Professional Activities

Home || Publications || Media: In the News || Invited Presentations || Professional Activities

Membership

1.      Senior Member, IEEE

2.      Fellow, Australian Computer Society

Expert Services

1.      Invited witness in a private briefing on "Bitcoin and alternative remittance systems" to the Parliamentary Joint Committee on Corporations and Financial Services (2014)

2.      Invited contributor to Australian Bureau of Statistics Draft Conceptual Framework for Cybercrime (2012, 2013)

External Expert Reviewer for Academic Programs

1.      Australian Government Tertiary Education Quality Standards Agency (TEQSA) (2013, 2017)

2.      New York University, School of Professional Studies (2017)

External Expert Reviewer for Faculty Appointment

3.      Tenure-Track Assistant Professor of Cyber Security, School of Computer Science and Engineering, Nanyang Technological University, Singapore (2017)

4.      Full-Time Assistant Professor Appointment, Institute of Law for Science and Technology National Tsing Hua University, Taiwan (2010)

5.      Senior Lecturer Promotion, University of Queensland Business School (2008)

Committee Membership (Professional Bodies)

1.      Australian Computer Society (ACS) Cyber Task-Force (2011)

2.      ACS Policy Committee, International Taskforce (Oct 2012 – Current)

3.      ACS Australian Capital Territory (ACT) Branch Executive Committee (2010 – Feb 2011)

4.      ACS South Australian (SA) Branch Executive Committee and Chair of ACS SA Branch Government Relations Committee (Mar – Dec 2011)

5.      ACS Specialism Advisory "Information Security" Group (Mar 2012 – Current)

6.      Cloud Security Alliance Asia Pacific Education Council (Apr 2015 – Current)

7.      Cloud Security Alliance, Australia Chapter (May 2013 – Current)

8.      IEEE Communications and Information Security Technical Committee (CISTC) Technical Recognition Award Committee (2015, 2016, 2017)

9.      South Australia Pearcey Award Committee (2011 – Current)

10.    Pakistan Society of Criminology (2009 – Current)

Book Series Editor

1.      Syngress/Elsevier’s Book Series entitled “Advanced Topics in Security”

Book Proposal Reviewer

2.      Elsevier (2014, 2015, 2016)

3.      Routledge (2015)

4.      Springer (2015)

Book Manuscript Reviewer

5.      Stanford University Press (2015)

Journal Guest Editor

1.      Kim-Kwang Raymond Choo, Jemal Abawajy and Rafiqul Islam 2017. Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions. Journal of Computer and System Sciences 83(1): 1–2. http://dx.doi.org/10.1016/j.jcss.2016.09.001  

2.      Kim-Kwang Raymond Choo, Yunsi Fei, Yang Xiang and Yu Yu 2017. Embedded Device Forensics and Security. ACM Transactions on Embedded Computing Systems 16(2): Article no 50. https://doi.org/10.1145/3015662

3.      Zhiyong Zhang and Kim-Kwang Raymond Choo 2017.  Guest Editorial: Multimedia Social Network Security and Applications. Multimedia Tools and Applications 76(3): 3163–3168  http://dx.doi.org/10.1007/s11042-016-4081-z  

4.      Elisa Bertino, Kim-Kwang Raymond Choo, Dimitrios Georgakopoulos and Surya Nepal 2016. Internet of Things (IoT): Smart and Secure Service Delivery. ACM Transactions on Internet Technology 16(4): Article no 22. https://doi.org/10.1145/3013520  

5.      Kim-Kwang Raymond Choo, Josep Domingo-Ferrer and Lei Zhang 2016. Cloud Cryptography: Theory, Practice and Future Research Directions. Future Generation Computer Systems 62: 51–53, 2016. http://dx.doi.org/10.1016/j.future.2016.04.017   

6.      Kim-Kwang Raymond Choo, Martin Herman, Michaela Iorga and Ben Martini 2016. Cloud Forensics: State-of-the-Art and Future Directions. Digital Investigation, 18: 77–78. http://dx.doi.org/10.1016/j.diin.2016.08.003  

7.      Kim-Kwang Raymond Choo, Lior Rokach and Claudio Bettini 2016. Mobile security and privacy: Advances, challenges and future research directions. Pervasive and Mobile Computing 31: 1–2. http://dx.doi.org/10.1016/j.pmcj.2016.10.003  

8.      Xiaodong Lin, Kim-Kwang Raymond Choo, Ying-Dar Lin and Peter Mueller 2016. Guest Editorial: Network Forensics and Surveillance for Emerging Networks. IEEE Network 30(6): 4–5. http://dx.doi.org/10.1109/MNET.2016.7764272  

9.      Kim-Kwang Raymond Choo and Rick Sarre 2015. Guest Editors’ Introduction: Balancing Privacy with Legitimate Surveillance and Lawful Data Access. IEEE Cloud Computing 2(4): 8–13. http://dx.doi.org/10.1109/MCC.2015.84  

10.    IEEE Transactions on Cloud Computing: Special Issue on “Cloud Security Engineering” – with Professor Omer Rana, Cardiff University (UK) and Professor Muttukrishnan Rajarajan, City University London (UK); To appear 2016

