Choo, Kim-Kwang Raymond  

Aug 2016 - Current: The University of Texas at San Antonio, USA 

  • Cloud Technology Endowed ProfessorshipDepartment of Information Systems and Cyber Security
  • Ph.D. Information Technology Program AdvisorDepartment of Information Systems and Cyber Security
  • Recipient of “UTSA College of Business Col. Jean Piccione and Lt. Col. Philip Piccione Endowed Research Award for Tenured Faculty”, 2018
  • Courtesy Appointment, Department of Electrical and Computer Engineering

Aug 2016 - Current: Courtesy Appointment, University of South Australia, Australia

Apr 2017 - CurrentHonorary Commander, 502nd Air Base Wing, Joint Base San Antonio-Fort Sam Houston, USA

Senior Member, IEEE
Fellow, Australian Computer Society 
Co-Chair, IEEE Multimedia Communications Technical Committee (MMTC)’s Digital Rights Management for Multimedia Interest Group 

Other affiliations

  • Mar 2011 – Aug 2016: Senior Lecturer, then Associate Professor, University of South Australia, Australia (and Recipient of "2014 Academic Impact and Uptake Award")
  • Sep 2015 – Feb 2016: Visiting Expert, INTERPOL Global Complex for Innovation (IGCI), Singapore
  • May 2015 – Dec 2016: Co-Chair, Education Council, Cloud Security Alliance (CSA) Asia Pacific, Singapore
  • Oct 2011 – Current: Justice of the Peace for South Australia, Australia
  • May 2008 – Current: Member of the International Consultancy Group (Research) @ United Nations Office on Drugs and Crime-Korean Institute of Criminology Virtual Forum against Cybercrime Programme
  • Aug – Dec 2009: Fulbright Scholar at Rutgers University School of Criminal Justice and Palo Alto Research Center (formerly Xerox PARC), USA
  • Jul 2006 – Mar 2011: Senior Research Analyst, Australian Government Australian Institute of Criminology, Australia (and Recipient of "2009 Fulbright Scholarship" and "2008 Australia Day Achievement Medallion")


I am the recipient of the following competitive research grants: 
  • Partner Investigator. Australian Research Council Discovery Projects “The right to be forgotten: GDPR modelling in cross-domain social networks”; AUD 450,000 (2020 – 2022)
  • Co-Principal Investigator (Co-PI). CPS Energy “Secure, Resilient and Smart Grid Cyber-Physical Situational Understanding using Data Driven Decision-Making and AI”; USD 469,000 (Sep 2019 – Aug 2021)
  • Principal Investigator (PI). University of Texas at San Antonio (UTSA) and Tecnológico de Monterrey (ITESM) Seed Funding “Cyberattack Mitigation in Software Defined Networks”; USD 80,000 (Sep 2019 – Aug 2020)
  • Principal Investigator (PI). National Science Foundation (NSF) “CCRI: Planning: Collaborative Research: A Software-defined Wireless Communications Network Research Infrastructure for the Industrial Internet of Things(IIoT)Research Community” (Sep 2019 – Aug 2020)
  • Co-PI. NASA “STTR: NASA: ROBOT: Rules Oriented Blockchain Operations Transactor” (Sep 2019 – Aug 2020)
  • Co-PI. LGS Innovations “Malware Propagation Modeling”, USD 149,000 (Feb 2019 – Jan 2020)
  • Principal Investigator (PI). CPS Energy  "Smart grid security and attack-resilience: A forensics-driven approach"; USD 399,218 (Sep 2017– Aug 2019)
  • Co-PI. Texas National Security Network Excellence Fund “Internet of Things Security & Forensics Lab” (2018)
  • Senior Personnel. National Science Foundation (NSF) CREST Center for Security and Privacy Enhanced Cloud Computing (2017-2022)
  • Co-Chief Investigator (CI). Cooperative Research Centre for Data to Decision grant "Integrated Policing: Federated Data Platform"; AUD 1,236,883 (2016-2019)
  • Co-CI. University of South Australia Research Themes Investment Scheme grant "Defence against the dark arts: guarding the public discourse from propaganda and fake news, and promoting truth, the whole truth and nothing but the truth in the media and social media" (2017-2019)
  • Co-CI. auDa Foundation grant "Defence against the Dark Arts: resisting online social manipulation and propaganda" (2016-2019)
  • Co-CI. Government of South Australia, SA Health grant "The feasibility and validity of obtaining pre-illness activity data in critically ill patients using 'smart-phone' technology: a validation study" (2016)
  • Co-PI. Ministry of Education, Singapore grant "Toward secure and privacy-preserving computing in mobile cloud" (2015-2017)
  • Co-PI. Nanyang Technology University College of Engineering, Singapore grant "Secure Fog Computing System Design and Implementation" (2015-2016)
  • CI. University of South Australia Research Themes Investment Scheme grant "A Public Health Approach to Dealing with Sexting" (2015-2016)
  • CI. National Drug Law Enforcement Research Fund (NRLERF) grant "Evidence-based digital forensic framework for drug (and other serious and organised) crime law enforcement investigations in the cloud computing environment"; AUD 269,319 (2013-2015) 
  • Co-CI. BAE Systems stratsec grant "Information Security Research Winter School 2012" 
  • Co-CI. National Drug Law Enforcement Research Fund (NRLERF) grant "Exploitation of Electronic Evidence from Mobile Phone Mediated Drug Crime"; AUD 271,040 (2011–2013)
  • Co-CI. Australian Research Council Discovery Projects grant (DP1096833) "The evolution of cybercrime: the monitoring of serious crime in cyberspace"; AUD 350,000 (2010-2012)
  • Co-CI. Australasian Institute of Judicial Administration Incorporated (AIJA) grant "ICT and the judiciary: multimedia glossary" (2011)


