Choo, Kim-Kwang Raymond  

Aug 2016 - Current: The University of Texas at San Antonio, USA 

  • Cloud Technology Endowed ProfessorshipDepartment of Information Systems and Cyber Security
  • Ph.D. Information Technology Program AdvisorDepartment of Information Systems and Cyber Security
  • Courtesy Appointment, Department of Electrical and Computer Engineering

Mar 2017 - Current: Adjunct Associate Professor, University of South Australia, Australia

Apr 2017 - CurrentHonorary Commander, 502nd Air Base Wing, Joint Base San Antonio-Fort Sam Houston, USA

Senior Member, IEEE
Fellow, Australian Computer Society 

Other affiliations

  • Mar 2011 – Mar 2017: Senior Lecturer, then Associate Professor, University of South Australia, Australia
  • Sep 2015 – Feb 2016: Visiting Expert, INTERPOL Global Complex for Innovation (IGCI), Singapore
  • May 2015 – Dec 2016: Co-Chair, Education Council, Cloud Security Alliance (CSA) Asia Pacific, Singapore
  • Oct 2011 – Current: Justice of the Peace for South Australia, Australia
  • May 2008 – Current: Member of the International Consultancy Group (Research) @ United Nations Office on Drugs and Crime-Korean Institute of Criminology Virtual Forum against Cybercrime Programme
  • Aug – Dec 2009: Fulbright Scholar at Rutgers University School of Criminal Justice and Palo Alto Research Center (formerly Xerox PARC), USA
  • Jul 2006 – Mar 2011: Senior Research Analyst, Australian Government Australian Institute of Criminology, Australia

Grants 

I am the recipient of the following grants: 
  • Principal Investigator. CPS Energy grant, USA "Smart grid security and attack-resilience: A forensics-driven approach"; $399,218 (09/2017–08/2019)
  • Senior Personnel. National Science Foundation (NSF) CREST Center for Security and Privacy Enhanced Cloud Computing (2017-2022)
  • Co-Chief Investigator. Cooperative Research Centre for Data to Decision grant "Integrated Policing: Federated Data Platform"; AUD 1,236,883 (2016-2019)
  • Co-Chief Investigator. University of South Australia Research Themes Investment Scheme grant "Defence against the dark arts: guarding the public discourse from propaganda and fake news, and promoting truth, the whole truth and nothing but the truth in the media and social media" (2017-2019)
  • Co-Chief Investigator. auDa Foundation grant "Defence against the Dark Arts: resisting online social manipulation and propaganda" (2016-2019)
  • Co-Chief Investigator. Government of South Australia, SA Health grant "The feasibility and validity of obtaining pre-illness activity data in critically ill patients using 'smart-phone' technology: a validation study" (2016)
  • Co-Principal Investigator. Ministry of Education, Singapore grant "Toward secure and privacy-preserving computing in mobile cloud" (2015-2017)
  • Co-Principal Investigator. Nanyang Technology University College of Engineering, Singapore grant "Secure Fog Computing System Design and Implementation" (2015-2016)
  • Chief Investigator. University of South Australia Research Themes Investment Scheme grant "A Public Health Approach to Dealing with Sexting" (2015-2016)
  • Chief Investigator. National Drug Law Enforcement Research Fund (NRLERF) grant "Evidence-based digital forensic framework for drug (and other serious and organised) crime law enforcement investigations in the cloud computing environment"; AUD 269,319 (2013-2015) 
  • Co-Chief Investigator. BAE Systems stratsec grant "Information Security Research Winter School 2012" 
  • Co-Chief Investigator. National Drug Law Enforcement Research Fund (NRLERF) grant "Exploitation of Electronic Evidence from Mobile Phone Mediated Drug Crime"; AUD 271,040 (2011–2013)
  • Co-Chief Investigator. Australian Research Council Discovery Projects grant (DP1096833) "The evolution of cybercrime: the monitoring of serious crime in cyberspace"; AUD 350,000 (2010-2012)
  • Co-Chief Investigator. Australasian Institute of Judicial Administration Incorporated (AIJA) grant "ICT and the judiciary: multimedia glossary" (2011)