11.    IEEE Transactions on Dependable and Secure Computing: Special Issue on “Emerging Embedded and Cyber Physical System Security and Forensic Challenges and Innovations” – with Assistant Professor Mehran Mozaffari Kermani, Rochester Institute of Technology (USA), Assistant Professor Reza Azarderakhsh, Rochester Institute of Technology (USA), and Professor Manimaran Govindarasu, Iowa State University (USA); Submissions being reviewed

12.    Future Generation Computer Systems: Special Issue on “Fog Computing” (Submission due: 1 April 2016) – with Assistant Professor Rongxing Lu, Nanyang Technological University (Singapore), Dr Liqun Chen, HP Labs (UK) and Professor Xun Yi, RMIT University (Australia) ; Submissions being reviewed

13.    Applied Soft Computing: Special Issue on “Crowd Computing for Social Media Ecosystem” (Submission due: 31 July 2016) – with Professor Zhiyong Zhang, Henan University of Science & Technology (China) and Iowa State University (USA), Professor Arun Kumar Sangaia, VIT University (India), Dr Liang Chen, University of West London (United Kingdom)

14.    Personal and Ubiquitous Computing: Special Issue on “Security and Privacy for Smart Cities” (Submission due: 1 August 2016) – with Professor Xinyi Huang, Fujian Normal University (China), Joseph Liu, Monash University (Australia), Assistant Professor Man Ho Au, Hong Kong Polytechnic University (Hong Kong)

15.    IEEE Transactions on Big Data: Special Issue on “Big Data Applications in Cyber Security and Threat Intelligence” (Submission due: 1 September 2016) – with Associate Professor Mauro Conti, Sapienza University of Rome (Italy), Dr Ali Dehghantanha, University of Salford (UK)

16.    Cluster Computing: Special Issue on “Convergence of Internet of Things and Cloud Computing: Recent Advances and Future Trends” (Submission due: 30 October 2016)  – with Assistant Professor Mohammad Mehedi Hassan, King Saud University (Saudi Arabia), Professor Giancarlo Fortino, University of Calabria (Italy), Professor Meikang Qiu, Pace University (USA), Professor Sheng Chen, University of Southampton (UK)

17.    Wireless Personal Communications: Special Issue on “Big Data Analytics and Network Applications for Cyber-Physical Systems” (Submission due: 31 October 2016) – with Dr Zheng Xu, Tsinghua University (China), Professor Yunhuai Liu, Third Research Institute of Ministry of Public Security (China), Associate Professor Neil Y. Yen, Aizu University (Japan)

18.    Future Generation Computer Systems: Special Issue on “Measurements and Security of Complex Networks and Systems” (Submission due: 1 November 2016) – with Professor Yongtang Shi, Nankai University (China), Professor Zengqiang Chen, Nankai University (China)

19.    Computers and Electrical Engineering: Special issue on “Security and Privacy in Wearable Embedded Technologies” (Submission due: 30 November 2016) – with Associate Professor Hebiao He, Wuhan University (China), Associate Professor Neeraj Kumar, Thapar University (India)

20.    Future Generation Computer Systems: Special Issue on “Energy Management for Cyber-Physical Cloud Systems” (Submission due: 1 December 2016) – with Associate Professor Neeraj Kumar, Thapar University (India), Professor Athanasios V. Vasilakos, Lulea University of Technology (Sweden), Professor Laurence T Yang, St. Francis Xavier University (Canada)

21.    IEEE Access: Special Issue on “Intelligent Sensing on Mobile and Social Media Analytics” (Submission due: 1 January 2017) – with Dr Zheng Xu, Tsinghua University and The Third Research Institute of the Ministry of Public Security (China), Dr Yunhuai Liu, The Third Research Institute of the Ministry of Public Security (China), Associate Professor Neil Yen, University of Aizu (Japan), Professor Vijayan Sugumaran, Oakland University (USA)

22.    Computers and Security: Special Issue on “Internet- and Cloud-of-Things: Cybercrime and Cybersecurity” (Submission due: 1 March 2017) – with Professor Matt Bishop, University of California, Davis (USA), Associate Professor William Glisson, University of South Alabama (USA), Professor Kara Nance, University of Alaska (USA)

23.    Journal of Computational Science: Special Issue on “The Convergence of New Computing Paradigms and Big Data Analytics Methodologies for Online Social Networks” (Submission due: 1 April 2017) – with Professor Zhiyong Zhang, Henan University of Science & Technology (China), Assistant Professor Brij B. Gupta, National Institute of Technology (India)

24.    IEEE Transactions on Emerging Topics in Computing: Special Issue on “Cyber Security Threats and Defense Advances” (Submission due: 1 June 2017) – with Professor Zhe Liu, Nanjing University of Aeronautics and Astronautics (China), Associate Professor Weiqiang  Liu, Nanjing University of Aeronautics and Astronautics (China), Professor Muhammad K. Khan, King Saud University (Saudi Arabia)

25.    IEEE Transactions on Industrial Informatics: Special Issue on “Applied Cryptography, Security, and Trust Computing for Industrial Internet-of-Things” (Submission due: 31 August 2017) – with Professor James (Jong Hyuk) Park, Seoul National University of Science and Technology (Korea), Professor Stefanos Gritzalis, University of the Aegean (Greece), Professor Han-Chieh Chao, National Dong Hwa University (Taiwan)