I have co-edited 18 books published by Elsevier, IET and Springer, including "Digital Forensic Education: An Experiential Learning Approach" where we documented our experiential learning experience in the digital forensic courses taught at UTSA (and eight of the students’ reports are included as chapters in the book). I have also (co)authored a number of publications in the areas of cyber crime and security, and digital forensics including 
Secure Key Establishment
I am the co-inventor of two Australian PCT and one Australian provisional patent applications on digital forensics and mobile app security filed in 2015 (which unfortunately are no longer supported after I moved from Australia to US). I am also the co-inventor of three US regular patent applications on lightweight cryptographic scheme for mobile devices and a code-based cryptographic scheme (i.e. post-quantum) filed in 2019.

My Google Scholar citations > 14,000, H-index is 63, and i10-index is >300, and my Erdős number is 4. Citations of my research include governmental reports: 
  • (Australian) 2010 Australian Government House of Representatives Standing Committee on Communications Report on the Inquiry into Cyber Crime, 2011 Australian Government House of Representatives Joint Select Committee’s Report on Cyber-Safety, 2013 Australian Crime Commission Fact Sheet on “Cyber and Technology Enabled Crime”2013 Australian Government House of Representatives Joint Select Committee on Cyber-Safety's Report on the Inquiry into Cybersafety for Senior Australians, 
  • (International) Working paper for the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, United Nations Office on Drugs and Crime (UNODC) 2011 “Handbook on Identity-related Crime”, UNODC's “Conferencia de las Partes en la Convención de las Naciones Unidas contra la Delincuencia Organizada Transnacional” 2018, 2010 US CRS Report for Congress (Prepared for Members and Committees of Congress) entitled “Organized Crime: An Evolving Challenge for U.S. Law Enforcement”, International Centre for Missing & Exploited Children’s report “Online Grooming of Children for Sexual Purposes: Model Legislation & Global Review” (2017), International Telecommunication Union (ITU) 2011 “Understanding Cybercrime: A Guide For Developing Countries” report, 2012 UNODC “Wildlife and Forest Crime Analytic Toolkit” report, and 
    2013 UK Home Office report entitled "Cyber crime: A review of the evidence".
One of my published cryptographic protocols was included in two independent submissions to the IEEE 802.11, the working group setting the standards for wireless LANs, by computer scientists from Fujitsu Labs in America; and the Internet Engineering Task Force (IETF) / Network Working Group by a team of computer scientists from Tropos Networks (US), Toshiba, Huawei, and University of Murcia. A protocol jointly proposed with Sherman Chow (formerly of New York University, US) was used in the P2P solution of the Milagro TLS (pairing-based cryptography for Transport Layer Security) presented to the IETF by researchers from MIRACL Ltd in 2016.

My published design principle about how session keys should be constructed in cryptographic (key establishment) protocols that result in significant benefits for their security was cited in a special publication (SP 800-56A) – Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography – by the US National Institute of Standards and Technology. This is one of four academic (i.e. non-NIST and non-international standard) citations, and the other three academic citations are publications of (1) Professor Alfred Menezes (University of Waterloo), Professor Phillip Rogaway (UC Davis), Professor Mihir Bellare (UC San Diego), and Professor Dan Boneh (Stanford University) – the top scholars in the field. It is also cited in NIST Special Publication 800-56A Revision 2 (2013), and NIST Special Publication 800-56A Revision 3 (April 2018).