Research

I have co-edited nine (9) books entitled "Cloud Security Ecosystem" (published by Syngress: An Imprint of Elsevier, 2015)Mobile Security and Privacy” (published by Syngress: An Imprint of Elsevier, 2017) and “Contemporary Digital Forensic Investigations of Cloud and Mobile Applications” (published by Syngress: An Imprint of Elsevier, 2017), “Green, Pervasive, and Cloud Computing” (published in Springer’s Lecture Notes in Computer Science book series, 2017), Security, Privacy, and Anonymity in Computation, Communication, and Storage” (published in Springer’s Lecture Notes in Computer Science book series, 2017), Security, Privacy, and Anonymity in Computation, Communication, and Storage Workshops” (published in Springer’s Lecture Notes in Computer Science book series, 2017), Algorithms and Architectures for Parallel Processing” (published in Springer’s Lecture Notes in Computer Science book series, 2017), “Advanced Multimedia and Ubiquitous Engineering” (published in Springer’s Lecture Notes in Electrical Engineering book series, 2017), and International Conference on Applications and Techniques in Cyber Security and Intelligence” (published in Springer’s Advances in Intelligent Systems and Computing book series, 2018). I have also (co)authored a number of publications in the areas of cyber crime and security, and digital forensics including 
Secure Key Establishment
  • a book entitled "Big Digital Forensic Data: Reduction and Analysis" published in Springer’s “SpringerBriefs on Cyber Security Systems and Networks” book series, 
  • a book entitled "Secure Key Establishment" published in Springer’s “Advances in Information Security” book series, 
  • a book entitled "Cloud Storage Forensics, 1st Edition" published by Syngress: An Imprint of Elsevier (Forewords written by Australia’s Chief Defence Scientist and Chair of the Electronic Evidence Specialist Advisory Group, Senior Managers of Australian and New Zealand Forensic Laboratories). For reviews of our book, see
  • seven Australian Government refereed monographs, 
  • 30 refereed book chapters, 
  • 277 refereed journal articles, 
  • 100 refereed conference articles and 
  • six Australian Government parliamentary submissions – see 
I am the co-inventor of two PCT and one provisional patent applications on digital forensics and mobile app security filed in 2015.

My Google Scholar H-index is 38 and i10-index is 153, and my Erdős number is 4. Citations of my research include governmental reports: 
  • (Australian) 2010 Australian Government House of Representatives Standing Committee on Communications Report on the Inquiry into Cyber Crime, 2011 Australian Government House of Representatives Joint Select Committee’s Report on Cyber-Safety, 2013 Australian Crime Commission Fact Sheet on “Cyber and Technology Enabled Crime”2013 Australian Government House of Representatives Joint Select Committee on Cyber-Safety's Report on the Inquiry into Cybersafety for Senior Australians, 
  • (International) Working paper for the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, United Nations Office on Drugs and Crime (UNODC) 2011 “Handbook on Identity-related Crime”, 2010 US CRS Report for Congress (Prepared for Members and Committees of Congress) entitled “Organized Crime: An Evolving Challenge for U.S. Law Enforcement”, International Centre for Missing & Exploited Children’s report “Online Grooming of Children for Sexual Purposes: Model Legislation & Global Review” (2017), International Telecommunication Union (ITU) 2011 “Understanding Cybercrime: A Guide For Developing Countries” report, 2012 UNODC “Wildlife and Forest Crime Analytic Toolkit” report, and 
    2013 UK Home Office report entitled "Cyber crime: A review of the evidence".
One of my published cryptographic protocols was included in two independent submissions to the IEEE 802.11, the working group setting the standards for wireless LANs, by computer scientists from Fujitsu Labs in America; and the Internet Engineering Task Force (IETF) / Network Working Group by a team of computer scientists from Tropos Networks (US), Toshiba, Huawei, and University of Murcia. A protocol jointly proposed with Sherman Chow (formerly of New York University, US) was used in the P2P solution of the Milagro TLS (pairing-based cryptography for Transport Layer Security) presented to the IETF by researchers from MIRACL Ltd in 2016.

My published design principle about how session keys should be constructed in cryptographic (key establishment) protocols that result in significant benefits for their security was cited in a special publication (SP 800-56A) – Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography – by the US National Institute of Standards and Technology. This is one of four academic (i.e. non-NIST and non-international standard) citations, and the other three academic citations are publications of (1) Professor Alfred Menezes (University of Waterloo), Professor Phillip Rogaway (UC Davis), Professor Mihir Bellare (UC San Diego), and Professor Dan Boneh (Stanford University) – the top scholars in the field.