26.    Multimedia Tools and Applications: Special Issue on “Ubiquitous Visual Surveillance for Public Security” ((Submission due: 30 September 2017) – with Assistant Professor Sambit Bakshi, National Institute of Technology Rourkela (India)

27.    Future Generation Computer Systems: Special Issue on “Security and Privacy in Cyber Physical Systems” (Submission due: 31 December 2017) – with Dr Sheng Wen, Deakin University (Australia), Dr. Aniello Castiglione, University of Salerno and University of Naples (Italy), Dr. Mohammod Sayad Haghighi, University of Tehran (Iran), and Dr. Rongxing Lu, University of New Brunswick (Canada)

28.    Future Generation Computer Systems: Special Issue on “Cyber Threat Intelligence and Analytics” (Submission due: 31 December 2017) – with Dr Ali Dehghantanha, University of Salford (UK)

29.    Cluster Computing: Special Issue on “Security and Privacy in Sensor-Cloud Integration” (Submission due: 31 April 2018) – with Professor Jiannong Cao, Hong Kong Polytechnic University (Hong Kong), Dr Sheng Wen, Deakin University (Australia), Associate Professor Tian Wang, Huaqiao University (China), and Assistant Professor Md Zakirul Alam Bhuiyan, Fordham University (USA)

Advisory / Editorial Board Membership (Journals)

1.      Australian Journal of Forensic Sciences (2015 – Current; 2015 Impact Factor: 0.833)

2.      Cluster Computing (2016 – Current; 2015 Impact Factor: 1.514 – Quartile 2)

3.      Digital Investigation (2016 – Current; 2015 Impact Factor: 1.211 – Quartile 2)

4.      Future Generation Computer Systems (2015 – Current; 2015 Impact Factor: 2.430 – Quartile 1)

5.      INFORMATICA (2009 – Current; 2015 Impact Factor: 1.386 – Quartile 1)

6.      IEEE Cloud Computing (2014 – Current)

7.      International Journal of Computational Science and Engineering (2016 – Current)

8.      International Journal of Cyber Criminology (2012 – Current)

9.      International Journal of Distributed Sensor Networks (2013 – Current; 2015 Impact Factor: 0.906)

10.    International Journal of High Performance Computing and Networking (2016 – Current)

11.    International Journal of Security and Networks (2015 – Current)

12.    Journal of Cloud Computing: Advances, Systems and Applications (2015 – Current)

13.    Journal of Digital Forensics, Security and Law (2014 – Current)

14.    Journal of Information Privacy and Security (2015 – Current)

15.    Journal of Network and Computer Applications (2016 – Current; 2015 Impact Factor: 2.331 – Quartile 1)

16.    KSII Transactions on Internet and Information Systems (2017 – Current; 2015 Impact Factor: 0365)

17.    PLOS ONE (2015 – Current; 2015 Impact Factor: 3.057 – Quartile 1)

18.    Security and Communication Networks (2015 – Current ; 2015 Impact Factor: 0.806)

19.    Soft Computing [2017 – Current; 2015 Impact Factor: 1.630 (Quartile 2; Ranks 56/130)].

Reviewer for Academic Programs, Grants, and Thesis

1.      Member of the Judging Panel,

·        2012 Kaspersky Lab IT Security for the Next Generation – Asia Pacific & MEA Cup 2012, City University of Hong Kong

·        2012 National Security Short Story Competition, Australia

·        2013 Consensus IT Writers & Consensus IT Professional Awards, Australia

·        2013 Kaspersky Lab CyberSecurity for the Next Generation – Asia Pacific & MEA Cup 2013, National University of Singapore

·        2013 Kaspersky Lab CyberSecurity for the Next Generation – International Round 2013, Royal Holloway University of London

·        iAwards 2013, Australia

·        iAwards 2014 (Panel Judge for ‘Educator of the Year’ Category), Australia

·        iAwards 2015, Australia (Panel Judge for ‘Research & Development’ Category), Australia

2.      Grants review (Panel reviewer):

·        National Science Foundation, Secure and Trustworthy Cyberspace: Education (2017)

3.      Grants review:

·        United States Department of Justice, Office of Justice Programs (2010)

·        Australian Government’s Australia-India Strategic Research Fund (2013)

·        Australian Government’s National Drug Law Enforcement Research Fund (2010)

·        Australian Government’s Criminology Research Council (2010)

·        Australian Research Council (2015)

                                           i.     Discovery (2015, 2016)

                                          ii.     Linkage (2015, 2016)

·        EPSRC Joint Singapore-UK Research in Cyber Security (2015)

·        Israeli Ministry of Science, Technology and Space (2015)

·        Netherlands Organisation for Scientific Research (2014)

·        Science Foundation Ireland (2016)

·        University of Turin, Italy, UE (2011)

·        Qatar National Research Fund (QNRF)’s National Priorities Research Program (NPRP) (2012, 2014, 2015, 2016)

·        Qatar National Research Fund (QNRF)’s National Priorities Research Program (NPRP) –  Exceptional Proposals (2013)

