Biography
Shamsul Huda received his PhD degree in Computer Science from the Center for Informatics and Applied Optimization (CIAO), School of Science, Information Technology and Engineering (SITE), Federation University, in 2009 under the supervision of Professor John Yearwood, Head, School of IT, Deakin University and Professor Roberto Tognieri, Head, School of Electrical, Electronic and Computer Engineering, University of Western Australia (UWA). During his PhD, he jointly worked with CIAO, Signal Processing and Recognition Laboratory, UWA with Prof Roberto Tognieri where he spent significant time in UWA, at Perth, WA for completion of his PhD and gained research experiences from both universities.
He achieved “Certified Information System Security Professional (CISSP)” certification from the topmost organization of the world for training and certifications for cybersecurity: “The International Information System Security Certification Consortium, (ISC)² ”. He also has achieved a full membership of (ISC)² as part of the recognition of his contribution and expertise in cybersecurity areas and industry based research engagement.
Career highlights
- January 2016 to date: Lecturer, School of IT, Deakin University, Australia
- January 2015 to December 2015:Research Fellow, School of IT, Deakin University, Australia
- October 2015 to 2016 February: Development team member and consultant on behalf of Deakin, Sparx Systems, Australia
- January 2010 to 2014 December: Research Fellow, School of IT, Federation University, Australia
- February 2008 to August 2008: Programmer, ArgusConnect, Australia
- July 2003 to March 2009, Assistant professor, (2005-2009 on study leave), Department of Computer Science and Engineering, Khulna university of Engineering and Technology, Bangladesh
Research interests
- Cyber-security for critical infrastructure
- Secure authentication and communication protocols and network components for secure operations of industrial control systems
- Industrial IoT networks and security
- National and portfolio level cyber strategy development and Global cybersecurity indices
- Critical assets, services portfolio level risk assessments
- Endpoint security and anti-malware solutions for mobile system and client-based systems
- Software vulnerability analysis and detection
- Innovative strategies in teaching and learning, testing the effectiveness of innovation for learning design
Teaching interests
- Cyber Security Management
- Systems security
- Software requirement analysis and modelling
- Database management systems
- Networks and Communications
- Service oriented architecture
- Data Mining and Machine Learning
Units taught
- SIT725 Software Engineering
- SIT773 Software requirement analysis and modelling
- SIT202 Networks and Communications
- SIT737 Service oriented architecture
- SIT790/SIT792 Major Thesis/Minor thesis
- SIT207 Android Programming
- SIT382 Systems Security (current)
Knowledge areas
- Cyber security
- Critical infrastructure and IIoT security
- Cyber risk assessment for critical assets and services
- National and portfolio level cyber strategy development
- Global cybersecurity indices
- Artificial intelligence, Deep learning
- Software Engineering
- Malware
Professional activities
- Recent conference committee member:
- 5th North American International Conference on Industrial Engineering and Operations Management Detroit, Michigan, USA, August 10-14, 2020,
- http://ieomsociety.org/detroit2020/committee/
- 11th Annual International Conference on Industrial Engineering and Operations Management, Singapore, March 9-11.
- http://ieomsociety.org/singapore2021/committee/
- Journal Reviewer for:
- IEEE transaction on Industrial informatics,
- Information science
- IEEE access
- Future Generation Computer Systems
- Applied soft computing
Research groups
Member of Centre for Cyber Security Research and Innovation
Member of Security and PrivacY Research in IoT Lab (SPYRIT)
Member of Cyber Physical Systems (CPS) and the Internet of Things (IoT) group
Projects
- Obfuscation-resilient novel algorithms and techniques for the analysis, detection and prevention of emerging time variant malware, Crypto malware, Funding (2020): 30,000AUD by Innovation Agency in the Ministry of Education, Saudi Arabia.
- Cybersecurity risk modeling framework, detective and preventive measure in security operations for Industrial control systems, Critical Infrastructure, Smart grid.
