Biography
Shamsul Huda received his PhD degree in Computer Science from the Center for Informatics and Applied Optimization (CIAO), School of Science, Information Technology and Engineering (SITE), Federation University, in 2009 under the supervision of Professor John Yearwood, Head, School of IT, Deakin University and Professor Roberto Tognieri, Head, School of Electrical, Electronic and Computer Engineering, University of Western Australia (UWA). During his PhD, he jointly worked with CIAO, Signal Processing and Recognition Laboratory, UWA with Prof Roberto Tognieri where he spent significant time in UWA, at Perth, WA for completion of his PhD and gained research experiences from both universities.
He achieved “Certified Information System Security Professional (CISSP)” certification from the topmost organization of the world for training and certifications for cybersecurity: “The International Information System Security Certification Consortium, (ISC)² ”. He also has achieved a full membership of (ISC)² as part of the recognition of his contribution and expertise in cybersecurity areas and industry based research engagement.
Career highlights
- January 2016 to date: Lecturer, School of IT, Deakin University, Australia
- January 2015 to December 2015:Research Fellow, School of IT, Deakin University, Australia
- October 2015 to 2016 February: Development team member and consultant on behalf of Deakin, Sparx Systems, Australia
- January 2010 to 2014 December: Research Fellow, School of IT, Federation University, Australia
- February 2008 to August 2008: Programmer, ArgusConnect, Australia
- July 2003 to March 2009, Assistant professor, (2005-2009 on study leave), Department of Computer Science and Engineering, Khulna university of Engineering and Technology, Bangladesh
Research interests
- Cyber-security for critical infrastructure
- Secure authentication and communication protocols and network components for secure operations of industrial control systems
- Industrial IoT networks and security
- National and portfolio level cyber strategy development and Global cybersecurity indices
- Critical assets, services portfolio level risk assessments
- Endpoint security and anti-malware solutions for mobile system and client-based systems
- Software vulnerability analysis and detection
- Innovative strategies in teaching and learning, testing the effectiveness of innovation for learning design
Teaching interests
- Cyber Security Management
- Systems security
- Software requirement analysis and modelling
- Database management systems
- Networks and Communications
- Service oriented architecture
- Data Mining and Machine Learning
Units taught
- SIT725 Software Engineering
- SIT773 Software requirement analysis and modelling
- SIT202 Networks and Communications
- SIT737 Service oriented architecture
- SIT790/SIT792 Major Thesis/Minor thesis
- SIT207 Android Programming
- SIT382 Systems Security (current)
Knowledge areas
- Cyber security
- Critical infrastructure and IIoT security
- Cyber risk assessment for critical assets and services
- National and portfolio level cyber strategy development
- Global cybersecurity indices
- Artificial intelligence, Deep learning
- Software Engineering
- Malware
Professional activities
- Recent conference committee member:
- 5th North American International Conference on Industrial Engineering and Operations Management Detroit, Michigan, USA, August 10-14, 2020,
- http://ieomsociety.org/detroit2020/committee/
- 11th Annual International Conference on Industrial Engineering and Operations Management, Singapore, March 9-11.
- http://ieomsociety.org/singapore2021/committee/
- Journal Reviewer for:
- IEEE transaction on Industrial informatics,
- Information science
- IEEE access
- Future Generation Computer Systems
- Applied soft computing
Research groups
Member of Centre for Cyber Security Research and Innovation
Member of Security and PrivacY Research in IoT Lab (SPYRIT)
Member of Cyber Physical Systems (CPS) and the Internet of Things (IoT) group
Projects
- Obfuscation-resilient novel algorithms and techniques for the analysis, detection and prevention of emerging time variant malware, Crypto malware, Funding (2020): 30,000AUD by Innovation Agency in the Ministry of Education, Saudi Arabia.
- Cybersecurity risk modeling framework, detective and preventive measure in security operations for Industrial control systems, Critical Infrastructure, Smart grid.
