Choo, Kim-Kwang Raymond  

Aug 2016 - Current: The University of Texas at San Antonio, USA 

  • Cloud Technology Endowed ProfessorshipDepartment of Information Systems and Cyber Security
  • Ph.D. Information Technology Program AdvisorDepartment of Information Systems and Cyber Security
  • Recipient of “UTSA College of Business Col. Jean Piccione and Lt. Col. Philip Piccione Endowed Research Award for Tenured Faculty”, 2018
  • Courtesy Appointment, Department of Electrical and Computer Engineering

Mar 2017 - Current: Adjunct Associate Professor, University of South Australia, Australia

Apr 2017 - CurrentHonorary Commander, 502nd Air Base Wing, Joint Base San Antonio-Fort Sam Houston, USA

Senior Member, IEEE
Fellow, Australian Computer Society 

Other affiliations

  • Mar 2011 – Mar 2017: Senior Lecturer, then Associate Professor, University of South Australia, Australia (and Recipient of "2014 Academic Impact and Uptake Award")
  • Sep 2015 – Feb 2016: Visiting Expert, INTERPOL Global Complex for Innovation (IGCI), Singapore
  • May 2015 – Dec 2016: Co-Chair, Education Council, Cloud Security Alliance (CSA) Asia Pacific, Singapore
  • Oct 2011 – Current: Justice of the Peace for South Australia, Australia
  • May 2008 – Current: Member of the International Consultancy Group (Research) @ United Nations Office on Drugs and Crime-Korean Institute of Criminology Virtual Forum against Cybercrime Programme
  • Aug – Dec 2009: Fulbright Scholar at Rutgers University School of Criminal Justice and Palo Alto Research Center (formerly Xerox PARC), USA
  • Jul 2006 – Mar 2011: Senior Research Analyst, Australian Government Australian Institute of Criminology, Australia (and Recipient of "2009 Fulbright Scholarship" and "2008 Australia Day Achievement Medallion")

Grants 

I am the recipient of the following grants: 
  • Principal Investigator. CPS Energy grant, USA "Smart grid security and attack-resilience: A forensics-driven approach"; $399,218 (09/2017–08/2019)
  • Co-Principal Investigator. Texas National Security Network Excellence Fund “Internet of Things Security & Forensics Lab” (2018)
  • Senior Personnel. National Science Foundation (NSF) CREST Center for Security and Privacy Enhanced Cloud Computing (2017-2022)
  • Co-Chief Investigator. Cooperative Research Centre for Data to Decision grant "Integrated Policing: Federated Data Platform"; AUD 1,236,883 (2016-2019)
  • Co-Chief Investigator. University of South Australia Research Themes Investment Scheme grant "Defence against the dark arts: guarding the public discourse from propaganda and fake news, and promoting truth, the whole truth and nothing but the truth in the media and social media" (2017-2019)
  • Co-Chief Investigator. auDa Foundation grant "Defence against the Dark Arts: resisting online social manipulation and propaganda" (2016-2019)
  • Co-Chief Investigator. Government of South Australia, SA Health grant "The feasibility and validity of obtaining pre-illness activity data in critically ill patients using 'smart-phone' technology: a validation study" (2016)
  • Co-Principal Investigator. Ministry of Education, Singapore grant "Toward secure and privacy-preserving computing in mobile cloud" (2015-2017)
  • Co-Principal Investigator. Nanyang Technology University College of Engineering, Singapore grant "Secure Fog Computing System Design and Implementation" (2015-2016)
  • Chief Investigator. University of South Australia Research Themes Investment Scheme grant "A Public Health Approach to Dealing with Sexting" (2015-2016)
  • Chief Investigator. National Drug Law Enforcement Research Fund (NRLERF) grant "Evidence-based digital forensic framework for drug (and other serious and organised) crime law enforcement investigations in the cloud computing environment"; AUD 269,319 (2013-2015) 
  • Co-Chief Investigator. BAE Systems stratsec grant "Information Security Research Winter School 2012" 
  • Co-Chief Investigator. National Drug Law Enforcement Research Fund (NRLERF) grant "Exploitation of Electronic Evidence from Mobile Phone Mediated Drug Crime"; AUD 271,040 (2011–2013)
  • Co-Chief Investigator. Australian Research Council Discovery Projects grant (DP1096833) "The evolution of cybercrime: the monitoring of serious crime in cyberspace"; AUD 350,000 (2010-2012)
  • Co-Chief Investigator. Australasian Institute of Judicial Administration Incorporated (AIJA) grant "ICT and the judiciary: multimedia glossary" (2011)