- National and portfolio level cyber strategy development including risk assessment for critical assets at the national level:Vanuatu Cybersecurity Capacity Building Project, Cybersecurity Maturity Model for Nations; with the Oceania Cyber Security Centre and Global Cyber Security Capacity Centre, Oxford University, Funding (2020): $125K jointly with Melbourne University, Latrobe University and Federation University
Publications
M Alam, M Haque, M Hassan, S Huda, M Hassan, F Strickland, S AlQahtani
(2023), pp. 1-11, IEEE Transactions on Intelligent Transportation Systems, Piscataway, N.J., C1
A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
Z Aljabri, J Abawajy, S Huda
(2023), Vol. 2023, pp. 1-31, Wireless Communications and Mobile Computing, London, Eng., C1
Rimsha Asad, Saud Altaf, Shafiq Ahmad, Haitham Mahmoud, Shamsul Huda, Sofia Iqbal
(2023), Vol. 15, pp. 1-24, Sustainability, Basel, Switzerland, C1
Asmat Ullah, Muhammad Mohmand, Hameed Hussain, Sumaira Johar, Inayat Khan, Shafiq Ahmad, Haitham Mahmoud, Shamsul Huda
(2023), Vol. 23, pp. 1-18, Sensors, Basel, Switzerland, C1
A Privacy Frequent Itemsets Mining Framework for Collaboration in IoT Using Federated Learning
J Wu, Q Teng, S Huda, Y Chen, C Chen
(2023), Vol. 19, pp. 1-15, ACM Transactions on Sensor Networks, New York, N.Y., C1
A Novel Approach to Improve Software Defect Prediction Accuracy Using Machine Learning
I Mehmood, S Shahid, H Hussain, I Khan, S Ahmad, S Rahman, N Ullah, S Huda
(2023), Vol. 11, pp. 63579-63597, IEEE Access, Piscataway, N.J., C1
Fazli Khaliq, Muhammad Shabir, Inayat Khan, Shafiq Ahmad, Muhammad Usman, Muhammad Zubair, Shamsul Huda
(2023), Vol. 23, pp. 1-16, Sensors, Basel, Switzerland, C1
Non Functional Requirements Identification and Classification Using Transfer Learning Model
M Khan, M Khan, I Khan, S Ahmad, S Huda
(2023), Vol. 11, pp. 74997-75005, IEEE Access, Piscataway, N.J., C1
Near Feasibility Driven Adaptive Penalty Functions Embedded MOEA/D
A Khan, M Jan, M Sagheer, R Khanum, M Uddin, S Ahmad, S Huda
(2023), Vol. 11, pp. 105182-105213, IEEE Access, C1
A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection
N Choudhry, J Abawajy, S Huda, I Rao
(2023), Vol. 11, pp. 114680-114713, IEEE Access, Piscataway, N.J., C1
Advancing Text Summarization through the Utilization of Arbitrary Aspect Learning
Hou Ziwei, Bahadorreza Ofoghi, Nayyar Zaidi, Mammadov Musa, Huda Shamsul, Yearwood John
(2023), pp. 22-33, MDAI 2023 : Proceedings of the 20th International Conference on Modeling Decisions for Artificial Intelligence 2023, Umeå, Sweden, E1
M Hassan, S Huda, M Hassan, J Abawajy, A Alsanad, G Fortino
(2022), Vol. 77, pp. 70-80, Information Fusion, Amsterdam, The Netherlands, C1
S Sharmeen, S Huda, J Abawajy, C Ahmed, M Hassan, G Fortino
(2022), Vol. 9, pp. 7298-7310, IEEE Internet of Things Journal, C1
M Hassan, M Islam, M Uddin, G Ghoshal, M Hassan, S Huda, G Fortino
(2022), Vol. 127, pp. 462-472, Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications, Amsterdam, The Netherlands, C1
A global training model for beat classification using basic electrocardiogram morphological features
S Sumesh, J Yearwood, S Huda, S Ahmad
(2022), Vol. 70, pp. 4503-4521, Computers, Materials and Continua, Encino, Calif., C1
N Gunaratne, M Abdollahian, S Huda, M Ali, G Frontino
(2022), Vol. 6, pp. 329-340, IEEE Transactions on Green Communications and Networking, Piscataway, NJ, C1
M Hassan, W Ismail, A Chowdhury, S Hossain, S Huda, M Hassan