I am also the recipient of various awards and scholarships including
  1. IEEE Technical Committee on Scalable Computing (TCSC) Award for Excellence in Scalable Computing (Middle Career Researcher) 2019 (Citation: For significant contributions to cyber forensics, particularly in cloud computing and Internet of Things)
  2. Best Paper Award, 2019 EURASIP Journal on Wireless Communications and Networking (JWCN), Springer
  3. British Computer Society's 2019 Wilkes Award's Runner-up for a paper published in the 2018 volume of The Computer Journal (Oxford University Press)
  4. IEEE Outstanding Paper Award from IEEE Blockchain 2019
  5. Journal of Information Processing Systems (JIPS) Survey Paper Award (Gold) 2019
  6. Two papers were among the five articles in the “Best of IEEE Blockchain Technical Briefs 2018” collection
  7. Outstanding Associate Editor of 2018 for IEEE Access, IEEE
  8. Best Paper Award, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom 18)
  9. Best Student Paper Award, 15th International Conference on Information Security and Cryptology (Inscrypt 2019)
  10. University of Texas at San Antonio (UTSA) College of Business Col. Jean Piccione and Lt. Col. Philip Piccione Endowed Research Award for Tenured Faculty”, 2018
  11. Winner, Cybersecurity Educator of the Year – APAC, 2016 (Cybersecurity Excellence Awards are produced in cooperation with the Information Security Community on LinkedIn).
  12. Best Research Paper Award, 20th European Symposium on Research in Computer Security (ESORICS 2015) - acceptance rate is 59/298 (~19.8%).
  13. Winning team in Germany's University of Erlangen-Nuremberg (FAU) Digital Forensics Research Challenge 2015.
  14. Highly Commended award by ANZPAA National Institute of Forensic Science (ANZPAA NIFS).
  15. "2014 Academic Impact and Uptake Award" which recognises researchers who have made important contributions to knowledge and have demonstrated excellence over a period of 5 years in research achievement in an area of strategic importance to the University of South Australia, research leadership and supervision, impact of research in terms of peer recognition and uptake, and strengthening of collaboration across world leading research institutions and groups.
  16. 2010 ACT Pearcey Award for “Taking a risk and making a difference in the development of the Australian ICT industry”
  17. 2010 Consensus IT Professional Award (one of 5 Winners) and 2010 Consensus IT Writers Award Finalist
  18. 2009 Fulbright Professional Scholarship in Australian-United States Alliance Studies, sponsored by the Australian Government Department of Foreign Affairs and Trade
  19. 2008 Australia Day Achievement Medallion in recognition of my dedication and contribution to the Australian Government's Australian Institute of Criminology (AIC), and through it to the public service of the nation
  20. British Computer Society's 2018 Wilkes Award for the best paper published in the 2007 volume of The Computer Journal (Oxford University Press)
  21. 2007 Queensland University of Technology (QUT)'s Faculty of Information Technology Executive Dean’s outstanding Ph.D. thesis commendation
  22. 2005 Australasian Conference on Information Security and Privacy (ACISP 2005) Best Student Paper Award

    Speaking Engagements (see "My Presentations") and Media ("My Media Interviews")

