
M Nosouhi, S Shah, L Pan, R Doss
(2022), Vol. 448, pp. 3-10, AC3 2022 : Proceedings of the EAI International Conference on Applied Cryptography in Computer and Communications 2022, Virtual Event, E1
Towards Privacy-Preserving Neural Architecture Search
F Wang, L Zhang, L Pan, S Hu, R Doss
(2022), pp. 1-6, Proceedings - 2022 IEEE Symposium on Computers and Communications, Rhodes, Greece, E1
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts
F Heikamp, L Pan, R Trujillo-Rasua, S Ruj, R Doss
(2022), Vol. 13787, pp. 514-523, NSS 2022 : Proceedings of the 16th International Conference on Network and System Security 2022, Denarau Island, Fiji, E1
Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis
V Kanthuru, S Rajasegarar, P Rathore, R Doss, L Pan, B Ray, M Chowdhury, C Srimathi, M Durai
(2022), Vol. 13725, pp. 118-130, ADMA 2022 : Proceedings of the Advanced Data Mining and Applications International Conference 2022, Brisbane, Qld., E1
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks
G Yang, M Ge, S Gao, X Lu, L Zhang, R Doss
(2022), Vol. 13787, pp. 406-425, NSS 2022 : Proceedings of the Network and System Security 2022 international conference, Denarau Island, Fiji, E1
FedREP: Towards Horizontal Federated Load Forecasting for Retail Energy Providers
M Husnoo, A Anwar, N Hosseinzadeh, S Islam, A Mahmood, R Doss
(2022), Vol. 2022-November, APPEEC 2022 : Proceedings of the 14th Asia-Pacific Power and Energy Engineering Conference, Melbourne, Victoria, E1
SEPN: A Sequential Engagement Based Academic Performance Prediction Model
X Song, J Li, S Sun, H Yin, P Dawson, R Doss
(2021), Vol. 36, pp. 46-53, IEEE Intelligent Systems, C1
Data congestion in VANETs: research directions and new trends through a bibliometric analysis
T Bhatia, R Ramachandran, R Doss, L Pan
(2021), Vol. 77, pp. 6586-6628, Journal of Supercomputing, C1
Multipath TCP Meets Transfer Learning: A Novel Edge-Based Learning for Industrial IoT
S Pokhrel, L Pan, N Kumar, R Doss, H Vu
(2021), Vol. 8, pp. 10299-10307, IEEE Internet of Things Journal, C1
Secure and privacy-preserving structure in opportunistic networks
S Rashidibajgan, T Hupperich, R Doss, A Förster
(2021), Vol. 104, Computers and Security, C1
Private and trustworthy distributed lending model using Hyperledger Besu
Purathani Praitheeshan, Lei Pan, Robin Ram Mohan Doss
(2021), Vol. 2, pp. 1-19, SN computer science, Cham, Switzerland, C1
The importance of selecting clustering parameters in VANETs: A survey
R Kaur, R Ramachandran, R Doss, L Pan
(2021), Vol. 40, Computer Science Review, C1
An extended reselling protocol for existing anti-counterfeiting schemes
G Khalil, R Doss, M Chowdhury
(2021), Vol. 10, Journal of Sensor and Actuator Networks, C1
T Bhatia, R Ramachandran, R Doss, L Pan
(2021), IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), C1
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)
S Shah, N Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
(2021), Vol. 108, Computers and Security, C1
A novel multi-stage distributed authentication scheme for smart meter communication
M Hegde, A Anwar, K Kotegar, Z Baig, R Doss
(2021), Vol. 7, pp. 1-36, PeerJ Computer Science, United States, C1
SolGuard: Preventing External Call Issues in Smart Contract-based Multi-Agent Robotic Systems
Purathani Praitheeshan, Lei Pan, Xi Zheng, Alireza Jolfaei, Robin Doss
(2021), Vol. 579, pp. 150-166, Information Sciences, Amsterdam, The Netherlands, C1
EEG-based emotion recognition via capsule network with channel-wise attention and LSTM models
L Deng, X Wang, F Jiang, R Doss
(2021), Vol. 3, pp. 425-435, CCF Transactions on Pervasive Computing and Interaction, C1
Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey
M Husnoo, A Anwar, R Chakrabortty, R Doss, M Ryan
(2021), Vol. 9, pp. 153276-153304, IEEE Access, Piscataway, N.J., C1
Detecting Internet of Things Bots: A Comparative Study
B Stephens, A Shaghaghi, R Doss, S Kanhere
(2021), Vol. 9, pp. 160391-160401, IEEE Access, C1
Tarandeep Bhatia, Ramkumar Ketti Ramachandran, Robin Doss, Lei Pan
(2021), pp. 636-642, Confluence 2021 : Proceedings of the 11th International Conference on Cloud Computing, Data Science & Engineering, Online, E1
Detecting and controlling the occurrence of data congestion in a high-density VANETs Environment
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Ram Mohan Doss, Lei Pan
(2021), pp. 42-48, Proceedings of the 2021 29th Conference of Open Innovations Association (FRUCT), Tampere, Finland, E1
Enhancing Privacy Through DMMA: Decision-Making Method for Authentication
Maksym Slavnenko, Yevhen Zolotavkin, Jong Jeong, Veronika Kuchta, Robin Doss
(2021), pp. 1-12, TRUSTCOM21 : Proceedings of the 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Shenyang, China, E1
Federated Learning with Extreme Label Skew: A Data Extension Approach
Saheed Tijani, Xingjun Ma, Ran Zhang, Frank Jiang, Robin Ram Mohan Doss
(2021), pp. 1-8, IJCNN 2021 : Proceedings of the International Joint Conference on Neural Networks, Shenzhen, China, E1
Identifying DNS Exfiltration based on Lexical Attributes of Query Name
I Jawad, J Ahmed, I Razzak, R Doss
(2021), pp. 1-7, IJCNN 2021 : Proceedings of the 2021 International Joint Conference on Neural Networks, Shenzhen, China, E1
Systematic evaluation of abnormal detection methods on gas well sensor data
Xichen Tang, Jinlong Wang, Ye Zhu, Robin Doss, Xin Han
