Dr Shamsul Huda

STAFF PROFILE

Position

Lecturer in Computer Science

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

shamsul.huda@deakin.edu.au
+61 3 924 45509

Biography

Shamsul Huda received his PhD degree in Computer Science from the Center for Informatics and Applied Optimization (CIAO), School of Science, Information Technology and Engineering (SITE), Federation University, in 2009 under the supervision of Professor John Yearwood, Head, School of IT, Deakin University and Professor Roberto Tognieri, Head, School of Electrical, Electronic and Computer Engineering, University of Western Australia (UWA). During his PhD, he jointly worked with CIAO, Signal Processing and Recognition Laboratory, UWA with Prof Roberto Tognieri where he spent significant time in UWA, at Perth, WA for completion of his PhD and gained research experiences from both universities.
He achieved “Certified Information System Security Professional (CISSP)” certification from the topmost organization of the world for training and certifications for cybersecurity: “The International Information System Security Certification Consortium, (ISC)² ”. He also has achieved a full membership of (ISC)² as part of the recognition of his contribution and expertise in cybersecurity areas and industry based research engagement.

Read more on Shamsul's profile

Career highlights

  • January 2016  to date: Lecturer, School of IT, Deakin University, Australia 
  • January 2015  to December 2015:Research Fellow, School of IT, Deakin University, Australia 
  • October  2015 to 2016 February: Development team member and consultant on behalf of Deakin, Sparx Systems, Australia 
  • January 2010   to 2014 December: Research Fellow, School of IT, Federation University, Australia
  • February 2008  to August 2008: Programmer, ArgusConnect, Australia
  • July  2003  to March 2009, Assistant professor, (2005-2009 on study leave), Department of Computer Science and Engineering, Khulna university of Engineering and Technology, Bangladesh

Research interests

  • Cyber-security for critical infrastructure
  • Secure authentication and communication protocols and network components for secure operations of industrial control systems
  • Industrial IoT networks and security
  • National and portfolio level cyber strategy development and Global cybersecurity indices
  • Critical assets, services portfolio level risk assessments
  • Endpoint security and anti-malware solutions for mobile system and client-based systems
  • Software vulnerability analysis and detection
  • Innovative strategies in teaching and learning, testing the effectiveness of innovation for learning design

Teaching interests

  • Cyber Security Management
  • Systems security
  • Software requirement analysis and modelling
  • Database management systems
  • Networks and Communications
  • Service oriented architecture
  • Data Mining and Machine Learning

Units taught

  • SIT725 Software Engineering
  • SIT773 Software requirement analysis and modelling
  • SIT202 Networks and Communications
  • SIT737 Service oriented architecture
  • SIT790/SIT792 Major Thesis/Minor thesis
  • SIT207 Android Programming
  • SIT382 Systems Security (current)

Knowledge areas

  • Cyber security
  • Critical infrastructure and IIoT security
  • Cyber risk assessment for critical assets and services
  • National and portfolio level cyber strategy development
  • Global cybersecurity indices
  • Artificial intelligence, Deep learning
  • Software Engineering
  • Malware

Professional activities

  • Recent conference committee member:
  • 5th North American International Conference on Industrial Engineering and Operations Management Detroit, Michigan, USA, August 10-14, 2020,
  • http://ieomsociety.org/detroit2020/committee/
  • 11th Annual International Conference on Industrial Engineering and Operations Management, Singapore, March 9-11.
  • http://ieomsociety.org/singapore2021/committee/
  • Journal Reviewer for:
  • IEEE transaction on Industrial informatics,
  • Information science
  • IEEE access
  • Future Generation Computer Systems
  • Applied soft computing

Research groups

Member of Centre for Cyber Security Research and Innovation
Member of Security and PrivacY Research in IoT Lab (SPYRIT)
Member of Cyber Physical Systems (CPS) and the Internet of Things (IoT) group

Projects

  • Obfuscation-resilient novel algorithms and techniques for the analysis, detection and prevention of emerging time variant malware, Crypto malware, Funding (2020): 30,000AUD by Innovation Agency in the Ministry of Education, Saudi Arabia.
  • Cybersecurity risk modeling framework, detective and preventive measure in security operations for Industrial control systems, Critical Infrastructure, Smart grid.
  • National and portfolio level cyber strategy development including risk assessment for critical assets at the national level:Vanuatu Cybersecurity Capacity Building Project, Cybersecurity Maturity Model for Nations; with the Oceania Cyber Security Centre and Global Cyber Security Capacity Centre, Oxford University, Funding (2020): $125K jointly with Melbourne University, Latrobe University and Federation University

Publications

Filter by

2021

Improving malicious PDF classifier with feature engineering: A data-driven approach

Ahmed Falah, Lei Pan, Shamsul Huda, Shiva Pokhrel, Adnan Anwar

(2021), Vol. 115, pp. 314-326, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article
2020