    I have been an invited speaker at a number of conferences in Australia and overseas such as the following:
    • Invited Witness in a private briefing on Bitcoin and alternative remittance systems to the Australian Government Parliamentary Joint Committee on Corporations and Financial Services, 28 March 2014
    • Distinguished Speaker at the International Summer School on Computational Forensics (SuCoFo 2016), Norwegian University of Science and Technology, Gjevik, Norway, September 2016
    • Invited Expert 
      1. Panel: Robotics, Cyberlaw, Electronic Evidence, Cybersecurity: New Opportunities & Challenges. ICCE Conference Excellence and Innovation: Today and Tomorrow 2018, Dubai, 7–8 November 2018
      2. Indian Government’s Global Initiative of Academic Networks (GIAN) one-week course on "Incident Handling and Forensics", 10–15 December 2017
      3. United Nations Asia and Far East Institute for the Prevention of Crime and the Treatment of Offenders (UNAFEI) Criminal Justice (Focus on Investigation, Prosecution, Adjudication, and International Cooperation)(J15-04250)Training, UNAFEI, Tokyo, Japan, 10 May –18 June 2015
      4. INTERPOL Cyber Research Agenda Workshop, INTERPOL Global Complex for Innovation, Singapore, 10 March 2015
      5. 2015 Taiwan International Symposium on Regional Security and Transnational Crimes, Taiwan, 18–23 October 2015, Organised by Ministry of Justice Investigation Bureau
      6. United Nations Office on Drugs and Crime–International Telecommunication Union (UNODC-ITU) 2011 Asia-Pacific Regional Workshop on Fighting Cybercrime
    • Keynote / Distinguished Speaker  
      1. International Conference on Smart City and Informatization (iSCI 2019) and International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2019), Guangzhou, China, 12–15 November
      2. Southwestern Texas Asian Symposium (SWTAS 2019), Texas A&M University-Kingsville, USA, 1 November
      3. International Summer School on Computational Forensics (SuCoFo2019), Norwegian University of Science and Technology, 26–30 August
      4. IEEE International Symposium on Parallel and Distributed Processing with Applications (IEEE ISPA 2018), Melbourne, Australia, 11–13 December
      5. International Workshop on Cyber Threat Intelligence Management (CyberTIM 2018 @ ARES), Hamburg, Germany, 27–30 August
      6. World Congress on Information Technology Applications and Services 2018, Jeju Island, South Korea, 20–22 February
      7. IEEE International Conference on Smart Cloud 2017 (SmartCloud 2017), New York, USA, 3–5 November
      8. ACM CCS International Workshop on Managing Insider Security Threats (MIST 2017 @ACM CCS), Dallas, USA, 30 October – 3 November
      9. Workshop on Security and Privacy in the Internet Of Things (SePrIoT 2017), in conjunction with EAI International Conference on Security and Privacy in Communication Networks, Niagara Falls, Canada, 22 –25 October
      10. International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017), in conjunction with IEEE/ACM CHASE 2017, Philadelphia, USA, 17–19 July
      11. SERENE-RISC Spring 2016 Workshop, Vancouver BC, Canada, 27–28 April 2016
      12. International Conference on Data Science and Data Intensive Systems (DSDIS 2015), Sydney, Australia, 11–13 December 2015 
      13. Cloud Security Alliance New Zealand Summit 2015, 27 November 2015 
      14. International Conference on Cloud Computing Research and Innovation (ICCCRI 2015), Co-organised by Infocomm Development Authority of Singapore, Singapore, 26-27 October 2015 
      15. CSO CXO Series Breakfast Event, Sydney, Australia, 31 July 2015, Organised by CSO Australia and Trend Micro 
      16. CSO CXO Series Breakfast Event, Melbourne, Australia, 30 July 2015, Organised by CSO Australia and Trend Micro 
      17. 2014 International Conference on Cyber-Crime Investigation and Cyber Security (Asia Pacific University of Technology and Innovation, Malaysia) 
      18. 2014 International Conference on Applied Linguistics & Language Teaching (National Taiwan University of Science and Technology, Taiwan) 
      19. 2014 Anti-Phishing Working Group (APWG)’s Counter-eCrime Operations Summit (CeCOS VIII) 
      20. 2011 Economic Crime Asia Conference (Nanyang Technological University, Singapore) 
      21. 2010 International Conference on Applied Linguistics (National Chiayi University, Taiwan) 
      22. ECPAT Taiwan’s 2008 Conference on Criminal Problems and Intervention Strategy
    • Plenary Speaker at the 2010 International Conference on Applied Linguistics
    I was one of over 20 international (and one of two Australian) experts consulted by the research team preparing McAfee's commissioned report entitled “Virtual Criminology Report 2009: Virtually Here: The Age of Cyber Warfare

    Recent Professional Activities (see "Complete Listing")

