A. S. M. Kayes

A. S. M. Kayes
  • Lecturer in Cyber Security (La Trobe University Australia)
  • Lecturer at La Trobe University

About

98
Publications
59,557
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,114
Citations
Introduction
Dr Kayes is a Lecturer in Cyberecurity in the Department of Computer Science and Information Technology, La Trobe University, Australia. He received his PhD in Computer Science from Swinburne University of Technology, Australia in 2014, and his BSc in Computer Science and Engineering from Chittagong University of Engineering and Technology in 2005. His research interests include data privacy, IoT security, cloud and fog security, and malware/ransomware detection and defence.
Current institution
La Trobe University
Current position
  • Lecturer
Additional affiliations
February 2017 - August 2017
La Trobe University
Position
  • Fellow
February 2017 - February 2019
La Trobe University
Position
  • Fellow
December 2014 - February 2015
Swinburne University of Technology
Position
  • Research Assistant
Education
April 2010 - September 2014
Swinburne University of Technology
Field of study
  • Software Engineering (Context-Aware Access Control)
January 2001 - November 2005
Chittagong University of Engineering & Technology
Field of study
  • Computer Science and Engineering

Publications

Publications (98)
Article
Full-text available
In modern communication environments, the ability to provide access control to information resources and software services in a context-aware manner is crucial. By leveraging the dynamically changing context information, we can achieve context-specific control over access to such resources and services, better satisfying the security and privacy re...
Article
Full-text available
Situation-aware applications need to capture relevant context information and user intention or purpose, to provide situation-specific access to software services. As such, a situation-aware access control approach coupled with purpose-oriented information is of critical importance. However, modelling purpose-oriented situations is a challenging ta...
Article
Full-text available
New opportunities have been created for the management of critical situations utilizing the Internet of Things (IoT). However, one of the difficulties in providing services for critical situation management using IoT is that access will often be needed by users at the critical events, where access to data and resources is usually restricted by mean...
Article
In today's dynamic ICT environments, the ability to control users’ access to information resources and services has become ever important. On the one hand, it should provide flexibility to adapt to the users’ changing needs, while on the other hand, it should not be compromised. The user is often faced with different contexts and environments that...
Article
Computing technologies are increasingly dynamic and ubiquitous in everyday life nowadays. Context information plays a crucial role in such dynamically changing environments and the different types of contextual conditions bring new challenges to context-sensitive access control. This information mostly can be derived from the crisp sets. For exampl...
Article
Full-text available
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from unauthorized access. A cloud-based access control approach brings significant challenges in terms of communication overhead, high latency, and complete reliance. In this paper, we propose a Fog-Based Adap...
Preprint
Full-text available
Although several machine learning driven solutions are deemed to be effective at detecting data breaches, the recent proliferation in data breach incidents resulting from cyber attacks demands an updated, thorough analysis of machine learning (ML) based data breach countermeasures to identify research gaps and guide future studies. In view of this,...
Preprint
Full-text available
This study proposes an innovative approach to address the Capacitated Vehicle Routing Problem with Time Windows (CVRPTW) by integrating Reinforcement Learning (RL) into Evolutionary Algorithms (EAs), forming the Reinforcement Learning-assisted EA (RL-EA). While traditional EAs struggle with scalability and convergence speed, RL offers promise in dy...
Preprint
Full-text available
With the Internet of Things (IoT) generating vast amounts of data, privacy breaches have become increasingly prevalent, exposing individuals to serious risks such as identity theft and life-threatening situations. This research addresses the challenge of identifying cybersecurity threats and vulnerabilities leading to privacy breaches, as evidenced...
Article
Full-text available
Building a secure and privacy-preserving health data sharing framework is a topic of great interest in the healthcare sector, but its success is subject to ensuring the privacy of user data. We clarified the definitions of privacy, confidentiality and security (PCS) because these three terms have been used interchangeably in the literature. We foun...
Article
Privacy breaches have become increasingly prevalent, exposing individuals to significant risks. These breaches can have far-reaching consequences, including identity theft and life-threatening situations. Several studies have analysed data and privacy breaches and presented detection or prevention techniques to combat these breaches. However, becau...
Chapter
Data-intensive products and services aim to turn big data to a value or strategic asset for the organizations. However, the inherent risk and cost of storing and managing a massive amount of data undermine the value creation from such products and services. Consequently, organizations need to adopt an appropriate data governance program to establis...
Article
Full-text available
The advancement of modern Operating Systems (OSs), and the popularity of personal computing devices with Internet connectivity have facilitated the proliferation of ransomware attacks. Ransomware has evolved from executable programs encrypting user files, to novel attack vectors including fileless command scripts, information exfiltration and human...
Chapter
Full-text available