(2021), pp. 1-6, ISCC 2021 : Proceedings of the 2021 IEEE Symposium on Computers and Communications, Athens, Greece, E1
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials
N Lalchandani, F Jiang, J Jeong, Y Zolotavkin, R Doss
(2021), pp. 1-11, PST 2021: Proceedings of the 18th Privacy, Security and Trusts 2021 International Conference, Auckland, N.Z., E1
Pengjie Zeng, Xiaoliang Wang, Hao Li, Frank Jiang, Robin Doss
(2020), Vol. 8, pp. 33644-33657, IEEE Access, Piscataway, N.J., C1
Secure attribute-based search in RFID-based inventory control systems
R Doss, R Trujillo-Rasua, S Piramuthu
(2020), Vol. 132, Decision Support Systems, C1
A Novel RFID-Based Anti-Counterfeiting Scheme for Retail Environments
G Khalil, R Doss, M Chowdhury
(2020), Vol. 8, pp. 47952-47962, IEEE Access, C1
A new secure RFID anti-counterfeiting and anti-theft scheme for merchandise
G Khalil, R Doss, M Chowdhury
(2020), Vol. 9, Journal of Sensor and Actuator Networks, C1
An efficient voting based decentralized revocation protocol for vehicular ad hoc networks
M Asghar, L Pan, R Doss
(2020), Vol. 6, pp. 422-432, Digital Communications and Networks, C1
Echo-id: Smart user identification leveraging inaudible sound signals
S Ali Shah, A Shaghaghi, S Kanhere, J Zhang, A Anwar, R Doss
(2020), Vol. 8, pp. 194508-194522, IEEE Access, C1
A review of simulators used for VANETs: The case-study of vehicular mobility generators
T Bhatia, R Ketti Ramachandran, R Ram Mohan Doss, L Pan
(2020), SPIN 2020 Proceedings of the 7th International Conference on Signal Processing and Integrated Networks, Noida, India, E1
Adopting SOA and microservices for inter-enterprise architecture in SME communities
A Andriyanto, R Doss, P Yustianto
(2020), pp. 282-287, ICEEIE 2019 : Emerging innovative technology for sustainable future : Proceedings of the 6th International Conference on Electrical, Electronics and Information Engineering 2019, Denpasar, Indonesia, E1
M Chowdhury, R Doss, B Ray, S Rajasegarar, S Chowdhury
(2020), Vol. 324, pp. 28-41, SGIoT 2019 : Proceedings of the Third European Alliance for Innovation International Conference on Smart Grid and Internet of Things 2019, TaiChung, Taiwan, E1
Smart parking with Computer Vision and IoT technology
M Dixit, C Srimathi, R Doss, S Loke, M Saleemdurai
(2020), pp. 170-174, TSP : Proceedings of the 2020 43rd International Conference on Telecommunications and Signal Processing, Online from Milan, Italy, E1
A survey on controlling the congestion in vehicle-to-vehicle communication
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2020), pp. 573-578, ICRITO 2020 : Trends and future directions : Proceedings of the IEEE 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1
Detection and control of data congestion in vehicular broadcast networks
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2020), pp. 1044-1049, ICRITO 2020 : Trends and future directions : Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1
A comprehensive review on the vehicular ad-hoc networks
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2020), pp. 515-520, ICRITO 2020 : Trends and future directions : Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1
Towards decentralized IoT updates delivery leveraging blockchain and zero-knowledge proofs
Edoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil Kanhere
(2020), pp. 1-10, NCA 2020 : 2020 IEEE 19th International Symposium on Network Computing and Applications, Online from Cambridge, Mass., E1
Security evaluation of smart contract-based on-chain Ethereum wallets
P Praitheeshan, L Pan, R Doss
(2020), Vol. 12570, pp. 22-41, NSS 2020 : Proceedings of the 14th International Conference on Network and System Security, Online from Melbourne, Vic., E1
Digital security reference model: a survey and proposal
Suhardi, B Aziz, R Doss, P Yustianto
(2020), pp. 323-328, ICITSI 2020 : Proceedings of the 2020 International Conference on Information Technology Systems and Innovation, Bandung, Indonesia, E1
A Feedback-Driven Lightweight Reputation Scheme for IoV
Rohan Dahiya, Frank Jiang, Robin Ram Mohan Doss
(2020), pp. 1060-1068, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1
Avoiding Geographic Regions in Tor
Matthew Ryan, Morshed Chowdhury, Frank Jiang, Robin Ram Mohan Doss
(2020), pp. 802-809, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1
Opportunistic Tracking in Cyber-Physical Systems
Samaneh Rashidibajgan, Thomas Hupperich, Robin Ram Mohan Doss, Lei Pan
(2020), pp. 1672-1679, TrustCom 2020 : Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, E1
Towards a lightweight continuous authentication protocol for device-to-device communication
S Shah, N Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
(2020), pp. 1119-1126, Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, E1
A Raghunath, S Chandrasekaran, R Doss, M Saleem Durai
(2020), Vol. 2020-January, pp. 1-5, SCOReD 2020 : Proceedings of the 2020 IEEE Student Conference on Research and Development, Batu Pahat, Malaysia, E1
A unifying structure of metamodel landscape
P Yustianto, R Doss, R Suhardi
(2019), Vol. 14, pp. 134-152, Journal of Modelling in Management, C1
An improved authentication scheme for internet of vehicles based on blockchain technology
X Wang, P Zeng, N Patterson, F Jiang, R Doss
(2019), Vol. 7, pp. 45061-45072, IEEE Access, C1
Privacy-preserving history-based routing in Opportunistic Networks
S Rashidibajgan, R Doss