4.      PhD Law Confirmation of Candidature (External) Review Panel Member, Faculty of Law, Queensland University of Technology (2012)

5.      Thesis examination:

·        Bachelor of Science (Honours) (Computer Science), Victoria University, Australia (2014)

·        Master by Research thesis (Master of Mathematical Sciences), University of Ballarat, Australia (2010)

·        Master of Computer Science Research thesis, University of Wollongong, Australia (2012)

·        Master of Philosophy (MPhil) thesis, Melbourne University, Australia (2014)

·        Master of Cyber Security thesis, University of Waikato (2015)

·        Doctor of Philosophy (Ph.D.) thesis, Deakin University, Australia (2016)

·        Doctor of Philosophy (Ph.D.) thesis, Macquarie University, Australia (2011)

·        Doctor of Philosophy (Ph.D.) thesis, Queensland University of Technology, Australia (2013)

·        Doctor of Philosophy (Ph.D.) thesis, Thapar University, India (2016)

·        Doctor of Philosophy (Ph.D.) thesis, University of New South Wales (UNSW) Sydney, Australia (2017)

·        Doctor of Philosophy (Ph.D.) thesis, Universiti Putra Malaysia, Malaysia (2017)

·        Doctor of Philosophy (Ph.D.) thesis, University of Pretoria, South Africa (2015)

·        Doctor of Philosophy (Ph.D.) thesis, University of Wollongong, Australia (2016)

·        Doctor of Philosophy (Ph.D.) thesis, University of Wollongong, Australia (2017)

·        Doctor of Philosophy (Ph.D.) thesis, Victoria University of Wellington, New Zealand (2013)

Conference Organiser

1.      Co-Chair, "Cyber-of-Things: Cyber-Crimes, Cyber-Security and Cyber Forensics" minitrack, Hawaii International Conference on System Sciences (HICSS 2018), Hilton Waikoloa Village, Big Island, USA

2.      Co-Chair, " Cyber Threat Intelligence and Analytics" minitrack, Hawaii International Conference on System Sciences (HICSS 2018), Hilton Waikoloa Village, Big Island, USA

3.      Co-Chair, "Cyber-of-Things: Cyber-Crimes and Cyber-Security" minitrack, Hawaii International Conference on System Sciences (HICSS 2017), Hilton Waikoloa Village, Big Island, USA

4.      Program Chair, 3rd International Conference on Green, Pervasive and Cloud Computing (GPC 2017), Amalfi Coast, Italy

5.      Program Chair, 17th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2017), Helsinki, Finland

6.      Program Chair, 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2017), Ningbo, China

7.      General Chair, 12th International Conference on Future Information Technology (FutureTech 2017), Guilin, China

8.      Chair, Forensics  and Analytics Track, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), Sydney, Australia

9.      Co-Chair, Second Annual Big Data Security, Privacy and Trust Workshop (BigDataSPT 2017), in conjunction with 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2017)

10.    Co-Chair, Workshop on Big Data Research and Development in Knowledge Engineering, In conjunction with the 29th International Conference on Software Engineering and Knowledge Engineering (SEKE 2017), Pittsburgh, USA

11.    Co-Chair, IEEE International Symposium on Security, Privacy and Trust in Internet of Things, In conjunction with the IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017)

12.    Co-Chair, International Workshop on Biometrics-as-a-Service (IW-BAAS 2017)

13.    General Chair, International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2016)

14.    General Executive Chair, IEEE International Conference on Cyber, Physical and Social Computing (CPSCom 2016)

15.    Program Vice-Chair, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016)

16.    Steering Committee, International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

17.    Steering Committee, International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016), in conjunction with "The 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

18.    Workshop Chair, International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

19.    Co-Chair, (Inaugural) Forensics Track, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016)

20.    Co-Chair, "Cybercrimes, Cyber-Physical Innovations, and Emerging Investigation Challenges" minitrack, Hawaii International Conference on System Sciences (HICSS 2016), Kauai, Hawaii, USA

21.    Co-Chair, Advances in Big Data – Annual Big Data Security, Privacy and Trust Workshop (BigDataSPT), in conjunction with 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

22.    Co-Chair, International Symposium on Cyber Security (CS 2016), Fuzhou, China

23.    Co-Chair, International Workshop on the Crowdsensing and intelligent sensing on Mobile Media Analytics (SMMA 2016), in conjunction with The 9th EAI International Conference on Mobile Multimedia Communications (MobiMedia 2016)

24.    Co-Chair, Workshop on Big Data Research and Development in Knowledge Engineering, In conjunction with the 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016), San Francisco Bay, USA

25.    International Liaison Chair, Cyber Science and Technology Congress (CyberSciTech 2016), Auckland, New Zealand

26.    Publications Chair, EAI International Conference on Cybersecurity, Network Security, Critical Infrastructure Protection, Digital Investigation, Information Security and Cyber Defense (AFRISEC 2016)

27.    Co-Chair, Information Security, International Symposium on Intelligence Computation and Applications (ISICA 2015), Guangzhou, China

28.    Organising Chair, Australasian Conference on Information Systems 2015, Adelaide, Australia

29.    Co-Chair, "IS Security, Cyber Crime and Digital Investigations "track, Australasian Conference on Information Systems 2015, Adelaide, Australia