Emails are the most popular and efficient communication method that makes them vulnerable to misuse. Federated learning (FL) provides a decentralized machine learning (ML) model, where a central server coordinates clients that collaboratively train a shared ML model. This paper proposes Federated Phishing Filtering (FPF) technique based on federate...
Conference Paper
Full-text available
Emails are the most popular and efficient communication method that makes them vulnerable to misuse. Federated learning (FL) provides a decentralized machine learning (ML) model, where a central server coordinates clients that collaboratively train a shared ML model. This paper proposes Federated Phishing Filtering (FPF) technique based on federate...
Article
Streaming data are continuously generated by multiple Internet of Things (IoT) sources, e.g., sensors, mobile devices, etc., and sent simultaneously to relevant applications to be processed in real time in a continuous and timely fashion. Existing research has dealt with the integration of IoT streaming data from multiple sources. Some of the earli...
Article
Full-text available
The purpose of this study is to investigate the effects of contextual features on automatic detection accuracy of online recruitment frauds in Australian job market. In addition, the study aims to unearth the significance of localisation of such approaches. The study first generates a dataset based on a local and semi-structured advertising platfor...
Article
Full-text available
During the onset of COVID-19 pandemic, the social media was flooded with misinformation. Irrespective of the type of the misinformation, such contents played a significant role in increasing confusion among people in the middle of an ongoing crisis. The purpose of the study is to investigate the nature of a specific type of misinformation, i.e., ru...
Article
Full-text available
Although ransomware has been around since the early days of personal computers, its sophistication and aggression have increased substantially over the years. Ransomware, as a type of malware to extort ransom payments from victims, has evolved to deliver payloads in different attack vectors and on multiple platforms, and creating repeated disruptio...
Article
Ransomware attacks are often catastrophic, yet existing reactive and preventative measures could only partially mitigate ransomware damage, often not in a timely manner, and often cannot prevent the novel attack vectors. Many of them were program-centric or data-centric and did not take into consideration user intention or consent. In this paper, w...
Article
Fog computing is a new emerging technology that complements the cloud and extends the services of cloud computing to be closer to the end devices. The cloud is usually located far from the devices which use their services and some of the recent research suggests that using a fog server as a nearby lightweight middleware can bridge the gap and provi...
Article
Full-text available
Recommendation systems have recently gained a lot of popularity in various industries such as entertainment and tourism. They can act as filters of information by providing relevant suggestions to the users through processing heterogeneous data from different networks. Many travelers and tourists routinely rely on textual reviews, numerical ratings...
Article
Full-text available
Wireless, sensor and actuator technologies are often central to sensing or communication critical systems [...]
Article
Full-text available
The purpose of this paper is to analyse the effects of predatory approach words in the detection of cyberbullying and to propose a mechanism of generating a dictionary of such approach words. The research incorporates analysis of chat logs from convicted felons, to generate a dictionary of sexual approach words. By analysing data across multiple so...
Article
Full-text available
The website of a university is considered to be a virtual gateway to provide primary resources to its stakeholders. It can play an indispensable role in disseminating information about a university to a variety of audience at a time. Thus, the quality of an academic website requires special attention to fulfil the users’ need. This paper presents a...
Article
Full-text available
A programming contest generally involves the host presenting a set of logical and mathematical problems to the contestants. The contestants are required to write computer programs that are capable of solving these problems. An online judge system is used to automate the judging procedure of the programs that are submitted by the users. Online judge...
Article
Full-text available
The Internet of Things (IoT) is a rapidly emerging field of technologies that delivers numerous cutting-edge solutions in various domains including the critical infrastructures. Thanks to the IoT, the conventional power system network can be transformed into an effective and smarter energy grid. In this article, we review the architecture and funct...
Article
Full-text available
In Ethereum blockchain, smart contracts are immutable, public, and distributed. However, they are subject to many vulnerabilities stemming from coding errors made by developers. Seven cybersecurity incidents occurred in Ethereum smart contracts between 2016 and 2018, which led to financial losses estimated to be over US$ 289 million. Reentrancy vul...
Chapter
In 2017, a Price Waterhouse report on intelligent cities advised that technology would be a key enabler for efficient management of resources for overpopulated cities. The increased reliance on technology to drive daily lives of people is the main reason why many believe that smart technology is a major part of intelligent cities. By design, intell...
Article
Full-text available
In this paper, we introduce a new framework for identifying the most influential people from social sensor networks. Selecting influential people from social networks is a complicated task as it depends on many metrics like the network of friends, followers, reactions, comments, shares, etc. (e.g., friends-of-a-friend, friends-of-a-friend-of-a-frie...
Article
