About
98
Publications
59,557
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,114
Citations
Introduction
Dr Kayes is a Lecturer in Cyberecurity in the Department of Computer Science and Information Technology, La Trobe University, Australia. He received his PhD in Computer Science from Swinburne University of Technology, Australia in 2014, and his BSc in Computer Science and Engineering from Chittagong University of Engineering and Technology in 2005.
His research interests include data privacy, IoT security, cloud and fog security, and malware/ransomware detection and defence.
Current institution
Additional affiliations
February 2017 - August 2017
February 2017 - February 2019
December 2014 - February 2015
Education
April 2010 - September 2014
January 2001 - November 2005
Publications
Publications (98)
In modern communication environments, the ability to provide access control to information resources and software services in a context-aware manner is crucial. By leveraging the dynamically changing context information, we can achieve context-specific control over access to such resources and services, better satisfying the security and privacy re...
Situation-aware applications need to capture relevant context information and user intention or purpose, to provide situation-specific access to software services. As such, a situation-aware access control approach coupled with purpose-oriented information is of critical importance. However, modelling purpose-oriented situations is a challenging ta...
New opportunities have been created for the management of critical situations utilizing the Internet of Things (IoT). However, one of the difficulties in providing services for critical situation management using IoT is that access will often be needed by users at the critical events, where access to data and resources is usually restricted by mean...
In today's dynamic ICT environments, the ability to control users’ access to information resources and services has become ever important. On the one hand, it should provide flexibility to adapt to the users’ changing needs, while on the other hand, it should not be compromised. The user is often faced with different contexts and environments that...
Computing technologies are increasingly dynamic and ubiquitous in everyday life nowadays. Context information plays a crucial role in such dynamically changing environments and the different types of contextual conditions bring new challenges to context-sensitive access control. This information mostly can be derived from the crisp sets. For exampl...
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from unauthorized access. A cloud-based access control approach brings significant challenges in terms of communication overhead, high latency, and complete reliance. In this paper, we propose a Fog-Based Adap...
Although several machine learning driven solutions are deemed to be effective at detecting data breaches, the recent proliferation in data breach incidents resulting from cyber attacks demands an updated, thorough analysis of machine learning (ML) based data breach countermeasures to identify research gaps and guide future studies. In view of this,...
This study proposes an innovative approach to address the Capacitated Vehicle Routing Problem with Time Windows (CVRPTW) by integrating Reinforcement Learning (RL) into Evolutionary Algorithms (EAs), forming the Reinforcement Learning-assisted EA (RL-EA). While traditional EAs struggle with scalability and convergence speed, RL offers promise in dy...
With the Internet of Things (IoT) generating vast amounts of data, privacy breaches have become increasingly prevalent, exposing individuals to serious risks such as identity theft and life-threatening situations. This research addresses the challenge of identifying cybersecurity threats and vulnerabilities leading to privacy breaches, as evidenced...
Building a secure and privacy-preserving health data sharing framework is a topic of great interest in the healthcare sector, but its success is subject to ensuring the privacy of user data. We clarified the definitions of privacy, confidentiality and security (PCS) because these three terms have been used interchangeably in the literature. We foun...
Privacy breaches have become increasingly prevalent, exposing individuals to significant risks. These breaches can have far-reaching consequences, including identity theft and life-threatening situations. Several studies have analysed data and privacy breaches and presented detection or prevention techniques to combat these breaches. However, becau...
Data-intensive products and services aim to turn big data to a value or strategic asset for the organizations. However, the inherent risk and cost of storing and managing a massive amount of data undermine the value creation from such products and services. Consequently, organizations need to adopt an appropriate data governance program to establis...
The advancement of modern Operating Systems (OSs), and the popularity of personal computing devices with Internet connectivity have facilitated the proliferation of ransomware attacks. Ransomware has evolved from executable programs encrypting user files, to novel attack vectors including fileless command scripts, information exfiltration and human...
Emails are the most popular and efficient communication method that makes them vulnerable to misuse. Federated learning (FL) provides a decentralized machine learning (ML) model, where a central server coordinates clients that collaboratively train a shared ML model. This paper proposes Federated Phishing Filtering (FPF) technique based on federate...