30.    Workshop Co-Chair, IEEE Technical Committee on Scalable Computing (DSDIS 2015), Sydney, Australia

31.    Co-Chair, IEEE International Symposium on Trust and Security in Cloud Computing (TSCloud 2015) In Affiliation with IEEE TrustCom 2015

32.    Co-Chair, IEEE International Symposium on Trust and Security in Cloud Computing (TSCloud 2014) In Affiliation with IEEE TrustCom 2014

33.    International Publicity Chair (Academia), International Forum on Mobile Technology and Applications 2014, Hong Kong

34.    Organising Committee, Australasian Computer Science Week 2013 (ACSW2013), Adelaide, Australia

35.    Co-Convener, 2012 Fulbright Symposium "Securing our Cyber Future", Adelaide, Australia

36.    Co-Chair, 3-week stratsec/UniSA IT Security Research Winter School 2012, Adelaide, Australia

37.    Co-Chair, 4-week stratsec/UniSA IT Security Research Winter School 2011, Adelaide, Australia

38.    Chair, Security Stream, Australian Computer Society’s Canberra 2011 Branch Conference, Canberra, Australia

39.    Co-Chair, Symposium on Cyber Terrorism, Defense Science Research Conference and Expo (DSR 2011), Singapore

40.    PhD Workshop Coordinator, Safeguarding Australia 2008 PhD National Security Workshop (2008)

Conference Program Committee Member (and Reviewer)

2017

1.      ACM Symposium on Applied Computing (SAC 2017), Special Track on Internet of Things (IoT)

2.      Australasian Conference on Information Security and Privacy (ACISP 2017)

3.      Australasian Information Security Conference (ACSW-AISC 2017)

4.      IEEE Global Communications Conference: Communication & Information System Security (Globecom 2017 – CISS)

5.      IEEE International Conference Collaboration and Internet Computing (IEEE CIC 2017)

6.      International Conference on Cloud Computing Technology and Science (CloudCom 2017)

7.      International Conference on Digital Forensics & Cyber Crime (ICDF2C 2017)

8.      International Conference on Information Systems (ICIS 2017), Security, Privacy and Ethics of IS Track

9.      International Conference on Network and System Security (NSS 2017)

10.    International Conference on Provable Security (ProvSec 2017)

11.    International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2017)

12.    International Workshop on Cloud Security and Forensics (WCSF 2017), in conjunction with IEEE International Conference on Trust, Security And Privacy In Computing And Communications (TrustCom2017)

13.    International Workshop on Digital Forensics (WSDF 2017), in conjunction with Conference on Availability, Reliability and Security (ARES 2017)

14.    International Workshop on Securing IoT Networks (SITN-2017), in conjunction with the 10th  IEEE International Conference on Internet of Things (iThings 2017)

15.    International Workshop on Security in Big Data (SECBD 2017), in conduction with International Conference on Network and System Security (NSS 2017)

16.    National Cyber Summit (NCS 2017)

17.    Workshop on Security and Privacy in Cyber-Physical Systems 2017 (SPCPS 2017), in conduction with the 3rd IEEE International Conference on Cybernetics (CYBCONF 2017)

2016

18.    Annual Conference on Privacy, Security and Trust (PST 2016)

19.    Australasian Conference on Information Security and Privacy (ACISP 2016)

20.    Australasian Information Security Conference (ACSW-AISC 2016)

21.    EAI International Conference on Cloud, Networking for IoT Systems (CN4IoT 2016)

22.    EAI International Conference on Security and Privacy in Vehicular Network (SPVAN 2016)

23.    DFRWS USA 2016

24.    IEEE Global Communications Conference: Communication & Information System Security (Globecom 2016 – CISS)

25.    IEEE International Conference on Communications (ICC 2016)

·        Communications and Information Systems Security Symposium

26.    IEEE International Conference on Pervasive Intelligence and Computing (PICom 2016)

27.    IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2016), Services Applications and Business Track

28.    IEEE Workshop on Legal and Technical Issues in Cloud Computing and the Internet of Things

29.    IEEE Workshop on Security and Privacy in the Cloud (IEEE SPC 2016), conjunction with the IEEE Conference on Communications and Network Security

30.    International Conference on Ambient Systems, Networks and Technologies (ANT 2016), Systems Security and Privacy Track

31.    International Conference on Digital Forensics & Cyber Crime (ICDF2C 2016)

32.    International Conference on Information Security Practice and Experience (ISPEC 2016)

33.    International Conference on Information Security Theory and Practice (WISTP 2016)

34.    International Conference on Network and System Security (NSS 2016)

35.    International Conference on Provable Security (ProvSec 2016)

36.    International Workshop on Digital Forensics (WSDF 2016), in conjunction with Conference on Availability, Reliability and Security (ARES 2016)

37.    International Workshop on Security and Forensics in Communication Systems (SFCS 2016), in conjunction with International Conference on Distributed Computing and Networking (ICDCN 2016)