(2022), Vol. 78, pp. 10250-10274, Journal of Supercomputing, United States, C1
Y Ahmed, S Huda, B Al-Rimy, N Alharbi, F Saeed, F Ghaleb, I Ali
(2022), Vol. 14, pp. 1-15, Sustainability, Basel, Switzerland, C1
M Monem, M Alam, M Abdullah-Al-Wadud, M Hassan, S Huda, G Fortino
(2022), pp. 1-1, IEEE Transactions on Industrial Informatics, Piscataway, N.J., C1
Advanced Authentication Scheme with Bio-Key Using Artificial Neural Network
Z Rehman, S Altaf, S Ahmad, M Alqahtani, S Huda, S Iqbal
(2022), Vol. 14, pp. 1-14, Sustainability, Basel, Switzerland, C1
S Altaf, S Ahmad, M Zaindin, S Huda, S Iqbal, M Soomro
(2022), Vol. 14, Sustainability (Switzerland), C1
A Allahloh, M Sarfraz, M Alqahtani, S Ahmad, S Huda
(2022), Vol. 2022, Wireless Communications and Mobile Computing, C1
M Haroon, S Altaf, S Ahmad, M Zaindin, S Huda, S Iqbal
(2022), Vol. 14, Symmetry, C1
Shafiq Ahmad, Zia Rehman, Saud Altaf, Mazen Zaindin, Shamsul Huda, Muhammad Haroon, Sofia Iqbal
(2022), Vol. 14, SUSTAINABILITY, C1
Combining Innovative Technology and Context based Approaches in Teaching Software Engineering
S Huda, S Alyahya, L Pan, H Al-Dossari
(2022), Vol. 13, pp. 305-314, International Journal of Advanced Computer Science and Applications, C1
M Hassan, S Huda, S Sharmeen, J Abawajy, G Fortino
(2021), Vol. 17, pp. 2860-2870, IEEE Transactions on Industrial Informatics, C1
A Robust Deep-Learning-Enabled Trust-Boundary Protection for Adversarial Industrial IoT Environment
M Hassan, M Hassan, S Huda, V De Albuquerque
(2021), Vol. 8, pp. 9611-9621, IEEE Internet of Things Journal, C1
Improving malicious PDF classifier with feature engineering: A data-driven approach
A Falah, L Pan, S Huda, S Pokhrel, A Anwar
(2021), Vol. 115, pp. 314-326, Future Generation Computer Systems, C1
M Hassan, M Hassan, S Huda, M Uddin, A Gumaei, A Alsanad
(2021), Vol. 108, Applied Soft Computing, C1
An Unsupervised Model for Identifying and Characterizing Dark Web Forums
S Nazah, S Huda, J Abawajy, M Hassan
(2021), Vol. 9, pp. 112871-112892, IEEE Access, Piscataway, N.J., C1
An efficient, hybrid authentication using ecg and lightweight cryptographic scheme for wban
Z Rehman, S Altaf, S Ahmad, S Huda, A Al-Shayea, S Iqbal
(2021), Vol. 9, pp. 133809-133819, IEEE Access, C1
Lightweight authenticated encryption for cloud-assisted IoT applications
Z AlJabri, J Abawajy, S Huda
(2021), Vol. 740, pp. 295-299, EWCIS 2020 : Trends in wireless communication and information security : proceedings of EWCIS 2020, Ranchi, India, E1
S Sharmeen, S Huda, J Abawajy, M Hassan
(2020), Vol. 89, Applied Soft Computing Journal, C1
Shaila Sharmeen, Yahye Ahmed, Shamsul Huda, Bari Kocer, Mohammad Hassan
(2020), Vol. 8, pp. 24522-24534, IEEE Access, Piscataway, N.J., C1
M Hassan, A Gumaei, S Huda, A Almogren
(2020), Vol. 16, pp. 6154-6162, IEEE Transactions on Industrial Informatics, C1
Y Ahmed, B Koçer, S Huda, B Saleh Al-rimy, M Hassan
(2020), Vol. 167, Journal of Network and Computer Applications, C1
A robust cyberattack detection approach using optimal features of SCADA power systems in smart grids
A Gumaei, M Hassan, S Huda, M Hassan, D Camacho, J Del Ser, G Fortino
(2020), Vol. 96, Applied Soft Computing Journal, C1
Evolution of dark web threat analysis and detection: A systematic approach
S Nazah, S Huda, J Abawajy, M Hassan
(2020), Vol. 8, pp. 171796-171819, IEEE Access, C1
Human emotion recognition using deep belief network architecture
Mohammad Hassan, Md Alam, Md Uddin, Shamsul Huda, Ahmad Almogren, Giancarlo Fortino