    1. Advisory Board Member, Global Telecom Inter-Payments Alliance (GTiP Alliance) (2018-Current)
    2. Advisory Board Member, ACCEPT: Addressing Cybersecurity and Cybercrime via a co-Evolutionary aPproach to reducing human-relaTed risks (EP/P011896/1), an EU-funded project (2017-Current)
    3. Evaluation Member, IEEE Communications and Information Security Technical Committee (CISTC) Technical Recognition Award Committee (2016-Current)
    4. Evaluation Member, IEEE CISTC Outstanding Service Award Committee (2016-Current)
    5. External Expert Reviewer for Academic Programs
      1. American Council on Education (2017, 2018)
      2. Australian Government Tertiary Education Quality Standards Agency (TEQSA) (2013, 2017) 
      3. Beijing Institute of Technology, Computer Science and Technology Program (2018)
      4. New York University, School of Professional Studies (2017)
      5. University College Dublin, Ireland, MSc Forensic Computing and Cybercrime Investigation (2017–2019)
    6. External Expert Reviewer For Faculty Appointment, Tenure and Promotion, and Peer Review
      1. Tenure Review and Promotion to Associate Professor, School of Criminology, Simon Fraser University (2019)
      2. Tenure Review and Promotion to Associate Professor, Department of Computer and Information Science, Fordham University (2018)
      3. Tenure Review and Promotion to Associate Professor, Department of Business & Information Technology Missouri University of Science and Technology (2018)
      4. Promotion to Associate Professor, Department of Information Systems, College of Computer and Information Sciences, King Saud University, Kingdom of Saudi Arabia (2019)
      5. Promotion to Associate Professor, School of Computing and Mathematics, Charles Sturt University, Australia (2018)
      6. Promotion to Full Professor, Department of Computer Science, Colorado State University (2017)
      7. Faculty Appointment, Tenure-Track Lecturer of Cyber Security, School of Engineering and Information Technology, University of New South Wales (UNSW) Canberra @Australian Defence Force Academy, Australia (2018)
      8. Faculty Appointment, Tenure-Track Assistant Professor of Cyber Security, School of Computer Science and Engineering, Nanyang Technological University, Singapore (2017)
      9. Expert Peer Review, National Research Foundation, South Africa (2018)
      10. Expert Peer Review, University of Exeter’s UKRI Future Leader Fellowship (2019)
    7. External Expert Reviewer For Grant Proposal
      1. Agency for Science, Technology and Research (A*STAR), Singapore 
        1. A*STAR Science and Engineering Research Council (SERC) and the Federal Ministry of Education and Research (Bundesministerium für Bildung und Forschung, BMBF)’s “2nd Singapore-Germany Academic-Industry (2+2) International Collaboration” (2019)
      2. American Association for the Advancement of Science – Research Competitiveness Program (2018)
      3. Australian Research Council (ARC)
        1. ARC Linkage (2018, 2019, 2020)
        2. ARC Centres of Excellence Expression of Interest 2020 (2018)
      4. Canada Research Chairs Program
        1. Tier 1 Chair (2019)
      5. Czech Science Foundation (2018)
      6. Dutch Research Council (NOW, 2019)
      7. Irish Research Council 
        1. Advanced Laureate Awards (2018) 
        2. Postgraduate Scholarship programme (2018)
      8. Israeli Ministry of Science and Technology (2019)
      9. Mauritius Research Council (2018)
      10. National Research Council, Canada 
        1. Ideation Fund’s Small Teams Initiative (2019)
      11. Natural Sciences and Engineering Research Council of Canada (2018)
      12. National Science Foundation, Computer and Network Systems (2018) 
      13. National Science Foundation, Secure and Trustworthy Cyberspace: Education (2017)
      14. Netherlands Organisation for Scientific Research (2017)
      15. New Zealand Cyber Security Research Programme (CSRP), a joint research programme between New Zealand universities and Australian counterparts coordinated by Data61 (2019)
      16. Oak Ridge Associated Universities (ORAU) 
        1. Nazarbayev University Research Council, Astana (2019)c
      17. Science Foundation Ireland (2019), SFI Research Professorship Programme
      18. Swiss National Science Foundation (2019)
      19. UK’s Research and Innovation (UKRI) Centre for Doctoral Training (2018)