Awards 


I am also the recipient of various awards and scholarships including
  1. Winner, Cybersecurity Educator of the Year – APAC, 2016 (Cybersecurity Excellence Awards are produced in cooperation with the Information Security Community on LinkedIn).
  2. Best Research Paper Award, 20th European Symposium on Research in Computer Security (ESORICS 2015) - acceptance rate is 59/298 (~19.8%).
  3. Winning team in Germany's University of Erlangen-Nuremberg (FAU) Digital Forensics Research Challenge 2015.
  4. Highly Commended award by ANZPAA National Institute of Forensic Science (ANZPAA NIFS).
  5. "2014 Academic Impact and Uptake Award" which recognises researchers who have made important contributions to knowledge and have demonstrated excellence over a period of 5 years in research achievement in an area of strategic importance to the University of South Australia, research leadership and supervision, impact of research in terms of peer recognition and uptake, and strengthening of collaboration across world leading research institutions and groups.
  6. 2010 ACT Pearcey Award for “Taking a risk and making a difference in the development of the Australian ICT industry”
  7. 2010 Consensus IT Professional Award (one of 5 Winners) and 2010 Consensus IT Writers Award Finalist
  8. 2009 Fulbright Professional Scholarship in Australian-United States Alliance Studies, sponsored by the Australian Government Department of Foreign Affairs and Trade
  9. 2008 Australia Day Achievement Medallion in recognition of my dedication and contribution to the Australian Government's Australian Institute of Criminology (AIC), and through it to the public service of the nation
  10. British Computer Society's Wilkes Award for the best paper published in the 2007 volume of The Computer Journal (Oxford University Press)
  11. 2007 Queensland University of Technology (QUT)'s Faculty of Information Technology Executive Dean’s outstanding Ph.D. thesis commendation
  12. 2005 Australasian Conference on Information Security and Privacy (ACISP 2005) Best Student Paper Award

    Speaking Engagements (see "My Presentations") and Media ("My Media Interviews")

    I have been an invited speaker at a number of conferences in Australia and overseas such as the following:
    • Invited Witness in a private briefing on Bitcoin and alternative remittance systems to the Australian Government Parliamentary Joint Committee on Corporations and Financial Services, 28 March 2014
    • Distinguished Speaker at the International Summer School on Computational Forensics (SuCoFo 2016), Norwegian University of Science and Technology, Gjevik, Norway, September 2016
    • Invited Expert 
      1. Indian Government’s Global Initiative of Academic Networks (GIAN) one-week course on "Incident Handling and Forensics", 10 – 15 December 2017,
      2. United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI) Criminal Justice (Focus on Investigation, Prosecution, Adjudication, and International Cooperation)(J15-04250)Training, UNAFEI, Tokyo, Japan, 10 May –18 June 2015
      3. INTERPOL Cyber Research Agenda Workshop, INTERPOL Global Complex for Innovation, Singapore, 10 March 2015
      4. 2015 Taiwan International Symposium on Regional Security and Transnational Crimes, Taiwan, 18–23 October 2015, Organised by Ministry of Justice Investigation Bureau
      5. United Nations Office on Drugs and Crime–International Telecommunication Union (UNODC-ITU) 2011 Asia-Pacific Regional Workshop on Fighting Cybercrime
    • Keynote Speaker 
      1. World Congress on Information Technology Applications and Services 2018, Jeju Island, South Korea, 20–22 February
      2. IEEE International Conference on Smart Cloud 2017 (SmartCloud 2017), New York, USA, 3–5 November
      3. ACM CCS International Workshop on Managing Insider Security Threats (MIST 2017 @ACM CCS), Dallas, USA, 30 October – 3 November
      4. Workshop on Security and Privacy in the Internet Of Things (SePrIoT 2017), in conjunction with EAI International Conference on Security and Privacy in Communication Networks, Niagara Falls, Canada, 22 –25 October
      5. International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017), in conjunction with IEEE/ACM CHASE 2017, Philadelphia, USA, 17–19 July
      6. SERENE-RISC Spring 2016 Workshop, Vancouver BC, Canada, 27–28 April 2016
      7. International Conference on Data Science and Data Intensive Systems (DSDIS 2015), Sydney, Australia, 11–13 December 2015 
      8. Cloud Security Alliance New Zealand Summit 2015, 27 November 2015 
      9. International Conference on Cloud Computing Research and Innovation (ICCCRI 2015), Co-organised by Infocomm Development Authority of Singapore, Singapore, 26-27 October 2015 
      10. CSO CXO Series Breakfast Event, Sydney, Australia, 31 July 2015, Organised by CSO Australia and Trend Micro 
      11. CSO CXO Series Breakfast Event, Melbourne, Australia, 30 July 2015, Organised by CSO Australia and Trend Micro 
      12. 2014 International Conference on Cyber-Crime Investigation and Cyber Security (Asia Pacific University of Technology and Innovation, Malaysia) 
      13. 2014 International Conference on Applied Linguistics & Language Teaching (National Taiwan University of Science and Technology, Taiwan) 
      14. 2014 Anti-Phishing Working Group (APWG)’s Counter-eCrime Operations Summit (CeCOS VIII) 
      15. 2011 Economic Crime Asia Conference (Nanyang Technological University, Singapore) 
      16. 2010 International Conference on Applied Linguistics (National Chiayi University, Taiwan) 
      17. ECPAT Taiwan’s 2008 Conference on Criminal Problems and Intervention Strategy
    • Plenary Speaker at the 2010 International Conference on Applied Linguistics
    I was one of over 20 international (and one of two Australian) experts consulted by the research team preparing McAfee's commissioned report entitled “Virtual Criminology Report 2009: Virtually Here: The Age of Cyber Warfare
     - 
    see
     