(2019), Vol. 84, pp. 244-255, Computers and security, Amsterdam, The Netherlands, C1
A comparison survey study on RFID based anti-counterfeiting systems
G Khalil, R Doss, M Chowdhury
(2019), Vol. 8, Journal of Sensor and Actuator Networks, C1
S Sathyadevan, K Achuthan, R Doss, L Pan
(2019), Vol. 7, pp. 92419-92435, IEEE Access, C1
P Yustianto, R Doss, Suhardi, N Kurniawan
(2019), pp. 555-561, ICITSI 2018 : Proceedings of the 5th International Conference on Information Technology Systems and Innovation, Bandung and Padang, Indonesia, E1
Intrusion detection system classifier for VANET based on pre-processing feature extraction
Ayoob Ayoob, Ghaith Khalil, Morshed Chowdhury, Robin Ram Mohan Doss
(2019), Vol. 1113, pp. 3-22, FNSS 2019 : Future Network Systems and Security 5th International Conference, FNSS 2019 Melbourne, VIC, Australia, November 27–29, 2019 Proceedings, Melbourne, Victoria, E1
Digital forensics for drone data - intelligent clustering using self organising maps
S Mekala, Zubair Baig
(2019), Vol. 1113, FNSS 2019 : Proceedings of the 5th International Conference of Future Network Systems and Security, Melbourne, Vic., E1
An efficient dynamic group-based batch verification scheme for vehicular sensor networks
L Jiang, Y Wang, J Tian, F Jiang, Nicholas Patterson, R Ram Mohan Doss
(2019), pp. 52-64, FNSS 2019 : Proceedings of the 5th International Conference of Future Network Systems and Security, Melbourne, Victoria, E1
Attainable hacks on keystore files in ethereum wallets--a systematic analysis
Purathani Praitheeshan, Y Xin, Lei Pan, Robin Ram Mohan Doss
(2019), FNSS 2019 : Future Network Systems and Security, Melbourne, Australia, E1
Quorum chain-based malware detection in android smart devices
F Gao, F Jiang, Y Zhang, R Doss
(2019), Vol. 1113, pp. 212-224, FNSS 2019 : Future Network Systems and Security : 5th International Conference, FNSS 2019 Melbourne, VIC, Australia, November 27–29, 2019 Proceedings, Melbourne, Vic., E1
Insider attacks on Zigbee based IoT networks by exploiting AT commands
W Piracha, M Chowdhury, B Ray, S Rajasegarar, R Doss
(2019), Vol. 1116, pp. 77-91, ATIS 2019 : Proceedings of the 10th Applications and Techniques in Information Security Conference 2019, Tamil Nadul, India, E1
A survey in RFID ownership transfer protocols
Gaith Al, Torana Al, M Chowdhury, R Doss
(2018), pp. 83-91, RFID technology: design principles, applications and controversies, Hauppauge, N.Y., B1
Survey on RFID security issues and scalability
Torana Al, Gaith Al, R Doss
(2018), pp. 37-50, RFID technology: design principles, applications and controversies, Hauppage, N.Y., B1
Routing Protocols in Opportunistic Networks-A Survey
M Alajeely, R Doss, A Ahmad
(2018), Vol. 35, pp. 369-387, IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), C1
Trust strategy implementation in OppNets
A Ahmad, R Doss, M Alajeely, S Rubeaai
(2018), Vol. 100, pp. 151-181, Computing, C1
A novel approach for information discovery in wireless sensor grids
M Tissera, R Doss, G Li, V Mak-Hau, L Batten
(2018), Vol. 26, pp. 640-662, Journal of network and systems management, Berlin, Germany, C1
Packet integrity defense mechanism in OppNets
A Ahmad, R Doss, M Alajeely, S Al Rubeaai, D Ahmad
(2018), Vol. 74, pp. 71-93, Computers and security, Amsterdam, The Netherlands, C1
S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss
(2018), Vol. 120, pp. 23-31, Journal of parallel and distributed computing, Amsterdam, The Netherlands, C1
Mapping Functions Driven Robust Retinal Vessel Segmentation via Training Patches
H Xia, F Jiang, S Deng, J Xin, R Doss
(2018), Vol. 6, pp. 61973-61982, IEEE Access, C1
Identifying drawbacks in malicious PDF detectors
A Falah, L Pan, M Abdelrazek, R Doss
(2018), Vol. 878, pp. 128-139, FNSS 2018 : Proceedings of the Future Network Systems and Security Conference 2018, Paris, France, E1
A new method for sharing the public keys in opportunistic networks
S Rashidibajgan, R Doss
(2018), Vol. 878, pp. 147-161, FNSS 2018 : Future network systems and security : 4th International Conference, FNSS 2018, Paris, France, July 9-11, 2018, Proceedings, Paris, France, E1
A scalable and efficient PKI based authentication protocol for VANETs
M Asghar, R Doss, L Pan
(2018), pp. 1-3, ITNAC 2018 : Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference, Sydney, N.S.W., E1
A literature review of inter-enterprise SOA in small and medium business communities
A Andriyanto, R Doss, L Pan, P Yustianto
(2018), pp. 547-554, ICITSI 2018 : Proceedings of the 5th International Conference on Information Technology Systems and Innovation, Bandung and Padang, Indonesia, E1
Defense against packet collusion attacks in opportunistic networks
M Alajeely, R Doss, A Ahmad, V Mak-Hau
(2017), Vol. 65, pp. 269-282, Computers & security, Amsterdam, The Netherlands, C1
On sensor-based solutions for simultaneous presence of multiple RFID tags
S Piramuthu, R Doss
(2017), Vol. 95, pp. 102-109, Decision support systems, Amsterdam, The Netherlands, C1
A secure search protocol for low cost passive RFID tags
S Sundaresan, R Doss, S Piramuthu, W Zhou
(2017), Vol. 122, pp. 70-82, Computer networks, Amsterdam, The Netherlands, C1
Attacks on and countermeasures for two RFID protocols
X Chen, T Cao, R Doss, J Zhai
(2017), Vol. 96, pp. 5825-5848, Wireless personal communications, New York, N.Y., C1
Portguard - An authentication tool for securing ports in an IoT gateway
S Sathyadevan, V Vejesh, R Doss, L Pan