As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick to exploit the security gaps that many devices are inherently designed with. Users cannot be expected to tackle this threat alone, and many current solutions available for network monitoring are simply not accessible or can be difficult to implement f...
Article
The COVID-19 outbreak has focused attention on the use of social distancing as the primary defence against community infection. Forcing social animals to maintain physical distance has presented significant challenges for health authorities and law enforcement. Anecdotal media reports suggest widespread dissatisfaction with social distancing as a p...
Article
Traditional non-semantic file systems are not sufficient in protecting file systems against attacks, either caused by ransomware attacks or software-related defects. Furthermore, outbreaks of new malware often cannot provide a large quantity of training samples for machine-learning-based approaches to counter malware campaigns. The malware defense...
Article
Full-text available
The Internet of Things (IoT) has recently received considerable interest due to the development of smart technologies in today’s interconnected world. With the rapid advancement in Internet technologies and the proliferation of IoT sensors, myriad systems and applications generate data of a massive volume, variety and velocity which traditional dat...
Article
Full-text available
Due to the substantial growth of internet users and its spontaneous access via electronic devices, the amount of electronic contents has been growing enormously in recent years through instant messaging, social networking posts, blogs, online portals and other digital platforms. Unfortunately, the misapplication of technologies has increased with t...
Article
Full-text available
The rapid growth of Global Positioning System (GPS) and availability of real-time Geo-located data allow the mobile devices to provide information which leads towards the Location Based Services (LBS). The need for providing suggestions to personals about the activities of their interests, the LBS contributing more effectively to this purpose. Reco...
Preprint
Full-text available
Due to the substantial growth of internet users and its spontaneous access via electronic devices, the amount of electronic contents is growing enormously in recent years through instant messaging, social networking posts, blogs, online portals, and other digital platforms. Unfortunately, the misapplication of technologies has boosted with this rap...
Article
Full-text available
Software-Defined Networking (SDN) offers an abstract view of the network and assists network operators to control the network traffic and the associated network resources more effectively. For the past few years, SDN has shown a lot of merits in diverse fields of applications, an important one being the Wireless Body Area Network (WBAN) for healthc...
Article
Nowadays, public gatherings and social events are an integral part of a modern city life. To run such events seamlessly, it requires real time mining and monitoring of causally related events so that the management can make informed decisions and take appropriate actions. The automatic detection of event causality from short text such as tweets cou...
Article
Full-text available
In a computing context, cybersecurity is undergoing massive shifts in technology and its operations in recent days, and data science is driving the change. Extracting security incident patterns or insights from cybersecurity data and building corresponding data-driven model, is the key to make a security system automated and intelligent. To underst...
Article
Full-text available
This paper formulates the problem of a rule-based machine learning method to discover the behavioral rules of individual smartphone users to provide context-aware intelligent services. Smartphones nowadays are considered as one of the most important Internet-of-Things (IoT) devices for providing various context-aware personalized services. These de...
Article
Full-text available
Nowadays, mobile telephony interruptions in our daily life activities are common because of the inappropriate ringing notifications of incoming phone calls in different contexts. Such interruptions may impact on the work attention not only for the mobile phone owners, but also for the surrounding people. Decision tree is the most popular machine-le...
Article
Full-text available
Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an overwhelming flow of data and services, which has shifted the access control paradigm from a fixed desktop environment to dynamic cloud environments. Fog computing is associated with a new access control paradigm to reduce the overhead costs by moving the e...
Preprint
Full-text available
The COVID-19 outbreak has focused attention on the use of social distancing as the primary defence against community infection, yet forcing social animals to maintain that physical distance has presented significant challenges for health authorities and law enforcement. Anecdotal media reports suggest widespread dissatisfaction with social distanci...
Article
This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT platforms and support service-oriented modelling at high levels of abstraction where fundamental SOA theories and techniques are ful...
Article
Full-text available
In the era of IoT, the world of connected experiences is created by the convergence of multiple technologies including real-time analytics, machine learning, and commodity sensors and embedded systems. However, with the proliferation of these IoT technologies and devices, there are challenges in integrating, indexing and managing time-series data f...
Conference Paper
Full-text available
Electronic crimes like data breaches in healthcare systems are often a fundamental failures of access control mechanisms. Most of current access control systems do not provide an accessible way to engage users in decision making processes, about who should have access to what data and when. We advocate that a policy ontology can contribute towards...
Article