- National and portfolio level cyber strategy development including risk assessment for critical assets at the national level:Vanuatu Cybersecurity Capacity Building Project, Cybersecurity Maturity Model for Nations; with the Oceania Cyber Security Centre and Global Cyber Security Capacity Centre, Oxford University, Funding (2020): $125K jointly with Melbourne University, Latrobe University and Federation University
Publications
Improving malicious PDF classifier with feature engineering: A data-driven approach
Ahmed Falah, Lei Pan, Shamsul Huda, Shiva Pokhrel, Adnan Anwar
(2021), Vol. 115, pp. 314-326, Future generation computer systems, Amsterdam, The Netherlands, C1
S Sharmeen, S Huda, J Abawajy, M Hassan
(2020), Vol. 89, pp. 1-20, Applied soft computing journal, Amsterdam, The Netherlands, C1
Shaila Sharmeen, Yahye Ahmed, Shamsul Huda, Bari Kocer, Mohammad Hassan
(2020), Vol. 8, pp. 24522-24534, IEEE Access, Piscataway, N.J., C1
Mohammad Hassan, Abdu Gumaei, M Huda, Ahmad Almogren
(2020), Vol. 16, pp. 6154-6162, IEEE Transactions on Industrial Informatics, Piscataway, N.J., C1
Yahye Ahmed, Barış Koçer, Shamsul Huda, Bander Saleh Al-rimy, Mohammad Hassan
(2020), Vol. 167, pp. 1-14, Journal of network and computer applications, Amsterdam, The Netherlands, C1
Mohammad Hassan, Shamsul Huda, Shaila Sharmeen, Jemal Abawajy, Giancarlo Fortino
(2020), pp. 1-10, IEEE Transactions on Industrial Informatics, Piscataway, N.J., C1
A Robust Deep Learning Enabled Trust-boundary Protection for Adversarial Industrial IoT Environment
Mohammad Hassan, Md Hassan, M Huda, Victor de Albuquerque
(2020), Vol. 8, pp. 1-12, IEEE Internet of Things Journal, Piscataway, N.J., C1
A robust cyberattack detection approach using optimal features of SCADA power systems in smart grids
A Gumaei, M Hassan, S Huda, M Hassan, D Camacho, J Del Ser, G Fortino
(2020), Vol. 96, pp. 1-18, Applied soft computing journal, Amsterdam, The Netherlands, C1
Evolution of Dark Web threat analysis and detection: a systematic approach
Saiba Nazah, Md Huda, Jemal Abawajy, Mohammad Hassan
(2020), Vol. 8, pp. 171796-171819, IEEE Access, Piscataway, N.J., C1
Human emotion recognition using deep belief network architecture
Mohammad Hassan, Md Alam, Md Uddin, Shamsul Huda, Ahmad Almogren, Giancarlo Fortino
(2019), Vol. 51, pp. 10-18, Information fusion, Amsterdam, The Netherlands, C1
S Huda, J Abawajy, B Al-Rubaie, L Pan, M Hassan
(2019), Vol. 101, pp. 1247-1258, Future generation computer systems, Amsterdam, The Netherlands, C1
S Sharmeen, S Huda, J Abawajy
(2019), Vol. 322, pp. 1-8, Proceedings of the 2019 International Conference on Smart Power & Internet Energy Systems 25–27 April 2019, Deakin University, Melbourne, Australia, Melbourne, Victoria, E1
M Hassan, S Huda, J Yearwood, H Jelinek, A Almogren
(2018), Vol. 41, pp. 105-118, Information fusion, Amsterdam, The Netherlands, C1
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
S Huda, R Islam, J Abawajy, J Yearwood, M Hassan, G Fortino
(2018), Vol. 83, pp. 193-207, Future generation computer systems, Amsterdam, The Netherlands, C1
Malware threats and detection for industrial mobile-IoT networks
S Sharmeen, S Huda, J Abawajy, W Ismail, M Hassan
(2018), Vol. 6, pp. 15941-15957, IEEE access, Piscataway, N.J., C1
An ensemble oversampling model for class imbalance problem in software defect prediction
S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, S Ahmad
(2018), Vol. 6, pp. 24184-24195, IEEE access, Piscataway, N.J., C1
Human activity recognition from body sensor data using deep learning
Mohammad Hassan, Shamsul Huda, Md Uddin, Ahmad Almogren, Majed Alrubaian
(2018), Vol. 42, pp. 1-8, Journal of medical systems, New York, N.Y., C1
S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss
(2018), Vol. 120, pp. 23-31, Journal of parallel and distributed computing, Amsterdam, The Netherlands, C1
Shamsul Huda, John Yearwood
(2018), Vol. 71, pp. 66-77, Applied soft computing, Amsterdam, The Netherlands, C1
Identifying cyber threats to mobile-IoT applications in edge computing paradigm
jemal Abawajy, M Huda, Shaila Sharmeen, Mohammad Hassan, Ahmad Almogren
(2018), Vol. 89, pp. 525-538, Future generation computer systems, Amsterdam, The Netherlands, C1
N Gunaratne, M Abdollahian, S Huda
(2018), Vol. 738, pp. 295-300, ITNG 2018 : Proceedings of the International Conference on Information Technology - New Generations, Las Vegas, Nevada, E1
M Huda, S Miah, M Hasaan, R Islam, J Yearwood, M Alrubaian, A Almogren
(2017), Vol. 379, pp. 211-228, Information sciences, Amsterdam, The Netherlands, C1
S Huda, J Abawajy, M Abdollahian, R Islam, J Yearwood
(2017), Vol. 29, pp. 1-18, Concurrency Computation, Chichester, Eng., C1
N Gunaratne, M Abdollahian, S Huda, J Yearwood
(2017), Vol. 55, pp. 4948-4962, International journal of production research, Abingdon, Eng., C1
A parallel framework for software defect detection and metric selection on cloud computing
M Ali, S Huda, J Abawajy, S Alyahya, H Al-Dossari, J Yearwood
(2017), Vol. 20, pp. 2267-2281, Cluster computing, New York, N.Y., C1
A framework for software defect prediction and metric selection
S Huda, S Alyahya, M Mohsin Ali, S Ahmad, J Abawajy, H Al-Dossari, J Yearwood
(2017), Vol. 6, pp. 2844-2858, IEEE access, Piscataway, N.J., C1
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
(2016), Vol. 55, pp. 376-390, Future generation computer systems, Amsterdam, The Netherlands, C1
S Huda, J Yearwood, H Jelinek, M Hassan, G Fortino, M Buckland
(2016), Vol. 4, pp. 9145-9154, IEEE Access, Piscataway, N.J., C1
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, R Broadhurst
(2014), Vol. 9, pp. 2878-2891, Journal of networks, Oulu, Finland, C1
S Huda, M Abdollahian, M Mammadov, J Yearwood, S Ahmed, I Sultan
(2014), Vol. 237, pp. 857-870, European journal of operational research, Amsterdam, The Netherlands, C1-1
S Huda, J Yearwood, R Togneri
(2014), Vol. 44, pp. 1962-1977, IEEE transactions on cybernetics, Piscataway, United States, C1-1
A Stranieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, H Jelinek
(2013), Vol. 58, pp. 185-193, Artificial Intelligence in Medicine, C1
Performance evaluation of multivariate non-normal process using metaheuristic approaches
S Ahmad, M Abdollahian, M Bhatti, S Huda, J Yearwood
(2012), Vol. 20, pp. 299-315, Journal of applied statistical science, Hauppage, N.Y., C1-1
Smart RFID reader protocol for malware detection
B Ray, S Huda, M Chowdhury
(2011), pp. 64-69, Proceedings - 2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, SNPD 2011, E1
S Huda, J Yearwood, A Stranieri
(2011), Vol. 113, pp. 43-52, ACSC 2011 :, Perth, W.A., E1-1
S Mukherjee, J Yearwood, P Vamplew, S Huda
(2011), pp. 24-30, SNPD 2011 : Proceedings of the 2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Sydney, N.S.W., E1-1
S Mukherjee, S Huda, J Yearwood
(2011), Vol. 368, pp. 169-183, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Sydney, N.S.W., E1-1
Multivariate control charts for surgical procedures
M Abdollahian, S Ahmad, S Huda
(2011), ISABEL '11: Proceedings of the International Symposium on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain, E1-1
Funded Projects at Deakin
Industry and Other Funding
Intelligent software engineering techniques to monitor and improve the quality of software development and managing the productivity of the developers
Dr Shamsul Huda, Prof John Yearwood, Prof Jemal Abawajy
- 2016: $20,000
- 2015: $40,000
Supervisions
Ahmed Falah
Thesis entitled: Improving PDF Maldoc Detection via Data-Driven Feature Engineering
Doctor of Philosophy (Information Technology), School of Information Technology