About
209
Publications
111,316
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,596
Citations
Introduction
A/Prof Rafiqul Islam works at Charles Sturt University's School of Computing, Mathematics, and Engineering in New South Wales, Australia. Mr. Islam's research interests include cyber security, network security, and IoT security, as well as malware analysis and classification.
Current institution
Publications
Publications (209)
Malware has emerged as a significant threat to end-users, businesses, and governments , resulting in financial losses of billions of dollars. Cybercriminals have found malware to be a lucrative business because of its evolving capabilities and ability to target diverse platforms such as PCs, mobile devices, IoT, and cloud platforms. While previous...
Federated Learning (FL) allows users to collaboratively train a global machine learning model by sharing local model only, without exposing their private data to a central server. This distributed learning is particularly appealing in scenarios where data privacy is crucial, and it has garnered substantial attention from both industry and academia....
Malware has emerged as a significant threat to end-users, businesses, and gov-ernments, resulting in financial losses of billions of dollars. Cybercriminals have foundmalware to be a lucrative business because of its evolving capabilities and ability to targetdiverse platforms such as PCs, mobile devices, IoT, and cloud platforms. While previousstu...
Malware has emerged as a significant threat to end-users, businesses, and governments, resulting in financial losses of billions of dollars. Cybercriminals have found malware to be a lucrative business because of its evolving capabilities and ability to target diverse platforms such as PCs, mobile devices, IoT, and cloud platforms. While previous s...
In light of their remarkable predictive capabilities, artificial intelligence (AI) models driven by deep learning (DL) have witnessed widespread adoption in the agriculture sector, contributing to diverse applications such as enhancing crop management and agricultural productivity. Despite their evident benefits, the integration of AI in agricultur...
Ransomware attacks are becoming increasingly sophisticated, thereby rendering conventional detection methods less effective. Recognizing this challenge, this study reviews advanced detection mechanisms and explores the potential of artificial intelligence (AI) techniques to improve detection capabilities. This study reviews the recent literature, i...
Ransomware attacks are becoming increasingly sophisticated, thereby rendering conventional detection methods less effective. Recognizing this challenge, this study reviews advanced detection mechanisms and explores the potential of artificial intelligence (AI) techniques to improve detection capabilities. This study reviews the recent literature, i...
Ransomware attacks are becoming increasingly sophisticated, thereby rendering conventional detection methods less effective. Recognizing this challenge, this study reviews advanced detection mechanisms and explores the potential of artificial intelligence (AI) techniques to improve detection capabilities. This study reviews the recent literature, i...
Ransomware attacks are becoming increasingly sophisticated, thereby rendering conventional detection methods less effective. Recognizing this challenge, this study reviews advanced detection mechanisms and explores the potential of artificial intelligence (AI) techniques to improve detection capabilities. This study reviews the recent literature, i...
The rapid dissemination of misinformation on the internet complicates the decision-making process for individuals seeking reliable information, particularly parents researching child development topics. This misinformation can lead to adverse consequences, such as inappropriate treatment of children based on myths. While previous research has utili...
The rapid dissemination of misinformation on the internet complicates the decision-making process for individuals seeking reliable information, particularly parents researching child development topics. This misinformation can lead to adverse consequences, such as inappropriate treatment of children based on myths. While previous research has utili...
Cloud computing have slowly made it way and has gained popularity with its services and products and they have repeatedly increased, and many users are attracted to migrate their data into the cloud. But there are still issues which concern users when outsourcing their data and the business application into the cloud, security and privacy are very...
This paper provides a model to identify website vulnerability to Code Injection Attacks (CIAs). The proposed model identifies vulnerabilities to CIA of various websites, to check vulnerable to CIAs. The lack of existing models in providing checking against code injection has motivated this paper to present a new and enhanced model against web code...
The primary objective of an anonymity tool is to protect the anonymity of its users through the implementation of strong encryption and obfuscation techniques. As a result, it becomes very difficult to monitor and identify users’ activities on these networks. Moreover, such systems have strong defensive mechanisms to protect users against potential...
Ransomware attacks are on the rise in terms of both frequency and impact. The shift to remote work due to the COVID-19 pandemic has led more people to work online, prompting companies to adapt quickly. Unfortunately, this increased online activity has provided cybercriminals numerous opportunities to carry out devastating attacks. One recent method...