    Recent Professional Activities (see "Complete Listing")

    1. External Evaluation Member, IEEE Communications and Information Security Technical Committee (CISTC) Technical Recognition Award Committee (2015, 2016, 2017).
    2. External Expert Reviewer for Academic Programs
      1. American Council on Education (2017)
      2. Australian Government Tertiary Education Quality Standards Agency (TEQSA) (2013, 2017) 
      3. New York University, School of Professional Studies (2017)
    3. External Expert Reviewer 
      1. Promotion to Full Professor, Department of Computer Science, Colorado State University (2017)
      2. Faculty Appointment, Tenure-Track Assistant Professor of Cyber Security, School of Computer Science and Engineering, Nanyang Technological University, Singapore (2017)
      3. Grant Proposal, Netherlands Organisation for Scientific Research (2017)
    4. Thesis Examiner
      1. Doctor of Philosophy (Ph.D.) thesis, University of Pretoria, South Africa (2017)
      2. Doctor of Philosophy (Ph.D.) thesis, University of New South Wales (UNSW) Sydney, Australia (2017)
      3. Doctor of Philosophy (Ph.D.) thesis, Universiti Putra Malaysia, Malaysia (2017) 
      4. Doctor of Philosophy (Ph.D.) thesis, University of Wollongong, Australia (2017)
    5. Guest Editor,
      1. Kim-Kwang Raymond Choo, Rongxing Lu, Liqun Chen and Xun Yi 2018. A foggy research future: Advances and future opportunities in fog computing research. Future Generation Computer Systems 78(2): 677–679. https://doi.org/10.1016/j.future.2017.09.014
      2. Kim-Kwang Raymond Choo, Jemal Abawajy and Rafiqul Islam 2017. Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions. Journal of Computer and System Sciences 83(1): 1–2. http://dx.doi.org/10.1016/j.jcss.2016.09.001 
      3. Kim-Kwang Raymond Choo, Yunsi Fei, Yang Xiang and Yu Yu 2017. Embedded Device Forensics and Security. ACM Transactions on Embedded Computing Systems 16(2): Article no 50. https://doi.org/10.1145/3015662  
      4. Kim-Kwang Raymond Choo, Mehran Mozaffari Kermani, Reza Azarderakhsh, Manimaran Govindarasu 2017. Emerging Embedded and Cyber Physical System Security Challenges and Innovations. IEEE Transactions on Dependable and Secure Computing 14(3): 235–236. https://doi.org/10.1109/TDSC.2017.2664183
      5. Kim-Kwang Raymond Choo, Omer F Rana and Muttukrishnan Rajarajan 2017. Cloud Security Engineering: Theory, Practice and Future Research. IEEE Transactions on Cloud Computing 5(3): 372–374. http://dx.doi.org/10.1109/TCC.2016.2582278 
      6. Debiao He, Kim-Kwang Raymond Choo and Neeraj Kumar 2017. Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies. Computers & Electrical Engineering 63: 157–159. https://doi.org/10.1016/j.compeleceng.2017.09.023
      7. Joseph L Liu, Raymond Choo, Xinyi Huang and Man Ho Au 2017. Special issue on security and privacy for smart cities. Personal and Ubiquitous Computing 21(5): 775-775. http://dx.doi.org/10.1007/s00779-017-1043-z
      8. Zheng Xu, Yunhuai Liu, Kim-Kwang Raymond Choo and Neil Y. Yen 2017. Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems. Wireless Personal Communications. Wireless Personal Communications. http://dx.doi.org/10.1007/s11277-017-4278-0