Research

I have co-edited nine (9) books entitled "Cloud Security Ecosystem" (published by Syngress: An Imprint of Elsevier, 2015)Mobile Security and Privacy” (published by Syngress: An Imprint of Elsevier, 2017) and “Contemporary Digital Forensic Investigations of Cloud and Mobile Applications” (published by Syngress: An Imprint of Elsevier, 2017), “Green, Pervasive, and Cloud Computing” (published in Springer’s Lecture Notes in Computer Science book series, 2017), Security, Privacy, and Anonymity in Computation, Communication, and Storage” (published in Springer’s Lecture Notes in Computer Science book series, 2017), Security, Privacy, and Anonymity in Computation, Communication, and Storage Workshops” (published in Springer’s Lecture Notes in Computer Science book series, 2017), Algorithms and Architectures for Parallel Processing” (published in Springer’s Lecture Notes in Computer Science book series, 2017), “Advanced Multimedia and Ubiquitous Engineering” (published in Springer’s Lecture Notes in Electrical Engineering book series, 2017), and International Conference on Applications and Techniques in Cyber Security and Intelligence” (published in Springer’s Advances in Intelligent Systems and Computing book series, 2018). I have also (co)authored a number of publications in the areas of cyber crime and security, and digital forensics including 
Secure Key Establishment
I am the co-inventor of two PCT and one provisional patent applications on digital forensics and mobile app security filed in 2015.

My Google Scholar H-index is 44 and i10-index is 192, and my Erdős number is 4. Citations of my research include governmental reports: 
  • (Australian) 2010 Australian Government House of Representatives Standing Committee on Communications Report on the Inquiry into Cyber Crime, 2011 Australian Government House of Representatives Joint Select Committee’s Report on Cyber-Safety, 2013 Australian Crime Commission Fact Sheet on “Cyber and Technology Enabled Crime”2013 Australian Government House of Representatives Joint Select Committee on Cyber-Safety's Report on the Inquiry into Cybersafety for Senior Australians, 
  • (International) Working paper for the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, United Nations Office on Drugs and Crime (UNODC) 2011 “Handbook on Identity-related Crime”, UNODC's “Conferencia de las Partes en la Convención de las Naciones Unidas contra la Delincuencia Organizada Transnacional” 2018, 2010 US CRS Report for Congress (Prepared for Members and Committees of Congress) entitled “Organized Crime: An Evolving Challenge for U.S. Law Enforcement”, International Centre for Missing & Exploited Children’s report “Online Grooming of Children for Sexual Purposes: Model Legislation & Global Review” (2017), International Telecommunication Union (ITU) 2011 “Understanding Cybercrime: A Guide For Developing Countries” report, 2012 UNODC “Wildlife and Forest Crime Analytic Toolkit” report, and 
    2013 UK Home Office report entitled "Cyber crime: A review of the evidence".
One of my published cryptographic protocols was included in two independent submissions to the IEEE 802.11, the working group setting the standards for wireless LANs, by computer scientists from Fujitsu Labs in America; and the Internet Engineering Task Force (IETF) / Network Working Group by a team of computer scientists from Tropos Networks (US), Toshiba, Huawei, and University of Murcia. A protocol jointly proposed with Sherman Chow (formerly of New York University, US) was used in the P2P solution of the Milagro TLS (pairing-based cryptography for Transport Layer Security) presented to the IETF by researchers from MIRACL Ltd in 2016.

My published design principle about how session keys should be constructed in cryptographic (key establishment) protocols that result in significant benefits for their security was cited in a special publication (SP 800-56A) – Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography – by the US National Institute of Standards and Technology. This is one of four academic (i.e. non-NIST and non-international standard) citations, and the other three academic citations are publications of (1) Professor Alfred Menezes (University of Waterloo), Professor Phillip Rogaway (UC Davis), Professor Mihir Bellare (UC San Diego), and Professor Dan Boneh (Stanford University) – the top scholars in the field. It is also cited in NIST Special Publication 800-56A Revision 2 (2013), and NIST Special Publication 800-56A Revision 3 (April 2018).