The increasing sophistication of malware threats has led to growing concerns in the anti-malware community, as malware poses a significant danger to online users despite the availability of numerous defense solutions. The aim of this study is to comprehensively review malware evolution and current attack trends in order to identify effective defens...
The increasing sophistication of malware threats has led to growing concerns in the anti-malware community, as malware poses a significant danger to online users despite the availability of numerous defense solutions. This study aims to comprehensively review malware evolution and current attack trends to identify effective defense mechanisms. It r...
Data protection is the process of securing sensitive information from being corrupted, compromised, or lost. A hyper-connectednetwork, on the other hand, is a computer networking trend in which communication occurs over a network. However, what aboutmalware? Malware is malicious software meant to penetrate private data, threaten a computer system,...
This research paper presents a study on designing and implementing a robust key management scheme for lightweight block ciphers in Internet of Things (IoT) networks. Key management is a critical concern for IoT devices due to their limited resources and susceptibility to security threats. The proposed scheme utilises partial key pre-distribution to...
Data protection is the process of securing sensitive information from being corrupted, compromised, or lost. A hyperconnected network, on the other hand, is a computer networking trend in which communication occurs over a network. However, what about malware. Malware is malicious software meant to penetrate private data, threaten a computer system,...
Breast cancer is frequent among women and its early diagnosis using thermography is not been widely practiced in medical facilities due to its limitation in classification accuracy, sensitivity, and specificity. This research aims to improve the accuracy, sensitivity, and specificity of breast cancer classification in thermal images. The proposed s...
The implementation of Deep Learning (DL) Prediction techniques for Human Age Prediction (HAP) has been widely researched and studied to prevent, treat, and extend life expectancy. While most algorithms rely on facial images, MRI scans, and DNA methylation for training and testing, they are seldom implemented due to a lack of significant validation...
The deep learning (DL) classification technique is extensively researched and considered for early lung cancer diagnosis. Despite the encouraging performance reported in the literature, DL models face several challenges to be deployed in real-life systems. These include the DL-Models' stability, the nodule structure's complexity, the lack of proper...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authen...
The ability of a cryptographic system to protect information from attacks depends on many factors, including the secrecy of the encryption key. A crucial aspect of any cryptosystem is how it manages the encryption keys. Encryption Key Management (EKM) spans the entire life cycle of the key, including the key’s generation, usage, distribution, renew...
Classifying network traffic is important for traffic shaping and monitoring. In the last two decades, with the emergence of privacy concerns, the importance of privacy-preserving technologies has risen. The Tor network, which provides anonymity to its users and supports anonymous services known as
Onion Services
, is a popular way to achieve onli...
Nowadays, with the proliferation of different news sources, fake news detection is becoming a crucial topic to research. Millions of articles are published daily in the press, on social media, and in electronic media, and many of them may be fake. It is common for scammers to spread fake news to mislead people for malicious purposes. For researcher...
With the convenience of Cloud computing (CC) comes changes and challenges to cybersecurity. Organisational networks have changed, and the traditional perimeter-style defence is ineffective in CC architecture. Tracking the location of data processes within CC poses challenges to organisations to preserve data privacy (Sun, IEEE Access 7:147420–14745...
The Dark Web is an encrypted subset of the deep web, whose content cannot be indexed by search engines. Dark Web pages can be accessed from private networks such as TOR (The Onion Routing), I2P (Invisible Internet Project) and Freenet. TOR is widely used by the Dark Web users in a domain defined by a .onion extension. Dark Web users can communicate...
This paper discusses a case study project in cybersecurity on the Dark Web that uses quantitative data science research methods and techniques. Beginning with a comparative analysis of dark web forum data sets using data science techniques and then adding an experimental research design that includes machine learning techniques and strategies for t...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authen...
Blockchain has recently drawn wide attention in the research community. Since its emergence, the world has seen the expansion of this new technology, which was initially developed as a digital currency more than a decade ago. A self-administering ledger that ensures extensive data immutability over a peer-to-peer network has made it attractive for...
Blockchain has recently been able to draw wider attention throughout the research community. Since its emergence, the world has seen the mind-blowing expansion of this new technology, which was initially developed as a pawn of digital currency more than a decade back. A self-administering ledger that ensures extensive data immutability over the pee...