In the cyberspace environment, access control is one of the foremost fundamental safeguards used to prevent unauthorized access and to minimize the impact from security breaches. Fog computing preserves many benefits for the integration of both internet of things (IoT) and cloud computing platforms. Security in Fog computing environment remains a s...
Conference Paper
Full-text available
Although the current ride hailing services have revolutionized the transportation industry in today's world, they are extremely centralized. Central authority has all the control and maintains data about the users. Such platforms raise concerns about the service policies and data reliability. In case the central server faces data tampering or ranso...
Chapter
Due to the rapid advancement in Internet of Things (IoT), myriad systems generate data of massive volume, variety and velocity which traditional databases are unable to manage effectively. Many organizations need to deal with these massive datasets that encounter different types of data (e.g., IoT streaming data, static data) in different formats c...
Chapter
Full-text available
Autonomous robots, such as unmanned aerial or ground robots, are vulnerable to cyber attacks since they use sensor data heavily for their path planning and control. Furthermore, consensus is critical for resilient coordination and communication of robots in multi-robot networks against a specific adversarial attack called the spoofing attack, where...
Conference Paper
Full-text available
The establishment of Bitcoin in 2008 has introduced Blockchain technology to become the predominant new ways in digital transactions in many fields, such as energy, healthcare, and financial services. Although blockchain technology promised many advantages, it has suffered from various attacks with significant financial loses. We analyse 65 cyberse...
Article
Full-text available
Distributed Ledger Technology (DLT) has emerged as one of the most disruptive technologies in the last decade. It promises to change the way people do their business, track their products, and manage their personal data. Though the concept of DLT was first implemented in 2009 as Bitcoin, it has gained significant attention only in the past few year...
Article
Full-text available
The electronic calendar is a valuable resource nowadays for managing our daily life appointments or schedules, also known as events, ranging from professional to highly personal. Researchers have studied various types of calendar events to predict smartphone user behavior for incoming mobile communications. However, these studies typically do not t...
Preprint
Full-text available
Blockchain technology has become one of the most popular technologies for maintaining digital transactions. From the foundation of Bitcoin to the now predominant smart contract, blockchain technology promises to induce a shift in thought about digital transactions in many fields, such as energy, healthcare, Internet of Things, cybersecurity, financ...
Preprint
Full-text available
The electronic calendar is a valuable resource nowadays for managing our daily life appointments or schedules, also known as events, ranging from professional to highly personal. Researchers have studied various types of calendar events to predict smartphone user behavior for incoming mobile communications. However, these studies typically do not t...
Preprint
Full-text available
Nowadays, mobile telephony interruptions in our daily life activities are common because of the inappropriate ringing notifications of incoming phone calls in different contexts. Such interruptions may impact on the work attention not only for the mobile phone owners but also the surrounding people. Decision tree is the most popular machine learnin...
Preprint
Full-text available
The worldwide interconnected objects, called Internet of Things (IoTs), have been increasingly growing in the last several years. Different social media platforms and devices are continuously generating data about individuals and facilitate the technological and the social convergence of their Internet-based data and services with globalized users....
Article
Full-text available
Due to the increasing popularity of recent advanced features and context-awareness in smart mobile phones, the contextual data relevant to users’ diverse activities with their phones are recorded through the device logs. Modeling and predicting individual’s smartphone usage based on contexts, such as temporal, spatial, or social information, can be...
Article
Late modern societies are now dependent on innumerable digitally networked technologies, yet there are intractable incongruencies between the technologies that we develop, and the corresponding technological literacies of users. This disjuncture has greatly increased the scope and scale of the risks to which globalized publics are exposed. With pub...
Article
Astroturfing is one of the most impactful threats on today’s internet. It is the process of masking and portraying a doctored message to the general population in a way as though it originated from the grass-root level. The concept of astroturfing detection is started to gain popularity among researchers in social media, e-commerce and politics. Wi...
Article
Full-text available
Astroturfing is one of the most impactful threats on today's internet. It is the process of masking and portraying a doctored message to the general population in a way as though it originated from the grass-root level. The concept of astroturfing detection is started to gain popularity among researchers in social media, e-commerce and politics. Wi...
Conference Paper
Due to the rapid advancement in Internet of Things (IoT), myriad systems generate data of massive volume, variety and velocity which traditional databases are unable to manage effectively. Many organizations need to deal with these massive datasets that encounter different types of data (e.g., IoT streaming data, static data) in different formats c...
Conference Paper
Full-text available
Due to the proliferation of data and services in everyday life, we face challenges to ascertain all the necessary contexts and associated contextual conditions and enable applications to utilize relevant information about the contexts. The ability to control context-sensitive access to data resources has become ever more important as the form of th...