Emails are the most popular and efficient communication method that makes them vulnerable to misuse. Federated learning (FL) provides a decentralized machine learning (ML) model, where a central server coordinates clients that collaboratively train a shared ML model. This paper proposes Federated Phishing Filtering (FPF) technique based on federate...
Streaming data are continuously generated by multiple Internet of Things (IoT) sources, e.g., sensors, mobile devices, etc., and sent simultaneously to relevant applications to be processed in real time in a continuous and timely fashion. Existing research has dealt with the integration of IoT streaming data from multiple sources. Some of the earli...
The purpose of this study is to investigate the effects of contextual features on automatic detection accuracy of online recruitment frauds in Australian job market. In addition, the study aims to unearth the significance of localisation of such approaches. The study first generates a dataset based on a local and semi-structured advertising platfor...
During the onset of COVID-19 pandemic, the social media was flooded with misinformation. Irrespective of the type of the misinformation, such contents played a significant role in increasing confusion among people in the middle of an ongoing crisis. The purpose of the study is to investigate the nature of a specific type of misinformation, i.e., ru...
Although ransomware has been around since the early days of personal computers, its sophistication and aggression have increased substantially over the years. Ransomware, as a type of malware to extort ransom payments from victims, has evolved to deliver payloads in different attack vectors and on multiple platforms, and creating repeated disruptio...
Ransomware attacks are often catastrophic, yet existing reactive and preventative measures could only partially mitigate ransomware damage, often not in a timely manner, and often cannot prevent the novel attack vectors. Many of them were program-centric or data-centric and did not take into consideration user intention or consent. In this paper, w...
Fog computing is a new emerging technology that complements the cloud and extends the services of cloud computing to be closer to the end devices. The cloud is usually located far from the devices which use their services and some of the recent research suggests that using a fog server as a nearby lightweight middleware can bridge the gap and provi...
Recommendation systems have recently gained a lot of popularity in various industries such as entertainment and tourism. They can act as filters of information by providing relevant suggestions to the users through processing heterogeneous data from different networks. Many travelers and tourists routinely rely on textual reviews, numerical ratings...
Wireless, sensor and actuator technologies are often central to sensing or communication critical systems [...]
The purpose of this paper is to analyse the effects of predatory approach words in the detection of cyberbullying and to propose a mechanism of generating a dictionary of such approach words. The research incorporates analysis of chat logs from convicted felons, to generate a dictionary of sexual approach words. By analysing data across multiple so...
The website of a university is considered to be a virtual gateway to provide primary resources to its stakeholders. It can play an indispensable role in disseminating information about a university to a variety of audience at a time. Thus, the quality of an academic website requires special attention to fulfil the users’ need. This paper presents a...
A programming contest generally involves the host presenting a set of logical and mathematical problems to the contestants. The contestants are required to write computer programs that are capable of solving these problems. An online judge system is used to automate the judging procedure of the programs that are submitted by the users. Online judge...
The Internet of Things (IoT) is a rapidly emerging field of technologies that delivers numerous cutting-edge solutions in various domains including the critical infrastructures. Thanks to the IoT, the conventional power system network can be transformed into an effective and smarter energy grid. In this article, we review the architecture and funct...
In Ethereum blockchain, smart contracts are immutable, public, and distributed. However, they are subject to many vulnerabilities stemming from coding errors made by developers. Seven cybersecurity incidents occurred in Ethereum smart contracts between 2016 and 2018, which led to financial losses estimated to be over US$ 289 million. Reentrancy vul...
In 2017, a Price Waterhouse report on intelligent cities advised that technology would be a key enabler for efficient management of resources for overpopulated cities. The increased reliance on technology to drive daily lives of people is the main reason why many believe that smart technology is a major part of intelligent cities. By design, intell...
In this paper, we introduce a new framework for identifying the most influential people from social sensor networks. Selecting influential people from social networks is a complicated task as it depends on many metrics like the network of friends, followers, reactions, comments, shares, etc. (e.g., friends-of-a-friend, friends-of-a-friend-of-a-frie...