Awards 


I am also the recipient of various awards and scholarships including
  1. University of Texas at San Antonio (UTSA) College of Business Col. Jean Piccione and Lt. Col. Philip Piccione Endowed Research Award for Tenured Faculty”, 2018
  2. Winner, Cybersecurity Educator of the Year – APAC, 2016 (Cybersecurity Excellence Awards are produced in cooperation with the Information Security Community on LinkedIn).
  3. Best Research Paper Award, 20th European Symposium on Research in Computer Security (ESORICS 2015) - acceptance rate is 59/298 (~19.8%).
  4. Winning team in Germany's University of Erlangen-Nuremberg (FAU) Digital Forensics Research Challenge 2015.
  5. Highly Commended award by ANZPAA National Institute of Forensic Science (ANZPAA NIFS).
  6. "2014 Academic Impact and Uptake Award" which recognises researchers who have made important contributions to knowledge and have demonstrated excellence over a period of 5 years in research achievement in an area of strategic importance to the University of South Australia, research leadership and supervision, impact of research in terms of peer recognition and uptake, and strengthening of collaboration across world leading research institutions and groups.
  7. 2010 ACT Pearcey Award for “Taking a risk and making a difference in the development of the Australian ICT industry”
  8. 2010 Consensus IT Professional Award (one of 5 Winners) and 2010 Consensus IT Writers Award Finalist
  9. 2009 Fulbright Professional Scholarship in Australian-United States Alliance Studies, sponsored by the Australian Government Department of Foreign Affairs and Trade
  10. 2008 Australia Day Achievement Medallion in recognition of my dedication and contribution to the Australian Government's Australian Institute of Criminology (AIC), and through it to the public service of the nation
  11. British Computer Society's Wilkes Award for the best paper published in the 2007 volume of The Computer Journal (Oxford University Press)
  12. 2007 Queensland University of Technology (QUT)'s Faculty of Information Technology Executive Dean’s outstanding Ph.D. thesis commendation
  13. 2005 Australasian Conference on Information Security and Privacy (ACISP 2005) Best Student Paper Award

    Speaking Engagements (see "My Presentations") and Media ("My Media Interviews")