      9. Zhiyong Zhang and Kim-Kwang Raymond Choo 2017. Guest Editorial: Multimedia Social Network Security and Applications. Multimedia Tools and Applications 76(3): 3163–3168. http://dx.doi.org/10.1007/s11042-016-4081-z 
      10. Elisa Bertino, Kim-Kwang Raymond Choo 2016, Dimitrios Georgakopoulos and Surya Nepal. Internet of Things (IoT): Smart and Secure Service Delivery. ACM Transactions on Internet Technology 16(4): Article no 22. https://doi.org/10.1145/3013520 
      11. Kim-Kwang Raymond Choo, Josep Domingo-Ferrer and Lei Zhang 2016. Cloud Cryptography: Theory, Practice and Future Research Directions. Future Generation Computer Systems 62: 51–53, 2016. http://dx.doi.org/10.1016/j.future.2016.04.017 
      12. Kim-Kwang Raymond Choo, Martin Herman, Michaela Iorga and Ben Martini 2016. Cloud Forensics: State-of-the-Art and Future Directions. Digital Investigation, 18: 77–78. http://dx.doi.org/10.1016/j.diin.2016.08.003 
      13. Kim-Kwang Raymond Choo, Lior Rokach and Claudio Bettini 2016. Mobile security and privacy: Advances, challenges and future research directions. Pervasive and Mobile Computing 31: 1–2. http://dx.doi.org/10.1016/j.pmcj.2016.10.003 
      14. Xiaodong Lin, Kim-Kwang Raymond Choo, Ying-Dar Lin and Peter Mueller 2016. Guest Editorial: Network Forensics and Surveillance for Emerging Networks. IEEE Network 30(6): 4–5. http://dx.doi.org/10.1109/MNET.2016.7764272 
      15. Kim-Kwang Raymond Choo and Rick Sarre 2015. Guest Editors’ Introduction: Balancing Privacy with Legitimate Surveillance and Lawful Data Access. IEEE Cloud Computing 2(4): 8–13. http://dx.doi.org/10.1109/MCC.2015.84
    6. Program Chair, Annual ADFSL Conference on Digital Forensics, Security and Law (ADFSL 2018)
    7. Program Chair, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2018)
    8. Program Chair, National Cyber Summit 2018 – Research Track
    9. Program Chair, 3rd International Conference on Green, Pervasive and Cloud Computing (GPC 2017)
    10. Program Chair, 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2017)
    11. General Chair, 17th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2017)
    12. General Chair, 12th International Conference on Future Information Technology (FutureTech 2017)
    13. Co-Chair
      • "Digital Forensics, Data Analytics and Data Security" minitrack @, 24th Americas Conference on Information Systems (AMCIS 2018)
      • "Cyber-of-Things: Cyber-Crimes and Cyber-Security" minitrack @Hawaii International Conference on System Sciences (HICSS 2018)
      • "Cyber Threat Intelligence and Analytics" minitrack @Hawaii International Conference on System Sciences (HICSS 2018)

      Academic Visitors

      1. January 2015: Associate Professor Christian W. Probst, Technical University of Denmark 
      2. February 2015 – February 2016: Associate Professor Mengbo Hou, Shandong University’s Lab of Information Security and Cryptography (Supported by a China Scholarship Council Fellowship)
      3. June 2015: Associate Professor Yong Yu, University of Electronic Science and Technology of China
      4. July 2015 – April 2016: Opeyemi Osanaiye (Ph.D. Candidate), University of Cape Town, South Africa