As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick to exploit the security gaps that many devices are inherently designed with. Users cannot be expected to tackle this threat alone, and many current solutions available for network monitoring are simply not accessible or can be difficult to implement f...
The COVID-19 outbreak has focused attention on the use of social distancing as the primary defence against community infection. Forcing social animals to maintain physical distance has presented significant challenges for health authorities and law enforcement. Anecdotal media reports suggest widespread dissatisfaction with social distancing as a p...
Traditional non-semantic file systems are not sufficient in protecting file systems against attacks, either caused by ransomware attacks or software-related defects. Furthermore, outbreaks of new malware often cannot provide a large quantity of training samples for machine-learning-based approaches to counter malware campaigns. The malware defense...
The Internet of Things (IoT) has recently received considerable interest due to the development of smart technologies in today’s interconnected world. With the rapid advancement in Internet technologies and the proliferation of IoT sensors, myriad systems and applications generate data of a massive volume, variety and velocity which traditional dat...
Due to the substantial growth of internet users and its spontaneous access via electronic devices, the amount of electronic contents has been growing enormously in recent years through instant messaging, social networking posts, blogs, online portals and other digital platforms. Unfortunately, the misapplication of technologies has increased with t...
The rapid growth of Global Positioning System (GPS) and availability of real-time Geo-located data allow the mobile devices to provide information which leads towards the Location Based Services (LBS). The need for providing suggestions to personals about the activities of their interests, the LBS contributing more effectively to this purpose. Reco...
Due to the substantial growth of internet users and its spontaneous access via electronic devices, the amount of electronic contents is growing enormously in recent years through instant messaging, social networking posts, blogs, online portals, and other digital platforms. Unfortunately, the misapplication of technologies has boosted with this rap...
Software-Defined Networking (SDN) offers an abstract view of the network and assists network operators to control the network traffic and the associated network resources more effectively. For the past few years, SDN has shown a lot of merits in diverse fields of applications, an important one being the Wireless Body Area Network (WBAN) for healthc...
Nowadays, public gatherings and social events are an integral part of a modern city life. To run such events seamlessly, it requires real time mining and monitoring of causally related events so that the management can make informed decisions and take appropriate actions. The automatic detection of event causality from short text such as tweets cou...
In a computing context, cybersecurity is undergoing massive shifts in technology and its operations in recent days, and data science is driving the change. Extracting security incident patterns or insights from cybersecurity data and building corresponding data-driven model, is the key to make a security system automated and intelligent. To underst...
This paper formulates the problem of a rule-based machine learning method to discover the behavioral rules of individual smartphone users to provide context-aware intelligent services. Smartphones nowadays are considered as one of the most important Internet-of-Things (IoT) devices for providing various context-aware personalized services. These de...
Nowadays, mobile telephony interruptions in our daily life activities are common because of the inappropriate ringing notifications of incoming phone calls in different contexts. Such interruptions may impact on the work attention not only for the mobile phone owners, but also for the surrounding people. Decision tree is the most popular machine-le...
Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an overwhelming flow of data and services, which has shifted the access control paradigm from a fixed desktop environment to dynamic cloud environments. Fog computing is associated with a new access control paradigm to reduce the overhead costs by moving the e...
The COVID-19 outbreak has focused attention on the use of social distancing as the primary defence against community infection, yet forcing social animals to maintain that physical distance has presented significant challenges for health authorities and law enforcement. Anecdotal media reports suggest widespread dissatisfaction with social distanci...
This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT platforms and support service-oriented modelling at high levels of abstraction where fundamental SOA theories and techniques are ful...
In the era of IoT, the world of connected experiences is created by the convergence of multiple technologies including real-time analytics, machine learning, and commodity sensors and embedded systems. However, with the proliferation of these IoT technologies and devices, there are challenges in integrating, indexing and managing time-series data f...
Electronic crimes like data breaches in healthcare systems are often a fundamental failures of access control mechanisms. Most of current access control systems do not provide an accessible way to engage users in decision making processes, about who should have access to what data and when. We advocate that a policy ontology can contribute towards...