An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches

S Sharmeen, S Huda, J Abawajy, M Hassan

(2020), Vol. 89, pp. 1-20, Applied soft computing journal, Amsterdam, The Netherlands, C1

journal article

Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches

Shaila Sharmeen, Yahye Ahmed, Shamsul Huda, Bari Kocer, Mohammad Hassan

(2020), Vol. 8, pp. 24522-24534, IEEE Access, Piscataway, N.J., C1

journal article

Increasing the trustworthiness in the Industrial IoT Networks through a reliable cyber-attack detection model

Mohammad Hassan, Abdu Gumaei, M Huda, Ahmad Almogren

(2020), Vol. 16, pp. 6154-6162, IEEE Transactions on Industrial Informatics, Piscataway, N.J., C1

journal article

A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection

Yahye Ahmed, Bar?? Koer, Shamsul Huda, Bander Saleh Al-rimy, Mohammad Hassan

(2020), Vol. 167, pp. 1-14, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal article

An adaptive trust boundary protection for IIoT networks using deep-learning feature extraction based semi-supervised model

Mohammad Hassan, Shamsul Huda, Shaila Sharmeen, Jemal Abawajy, Giancarlo Fortino

(2020), pp. 1-10, IEEE Transactions on Industrial Informatics, Piscataway, N.J., C1

journal article

A Robust Deep Learning Enabled Trust-boundary Protection for Adversarial Industrial IoT Environment

Mohammad Hassan, Md Hassan, M Huda, Victor de Albuquerque

(2020), Vol. 8, pp. 1-12, IEEE Internet of Things Journal, Piscataway, N.J., C1

journal article

A robust cyberattack detection approach using optimal features of SCADA power systems in smart grids

A Gumaei, M Hassan, S Huda, M Hassan, D Camacho, J Del Ser, G Fortino

(2020), Vol. 96, pp. 1-18, Applied soft computing journal, Amsterdam, The Netherlands, C1

journal article

Evolution of Dark Web threat analysis and detection: a systematic approach

Saiba Nazah, Md Huda, Jemal Abawajy, Mohammad Hassan

(2020), Vol. 8, pp. 171796-171819, IEEE Access, Piscataway, N.J., C1

journal article
2019

Human emotion recognition using deep belief network architecture

Mohammad Hassan, Md Alam, Md Uddin, Shamsul Huda, Ahmad Almogren, Giancarlo Fortino

(2019), Vol. 51, pp. 10-18, Information fusion, Amsterdam, The Netherlands, C1

journal article

Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks

S Huda, J Abawajy, B Al-Rubaie, L Pan, M Hassan

(2019), Vol. 101, pp. 1247-1258, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

Identifying malware on cyber physical systems by incorporating semi-supervised approach and deep learning

S Sharmeen, S Huda, J Abawajy

(2019), Vol. 322, pp. 1-8, Proceedings of the 2019 International Conference on Smart Power & Internet Energy Systems 25?27 April 2019, Deakin University, Melbourne, Australia, Melbourne, Victoria, E1

conference
2018

Multistage fusion approaches based on a generative model and multivariate exponentially weighted moving average for diagnosis of cardiovascular autonomic nerve dysfunction

M Hassan, S Huda, J Yearwood, H Jelinek, A Almogren

(2018), Vol. 41, pp. 105-118, Information fusion, Amsterdam, The Netherlands, C1

journal article

A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection

S Huda, R Islam, J Abawajy, J Yearwood, M Hassan, G Fortino

(2018), Vol. 83, pp. 193-207, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

Malware threats and detection for industrial mobile-IoT networks

S Sharmeen, S Huda, J Abawajy, W Ismail, M Hassan

(2018), Vol. 6, pp. 15941-15957, IEEE access, Piscataway, N.J., C1

journal article

An ensemble oversampling model for class imbalance problem in software defect prediction

S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, S Ahmad

(2018), Vol. 6, pp. 24184-24195, IEEE access, Piscataway, N.J., C1

journal article

Human activity recognition from body sensor data using deep learning

Mohammad Hassan, Shamsul Huda, Md Uddin, Ahmad Almogren, Majed Alrubaian

(2018), Vol. 42, pp. 1-8, Journal of medical systems, New York, N.Y., C1

journal article

A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network

S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss

(2018), Vol. 120, pp. 23-31, Journal of parallel and distributed computing, Amsterdam, The Netherlands, C1

journal article

Securing the operations in SCADA-IoT platform based industrial control system using ensemble of deep belief networks

Shamsul Huda, John Yearwood

(2018), Vol. 71, pp. 66-77, Applied soft computing, Amsterdam, The Netherlands, C1

journal article

Identifying cyber threats to mobile-IoT applications in edge computing paradigm

jemal Abawajy, M Huda, Shaila Sharmeen, Mohammad Hassan, Ahmad Almogren

(2018), Vol. 89, pp. 525-538, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA)