      20. United States Department of Defense Scholarship-For-Service (SMART) Program (2019)
      21. University of Sharjah, UAE (2019)
      22. Qatar National Research Fund (QNRF)’s National Priorities Research Program (NPRP) (2018)
      23. Qatar National Research Fund (QNRF)’s Undergraduate Research Experience Program (UREP) (2018)
    8. External Search Committee Member for Journal Editor-in-Chief
      1. IEEE Cloud Computing (2018)
    9. Thesis Examiner
      1. Doctor of Philosophy (Ph.D.) thesis, Anna University, India (2019)
      2. Doctor of Philosophy (Ph.D.) thesis, Central University of Rajasthan (2019)
      3. Doctor of Philosophy (Ph.D.) thesis, Defence Institute of Advanced Technology, India (2018)
      4. Doctor of Philosophy (Ph.D.) thesis, Indian Institute of Technology (Indian School of Mines) Dhanbad, India (2018)
      5. Doctor of Philosophy (Ph.D.) thesis, Melbourne University, Australia (2018)
      6. Doctor of Philosophy (Ph.D.) thesis, University of Malaya (2018)
      7. Doctor of Philosophy (Ph.D.) thesis, University of Pretoria, South Africa (2017, 2018)
      8. Doctor of Philosophy (Ph.D.) thesis, University of New South Wales (UNSW) Sydney, Australia (2017)
      9. Doctor of Philosophy (Ph.D.) thesis, University of New South Wales (UNSW) Canberra, Australia (2018)
      10. Doctor of Philosophy (Ph.D.) thesis, Universiti Putra Malaysia, Malaysia (2017) 
      11. Doctor of Philosophy (Ph.D.) thesis, University of Technology Sydney, Australia (2019)
      12. Doctor of Philosophy (Ph.D.) thesis, University of Wollongong, Australia (2017)
      13. Doctor of Philosophy (Ph.D.) thesis, Visvesvaraya Technological University, India (2018, 2019)
    10. Guest Editor,
      1. Shaohua Wan, Tariq Umer and Kim-Kwang Raymond Choo 2020. Introduction to the special section on blockchain technologies for industrial Internet of Things (SI-bciot). Computers & Electrical Engineering 81: Article 106538.  
      2. Kim-Kwang Raymond Choo, Jemal Abawajy and Rafiqul Islam 2019. Special issue on cybersecurity in the critical infrastructure: Advances and future directions. Journal of Computer and System Sciences 102: 40–41. 
      3. Kim-Kwang Raymond Choo and Sambit Bakshi 2019. Editorial Note: Ubiquitous Visual Surveillance for Public Security. Multimedia Tools and Applications 78(5): 5535–5535.
      4. Kim-Kwang Raymond Choo, Mauro Conti and Ali Dehghantanha 2019. Special Issue on Big Data Applications in Cyber Security and Threat Intelligence – Part 1. IEEE Transactions on Big Data 5(3): 279–281. 
      5. Yulei Wu, Zheng Yan, Kim-Kwang Raymond Choo and Laurence T. Yang 2019. IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management. IEEE Access 7: 65223–65227. 
      6. Jose M de Fuentes, Lorena Gonzalez-Manzano, Javier Lopez, Pedro Peris-Lopez and Kim-Kwang Raymond Choo 2019. Editorial: Security and Privacy in Internet of Things. Mobile Networks and Applications 24(3): 878–880.
      7. Silvio Barra, Kim-Kwang Raymond Choo, Michele Nappi, Arcangelo Castiglione, Fabio Narducci and Rajiv Ranjan 2018. Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications. IEEE Cloud Computing 5(4): 33–37.
      8. Kim-Kwang Raymond Choo, Matt Bishop, William Glisson and Kara Nance 2018. Internet- and cloud-of-things cybersecurity research challenges and advances. Computers & Security 74: 275–276. 
      9. Yulei Wu, Zheng Yan, Kim-Kwang Raymond Choo and Laurence T. Yang 2019. IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management. IEEE Access 7: 65223–65227.
      10. Kim-Kwang Raymond Choo, Stefanos Gritzalis, Jong Hyuk Park 2018. Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities. IEEE Transactions on Industrial Informatics 14(8): 3567–3569.
      11. Kim-Kwang Raymond Choo, Rongxing Lu, Liqun Chen and Xun Yi 2018. A foggy research future: Advances and future opportunities in fog computing research. Future Generation Computer Systems 78(2): 677–679.
      12. Kim-Kwang Raymond Choo, Yongtang Shi and Zengqiang Chen 2018. Measurements and security of complex networks and systems: Research advances and challenges Future Generation Computer Systems 83: 374–375.
      13. Jose M de Fuentes, Lorena Gonzalez-Manzano, Javier Lopez, Pedro Peris-Lopez and Kim-Kwang Raymond Choo 2018. Editorial: Security and Privacy in Internet of Things. Mobile Networks and Applications.