(2017), pp. 624-629, PerCom 2017 : IEEE International Conference on Pervasive Computing and Communications Workshops, Kona, Hawaii, E1
Securing OppNets from packet integrity attacks using trust and reputation
A Ahmad, R Doss, M Alajeely, K Ahmad
(2017), pp. 7-12, WAINA 2017 : Proceedings of the 31st Advanced Information Networking and Applications Workshops 2017 International Conference, Taipei, Taiwan, E1
Adjusting matryoshka protocol to address the scalability issue in IoT environment
G Al, R Doss, M Chowdhury
(2017), Vol. 759, pp. 84-94, FNSS 2017 :Proceedings of the 3rd International Future Network Systems and Security Conference, Florida, USA, E1
Activities and artifacts in service engineering: Case study report of service engineering framework
P Yustianto, R Doss, S Suhardi
(2017), Vol. 2018-January, pp. 373-377, ICITSI IEEE 2017 : Information Technology Systems and Innovation : 4th Proceeding of International Conference, Bandung, Indonesia, E1
Security and trust in opportunistic networks - A survey
M Alajeely, R Doss, A Ahmad
(2016), Vol. 33, pp. 256-268, IETE Technical Review, C1
Query verification schemes for cloud-hosted databases: a brief survey
F Riaz-ud-Din, W Zhou, R Doss
(2016), Vol. 31, pp. 543-561, International Journal of Parallel, Emergent and Distributed Systems, C1
RFID ownership transfer protocol based on cloud
T Cao, X Chen, R Doss, J Zhai, L Wise, Q Zhao
(2016), Vol. 105, pp. 47-59, Computer networks, Amsterdam, The Netherlands, C1
Establishing trust relationships in OppNets using Merkle trees
A Ahmad, M Alajeely, R Ram Mohan Doss
(2016), pp. 1-6, COMSNETS 2016: Proceedings of the 8th International Conference on Communication Systems and Networks, Bangalore, India, E1
String matching query verification on the cloud-hosted databases
F Riaz-ud-Din, R Ram Mohan Doss, W Zhou
(2016), pp. 1-10, ICDCN 2016 : Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore, E1
Malicious node detection in OppNets using hash chain technique
M Alajeely, A Ahmad, R Doss
(2016), pp. 925-930, ICCSNT 2015 : Proceedings of 2015 4th International Conference on Computer Science and Network Technology, Harbin, China, E1
Secure RFID protocol to manage and prevent tag counterfeiting with Matryoshka concept
G Al, R Doss, M Chowdhury, B Ray
(2016), Vol. 670, pp. 126-141, FNSS 2016 : Proceedings of the Second International Conference on Future Network Systems and Security, Paris, France, E1
Reputation based malicious node detection in OppNets
A Ahmad, M Alajeely, R Doss
(2016), pp. 1-6, JCSSE 2016 : Machine learning in the internet of things era : Proceedings of the 2016 13th International Joint Conference on Computer Science and Software Engineering, Khon Kaen, Thailand, E1
Novel approach for information discovery in autonomous wireless sensor networks
M Tissera, R Ram Mohan Doss, G Li, L Batten
(2015), Vol. 523, pp. 47-60, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1
An efficient detection mechanism against packet faking attack in opportunistic networks
M Alajeely, A Ahmad, R Ram Mohan Doss, V Mak
(2015), Vol. 523, pp. 84-100, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1
S Sundaresan, R Ram Mohan Doss, W Zhou, S Piramuthu
(2015), Vol. 55, pp. 112-124, Computer communications, Amsterdam, The Netherlands, C1
Secure tag search in RFID systems using mobile readers
S Sundaresan, R Ram Mohan Doss, S Piramuthu, W Zhou
(2015), Vol. 12, pp. 1-14, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1
Zero knowledge grouping proof protocol for RFID EPC C1G2 Tags
S Sundaresan, R Doss, W Zhou
(2015), Vol. 64, pp. 2994-3008, IEEE transactions on computers, Piscataway, N.J., C1
M Alajeely, R Doss, A Ahmad, V Mak-Hau
(2015), Vol. 71, pp. 111-118, Computer communications, Amsterdam, The Netherlands, C1
Service engineering based on service oriented architecture methodology
S Suhardi, R Ram Mohan Doss, P Yustianto
(2015), Vol. 13, pp. 1466-1477, Telkomika: telecommunication, computing, electronics and control, Yogyakarta, Indonesia, C1
Fast and energy efficient data storage for information discovery in multi-dimensional WSNs
Tissera, R Ram Mohan Doss, G Li, L Batten
(2015), pp. 88-93, ITNAC 2015: Proceedings of the 25th International Telecommunication Networks and Applications Conference, Sydney, New South Wales, E1
Malicious node traceback in opportunistic networks using merkle trees
M Alajeely, A Ahmad, R Ram Mohan Doss
(2015), pp. 147-152, DSDIS 2015: Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, Sydney, New South Wales, E1
Consolidating service enginering perspectives
P Yustianto, Suhardi, R Ram Mohan Doss
(2015), pp. 1-7, ICITSI 2015: Proceedings of the International Conference on Information Technology Systems and Innovation, Bandung, Indonesia, E1
A robust grouping proof protocol for RFID EPC C1G2 tags
S Sundaresan, R Ram Mohan Doss, S Piramuthu, W Zhou
(2014), Vol. 9, pp. 961-975, IEEE transactions on information forensics and security, Piscataway, N.J., C1
Packet faking attack: a novel attack and detection mechanism in OppNets
M Alajeely, A Ahmad, R Ram Mohan Doss, V Mak
(2014), pp. 638-642, CIS 2014 : Proceedings of the 10th International Conference on Computational Intelligence and Security, Kunming, China, E1
Defense against packet dropping attacks in opportunistic networks
A Ahmad, M Alajeely, R Ram Mohan Doss
(2014), pp. 1608-1613, ACCI 2014 : Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, Delhi, India, E1