N Gunaratne, M Abdollahian, S Huda

(2018), Vol. 738, pp. 295-300, ITNG 2018 : Proceedings of the International Conference on Information Technology - New Generations, Las Vegas, Nevada, E1

conference
2017

Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data

M Huda, S Miah, M Hasaan, R Islam, J Yearwood, M Alrubaian, A Almogren

(2017), Vol. 379, pp. 211-228, Information sciences, Amsterdam, The Netherlands, C1

journal article

A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression

S Huda, J Abawajy, M Abdollahian, R Islam, J Yearwood

(2017), Vol. 29, pp. 1-18, Concurrency Computation, Chichester, Eng., C1

journal article

Exponentially weighted control charts to monitor multivariate process variability for high dimensions

N Gunaratne, M Abdollahian, S Huda, J Yearwood

(2017), Vol. 55, pp. 4948-4962, International journal of production research, Abingdon, Eng., C1

journal article

A parallel framework for software defect detection and metric selection on cloud computing

M Ali, S Huda, J Abawajy, S Alyahya, H Al-Dossari, J Yearwood

(2017), Vol. 20, pp. 2267-2281, Cluster computing, New York, N.Y., C1

journal article

A framework for software defect prediction and metric selection

S Huda, S Alyahya, M Mohsin Ali, S Ahmad, J Abawajy, H Al-Dossari, J Yearwood

(2017), Vol. 6, pp. 2844-2858, IEEE access, Piscataway, N.J., C1

journal article
2016

Hybrids of support vector machine wrapper and filter based framework for malware detection

S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood

(2016), Vol. 55, pp. 376-390, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

A hybrid feature selection with ensemble classification for imbalanced healthcare data: a case study for brain tumor diagnosis

S Huda, J Yearwood, H Jelinek, M Hassan, G Fortino, M Buckland

(2016), Vol. 4, pp. 9145-9154, IEEE Access, Piscataway, N.J., C1

journal article
2014

A hybrid wrapper-filter approach for malware detection

M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, R Broadhurst

(2014), Vol. 9, pp. 2878-2891, Journal of networks, Oulu, Finland, C1

journal article

A hybrid wrapper-filter approach to detect the source(s) of out-of-control signals in multivariate manufacturing process

S Huda, M Abdollahian, M Mammadov, J Yearwood, S Ahmed, I Sultan

(2014), Vol. 237, pp. 857-870, European journal of operational research, Amsterdam, The Netherlands, C1-1

journal article

Hybrid metaheuristic approaches to the expectation maximization for estimation of the hidden markov model for signal modeling

S Huda, J Yearwood, R Togneri

(2014), Vol. 44, pp. 1962-1977, IEEE transactions on cybernetics, Piscataway, United States, C1-1

journal article
2013

An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy

A Stranieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, H Jelinek

(2013), Vol. 58, pp. 185-193, Artificial Intelligence in Medicine, C1

journal article
2012

Performance evaluation of multivariate non-normal process using metaheuristic approaches

S Ahmad, M Abdollahian, M Bhatti, S Huda, J Yearwood

(2012), Vol. 20, pp. 299-315, Journal of applied statistical science, Hauppage, N.Y., C1-1

journal article
2011

Smart RFID reader protocol for malware detection

B Ray, S Huda, M Chowdhury

(2011), pp. 64-69, Proceedings - 2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence Networking and Parallel Distributed Computing, SNPD 2011, E1

conference

Hybrid wrapper-filter approaches for input feature selection using maximum relevance-minimum redundancy and artificial neural network input gain measurement approximation (ANNIGMA)

S Huda, J Yearwood, A Stranieri

(2011), Vol. 113, pp. 43-52, ACSC 2011 :, Perth, W.A., E1-1

conference

Reinforcement learning approach to AIBO robot's decision making process in Robosoccer's goal keeper problem

S Mukherjee, J Yearwood, P Vamplew, S Huda

(2011), pp. 24-30, SNPD 2011 : Proceedings of the 2011 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Sydney, N.S.W., E1-1

conference

A reinforcement learning approach with spline-fit object tracking for AIBO robot's high level decision making

S Mukherjee, S Huda, J Yearwood

(2011), Vol. 368, pp. 169-183, SNPD 2011 : Proceedings of the 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Sydney, N.S.W., E1-1

conference

Multivariate control charts for surgical procedures

M Abdollahian, S Ahmad, S Huda

(2011), ACM International Conference Proceeding Series, E1-1

conference

Funded Projects at Deakin

Industry and Other Funding

Intelligent software engineering techniques to monitor and improve the quality of software development and managing the productivity of the developers

Dr Shamsul Huda, Prof John Yearwood, Prof Jemal Abawajy

  • 2016: $20,000
  • 2015: $40,000

Supervisions

Associate Supervisor
2020

Ahmed Falah

Thesis entitled: Improving PDF Maldoc Detection via Data-Driven Feature Engineering

Doctor of Philosophy (Information Technology), School of Information Technology