    I have been an invited speaker at a number of conferences in Australia and overseas such as the following:
    • Invited Witness in a private briefing on Bitcoin and alternative remittance systems to the Australian Government Parliamentary Joint Committee on Corporations and Financial Services, 28 March 2014
    • Distinguished Speaker at the International Summer School on Computational Forensics (SuCoFo 2016), Norwegian University of Science and Technology, Gjevik, Norway, September 2016
    • Invited Expert 
      1. Indian Government’s Global Initiative of Academic Networks (GIAN) one-week course on "Incident Handling and Forensics", 10 – 15 December 2017,
      2. United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI) Criminal Justice (Focus on Investigation, Prosecution, Adjudication, and International Cooperation)(J15-04250)Training, UNAFEI, Tokyo, Japan, 10 May –18 June 2015
      3. INTERPOL Cyber Research Agenda Workshop, INTERPOL Global Complex for Innovation, Singapore, 10 March 2015
      4. 2015 Taiwan International Symposium on Regional Security and Transnational Crimes, Taiwan, 18–23 October 2015, Organised by Ministry of Justice Investigation Bureau
      5. United Nations Office on Drugs and Crime–International Telecommunication Union (UNODC-ITU) 2011 Asia-Pacific Regional Workshop on Fighting Cybercrime
    • Keynote Speaker 
      1. International Workshop on Cyber Threat Intelligence Management (CyberTIM 2018 @ ARES), Hamburg, Germany, 27–30 August
      2. World Congress on Information Technology Applications and Services 2018, Jeju Island, South Korea, 20–22 February
      3. IEEE International Conference on Smart Cloud 2017 (SmartCloud 2017), New York, USA, 3–5 November
      4. ACM CCS International Workshop on Managing Insider Security Threats (MIST 2017 @ACM CCS), Dallas, USA, 30 October – 3 November
      5. Workshop on Security and Privacy in the Internet Of Things (SePrIoT 2017), in conjunction with EAI International Conference on Security and Privacy in Communication Networks, Niagara Falls, Canada, 22 –25 October
      6. International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017), in conjunction with IEEE/ACM CHASE 2017, Philadelphia, USA, 17–19 July
      7. SERENE-RISC Spring 2016 Workshop, Vancouver BC, Canada, 27–28 April 2016
      8. International Conference on Data Science and Data Intensive Systems (DSDIS 2015), Sydney, Australia, 11–13 December 2015 
      9. Cloud Security Alliance New Zealand Summit 2015, 27 November 2015 
      10. International Conference on Cloud Computing Research and Innovation (ICCCRI 2015), Co-organised by Infocomm Development Authority of Singapore, Singapore, 26-27 October 2015 
      11. CSO CXO Series Breakfast Event, Sydney, Australia, 31 July 2015, Organised by CSO Australia and Trend Micro 
      12. CSO CXO Series Breakfast Event, Melbourne, Australia, 30 July 2015, Organised by CSO Australia and Trend Micro 
      13. 2014 International Conference on Cyber-Crime Investigation and Cyber Security (Asia Pacific University of Technology and Innovation, Malaysia) 
      14. 2014 International Conference on Applied Linguistics & Language Teaching (National Taiwan University of Science and Technology, Taiwan) 
      15. 2014 Anti-Phishing Working Group (APWG)’s Counter-eCrime Operations Summit (CeCOS VIII) 
      16. 2011 Economic Crime Asia Conference (Nanyang Technological University, Singapore) 
      17. 2010 International Conference on Applied Linguistics (National Chiayi University, Taiwan) 
      18. ECPAT Taiwan’s 2008 Conference on Criminal Problems and Intervention Strategy
    • Plenary Speaker at the 2010 International Conference on Applied Linguistics
    I was one of over 20 international (and one of two Australian) experts consulted by the research team preparing McAfee's commissioned report entitled “Virtual Criminology Report 2009: Virtually Here: The Age of Cyber Warfare
     - 
    see
     

    Recent Professional Activities (see "Complete Listing")