(2019), Vol. 51, pp. 10-18, Information fusion, Amsterdam, The Netherlands, C1
S Huda, J Abawajy, B Al-Rubaie, L Pan, M Hassan
(2019), Vol. 101, pp. 1247-1258, Future Generation Computer Systems, C1
S Sharmeen, S Huda, J Abawajy
(2019), Vol. 322, pp. 1-8, Proceedings of the 2019 International Conference on Smart Power & Internet Energy Systems 25–27 April 2019, Deakin University, Melbourne, Australia, Melbourne, Victoria, E1
M Hassan, S Huda, J Yearwood, H Jelinek, A Almogren
(2018), Vol. 41, pp. 105-118, Information fusion, Amsterdam, The Netherlands, C1
A Framework for Software Defect Prediction and Metric Selection
S Huda, S Alyahya, M Mohsin Ali, S Ahmad, J Abawajy, H Al-Dossari, J Yearwood
(2018), Vol. 6, pp. 2844-2858, IEEE Access, C1
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
S Huda, R Islam, J Abawajy, J Yearwood, M Hassan, G Fortino
(2018), Vol. 83, pp. 193-207, Future Generation Computer Systems, C1
Malware Threats and Detection for Industrial Mobile-IoT Networks
S Sharmeen, S Huda, J Abawajy, W Ismail, M Hassan
(2018), Vol. 6, pp. 15941-15957, IEEE Access, C1
An Ensemble Oversampling Model for Class Imbalance Problem in Software Defect Prediction
S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, S Ahmad
(2018), Vol. 6, pp. 24184-24195, IEEE Access, C1
Human Activity Recognition from Body Sensor Data using Deep Learning
M Hassan, S Huda, M Uddin, A Almogren, M Alrubaian
(2018), Vol. 42, Journal of Medical Systems, United States, C1
S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss
(2018), Vol. 120, pp. 23-31, Journal of parallel and distributed computing, Amsterdam, The Netherlands, C1
S Huda, J Yearwood, M Hassan, A Almogren
(2018), Vol. 71, pp. 66-77, Applied Soft Computing Journal, C1
Identifying cyber threats to mobile-IoT applications in edge computing paradigm
J Abawajy, S Huda, S Sharmeen, M Hassan, A Almogren
(2018), Vol. 89, pp. 525-538, Future Generation Computer Systems, C1
N Gunaratne, M Abdollahian, S Huda
(2018), Vol. 738, pp. 295-300, ITNG 2018 : Proceedings of the International Conference on Information Technology - New Generations, Las Vegas, Nevada, E1
S Huda, S Miah, M Mehedi Hassan, R Islam, J Yearwood, M Alrubaian, A Almogren
(2017), Vol. 379, pp. 211-228, Information Sciences, C1
S Huda, J Abawajy, M Abdollahian, R Islam, J Yearwood
(2017), Vol. 29, Concurrency and Computation: Practice and Experience, C1
N Gunaratne, M Abdollahian, S Huda, J Yearwood
(2017), Vol. 55, pp. 4948-4962, International journal of production research, Abingdon, Eng., C1
A parallel framework for software defect detection and metric selection on cloud computing
M Ali, S Huda, J Abawajy, S Alyahya, H Al-Dossari, J Yearwood
(2017), Vol. 20, pp. 2267-2281, Cluster Computing, C1
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
(2016), Vol. 55, pp. 376-390, Future Generation Computer Systems, C1
S Huda, J Yearwood, H Jelinek, M Hassan, G Fortino, M Buckland
(2016), Vol. 4, pp. 9145-9154, IEEE Access, C1
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, R Broadhurst
(2014), Vol. 9, pp. 2878-2891, Journal of networks, Oulu, Finland, C1
S Huda, M Abdollahian, M Mammadov, J Yearwood, S Ahmed, I Sultan
(2014), Vol. 237, pp. 857-870, European journal of operational research, Amsterdam, The Netherlands, C1-1
S Huda, J Yearwood, R Togneri
(2014), Vol. 44, pp. 1962-1977, IEEE transactions on cybernetics, Piscataway, United States, C1-1
A Strainieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, H Jelinek