      14. Debiao He, Kim-Kwang Raymond Choo, Neeraj Kumar and Aniello Castiglione 2018. IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies. IEEE Access 6: 72033–72036.
      15. Neeraj Kumar, Joel J. P. C. Rodrigues, Mohsen Guizani, Kim-Kwang Raymond Choo, Rongxing Lu, Christos Verikoukis and Zhimeng Zhong 2018. Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment. IEEE Communications Magazine 56(5): 20–21.
      16. Zhenxing Qian, Kim-Kwang Raymond Choo, Rémi Cogranne and Xinpeng Zhang 2018. Multimedia Security: Novel Steganography and Privacy Preserving. Security and Communication Networks 2018: Article ID 6390945.
      17. Zhiyong Zhang, Kim-Kwang Raymond Choo, Brij B. Gupta 2018. The Convergence of New Computing Paradigms and Big Data Analytics Methodologies for Online Social Networks. Journal of Computational Science 26: 453–455.
      18. Zhiyong Zhang, Kim-Kwang Raymond Choo, Arun Kumar Sangaiah, Liang Chen 2018. Crowd Computing for Social Media Ecosystems. Applied Soft Computing 66: 492-494.
      19. Kim-Kwang Raymond Choo, Jemal Abawajy and Rafiqul Islam 2017. Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions. Journal of Computer and System Sciences 83(1): 1–2. 
      20. Kim-Kwang Raymond Choo, Yunsi Fei, Yang Xiang and Yu Yu 2017. Embedded Device Forensics and Security. ACM Transactions on Embedded Computing Systems 16(2): Article no 50.  
      21. Kim-Kwang Raymond Choo, Mehran Mozaffari Kermani, Reza Azarderakhsh, Manimaran Govindarasu 2017. Emerging Embedded and Cyber Physical System Security Challenges and Innovations. IEEE Transactions on Dependable and Secure Computing 14(3): 235–236.
      22. Kim-Kwang Raymond Choo, Omer F Rana and Muttukrishnan Rajarajan 2017. Cloud Security Engineering: Theory, Practice and Future Research. IEEE Transactions on Cloud Computing 5(3): 372–374. 
      23. Debiao He, Kim-Kwang Raymond Choo and Neeraj Kumar 2017. Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies. Computers & Electrical Engineering 63: 157–159.
      24. Weiyao Lin, Zheng Xu, Yunhuai Liu, Neil Y. Yen, Kim-Kwang Raymond Choo and Vijayan Sugumaran  2017. IEEE Access Special Section Editorial: Intelligent Sensing On Mobile and Social Media Analytics. IEEE Access 5: 27841–27844.
      25. Joseph L Liu, Raymond Choo, Xinyi Huang and Man Ho Au 2017. Special issue on security and privacy for smart cities. Personal and Ubiquitous Computing 21(5): 775-775.
      26. Zheng Xu, Yunhuai Liu, Kim-Kwang Raymond Choo and Neil Y. Yen 2017. Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems. Wireless Personal Communications. Wireless Personal Communications.
      27. Zhiyong Zhang and Kim-Kwang Raymond Choo 2017. Guest Editorial: Multimedia Social Network Security and Applications. Multimedia Tools and Applications 76(3): 3163–3168. 
      28. Elisa Bertino, Kim-Kwang Raymond Choo 2016, Dimitrios Georgakopoulos and Surya Nepal. Internet of Things (IoT): Smart and Secure Service Delivery. ACM Transactions on Internet Technology 16(4): Article no 22. 
      29. Kim-Kwang Raymond Choo, Josep Domingo-Ferrer and Lei Zhang 2016. Cloud Cryptography: Theory, Practice and Future Research Directions. Future Generation Computer Systems 62: 51–53, 2016. 
      30. Kim-Kwang Raymond Choo, Martin Herman, Michaela Iorga and Ben Martini 2016. Cloud Forensics: State-of-the-Art and Future Directions. Digital Investigation, 18: 77–78. 
      31. Kim-Kwang Raymond Choo, Lior Rokach and Claudio Bettini 2016. Mobile security and privacy: Advances, challenges and future research directions. Pervasive and Mobile Computing 31: 1–2. 
      32. Xiaodong Lin, Kim-Kwang Raymond Choo, Ying-Dar Lin and Peter Mueller 2016. Guest Editorial: Network Forensics and Surveillance for Emerging Networks. IEEE Network 30(6): 4–5. 
      33. Kim-Kwang Raymond Choo and Rick Sarre 2015. Guest Editors’ Introduction: Balancing Privacy with Legitimate Surveillance and Lawful Data Access. IEEE Cloud Computing 2(4): 8–13.
    11. General Co-Chair, 2020 National Cyber Summit - Research Track, Huntsville, AL, USA
    12. General Co-Chair, EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2019), Orlando, Florida, USA
    13. General Co-Chair, IEEE Advanced and Trusted Computing (ATC 2019), Leicester, UK
    14. General Co-Chair, International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN 2019), Naples, Italy
    15. Program Co-Chair, IEEE Cyber Science and Technology Congress (IEEE CyberSciTech 2019), Fukuoka, Japan