Security concerns for IoT applications have been alarming because of their widespread use in different enterprise systems. The potential threats to these applications are constantly emerging and changing, and therefore, sophisticated and dependable defense solutions are necessary against such threats. With the rapid development of IoT networks and...
While the convergence of Artificial Intelligence (AI) techniques with improved information technology systems ensured enormous benefits to the Internet of Vehicles (IoVs) systems, it also introduced an increased amount of security and privacy threats. To ensure the security of IoVs data, privacy preservation methodologies have gained significant at...
Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and other unexpected events, is essential for organizations facing inundating security threats on a daily basis. Organizations usually employ multiple strategies to conduct risk management to achieve cyber assurance. Utilizing cybersecurity standards and certifica...
Blockchain technology has been widely advocated for security and privacy in IoT systems. However, a major impediment to its successful implementation is the lack of privacy protection regarding user access policy while accessing personal data in the IoT system. This work aims to preserve the privacy of user access policy by protecting the confident...
Advances of emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security properties depends on consumers' confidence and markets' trust in the security functionalities and whether...
The dark web is a section of the Internet that is not accessible to search engines and requires an anonymizing browser called Tor. Its hidden network and anonymity pave the way for illegal activities and help cybercriminals to execute well-planned, coordinated, and malicious cyberattacks. Cyber security experts agree that online criminal activities...
Security concerns for IoT applications have been alarming because of their widespread use in different enterprise systems. The potential threats to these applications are constantly emerging and changing, and therefore, sophisticated and dependable defense solutions are necessary against such threats. With the rapid development of IoT networks and...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices that can collect vast volumes of data. Hence, the demands of IoT security is paramount. Cryptography is being used to secure the authentication, confidentiality, data integrity, and access control of networks. However, due to the many constraints of...
Traditional cryptographic block cipher algorithms are often unsuitable for low-resource profiled IoT (Internet of Things) devices. A lightweight cryptographic algorithm is thus mandated. The S boxes are often called the heart of a cryptographic protocol, as a considerable amount of resource and time complexities are associated with the design of an...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices that can collect vast volumes of data. Hence, the demands of IoT security is paramount. Cryptography is being used to secure the authentication, confidentiality, data integrity and access control of networks. However, due to the many constraints of...
Anonymity networks are becoming increasingly popular in today’s online world as more users attempt to safeguard their online privacy. Tor is currently the most popular anonymity network in use and provides anonymity to both users and services (hidden services). However, the anonymity provided by Tor is also being misused in various ways. Hosting il...
Business intelligence (BI) institutionalization has become a growing research area within the information systems (IS) discipline because of the decision-making iteration in businesses. Studies on BI application in improving decision support are not new. However, research on BI institutionalization seems sparse. BI institutionalization may positive...
With the advent of advanced technology, IoT introduces a vast number of devices connecting with each other and collecting a sheer volume of data. Thus, the demands of IoT security is paramount. Cryptography is being used to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource const...
Anonymity networks are becoming increasingly popular in today's online world as more users attempt to safeguard their online privacy. Tor is currently the most popular anonymity network in use and provides anonymity to both users and services (hidden services). However, the anonymity provided by Tor is also being misused in various ways. Hosting il...
Throughout the COVID-19 outbreak, malicious attacks have become more pervasive and damaging than ever. Malicious intruders have been responsible for most cybercrimes committed recently and are the cause for a growing number of cyber threats, including identity and IP thefts, financial crimes, and cyber-attacks to critical infrastructures. Machine l...
We propose a new methodology to sanitize web pages to prevent code injection attacks. One of a common programming error that usually happens in the web application is using of an improper encoding method to sanitize the source code of the web page. Our methodology provides a proper encoding method to the webpages which have an improper encoding of...
Business intelligence (BI) institutionalization has become a growing research area within the information systems (IS) discipline because of the decision-making iteration in businesses. Studies on BI application in improving decision support are not new. However, research on BI institutionalization seems sparse. BI institutionalization may positive...
This book constitutes the refereed proceedings of the 16th Australasian Conference on Data Mining, AusDM 2018, held in Bathurst, NSW, Australia, in November 2018.
The 27 revised full papers presented together with 3 short papers were carefully reviewed and selected from 80 submissions. The papers are organized in topical sections on classification...