Energy efficient information discovery approach for range queries in multi-dimensional WSNs
M Tissera, R Ram Mohan Doss, G Li, L Batten
(2014), pp. 1-6, ICWiSe 2014: Proceedings of the IEEE Conference on Wireless Sensors, Subang, Selangor, Malaysia, E1
Secure yoking proof protocol for RFID Systems
S Sundaresan, S Sundaresan, R Doss, R Doss
(2014), pp. 1608-1613, ICACCI 2014: Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, Delhi, India, E1
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
R Doss, S Sundaresan, W Zhou
(2013), Vol. 11, pp. 383-396, Ad hoc networks, New York, N.Y., C1
Secure RFID tag ownership transfer based on quadratic residues
R Doss, W Zhou, S Yu
(2013), Vol. 8, pp. 390-401, IEEE Transactions on information forensics and security, Piscataway, N.J., C1
Information discovery in multidimensional wireless sensor networks
M Tissera, R Doss, G Li, L Batten
(2013), pp. 54-59, ICOIN 2013 : Proceedings of the 27th International Conference on Information Networking, Bangkok, Thailand, E1
A general cloud firewall framework with dynamic resource allocation
S Yu, R Doss, W Zhou, S Guo
(2013), pp. 1941-1945, Proceedings of the IEEE International Conference on Communications; ICC 2013, Budapest, Hungary, E1
Comparative study of routing protocols for opportunistic networks
M Alajeely, A Ahmad, R Doss
(2013), pp. 209-214, ICST 2013 : Proceedings of the 7th International Conference on Sensing Technology, Wellington, New Zealand, E1
Offline grouping proof protocol for RFID systems
S Sundaresan, R Doss, W Zhou
(2013), pp. 247-252, WiMob 2013 2013 : Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Lyon, France, E1
An adaptive approach to information discovery in multi-dimensional wireless sensor networks
M Tissera, R Doss, G Li, L Batten
(2013), pp. 203-208, ICST 2013 : Proceedings of the 7th International Conference on Sensing Technology, Wellington, New Zealand, E1
RFID tags : grouping proof with forward security
S Sundaresan, R Doss, W Zhou
(2013), pp. 1-6, RFID-TA 2013 : Proceedings of the IEEE RFID-Technologies and Applications 2013 international conference, Johor Bahru, Malaysia, E1
Secure ownership transfer in multi-tag/multi-owner passive RFID systems
S Sundaresan, R Doss, W Zhou
(2013), pp. 1-6, GLOBECOM 2013 : Proceedings of the IEEE Global Communications 2013 conference, Atlanta, Georgia, E1
A minimum disclosure approach to authentication and privacy in RFID systems
R Doss, W Zhou, S Sundaresan, S Yu, L Gao
(2012), Vol. 56, pp. 3401-3416, Computer networks, Amsterdam, The Netherlands, C1
A secure tag ownership transfer scheme in a closed loop RFID system
R Doss, W Zhou
(2012), pp. 164-169, WCNCW 2012 : Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, Paris, France, E1
A serverless ultra-lightweight secure search protocol for EPC Class-1 Gen-2 UHF RFID tags
S Sundaresan, R Doss, W Zhou
(2012), pp. 580-585, ICCIS 2012 : Proceedings of the 2012 International Conference on Computer and Information Science, Kuala Lumpur, Malaysia, E1
A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags
S Sundaresan, R Doss, W Zhou
(2012), pp. 30-35, PIMRC 2012 : IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sydney, New South Wales, E1
Implementing recovery in low-resource stationary wireless sensor networks
B Li, L Batten, R Doss
(2011), pp. 11-20, Advances in wireless, mobile networks and applications, Berlin, Germany, B1
Traceback of DDoS attacks using entropy variations
S Yu, W Zhou, R Doss, W Jia
(2011), Vol. 22, pp. 412-425, IEEE transactions on parallel and distributed systems, United States, C1
Prevention of information harvesting in a cloud services environment
L Batten, J Abawajy, R Doss
(2011), pp. 66-72, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1
A novel mutual authentication scheme with minimum disclosure for rfid systems
R Doss, W Zhou, S Yu, L Gao
(2011), pp. 544-549, ISSNIP 2011 : Proceedings of the 7th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Adelaide, S. Aust., E1
Network resilience in low-resource mobile wireless sensor networks
B Li, L Batten, R Doss
(2010), pp. 127-138, Security and privacy in mobile information and communication systems : second international ICST conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010 : revised selected papers, Berlin, Germany, B1
Dynamic addressing in wireless sensor networks without location awareness
R Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2010), Vol. 26, pp. 443-460, Journal of information science and engineering, Taipei, Taiwan, C1
Information discovery in mission-critical wireless sensor networks
R Doss, G Li, V Mak, M Tissera
(2010), Vol. 54, pp. 2383-2399, Computer networks, Amsterdam, Netherlands, C1-1
Information discovery in mission-critical wireless sensor networks
Robin Doss, Gang Li, Vicky Mak, Menik Tissera
(2010), Vol. 54, pp. 2383-2399, COMPUTER NETWORKS, C1
Energy-Efficient Medium Access Control in Wireless Sensor Networks
Gang Li, Robin Doss
(2009), pp. 419-438, Guide to Wireless Sensor Networks. Computer Communications and Networks, London, Eng., B1-1
Improving the qos for information discovery in autonomic wireless sensor networks
R Doss, G Li, V Mak, S Yu, M Chowdhury
(2009), Vol. 5, pp. 334-349, Pervasive and mobile computing, Amsterdam, Netherlands, C1
Fast recovery from node compromise in wireless sensor networks
B Li, R Doss, L Batten, W Schott