38.    International Workshop on Trust in Cloud Computing (IWTCC 2016)

2015

39.    Annual ADFSL Conference on Digital Forensics, Security and Law (ADFSL 2015)

40.    Australasian Conference on Information Security and Privacy (ACISP 2015)

41.    Australasian Information Security Conference (ACSW-AISC 2015)

42.    IEEE International Conference on Communications (ICC 2015)

·        Communications and Information Systems Security Symposium

·        Social Networking Track

43.    IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2015)

44.    IEEE International Symposium on Nanoelectronic and Information Systems (iNIS 2015)

45.    IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2015), Services Applications and Business Track

46.    International Conference on Connected Vehicles & Expo (ICCVE 2015)

47.    International Conference on Digital Society (ICDS 2015)

48.    International Conference on Human Aspects of Information Security, Privacy and Trust (HAS 2015), in conjunction with International Conference on Human-Computer Interaction (HCII 2015)

49.    International Conference on Systematic Approaches to Digital Forensics Engineering (SADFE 2015)

50.    International Workshop on Cloud Security and Forensics (WCSF 2015), in conjunction with Conference on Availability, Reliability and Security (ARES 2015)

51.    International Workshop on Digital Forensics (WSDF 2015), in conjunction with Conference on Availability, Reliability and Security (ARES 2015)

52.    International Workshop on Digital Forensics and Incident Analysis (WDFIA 2015)

53.    International Workshop on Security and Forensics in Communication Systems (SFCS 2015), in conjunction with IEEE ISCC 2015

54.    International Workshop on Trust for the Converged Cloud and Internet of Things (CCIoT 2015)

55.    International Workshop on Trust in Cloud Computing (IWTCC 2015)

56.    Smart Card Research and Advanced Application Conference (CARDIS 2015)

2014

57.    Australasian Conference on Information Security and Privacy (ACISP 2014)

58.    Australasian Conference on Information Systems (ACIS 2014)

59.    Australasian Information Security Conference (ACSW-AISC 2014)

60.    Cybercrime and Trustworthy Computing Workshop (CTC 2014)

61.    FTRA International Conference on Creative Converged IT (CCIT 2014)

62.    FTRA International Symposium on Digital Forensics and Information Security (DFIS 2014)

63.    FTRA International Workshop on Advanced Multimedia Computing (AMC 2014)

64.    IEEE International Conference on Communications (ICC 2014), Communications and Information Systems Security Symposium

65.    International Conference on Computational Intelligence and Software Engineering (CiSE 2014)

66.    IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), Security Track

67.    International Conference on Connected Vehicles & Expo (ICCVE 2014)

68.    International Conference on Digital Society (ICDS 2014)

69.    International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2014), Security, Privacy and Trust Track

70.    International Symposium on Information and Communication Technology (SoICT 2014)

71.    International Workshop on Applications and Technologies in Cyber Security (ATCS 2014), in conjunction with the International conference on Security and Privacy in Communication Networks (SECURECOMM 2014)

72.    IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2014), Services Applications and Business Track

73.    International Workshop on Digital Forensics (WSDF 2014)

74.    International Workshop on Security and Forensics in Communication Systems (SFCS 2014), in conjunction with ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS 2014)

2013

75.    Australasian Conference on Information Security and Privacy (ACISP 2013)

76.    Australasian Conference on Information Systems (ACIS 2013), Social Media and Social Networks in Organisations Track

77.    Australasian Information Security Conference (ACSW-AISC 2013)

78.    Cloud Security Alliance APAC CISO Forum 2013

79.    Cybercrime and Trustworthy Computing Workshop (CTC 2013)

80.    FTRA International Conference on Advanced IT, engineering and Management (AIM 2013)

81.    FTRA International Symposium on Ubiquitous Computing and Embedded Systems (UCES 2013)

82.    IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS-2013), Track 4: Grid And P2P Distributed Infrastructure for Intelligent Networking and Collaborative Systems

83.    IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), Security Track

84.    IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2013), Services Applications and Business Track

85.    International Conference on Connected Vehicles & Expo (ICCVE 2013)

86.    International Conference on Digital Forensics & Cyber Crime (ICDF2C 2013)

87.    International Conference on Technical and Legal Aspects of the e-Society (CYBERLAWS 2013)

88.    International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security (ACCESS 2013)

89.    International Higher Education Teaching and Learning Association Conference: Exploring Spaces for Learning (Review Board Member)

90.    International Symposium on Trust and Security in Cloud Computing (IEEE TSCloud 2013)

91.    International Workshop on Digital Forensics (WSDF 2013)

92.    Kaspersky Lab’s Cyber Security for the Next Generation – Asia Pacific & MEA Cup 2013

2012

93.    Australasian Information Security Conference (AISC 2012)

94.    Cybercrime and Trustworthy Computing Workshop (CTC 2012)

95.    FTRA International Conference on Advanced IT, engineering and Management (AIM 2012)

·        Track3 : Advanced Vehicular Communications Technology

·        Track5 : Strategic Security Management for Industrial Technology

96.    FTRA International Conference on Advanced IT, engineering and Management (AIM Summer 2012)

97.    FTRA International Conference on Information Technology Convergence and Services (ITCS 2012)

98.    FTRA International Workshop on Advanced Future Multimedia Services (AFMS 2012)

99.    IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS-2012), "Cloud Computing Security and Privacy" Track

100. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012)