    1. External Evaluation Member, IEEE Communications and Information Security Technical Committee (CISTC) Technical Recognition Award Committee (2015-2018).
    2. External Expert Reviewer for Academic Programs
      1. American Council on Education (2017, 2018)
      2. Australian Government Tertiary Education Quality Standards Agency (TEQSA) (2013, 2017) 
      3. New York University, School of Professional Studies (2017)
    3. External Expert Reviewer For Faculty Appointment, Tenure and Promotion
      1. Tenure Review, Department of Computer and Information Science, Fordham University (2018)
      2. Promotion to Full Professor, Department of Computer Science, Colorado State University (2017)
      3. Faculty Appointment, Tenure-Track Assistant Professor of Cyber Security, School of Computer Science and Engineering, Nanyang Technological University, Singapore (2017)
    4. External Expert Reviewer For Grant Proposal
      1. American Association for the Advancement of Science – Research Competitiveness Program (2018)
      2. National Science Foundation, Computer and Network Systems (2018) 
      3. National Science Foundation, Secure and Trustworthy Cyberspace: Education (2017)
      4. Netherlands Organisation for Scientific Research (2017)
      5. Qatar National Research Fund (QNRF)’s National Priorities Research Program (NPRP) (2018)
      6. Qatar National Research Fund (QNRF)’s Undergraduate Research Experience Program (UREP) (2018)
    5. External Search Committee Member for Journal Editor-in-Chief
      1. IEEE Cloud Computing (2018)
    6. Thesis Examiner
      1. Doctor of Philosophy (Ph.D.) thesis, University of Pretoria, South Africa (2017)
      2. Doctor of Philosophy (Ph.D.) thesis, University of New South Wales (UNSW) Sydney, Australia (2017)
      3. Doctor of Philosophy (Ph.D.) thesis, Universiti Putra Malaysia, Malaysia (2017) 
      4. Doctor of Philosophy (Ph.D.) thesis, University of Wollongong, Australia (2017)
    7. Guest Editor,
      1. Kim-Kwang Raymond Choo, Stefanos Gritzalis, Jong Hyuk Park. Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities. IEEE Transactions on Industrial Informatics [In press]. https://doi.org/10.1109/TII.2018.2841049
      2. Zhiyong Zhang, Kim-Kwang Raymond Choo, Brij B. Gupta. The Convergence of New Computing Paradigms and Big Data Analytics Methodologies for Online Social Networks. Journal of Computational Science [In press]. https://doi.org/10.1016/j.jocs.2018.04.007
      3. Kim-Kwang Raymond Choo, Matt Bishop, William Glisson and Kara Nance 2018. Internet- and cloud-of-things cybersecurity research challenges and advances. Computers & Security 74: 275–276. https://doi.org/10.1016/j.cose.2018.02.008
      4. Kim-Kwang Raymond Choo, Rongxing Lu, Liqun Chen and Xun Yi 2018. A foggy research future: Advances and future opportunities in fog computing research. Future Generation Computer Systems 78(2): 677–679. https://doi.org/10.1016/j.future.2017.09.014
      5. Kim-Kwang Raymond Choo, Yongtang Shi and Zengqiang Chen 2018. Measurements and security of complex networks and systems: Research advances and challenges Future Generation Computer Systems 83: 374–375. https://doi.org/10.1016/j.future.2018.03.001
      6. Neeraj Kumar, Joel J. P. C. Rodrigues, Mohsen Guizani, Kim-Kwang Raymond Choo, Rongxing Lu, Christos Verikoukis and Zhimeng Zhong 2018. Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment. IEEE Communications Magazine 56(5): 20–21. https://doi.org/10.1109/MCOM.2018.8360845
      7. Zhiyong Zhang, Kim-Kwang Raymond Choo, Arun Kumar Sangaiah, Liang Chen 2018. Crowd Computing for Social Media Ecosystems. Applied Soft Computing 66: 492-494. https://doi.org/10.1016/j.asoc.2018.02.045
      8. Kim-Kwang Raymond Choo, Jemal Abawajy and Rafiqul Islam 2017. Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions. Journal of Computer and System Sciences 83(1): 1–2. http://dx.doi.org/10.1016/j.jcss.2016.09.001 
      9. Kim-Kwang Raymond Choo, Yunsi Fei, Yang Xiang and Yu Yu 2017. Embedded Device Forensics and Security. ACM Transactions on Embedded Computing Systems 16(2): Article no 50. https://doi.org/10.1145/3015662  