The book highlights innovative ideas, cutting-edge findings, and novel techniques, methods and applications touching on all aspects of technology and intelligence in smart city management and services. Above all, it explores developments and applications that are of practical use and value for Cyber Intelligence-related methods, which are frequentl...
Code Injection Attacks (CIAs) exploit security vulnerabilities and computer bugs that are caused by processing invalid codes. CIA is a problem that hackers attempt to introduce to any new method, their objective being to bypass the protection system. In this paper we present a tool called GMSA, developed to detect a variety of code injection attack...
Today data is a strategic asset and organizational goal is to maximize the value of their information. The concept of big data is now treated from different points of view covering its implications in many fields remarkably including Healthcare. Healthcare data is progressively being digitized and the Healthcare era is expansively using new ma-chin...
This paper will describe three case studies on the human factors, in personal and public safety and cyber security from the Asia Pacific region (APAC). A deeper consideration of human factors, the impact of “Internet of Things” and cyber security education about the behaviour and actions that can be taken by individuals is at the foundation of publ...
Biometric authentication using human ear is a recent trend in security applications including access control, user recognition, surveillance, forensic, and border security systems. This paper aims to propose a fast and robust authentication scheme using ear biometric. In this work, a fast technique based on the AdaBoost algorithm is used to detect...
Today data is a strategic asset and organizational goal is to maximize the value of their information. The concept of big data is now treated from different points of view covering its implications in many fields remarkably including Healthcare. Healthcare data is progressively being digitized and the Healthcare era is expansively using new machine...
In recent years, malware attacks against data and information is considered as a serious cyber threat in the industries and organizations. Cyber criminals attempt to attack and gain access to computer networks or systems of many organizations especially in the healthcare industry by malicious software or malware to breach or manipulate sensitive da...
Stereo matching algorithms are essential for recovering depth information of objects in many computer vision applications including 3D reconstruction, robot navigation, autonomous driving and so on. Most of the stereo algorithms generally rely on two types of matching technique: global and local matching. The state-of-the-art stereo algorithms that...
Recently, both security and privacy are the growing concerns in eHealth platforms that deal with sensitive clinical data stored in electronic health records (EHR). Breaches or damage of sensitive data of an individual’s health record can be occurred due to attacks by hackers or malicious insiders. Therefore, it is very crucial to enforce privacy an...
Malicious software (malware) constitute one of the most pressing cyber threats intended to cripple critical infrastructure, render infected systems unusable, permanently erase data from storage systems. The number of malware has skyrocketed through the use of enormous malware development toolkit. Run-time analysis has recently been used to overcome...
This paper researched two issues; targeted advertising and politics in social media. In its findings, it was apparent that many social media platforms actively collected user data and used big data to store and analyze it so as to profile the users. From these profiles, targeted adverts were served to the users on their social media feeds. The data...
Preservation of privacy and security of healthcare data is very important in the electronic healthcare domain. Unauthorized access or attacks by hackers can breach or damage sensitive data of patients’ health records that may lead to disclosure of patient’s privacy or may slowdown the system. Hence, it is very crucial to provide and enforce privacy...
The emergence of electronic health or eHealth has revolutionized the healthcare industry to offer better healthcare services at a low and affordable cost. However, it still suffers from security and privacy issues in handling health information. The privacy and security issues in eHealth domain are mainly centered around user authentication, data i...
Exfiltration of sensitive data by malicious software or malware is a serious cyber threat around the world that has catastrophic effect on businesses, research organizations, national intelligence, as well as individuals. Thousands of cyber criminals attempt every day to attack computer systems by employing malicious software with an intention to b...
The Code Injection Attack (CIA) exploits a security vulnerability or computer bug that is caused by processing invalid data, CIA is a serious attack problem that attackers try to introduce any new methodologies to bypass the defense system. In this paper, we introduce a novel detection algorithm for detection of code injection attack. Our empirical...
This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge r...
Cloud computing is geared towards the effective and efficient use of computational resources and it has been making a big revolution in the field of information technology by reducing capital investment. It delivers computing as a service, that enables effective utilization of computational resources, rather than, a product, for a fraction of the c...
Biometric authentication has been gaining popularity for providing privacy and security in many applications including secure access control, surveillance systems, user identification and many more. This research proposes a robust scheme for biometric authentication by analyzing and interpreting facial image using a neural network. Human face has b...