(2013), Vol. 58, pp. 185-193, Artificial intelligence in medicine, Amsterdam, The Netherlands, C1
Performance evaluation of multivariate non-normal process using metaheuristic approaches
S Ahmad, M Abdollahian, M Bhatti, S Huda, J Yearwood
(2012), Vol. 20, pp. 299-315, Journal of applied statistical science, Hauppage, N.Y., C1-1
Smart RFID reader protocol for malware detection
B Ray, S Huda, M Chowdhury
(2011), pp. 64-69, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, Sydney, N. S. W., E1
S Huda, J Yearwood, A Stranieri
(2011), Vol. 113, pp. 43-52, ACSC 2011 :, Perth, W.A., E1-1
S Mukherjee, J Yearwood, P Vamplew, S Huda
(2011), pp. 24-30, SNPD 2011 : Proceedings of the 2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Sydney, N.S.W., E1-1
S Mukherjee, S Huda, J Yearwood
(2011), Vol. 368, pp. 169-183, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Sydney, N.S.W., E1-1
Multivariate control charts for surgical procedures
M Abdollahian, S Ahmad, S Huda
(2011), ISABEL '11: Proceedings of the International Symposium on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain, E1-1
Rimsha Asad, Saud Altaf, Shafiq Ahmad, Adamali Shah Noor Mohamed, Shamsul Huda, Sofia Iqbal
(), Vol. 15, pp. 2714-2714, Sustainability, C1
Radio-Frequency-Identification-Based 3D Human Pose Estimation Using Knowledge-Level Technique
Saud Altaf, Muhammad Haroon, Shafiq Ahmad, Emad Nasr, Mazen Zaindin, Shamsul Huda, Zia Rehman
(), Vol. 12, pp. 374-374, Electronics, C1
Funded Projects at Deakin
Other Public Sector Funding
Kronos: Towards Fast Feedback Fuzzers for Discovering Vulnerabilities in Software Binaries
Prof Robin Ram Mohan Doss, Dr Shamsul Huda
Data61
- 2023: $20,000
- 2022: $13,333
- 2021: $6,667
Industry and Other Funding
Intelligent software engineering techniques to monitor and improve the quality of software development and managing the productivity of the developers
Dr Shamsul Huda, Prof John Yearwood, Prof Jemal Abawajy
King Saud University, Sparx Systems
- 2016: $20,000
- 2015: $40,000
Obfuscation-resilient Algorithm for Early Detection of Malicious Software
Prof Jemal Abawajy, Dr Shamsul Huda
Research and and Innovation Agency, Ministry of Education, Saudi Arabia
- 2021: $30,000
Other Funding Sources
Sharing Cybersecurity Data for Australian Research (SCReeD).
Prof Jemal Abawajy, Prof Chang-Tsun Li, Prof Gang Li, A/Prof William Yeoh, Dr Shamsul Huda, Dr Frank Jiang, Dr Jack Li
Cyber Security Research Centre Limited
- 2023: $12,500
- 2022: $10,320
Socrates: Software Security with a focus on critical technologies.
Dr Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, Dr Lennon Chang, A/Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang
Cyber Security Research Centre Limited
- 2023: $120,976
Supervisions
Ipshita Das
Thesis entitled: Developing a novel algorithm for the condition assessment of utility timber poles
Doctor of Philosophy (Engineering), School of Engineering
Shaila Sharmeen
Thesis entitled: Semi-Supervised Models for Android Malware Detection
Doctor of Philosophy (Information Technology), School of Information Technology
Saiba Nazah
Thesis entitled: Understanding the Characteristics of Dark Web Forum Using Machine Learning Techniques
Master of Science (Information Technology), School of Information Technology
Ahmed Falah
Thesis entitled: Improving PDF Maldoc Detection via Data-Driven Feature Engineering
Doctor of Philosophy (Information Technology), School of Information Technology