      10. Kim-Kwang Raymond Choo, Mehran Mozaffari Kermani, Reza Azarderakhsh, Manimaran Govindarasu 2017. Emerging Embedded and Cyber Physical System Security Challenges and Innovations. IEEE Transactions on Dependable and Secure Computing 14(3): 235–236. https://doi.org/10.1109/TDSC.2017.2664183
      11. Kim-Kwang Raymond Choo, Omer F Rana and Muttukrishnan Rajarajan 2017. Cloud Security Engineering: Theory, Practice and Future Research. IEEE Transactions on Cloud Computing 5(3): 372–374. http://dx.doi.org/10.1109/TCC.2016.2582278 
      12. Debiao He, Kim-Kwang Raymond Choo and Neeraj Kumar 2017. Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies. Computers & Electrical Engineering 63: 157–159. https://doi.org/10.1016/j.compeleceng.2017.09.023
      13. Weiyao Lin, Zheng Xu, Yunhuai Liu, Neil Y. Yen, Kim-Kwang Raymond Choo and Vijayan Sugumaran  2017. IEEE Access Special Section Editorial: Intelligent Sensing On Mobile and Social Media Analytics. IEEE Access 5: 27841–27844. http://dx.doi.org/10.1109/ACCESS.2017.2783138
      14. Joseph L Liu, Raymond Choo, Xinyi Huang and Man Ho Au 2017. Special issue on security and privacy for smart cities. Personal and Ubiquitous Computing 21(5): 775-775. http://dx.doi.org/10.1007/s00779-017-1043-z
      15. Zheng Xu, Yunhuai Liu, Kim-Kwang Raymond Choo and Neil Y. Yen 2017. Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems. Wireless Personal Communications. Wireless Personal Communications. http://dx.doi.org/10.1007/s11277-017-4278-0
      16. Zhiyong Zhang and Kim-Kwang Raymond Choo 2017. Guest Editorial: Multimedia Social Network Security and Applications. Multimedia Tools and Applications 76(3): 3163–3168. http://dx.doi.org/10.1007/s11042-016-4081-z 
      17. Elisa Bertino, Kim-Kwang Raymond Choo 2016, Dimitrios Georgakopoulos and Surya Nepal. Internet of Things (IoT): Smart and Secure Service Delivery. ACM Transactions on Internet Technology 16(4): Article no 22. https://doi.org/10.1145/3013520 
      18. Kim-Kwang Raymond Choo, Josep Domingo-Ferrer and Lei Zhang 2016. Cloud Cryptography: Theory, Practice and Future Research Directions. Future Generation Computer Systems 62: 51–53, 2016. http://dx.doi.org/10.1016/j.future.2016.04.017 
      19. Kim-Kwang Raymond Choo, Martin Herman, Michaela Iorga and Ben Martini 2016. Cloud Forensics: State-of-the-Art and Future Directions. Digital Investigation, 18: 77–78. http://dx.doi.org/10.1016/j.diin.2016.08.003 
      20. Kim-Kwang Raymond Choo, Lior Rokach and Claudio Bettini 2016. Mobile security and privacy: Advances, challenges and future research directions. Pervasive and Mobile Computing 31: 1–2. http://dx.doi.org/10.1016/j.pmcj.2016.10.003 
      21. Xiaodong Lin, Kim-Kwang Raymond Choo, Ying-Dar Lin and Peter Mueller 2016. Guest Editorial: Network Forensics and Surveillance for Emerging Networks. IEEE Network 30(6): 4–5. http://dx.doi.org/10.1109/MNET.2016.7764272 
      22. Kim-Kwang Raymond Choo and Rick Sarre 2015. Guest Editors’ Introduction: Balancing Privacy with Legitimate Surveillance and Lawful Data Access. IEEE Cloud Computing 2(4): 8–13. http://dx.doi.org/10.1109/MCC.2015.84
    8. Program Chair, Annual ADFSL Conference on Digital Forensics, Security and Law (ADFSL 2018)
    9. Program Chair, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2018)
    10. Program Chair, IEEE International Symposium on Big Data and Cloud Computing (BDCloud 2018)
    11. Program Chair, National Cyber Summit 2018 – Research Track
    12. Program Chair, International Symposium on Cyberspace Safety and Security (CSS 2018)
    13. General Co-Chair and Steering Committee Co-Chair, International Workshop on Cyberspace Security (IWCSS 2018), in conjunction with the 15th IEEE International Conference on Advanced and Trusted Computing (ATC 2018)
    14. Co-Chair
      • "Cyber-of-Things: CyberCrimes, CyberSecurity and CyberForensics" minitrack @Hawaii International Conference on System Sciences (HICSS 2019)
      • "Cyber Threat Intelligence and Analytics" minitrack @Hawaii International Conference on System Sciences (HICSS 2019) 
      • Steering Committee, IEEE International Conference on Computational Science and Engineering (CSE 2018), University Politehnica of Bucharest, Romania
    15. Steering Committee, IEEE International Conference on Computational Science and Engineering (CSE 2018), University Politehnica of Bucharest, Romania