In the cyberspace environment, access control is one of the foremost fundamental safeguards used to prevent unauthorized access and to minimize the impact from security breaches. Fog computing preserves many benefits for the integration of both internet of things (IoT) and cloud computing platforms. Security in Fog computing environment remains a s...
Although the current ride hailing services have revolutionized the transportation industry in today's world, they are extremely centralized. Central authority has all the control and maintains data about the users. Such platforms raise concerns about the service policies and data reliability. In case the central server faces data tampering or ranso...
Due to the rapid advancement in Internet of Things (IoT), myriad systems generate data of massive volume, variety and velocity which traditional databases are unable to manage effectively. Many organizations need to deal with these massive datasets that encounter different types of data (e.g., IoT streaming data, static data) in different formats c...
Autonomous robots, such as unmanned aerial or ground robots, are vulnerable to cyber attacks since they use sensor data heavily for their path planning and control. Furthermore, consensus is critical for resilient coordination and communication of robots in multi-robot networks against a specific adversarial attack called the spoofing attack, where...
The establishment of Bitcoin in 2008 has introduced Blockchain technology to become the predominant new ways in digital transactions in many fields, such as energy, healthcare, and financial services. Although blockchain technology promised many advantages, it has suffered from various attacks with significant financial loses. We analyse 65 cyberse...
Distributed Ledger Technology (DLT) has emerged as one of the most disruptive technologies in the last decade. It promises to change the way people do their business, track their products, and manage their personal data. Though the concept of DLT was first implemented in 2009 as Bitcoin, it has gained significant attention only in the past few year...
The electronic calendar is a valuable resource nowadays for managing our daily life appointments or schedules, also known as events, ranging from professional to highly personal. Researchers have studied various types of calendar events to predict smartphone user behavior for incoming mobile communications. However, these studies typically do not t...
Blockchain technology has become one of the most popular technologies for maintaining digital transactions. From the foundation of Bitcoin to the now predominant smart contract, blockchain technology promises to induce a shift in thought about digital transactions in many fields, such as energy, healthcare, Internet of Things, cybersecurity, financ...
The electronic calendar is a valuable resource nowadays for managing our daily life appointments or schedules, also known as events, ranging from professional to highly personal. Researchers have studied various types of calendar events to predict smartphone user behavior for incoming mobile communications. However, these studies typically do not t...
Nowadays, mobile telephony interruptions in our daily life activities are common because of the inappropriate ringing notifications of incoming phone calls in different contexts. Such interruptions may impact on the work attention not only for the mobile phone owners but also the surrounding people. Decision tree is the most popular machine learnin...
The worldwide interconnected objects, called Internet of Things (IoTs), have been increasingly growing in the last several years. Different social media platforms and devices are continuously generating data about individuals and facilitate the technological and the social convergence of their Internet-based data and services with globalized users....
Due to the increasing popularity of recent advanced features and context-awareness in smart mobile phones, the contextual data relevant to users’ diverse activities with their phones are recorded through the device logs. Modeling and predicting individual’s smartphone usage based on contexts, such as temporal, spatial, or social information, can be...
Late modern societies are now dependent on innumerable digitally networked technologies, yet there are intractable incongruencies between the technologies that we develop, and the corresponding technological literacies of users. This disjuncture has greatly increased the scope and scale of the risks to which globalized publics are exposed. With pub...
Astroturfing is one of the most impactful threats on today’s internet. It is the process of masking and portraying a doctored message to the general population in a way as though it originated from the grass-root level. The concept of astroturfing detection is started to gain popularity among researchers in social media, e-commerce and politics. Wi...
Astroturfing is one of the most impactful threats on today's internet. It is the process of masking and portraying a doctored message to the general population in a way as though it originated from the grass-root level. The concept of astroturfing detection is started to gain popularity among researchers in social media, e-commerce and politics. Wi...
Due to the rapid advancement in Internet of Things (IoT), myriad systems generate data of massive volume, variety and velocity which traditional databases are unable to manage effectively. Many organizations need to deal with these massive datasets that encounter different types of data (e.g., IoT streaming data, static data) in different formats c...