      Academic Visitors

      1. January 2015: Associate Professor Christian W. Probst, Technical University of Denmark 
      2. February 2015 – February 2016: Associate Professor Mengbo Hou, Shandong University’s Lab of Information Security and Cryptography (Supported by a China Scholarship Council Fellowship)
      3. June 2015: Associate Professor Yong Yu, University of Electronic Science and Technology of China
      4. July 2015 – April 2016: Opeyemi Osanaiye (Ph.D. Candidate), University of Cape Town, South Africa

      Prospective PhD Students 

      My door is always open to motivated individuals, particularly those with excellent academic records (and publication track record), who are interested in researching on cyber security and digital forensics (technical research), cyber crime (criminology and policy research), anti-money laundering / counter terrorism financing, cryptography and digital forensics. To see what types of problems I work on, please visit " "

      Since joining the University of South Australia in March 2011, I have supervised to completion one DIT, 19 Ph.D., 13 Master and nine Honours (eight 1st Class, and one 2nd Upper Class Honours) theses. 
      1. Angela Irwin, 2013 [Ph.D. Thesis: Money laundering and terrorism financing in virtual environments] - Currently, she is a Cyber Security Consultant Manager, KPMG, Australia. 
      2. Aswami Fadillah Mohd Ariffin, 2013 [Ph.D. Thesis: A general model of forensic data recovery framework for digital CCTV systems] - Currently, he is the Vice President of Cyber Security Responsive Services at CyberSecurity Malaysia.
      3. Yuan (Tom) Gao, 2014 [DIT Thesis: Commercial implementation of shared secret in middleware] - Currently, he is the Chief Technology and Digital Officer at City of Sydney, Australia.
      4. Ben Martini, 2015  [Ph.D. Thesis: ForFACTS: a Forensic Framework for Analysis of Cloud Technologies and Services] - Currently, he is a Lecturer at the University of South Australia.
      5. Ki Hong (Steve) Chon, 2016, Australian National University [Ph.D. Thesis: Cybercrime Precursors: Towards a Model of Offender Resources] - Currently, he is a Senior Manager - Intelligence & Research Analytics at HSBC, Canada.
      6. Deepa Mani, 2016 [Ph.D. Thesis: Understanding Information Security Risk in Australian Real Estate Sectors]. Currently, she is a Data Analyst at Health Care Australia.
      7. Ala' (Jordan) Aburumman, 2016 [Ph.D. Thesis: Secure Session Initiation Protocol Solutions for Mobile Ad Hoc Networks]. Currently, he is a Lecturer at South Australian Institute of Business & Technology.
      8. Nurul Hidayah Ab Rahman, 2016 [Ph.D. Thesis: An Evidence-based Cloud Incident Handling Framework]. Currently, she is a Senior Lecturer at Universiti Tun Hussein Onn Malaysia, Malaysia.
      9. Opeyemi Osanaiye, 2016, University of Cape Town, South Africa, [Ph.D. Thesis: DDoS defence for service availability in cloud computing]. Currently, he is a Post-Doctoral Research Fellow at University of Pretoria, South Africa.
      10. Victor Prokhorenko, 2017 [Ph.D. Thesis: An intent-based behavioural intrusion prevention framework for PHP-based web applications]. Currently, he is a Research Associate, Centre for Research on Engineering Software Technologies, University of Adelaide, Australia.
      11. Abdullah Azfar, 2017 [Ph.D. Thesis: Forensic Taxonomies of Android Apps (ForTAApps)]. Currently, he is a Senior Digital Forensic Consultant at KPMG Australia.
      12. Pei Yee Chin, 2017 [Ph.D. Thesis: Factors Influencing Employees' Use of Enterprise Social Networks]. Currently, she is a Senior Lecturer and Deputy Director (Industry Network) at the Centre of Industry and Community Network, Universiti Malaysia Sabah, Malaysia.
      13. Quang Do, 2017 [Ph.D. Thesis: An adversary model approach to securing smart devices]. Currently, he is a consultant at Aligent Consulting, Australia.
      14. Darren Quick, 2017 [Ph.D. Thesis: Digital Forensic Data Reduction and Quick Analysis for Evidence and Intelligence]. Currently, he is a ‎Senior Intelligence Technologist with the Australian Government Department of Home Affairs.
      15. Christopher Tassone, 2017 [Ph.D. Thesis: A Mobile Forensic Visualisation Lifecycle]. He is with a Cyber Security Researcher with the Australian Government Department of Home Affairs.
      16. Alireza Heravi, 2017 [Ph.D. Thesis: Privacy attitudes and behaviours in online social networking].  
      17. Christian D’Orazio, 2017 [Ph.D. Thesis: An evidence-based adversary model for iOS device and app vulnerability detection and exploitation]. He is with a Cyber Security Researcher and Software Technical Analyst with the Defence Science and Technology Group of the Australian Department of Defence.
      18. Niken Cahyani, 2017 [Ph.D. Thesis: An evidence-based process model for Windows Phone 8 forensics]. Currently, she is a Senior Lecturer at Telkom University, Indonesia.
      19. Jian Peng, 2018 [Ph.D. Thesis: Authorship Attribution with Binary N-gram Analysis for Detecting Astroturfing in Social Media]. He is currently an Associate Professor at the Software Technology Institute, Dalian Jiaotong University, China.
      20. Brett Eterovic-Soric, 2019 [Ph.D. Thesis: Detecting and Deterring Stalkers Using Technology]. He is currently a Cyber Security Specialist, Wireless Communications, Australia.
      I can be contacted on (email) raymond [DOT] choo [AT] fulbrightmail [DOT] org