      Academic Visitors

      1. January 2015: Associate Professor Christian W. Probst, Technical University of Denmark 
      2. February 2015 – February 2016: Associate Professor Mengbo Hou, Shandong University’s Lab of Information Security and Cryptography (Supported by a China Scholarship Council Fellowship)
      3. June 2015: Associate Professor Yong Yu, University of Electronic Science and Technology of China
      4. July 2015 – April 2016: Opeyemi Osanaiye (Ph.D. Candidate), University of Cape Town, South Africa

      Prospective PhD Students 

      My door is always open to motivated individuals, particularly those with excellent academic records (and publication track record), who are interested in researching on cyber security and digital forensics (technical research), cyber crime (criminology and policy research), anti-money laundering / counter terrorism financing, cryptography and digital forensics. To see what types of problems I work on, please visit " "

      Since joining the University of South Australia in March 2011, I have supervised to completion one DIT, 16 Ph.D., 13 Master and nine Honours (eight 1st Class, and one 2nd Upper Class Honours) theses. 
      1. Angela Irwin, 2013 [Ph.D. Thesis: Money laundering and terrorism financing in virtual environments] - Currently, she is a Cyber Security Consultant Manager, KPMG, Australia. 
      2. Aswami Fadillah Mohd Ariffin, 2013 [Ph.D. Thesis: A general model of forensic data recovery framework for digital CCTV systems] - Currently, he is the Vice President of Cyber Security Responsive Services at CyberSecurity Malaysia.
      3. Yuan (Tom) Gao, 2014 [DIT Thesis: Commercial implementation of shared secret in middleware] - Currently, he is the Chief Technology and Digital Officer at City of Sydney, Australia.
      4. Ben Martini, 2015  [Ph.D. Thesis: ForFACTS: a Forensic Framework for Analysis of Cloud Technologies and Services] - Currently, he is a Lecturer at the University of South Australia.
      5. Ki Hong (Steve) Chon, 2016, Australian National University [Ph.D. Thesis: Cybercrime Precursors: Towards a Model of Offender Resources] - Currently, he is a Senior Manager - Intelligence & Research Analytics at HSBC, Canada.
      6. Deepa Mani, 2016 [Ph.D. Thesis: Understanding Information Security Risk in Australian Real Estate Sectors]. Currently, she is a Data Analyst at Health Care Australia.
      7. Ala' (Jordan) Aburumman, 2016 [Ph.D. Thesis: Secure Session Initiation Protocol Solutions for Mobile Ad Hoc Networks]. Currently, he is a Lecturer at South Australian Institute of Business & Technology.
      8. Nurul Hidayah Ab Rahman, 2016 [Ph.D. Thesis: An Evidence-based Cloud Incident Handling Framework]. Currently, she is a Senior Lecturer at Universiti Tun Hussein Onn Malaysia, Malaysia.
      9. Opeyemi Osanaiye, 2016, University of Cape Town, South Africa, [Ph.D. Thesis: DDoS defence for service availability in cloud computing]. Currently, he is a Post-Doctoral Research Fellow at University of Pretoria, South Africa.
      10. Victor Prokhorenko, 2017 [Ph.D. Thesis: An intent-based behavioural intrusion prevention framework for PHP-based web applications]. Currently, he is a Research Associate, Centre for Research on Engineering Software Technologies, University of Adelaide, Australia.
      11. Abdullah Azfar, 2017 [Ph.D. Thesis: Forensic Taxonomies of Android Apps (ForTAApps)]. Currently, he is a Senior Digital Forensic Consultant at KPMG Australia.
      12. Pei Yee Chin, 2017 [Ph.D. Thesis: Factors Influencing Employees' Use of Enterprise Social Networks]. Currently, she is a Senior Lecturer and Deputy Director (Industry Network) at the Centre of Industry and Community Network, Universiti Malaysia Sabah, Malaysia.
      13. Quang Do, 2017 [Ph.D. Thesis: An adversary model approach to securing smart devices]. Currently, he is a consultant at Aligent Consulting, Australia.
      14. Darren Quick, 2017 [Ph.D. Thesis: Digital Forensic Data Reduction and Quick Analysis for Evidence and Intelligence]. Currently, he is a ‎Senior Intelligence Technologist with the Australian Government Department of Home Affairs.
      15. Christopher Tassone, 2017 [Ph.D. Thesis: A Mobile Forensic Visualisation Lifecycle]. He is with a Cyber Security Researcher with the Australian Government Department of Home Affairs.
      16. Alireza Heravi, 2017 [Ph.D. Thesis: Privacy attitudes and behaviours in online social networking].  
      17. Christian D’Orazio, 2017 [Ph.D. Thesis: An evidence-based adversary model for iOS device and app vulnerability detection and exploitation]. He is with a Cyber Security Researcher and Software Technical Analyst with the Defence Science and Technology Group of the Australian Department of Defence.
      18. Niken Cahyani, 2017 [Ph.D. Thesis: An evidence-based process model for Windows Phone 8 forensics]. Currently, she is a Senior Lecturer at Telkom University, Indonesia.
      I can be contacted on (email) raymond [DOT] choo [AT] fulbrightmail [DOT] org