      Prospective PhD Students 

      My door is always open to motivated individuals, particularly those with excellent academic records (and publication track record), who are interested in researching on cyber security and digital forensics (technical research), cyber crime (criminology and policy research), anti-money laundering / counter terrorism financing, cryptography and digital forensics. To see what types of problems I work on, please visit " "

      Since joining the University of South Australia in March 2011, I have supervised to completion one DIT, 16 Ph.D., 13 Master and nine Honours (eight 1st Class, and one 2nd Upper Class Honours) theses. 
      1. Angela Irwin, 2013 [Ph.D. Thesis: Money laundering and terrorism financing in virtual environments] - Currently, she is a Lecturer at the Centre for Policing, Intelligence and Counter Terrorism (PICT), Macquarie University. 
      2. Aswami Fadillah Mohd Ariffin, 2013 [Ph.D. Thesis: A general model of forensic data recovery framework for digital CCTV systems] - Currently, he is the Vice President of Cyber Security Responsive Services at CyberSecurity Malaysia.
      3. Yuan (Tom) Gao, 2014 [DIT Thesis: Commercial implementation of shared secret in middleware] - Currently, he is the Microsoft Application and Digital Manager at CSR Limited.
      4. Ben Martini, 2015  [Ph.D. Thesis: ForFACTS: a Forensic Framework for Analysis of Cloud Technologies and Services] - Currently, he is a Lecturer at the University of South Australia.
      5. Ki Hong (Steve) Chon, 2016, Australian National University [Ph.D. Thesis: Cybercrime Precursors: Towards a Model of Offender Resources] - Currently, he is a Data Scientist with NuData Security, Canada.
      6. Deepa Mani, 2016 [Ph.D. Thesis: Understanding Information Security Risk in Australian Real Estate Sectors]. Currently, she is a contracted academic at the University of South Australia.
      7. Ala' (Jordan) Aburumman, 2016 [Ph.D. Thesis: Secure Session Initiation Protocol Solutions for Mobile Ad Hoc Networks]. Currently, he is a contracted academic at the University of South Australia.
      8. Nurul Hidayah Ab Rahman, 2016 [Ph.D. Thesis: An Evidence-based Cloud Incident Handling Framework]. Currently, she is a Senior Lecturer at Universiti Tun Hussein Onn Malaysia, Malaysia.
      9. Opeyemi Osanaiye, 2016, University of Cape Town, South Africa, [Ph.D. Thesis: DDoS defence for service availability in cloud computing]. Currently, he is a Post-Doctoral Research Fellow at University of Pretoria, South Africa.
      10. Victor Prokhorenko, 2017 [Ph.D. Thesis: An intent-based behavioural intrusion prevention framework for PHP-based web applications]. Currently, he is a contracted academic at the University of South Australia.
      11. Abdullah Azfar, 2017 [Ph.D. Thesis: Forensic Taxonomies of Android Apps (ForTAApps)]. Currently, he is a Senior Digital Forensic Consultant at KPMG Australia.
      12. Pei Yee Chin, 2017 [Ph.D. Thesis: Factors Influencing Employees' Use of Enterprise Social Networks]. Currently, she is a Lecturer at Universiti Malaysia Sabah, Malaysia.
      13. Quang Do, 2017 [Ph.D. Thesis: An adversary model approach to securing smart devices]. 
      14. Darren Quick, 2017 [Ph.D. Thesis: Digital Forensic Data Reduction and Quick Analysis for Evidence and Intelligence]. Currently, he is a ‎Senior Intelligence Technologist with the Australian Government Department of Immigration and Border Protection.
      15. Christopher Tassone, 2017 [Ph.D. Thesis: A Mobile Forensic Visualisation Lifecycle]. He will be joining the Australian Government Department of Immigration and Border Protection.
      16. Alireza Heravi, 2017 [Ph.D. Thesis: Privacy attitudes and behaviours in online social networking].  
      17. Christian D’Orazio, 2017 [Ph.D. Thesis: An evidence-based adversary model for ios device and app vulnerability detection and exploitation]. He will be joining the Australian Government Department of Defence 
      I can be contacted on (email) raymond [DOT] choo [AT] fulbrightmail [DOT] org