(2009), pp. 1-6, NTMS 2009 : Proceedings of the NTMS 2009 3rd International Conference on New Technologies, Mobility and Security, Cairo, Egypt, E1
Lightweight authentication for recovery in wireless sensor networks
B Li, L Batten, R Doss
(2009), pp. 465-471, MSN 2009 : Proceedings of the Mobile Ad-hoc and Sensor Networks 2009 international conference, Fujian Province, China, E1
Information theory based detection against network behavior mimicking DDoS attacks
S Yu, W Zhou, R Doss
(2008), Vol. 12, pp. 319-321, IEEE communications letters, USA, C1
The crossroads approach to information discovery in wireless sensor networks
R Doss, G Li, S Yu, V Mak, M Chowdhury
(2008), Vol. 4904, pp. 310-321, Lecture notes in computer science, Berlin, Germany, C1
A transformation model for heterogeneous servers
S Yu, R Doss, T Thapngam, D Qian
(2008), pp. 665-671, HPCC 2008 : Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, Dalian, China, E1
Exploiting affinity propagation for energy-efficient information discovery in sensor networks
R Doss, G Li
(2008), pp. 735-740, GLOBECOM 2008 : Proceedings of the IEEE Global Telecommunication Conference, New Orleans, La., E1
Self adjusted security architecture for mobile ad hoc networks (MANETs)
A Ghalwash, A Youssif, S Hashad, R Doss
(2007), pp. 682-687, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings, Melbourne, Australia, E1
Geographic routing with cooperative relaying and leapfrogging in wireless sensor networks
P Coronel, R Doss, W Schott
(2007), pp. 646-651, IEEE GLOBECOM 2007 innovate, educate, accelerate: 50th Annual IEEE Global Telecommunications Conference, Washington, DC, USA, E1
Prediction based location aided routing for mobile ad hoc networks
R Doss, A Jennings, N Shenoy
(2006), Vol. 2, pp. 91-102, International journal of pervasive computing and communications, Leicester, England, C1
Lease based addressing for event-driven wireless sensor networks
R Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2006), pp. 251-256, ISCC 2006 proceedings : 11th IEEE Symposium on Computers and Communications : 26-29 June 2006, Cagliari, Sardinia, Italy, Cagliari, Sardinia, Italy, E1
Address reuse in wireless sensor networks
R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1
Topology based packet marking for IP traceback
H Alwis, R Doss, P Hewage, M Chowdhury
(2006), pp. 224-228, Proceedings of the (ATNAC) Australian Telecommunication Networks and Applications Conference, Melbourne, Australia, E1
R Doss, L Pan
(2006), pp. 409-413, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1
Energy efficient on-demand addressing for wireless sensor networks
P Hewage, R Doss, H Alwis, M Chowdhury
(2006), pp. 324-328, ATNAC : Proceedings of the Australian Telecommuncation Networks and Applications Conference, 2006, Melbourne, Victoria, E1
Reliable event transfer in wireless sensor networks deployed for emergency response
R Chellappa-Doss, D Chandra
(2005), pp. 208-213, Proceedings of the 17th IASTED International Conference on Parallel and Distributed Computing and Systems : November 14 - 16, 2005, Phoenix, AZ, USA, Phoenix, USA, E1
Route maintenance using mobility prediction for mobile ad hoc networks
B Sathyaraj, R Chellappa-Doss
(2005), pp. 101-106, IEEE Mass 2005: the 2005 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Washington, D.C., E1
Mobility prediction based routing for minimizing control overhead in mobile ad hoc networks
R Doss, A Jennings, N Shenoy
(2004), pp. 27-31, ICWN`04 : Proceedings of the International Conference on Wireless Networks, Las Vegas, USA, E1
A review of current mobility prediction techniques for ad hoc networks
R Doss, A Jennings, N Shenoy
(2004), Categorisation of failures in telecommunication networks : proceedings of the 4th IASTED International Multi-Conference Wireless and Optical Communications July 8-10, 2004, Banff, Canada, Banff, Canada, E1
Mobility prediction for seamless mobility in wireless networks
R Doss, A Jennings, N Shenoy
(2004), pp. 435-443, INC 2004 : Proceedings of the 4th International Network Conference, Plymouth, UK, E1
A review on current work in mobility prediction for wireless networks
R Chellappa-Doss, A Jennings, N Shenoy
(2004), pp. 1-7, Proceedings of the 3rd Asian International Mobile Computing Conference, Bangkok, Thailand, E1
User mobility prediction in hybrid and ad hoc wireless networks
R Chellappa-Doss, A Jennings, N Shenoy
(2003), pp. 1-5, 2003 Australian Telecommunications Networks and Applications Conference, Melbourne, Australia, E1
Route discovery and reconstruction in mobile ad hoc networks
R Chellappa, A Jennings, N Shenoy
(2003), pp. 549-554, IEEE International Conference on Networks, ICON, Sydney, AUSTRALIA, E1-1
Funded Projects at Deakin
Australian Competitive Grants
Secure and Efficient Communication in Vehicle-based Radio Frequency Identification Systems
Prof Wanlei Zhou, Prof Robin Ram Mohan Doss
ARC Linkage - Projects Rnd 1
- 2012: $60,312
- 2011: $54,402
- 2010: $51,671
CyberNinjas: Keeping Our Children Cybersmart
Prof Robin Ram Mohan Doss, A/Prof Radhika Gorur, Dr Sophie Mckenzie, A/Prof William Yeoh, Dr Graeme Pye
e-Safety Commissioner Online Safety Grants Program
- 2023: $423,765
Other Public Sector Funding
Recovery Mechanisms for Wireless Sensor Devices
Prof Lynn Batten, Prof Robin Ram Mohan Doss, Mr Brian Palm
DoD Grant - Research - Department of Defence
- 2009: $18,855
- 2008: $67,348
Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems.