101. International Conference on Network-Based Information Systems (NBiS-2012)

102. International Conference on Provable Security (ProvSec 2012)

103. International Conference on Technical and Legal Aspects of the e-Society (CYBERLAWS 2012)

104. International Symposium on Trust and Security in Cloud Computing (IEEE TSCloud 2012), in conjunction with IEEE TrustCom 2012

105. International Workshop on Digital Forensics (WSDF 2012), in conjunction with the 7th International Conference on Availability, Reliability and Security (ARES 2012)

106. Kaspersky Lab’s IT Security for the Next Generation - Asia Pacific & MEA Cup 2012

2011

107. Australasian Information Security Conference (AISC 2011)

108. Cybercrime and Trustworthy Computing Workshop (CTC 2011)

109. FTRA International Conference on Information Technology Convergence and Services (ITCS 2011), Track 5: Electronic Commerce, Business and Management

110. FTRA International Workshop on Advanced Future Multimedia Services (AFMS 2011)

111. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2011), Security Track

112. IEEE International Workshop on Security in Computers, Networking and Communications (SCNC), in conjunction with IEEE INFOCOM 2011

113. International Workshop on Trust and Security in Cloud Computing (IEEE TSCloud 2011), in conjunction with IEEE TrustCom 2011

114. International Conference on Information and Communication Security (ICICS 2011)

2010

115. Cybercrime and Trustworthy Computing Workshop (CTC-2010)

116. FTRG 2010 International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2010)

117. International Symposium on u- and e- Service, Science and Technology (UNESST 2010)

118. International Workshop on Advanced Future Multimedia Services (AFMS 2010)

2009

119. ASIACRYPT 2009

120. International Conference on Security and Cryptography (SECRYPT 2009)

121. International Symposium on u- and e- Service, Science and Technology (UNESST 2009)

122. International Workshop on Mobile Multimedia Information Retrieval (MoMIR 2009)

123. Personal, Indoor and Mobile Radio Communications Symposium (PIMRC 2009)

2008

124. International Conference on Security and Cryptography (SECRYPT 2008)

125. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2008) – Track #4: Applications, Services & Business Approach

126. International Symposium on u- and e- Service, Science and Technology (UNESST 2008)

2007

127. International Workshop on Group-Oriented Cryptographic Protocols (GOCP 2007), in conjunction with 34th International Colloquium on Automata, Languages and Programming (ICALP 2007)

128. International Conference on Security and Cryptography (SECRYPT 2007)

129. International Conference on Provable Security (ProvSec 2007) – previously known as Applied Cryptography and Information Security (ACIS)

130. International Workshop on Mobile Multimedia Information Retrieval (MoMIR 2007), in conjunction with 5th International Conference on Mobile Computing and Multimedia (MoMM 2007)

131. International WorkShop on Ubiquitous Application & Security Service (UASS 2007)

2006

132. Applied Cryptography and Information Security (ACIS 2006), in conjunction with 2006 International Conference on Computational Science and its Applications (ICCSA 2006)

133. Workshop on Internet Communications Security (WISC 2006), in conjunction with 2006 International Conference on Computational Science and its Applications (ICCSA 2006)

134. International Workshop on Mobile Multimedia Information Retrieval (MoMIR 2006), in conjunction with 4th International Conference on Mobile Computing and Multimedia (MoMM 2006)

Conference Reviewer

2015

1.      Hawaiian International Conference on System Sciences (HICSS 2016)

2015

2.      Americas Conference on Information Systems (AMCIS 2015)

3.      Hawaiian International Conference on System Sciences (HICSS 2015)

2014

4.      Americas Conference on Information Systems (AMCIS 2014)

5.      ASIACRYPT 2014

6.      Hawaiian International Conference on System Sciences (HICSS 2014)

7.      IEEE Enterprise Computing Conference (IEEE EDOC 2014)

2013

8.      Pacific Asia Conference on Information Systems (PACIS 2013)

9.      Australasian Conference on Information Systems (ACIS 2013), Information Security Management Track

2012

10.    6th International Symposium on Wearable Computers (ISWC 2012)

11.    9th Annual IEEE Consumer Communications and Networking Conference (CCNC 2012)

2011

12.    2011 International Cyber Resilience Conference

13.    4th International Workshop on Digital Forensics (WSDF 2011)

2010

14.    International Workshop on Security – IWSEC 2010

15.    INDOCRYPT 2010

16.    ACM Symposium on Information, Computer and Communications Security – ASIACCS 2009

17.    Financial Cryptography and Data Security 2010

2009

18.    International Conference on Information Security and Cryptology – ICISC 2009

2008

19.    Africacrypt 2008

20.    ASIACRYPT 2008

21.    International Conferences on Information Security and Cryptology – Inscrypt 2008

22.    International Conference on Provable Security – ProvSec 2008

23.    Information Security Conference 2008 – ISC 2008

2007

24.    ACM Conference on Computer and Communications Security – CCS 2007 (Research Track)

25.    International Workshop on Security – IWSEC 2007

26.    International Conference on Computational Science and Its Applications – ICCSA 2007

27.    Information Security Practice and Experience Conference – ISPEC 2007

2006

28.    Advances in Cryptology – ASIACRYPT 2006

29.    Australasian Information Security Workshop 2006

30.    International Workshop on Issues in the Theory of Security – WITS 2006

31.    SKLOIS Conference on Information Security and Cryptology 2006

2005

32.    Advances in Cryptology – ASIACRYPT 2005

33.    SKLOIS Conference on Information Security and Cryptology 2005

Journal Reviewer

Information Security Journals:

·        ACM Computing Surveys (2017), Ad Hoc Networks (2015), Applied Computing and Informatics (2016), Applied Soft Computing (2016), Australian Journal of Telecommunications and the Digital Economy – formerly known as Telecommunications Journal of Australia (2013), Big Data Research (2017), Communications of the ACM (2016, 2017), Computer Communications (2009, 2017), Computer Journal (2011–2012), Computer Networks (2010, 2016), Computer Standards & Interfaces (2015–2016), Computers and Electrical Engineering (2011), Computers & Security (2008, 2013–2017), Concurrency and Computation: Practice and Experience (2013, 2016), Designs, Codes and Cryptography (2007–2008, 2011), Digital Investigation (2015); EURASIP Journal on Wireless Communications and Networking (2006), Expert Systems With Applications (2014, 2016), Frontiers of Computer Science in China (2011), Future Generation Computer Systems (2015–2017), IBM Journal of Research and Development (2015), IEEE Communications Letters (2007–2008, 2010), IEEE Communications Magazine (2017), IEEE Computer (2012, 2014), IEEE Network (2016), IEEE Security & Privacy (2017), IEEE Transactions on Big Data (2017), IEEE Transactions on Circuits and Systems for Video Technology (2013, 2017), IEEE Transactions on Cloud Computing (2015–2017), IEEE Transactions on Computers (2014, 2017), IEEE Transactions on Computational Social Systems (2015), IEEE Transactions on Emerging Topics in Computing (2015), IEEE Transactions on Information Forensics and Security (2015– 2017), IEEE Transactions on Parallel and Distributed Systems (2010, 2012), IEEE Transactions on Services Computing (2016, 2017), IEEE Transactions on Sustainable Computing (2016, 2017), IET Information Security (2007–2010, 2012–2013, 2015), INFORMATICA (2006–2014), Information and Computer Security (2017), Information and Management (2016), Information Management and Computer Security (2013–2014), Information Processing Letters (2015), Information Sciences (2015–2017), Interdisciplinary Journal of Information, Knowledge, and Management (2007–2009, 2012), International Journal of Applied Cryptography (2010), International Journal of Computer Applications in Technology (2011), International Journal of Communication Networks and Distributed Systems (2013), International Journal of Communication Systems (2016), International Journal of Computer Systems Science and Engineering (2012), International Journal of Electronic Security and Digital Forensics (2015), International Journal of High Performance Systems Architecture (2013), International Journal of Information and Computer Security (2014), International Journal of Information Security (2008, 2011–2012, 2014, 2016, 2017), International Journal of Network Security (2005–2008, 2010–2011, 2014), International Journal of Security and Networks (2011, 2015), International Journal of High Performance Systems Architecture (2013), Journal of Ambient Intelligence and Humanized Computing (2016 – 2017), Journal of Computational Science (2016), Journal of Communications and Networks (2006), Journal of Computer and System Sciences (2015–2016), Journal of Computer Science and Technology (2007), Journal of Convergence (2013), Journal of Information Privacy and Security (2016), Journal of Network and Computer Applications (2016), Journal of Parallel and Distributed Computing (2007, 2016), Journal of Supercomputing (2013–2015), Journal of System and Software (2006–2009, 2011), Journal of Universal Computer Science (2007, 2009, 2016), Knowledge-Based Systems (2016), Mathematical & Computer Modelling (2011), Microsystem Technologies (2016), Mobile Networks and Applications (2016, 2017), Multimedia Tools and Applications (2016), Pervasive and Mobile Computing (2016), Security and Communication Networks (2009, 2012–2014), Scientific World Journal (2013), Signal Processing (2014), SpringerPlus (2016), Software: Practice and Experience (2016), Theory of Computing Systems (2014), Wireless Personal Communications (2010–2014)

Interdisciplinary Journals:

·        Asian Journal of Criminology (2007, 2009–2010), Behaviour & Information Technology (2014, 2016–2017), Crime, Law and Social Change (2009, 2012), Crime Prevention and Community Safety (2013), European Journal of Criminology (2016), European Review of Organised Crime (2015), Flinders Law Journal (2012), Forensic Science International (2016), Information Systems Frontiers (2017), Information Systems Journal (2016), International Journal of Cyber Criminology (2012, 2013), Journal of Applied Research in Higher Education (2012, 2013), Journal of Forensic Sciences (2015–2017), Journal of Medical Systems (2013), Journal of Policing, Intelligence and Counter Terrorism (2013), Journal of the Knowledge Economy (2015), Pakistan Journal of Criminology (2012), PLOS ONE (2015–2016); Precedent: Journal of the Australian Lawyers Alliance (2011), Trends & Issues in Crime and Criminal Justice (2010–2011, 2013), Trends in Organized Crime (2012), Victims and Offenders (2013–2014), World Medical & Health Policy (2012)

Comments