Due to the proliferation of data and services in everyday
life, we face challenges to ascertain all the necessary contexts and associated contextual conditions and enable applications to utilize relevant
information about the contexts. The ability to control context-sensitive
access to data resources has become ever more important as the form of
th...
Due to the proliferation of data and services in everyday life, we face challenges to ascertain all the necessary contexts and associated contextual conditions and enable applications to utilize relevant information about the contexts. The ability to control context-sensitive access to data resources has become ever more important as the form of th...
With the proliferation of data and services in today’s
dynamic computing environments, accessing data from
multiple sources and consequently providing appropriate integrated
results to the users has become a key challenge, often
involving large processing overheads and administrative costs.
The traditional context-sensitive access control models ha...
In role-based access control, roles are mostly organized
in static hierarchies and users are authorized to play such
roles in order to exercise the organizational functions. However,
some of these roles cannot be organized in the same way in
static hierarchies as the authorizations granted to such roles are
strictly related to the dynamically chang...
Context information plays a crucial role in dynamically changing environments and the different types of contextual conditions bring new challenges to access control. This information mostly can be derived from the crisp sets. For example, we can utilize a crisp set to derive a patient and nurse are co-located in the general ward of the hospital or...
Real time road traffic update is highly desirable for city dwellers, commuters, tourists and travelers. In this paper, we propose a novel methodology for estimating traffic conditions at road intersections. Our methodology involves crowd sourcing approach for traffic estimation as well as utilization of conditional probability distribution of traff...
In today's dynamic ICT environments, the ability to control users' access to resources becomes ever important. On the one hand, it should adapt to the users' changing needs; on the other hand, it should not be compromised. Therefore, it is essential to have a flexible access control model, incorporating dynamically changing context information. Tow...
Malware, which is a malevolent software, mostly programmed by attackers for either disrupting the normal computer operation or gaining access to private computer systems. A malware detector determines the malicious intent of a program and thereafter, stops executing the program if the program is malicious. While a substantial number of various malw...
Context-awareness is an important aspect of the dynamically changing environments and the relationship context information brings new benefits to the access control systems. Existing relationship-aware access control approaches are highly domain-specific and consider the expression of access control policies in terms of the relationship context inf...
Context-awareness is an important aspect of the dynamic environments and the different types of contextual information bring new benefits to the access control systems. By leveraging this dynamically changing information, we can achieve context-specific control over access to resources or software services. This thesis introduces a context-aware ac...
Situation-aware applications need to capture relevant context information and user intention or purpose, to provide situation-specific access to software services. As such, a situation-aware access control approach coupled with purpose-oriented information is of critical importance. Existing approaches are highly domain-specific and they control ac...
In the present age, context-awareness is an important aspect of the dynamic environments and the different types of dynamic context information bring new challenges to access control systems. Therefore, the need for the new access control frameworks to link their decision making abilities with the context-awareness capabilities have become increasi...
In modern communication environments, the ability to provide access control to services in a context-aware manner is crucial. By leveraging the dynamically changing context information, we can achieve context-specific control over access to services, better satisfying the security and privacy requirements of the stakeholders. In this paper, we intr...
Due to the rapid advancement of communication technologies, the ability to support access control to resources in open and dynamic environments is crucial. On the one hand, users demand access to resources and services in an anywhere, anytime fashion. On the other hand, additional challenges arise when ensuring privacy and security requirements of...
Feature extraction is one of the significant parts of image processing. In the literature, several research efforts have been proposed different feature extraction methods using edge detection, corner detection, etc. One of the key limitations of the existing approaches is the absence of an appropriate feature extraction method. In this paper, we t...
Context-aware systems acquire and integrate multi-faceted knowledge about their environments in order to make decisions. A number of attempts to build frameworks for context-aware systems have been made, but these have not provided adequate support for context-aware access control. In this paper, we present a framework for context-aware access cont...
Questions
Question (1)
In today's open and dynamic environments, the applications need to capture relationship context information, in order to provide relation-specific access to information resources or software services. What is the best way to capture relationship information, from which sources, and what are the different types of such information?