Chapter
Due to the proliferation of data and services in everyday life, we face challenges to ascertain all the necessary contexts and associated contextual conditions and enable applications to utilize relevant information about the contexts. The ability to control context-sensitive access to data resources has become ever more important as the form of th...
Conference Paper
Full-text available
With the proliferation of data and services in today’s dynamic computing environments, accessing data from multiple sources and consequently providing appropriate integrated results to the users has become a key challenge, often involving large processing overheads and administrative costs. The traditional context-sensitive access control models ha...
Conference Paper
Full-text available
In role-based access control, roles are mostly organized in static hierarchies and users are authorized to play such roles in order to exercise the organizational functions. However, some of these roles cannot be organized in the same way in static hierarchies as the authorizations granted to such roles are strictly related to the dynamically chang...
Conference Paper
Full-text available
Context information plays a crucial role in dynamically changing environments and the different types of contextual conditions bring new challenges to access control. This information mostly can be derived from the crisp sets. For example, we can utilize a crisp set to derive a patient and nurse are co-located in the general ward of the hospital or...
Conference Paper
Full-text available
Real time road traffic update is highly desirable for city dwellers, commuters, tourists and travelers. In this paper, we propose a novel methodology for estimating traffic conditions at road intersections. Our methodology involves crowd sourcing approach for traffic estimation as well as utilization of conditional probability distribution of traff...
Article
Full-text available
In today's dynamic ICT environments, the ability to control users' access to resources becomes ever important. On the one hand, it should adapt to the users' changing needs; on the other hand, it should not be compromised. Therefore, it is essential to have a flexible access control model, incorporating dynamically changing context information. Tow...
Conference Paper
Full-text available
Malware, which is a malevolent software, mostly programmed by attackers for either disrupting the normal computer operation or gaining access to private computer systems. A malware detector determines the malicious intent of a program and thereafter, stops executing the program if the program is malicious. While a substantial number of various malw...
Conference Paper
Full-text available
Context-awareness is an important aspect of the dynamically changing environments and the relationship context information brings new benefits to the access control systems. Existing relationship-aware access control approaches are highly domain-specific and consider the expression of access control policies in terms of the relationship context inf...
Thesis
Full-text available
Context-awareness is an important aspect of the dynamic environments and the different types of contextual information bring new benefits to the access control systems. By leveraging this dynamically changing information, we can achieve context-specific control over access to resources or software services. This thesis introduces a context-aware ac...
Conference Paper
Full-text available
Situation-aware applications need to capture relevant context information and user intention or purpose, to provide situation-specific access to software services. As such, a situation-aware access control approach coupled with purpose-oriented information is of critical importance. Existing approaches are highly domain-specific and they control ac...
Conference Paper
Full-text available
In the present age, context-awareness is an important aspect of the dynamic environments and the different types of dynamic context information bring new challenges to access control systems. Therefore, the need for the new access control frameworks to link their decision making abilities with the context-awareness capabilities have become increasi...
Conference Paper
Full-text available
In modern communication environments, the ability to provide access control to services in a context-aware manner is crucial. By leveraging the dynamically changing context information, we can achieve context-specific control over access to services, better satisfying the security and privacy requirements of the stakeholders. In this paper, we intr...
Conference Paper
Full-text available
Due to the rapid advancement of communication technologies, the ability to support access control to resources in open and dynamic environments is crucial. On the one hand, users demand access to resources and services in an anywhere, anytime fashion. On the other hand, additional challenges arise when ensuring privacy and security requirements of...
Article
Full-text available
Feature extraction is one of the significant parts of image processing. In the literature, several research efforts have been proposed different feature extraction methods using edge detection, corner detection, etc. One of the key limitations of the existing approaches is the absence of an appropriate feature extraction method. In this paper, we t...
Conference Paper
Full-text available
Context-aware systems acquire and integrate multi-faceted knowledge about their environments in order to make decisions. A number of attempts to build frameworks for context-aware systems have been made, but these have not provided adequate support for context-aware access control. In this paper, we present a framework for context-aware access cont...

Questions

Question (1)
Question
In today's open and dynamic environments, the applications need to capture relationship context information, in order to provide relation-specific access to information resources or software services. What is the best way to capture relationship information, from which sources, and what are the different types of such information?

Network

Cited By