Prof Robin Ram Mohan Doss, Prof Seng Loke, Dr Lei Pan, Dr Rolando Trujillo Rasua, Dr Frank Jiang, Dr Leo Zhang
Department of Industry, Innovation and Science
- 2022: $74,235
- 2021: $123,725
- 2019: $296,940
Zero Trust Architectures for Australia's Critical Infrastructure Security.
Prof Robin Ram Mohan Doss, Dr Zubair Baig, Dr Adnan Anwar, Dr Arash Shaghaghi
DSTO Grant - Research - Defence Science & Technology Organisation
- 2020: $60,741
Cybersecurity Training and Innovation for IoT-Enabled Smart Energy Grids for Australian and Japanese Researchers
Dr Adnan Anwar, Dr Mengmeng Ge, Prof Seng Loke, Prof Robin Ram Mohan Doss
Aust Japan Foundation
- 2021: $15,000
Kronos: Towards Fast Feedback Fuzzers for Discovering Vulnerabilities in Software Binaries
Prof Robin Ram Mohan Doss, Dr Shamsul Huda
Data61
- 2023: $20,000
- 2022: $13,333
- 2021: $6,667
ERP16 USE OF EMERGING TECHNOLOGIES FOR NATIVE WILDLIFE POPULATION ASSESSMENT AND MANAGEMENT
Prof Don Driscoll, Prof Euan Ritchie, Dr Desley Whisson, A/Prof Mike Weston, A/Prof Daniel Ierodiaconou, Dr Blake Allan, Dr Shuddha Rafiq, Dr Duc Thanh Nguyen, A/Prof Tim Wilkin, Prof Robin Ram Mohan Doss, Prof Seng Loke
Department of Environment Land Water and Planning
- 2022: $327,000
Accurate Decision-making for Network Security with Compromised Data.
Dr Keshav Sood, Prof Robin Ram Mohan Doss
Department of Defence
- 2022: $30,000
Cyber Harm Prevention
Prof Robin Ram Mohan Doss, Dr Jay Jeong, Prof Chad Whelan, Prof Judy Currey, A/Prof William Yeoh, Prof Gang Li, Dr Adnan Anwar, Dr Paul Cooper, Mr Damien Manuel
VIC Managed Insurance Authority
- 2023: $175,280
- 2022: $50,763
Useability Framework for Verifiable Credentials.
Prof Robin Ram Mohan Doss, Dr Jay Jeong, Dr Graeme Pye
CSIRO Scholarship - Commonwealth Scientific and Industrial Research Organisation
- 2023: $46,000
Industry and Other Funding
Secure and Efficient Communication in Vehicle-based Radio Frequency Identification Systems
Prof Wanlei Zhou, Prof Robin Ram Mohan Doss
Express Promotions
- 2012: $11,000
- 2011: $11,000
- 2010: $11,000
Development of Cyber Security Guidelines for Critical Infrastructures.
Dr Zubair Baig, Mr Damien Manuel, Prof Robin Ram Mohan Doss
Deloitte Risk Advisory Pty Ltd
- 2021: $14,945
Australian 5G Innovation Initiative - Round 1 Interchange: VR and AI soft skills training streamed at low latencies.
A/Prof Linda Byrne, Ms Vicki Kavadas, Prof Robin Ram Mohan Doss
Liminal VR Pty Ltd
- 2022: $81,000
Useability Framework for Verifiable Credentials.
Prof Robin Ram Mohan Doss, Dr Jay Jeong, Dr Graeme Pye
BUPA HI Pty Ltd
- 2023: $12,000
Other Funding Sources
AGD Data Analytics Workshop
A/Prof Jacob Cybulski, Prof Rens Scheepers, Prof Gang Li, Prof Robin Ram Mohan Doss
Data to Decisions CRC
- 2017: $13,936
CyberCRC Theme 1.3 - Post Doc 1
Prof Robin Ram Mohan Doss
Cyber Security Research Centre Limited
- 2021: $150,000
- 2020: $150,000
- 2019: $75,000
CyberCRC Theme 1.3 - Post Doc 2
Prof Robin Ram Mohan Doss
Cyber Security Research Centre Limited
- 2021: $187,500
- 2020: $112,500
- 2019: $75,000
Smarter Adaptable Real-World Security: A Tool for Designing and Deploying Run-Time Adaptable Security Mechanisms for loT / CPS Systems
Prof Seng Loke, Prof Robin Ram Mohan Doss, Dr Rolando Trujillo Rasua
Cyber Security Research Centre Limited
- 2020: $52,000
National Authentication Governance and Human Framework.
Prof Robin Ram Mohan Doss, A/Prof William Yeoh, Dr Graeme Pye, Dr Frank Jiang
Cyber Security Research Centre Limited
- 2023: $23,500
- 2022: $38,803
- 2021: $47,000
- 2020: $23,500
Traceability and Path Authentication in Dynamic Supply Chains.
Prof Robin Ram Mohan Doss, Dr Rolando Trujillo Rasua, Dr Lei Pan
Cyber Security Research Centre Limited
- 2023: $45,000
- 2022: $61,921
Provably Secure and Efficient Machine-to-Machine Authentication Solutions for IoT Systems.
Prof Robin Ram Mohan Doss, Dr Arash Shaghaghi, Mr Dimitri Kamenski
Cyber Security Research Centre Limited
- 2022: $49,536
- 2021: $30,000
Lightweight Continuous Authentication for Cloud Edge Integrated Platforms
Dr Zubair Baig, Dr Lei Pan, Prof Robin Ram Mohan Doss
CYBER SECURITY RESEARCH CENTRE
- 2023: $45,000
- 2022: $49,536
- 2021: $15,000
Secure and Authenticated Access to Remote Assets Within Critical Infrastructure.
Dr Zubair Baig, Dr Lei Pan, Dr Keshav Sood, Prof Robin Ram Mohan Doss
Cyber Security Research Centre Limited
- 2023: $135,000
- 2022: $111,458
Robust Authentication using Ambient Intelligence in Smart Environments (RAAISE).
Prof Robin Ram Mohan Doss, Dr Zubair Baig, Dr Adnan Anwar, Dr Frank Jiang
Cyber Security Research Centre Limited
- 2023: $259,606
- 2022: $159,674
Next Generation Authentication Technologies.
Prof Robin Ram Mohan Doss, Dr Lei Pan, Dr Zubair Baig
Cyber Security Research Centre Limited
- 2023: $262,500
- 2022: $216,724
Augmenting Cyber Defence Capability (ACDC).
Prof Gang Li, Dr Luxing Yang, Dr Nayyar Zaidi, Dr Ye Zhu, Prof Rajesh Vasa, Prof Kon Mouzakis, Prof Robin Ram Mohan Doss, Dr Thanh Thi Nguyen
Cyber Security Research Centre Limited
- 2023: $117,000
- 2022: $32,199
Secure Data Provenance in the Internet of Vehicles.
Prof Robin Ram Mohan Doss, Dr Frank Jiang, Mr Anuj Nepal
iMove Australia Limited
- 2023: $8,100
- 2022: $4,507
Misbehaviour Detection in Corporate Intelligent Transportation Systems (cITS).
Prof Robin Ram Mohan Doss, Prof Seng Loke, Mr Mohamed Ahzam Amanullah
iMove Australia Limited
- 2023: $6,900
- 2022: $3,716
Socrates: Software Security with a focus on critical technologies.
Dr Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, Dr Lennon Chang, A/Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang
Cyber Security Research Centre Limited
- 2023: $90,732
Privacy Respecting and Compliant Digital Credential wAlleT (PRCDCATT)
Prof Robin Ram Mohan Doss, Dr Jay Jeong, Dr Luxing Yang, Dr Anh Dinh, A/Prof Mohamed Abdelrazek, Dr Yanjun Zhang
Cyber Security Research Centre Limited
- 2023: $81,250
Supervisions
Ravneet Kaur
Thesis entitled: Emergency Message Dissemination in Vehicular Adhoc Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Tarandeep Bhatia
Thesis entitled: Data Congestion in Vehicular Ad-hoc Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Gurdeep Singh
Thesis entitled: Wearable IoT Framework for Patient Emergencies in Smart Healthcare
Master of Science (Information Technology), School of Information Technology
Miraj Asghar
Thesis entitled: Security and Privacy for Vehicular Adhoc Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Shiju Sathyadevan
Thesis entitled: Design of a Secure Architecture for the Internet of Things.
Doctor of Philosophy (Information Technology), School of Information Technology
Agustinus Andriyanto
Thesis entitled: Service-based Reference Architecture in the Context of Inter-Enterprise Architecture
Doctor of Philosophy (Information Technology), School of Information Technology
Faizal Riaz-ud-Din
Thesis entitled: Pattern Matching Query Verification on the Cloud
Doctor of Philosophy (Information Technology), School of Information Technology
Purnomo Yustianto
Thesis entitled: General Framework for Service Engineering Analysis and Design
Doctor of Philosophy (Information Technology), School of Information Technology
Asma'a Nasser Ahmad
Thesis entitled: Establishing Trust Relationships and Secure Channels in Opportunistic Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Majeed Alajeely
Thesis entitled: Defence and Traceback Mechanisms in Opportunistic Wireless Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Warnakulasuriya Menik Randi Tissera
Thesis entitled: Information Discovery in Multi-Dimensional Autonomous Wireless Sensor Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Saravanan Sundaresan
Thesis entitled: Secure Ownership Transfer Protocols for RFID EPC C1G2 Tags
Doctor of Philosophy (Information Technology), School of Information Technology
Ghaith Dh Khalil
Thesis entitled: A Novel RFID Based Anti-Counterfeiting Scheme for Retailer Environments
Doctor of Philosophy (Information Technology), School of Information Technology
Iram Jawad
Thesis entitled: Detecting Anomalous Network Behaviors using Deep Learning and Data Analytics
Master of Science (Information Technology), School of Information Technology
Xiangyu Song
Thesis entitled: Effective Sequential Learning for Students' Performance Prediction
Doctor of Philosophy (Information Technology), School of Information Technology
Md Jamilur Rahman
Thesis entitled: Hand Gesture-Based Control of Multiple Robots: The Case of HEXAs
Master of Science (Information Technology), School of Information Technology
Purathani Praitheeshan
Thesis entitled: Empirical Studies of Security and Privacy on Real World Ethereum Smart Contracts
Doctor of Philosophy (Information Technology), School of Information Technology
Ahmed Raad Abdul Hussein Al-Sudani
Thesis entitled: Trust Management in RFID Critical Applications
Doctor of Philosophy (Information Technology), School of Information Technology
Bai Li
Thesis entitled: Recovery Mechanisms on Sensor Networks
Doctor of Philosophy (Information Technology), School of Information Technology
Theerasak Thapngam
Thesis entitled: Improvement of DDoS Attacks Detection and Web Access Anonymity
Doctor of Philosophy (Information Technology), School of Information Technology
Ping Li
Thesis entitled: Detecting Stepping Stones in Internet Environments
Doctor of Philosophy (Information Technology), School of Information Technology
Ke Li
Thesis entitled: Reliable Algorithms and Attack Detection Schemes for Network Systems
Doctor of Philosophy (Information Technology), School of Information Technology