Professional Activities

Home || Publications || Media: In the News || Invited Presentations || Professional Activities

Membership

1.       Senior Member, IEEE

2.       Fellow, Australian Computer Society

Expert Services

1.       Invited witness in a private briefing on "Bitcoin and alternative remittance systems" to the Parliamentary Joint Committee on Corporations and Financial Services (2014)

2.       Invited contributor to Australian Bureau of Statistics Draft Conceptual Framework for Cybercrime (2012, 2013)

External Expert Reviewer for Academic Programs

1.       Australian Government Tertiary Education Quality Standards Agency (TEQSA) (2013, 2017)

2.       New York University, School of Professional Studies (2017)

External Expert Reviewer for Faculty Appointment / Promotion

3.       Promotion to Full Professor, Department of Computer Science, Colorado State University (2017)

4.       Tenure-Track Assistant Professor of Cyber Security, School of Computer Science and Engineering, Nanyang Technological University, Singapore (2017)

5.       Full-Time Assistant Professor Appointment, Institute of Law for Science and Technology National Tsing Hua University, Taiwan (2010)

6.       Senior Lecturer Promotion, University of Queensland Business School (2008)

Committee Membership (Professional Bodies)

1.       Australian Computer Society (ACS) Cyber Task-Force (2011)

2.       ACS Policy Committee, International Taskforce (Oct 2012 – Current)

3.       ACS Australian Capital Territory (ACT) Branch Executive Committee (2010 – Feb 2011)

4.       ACS South Australian (SA) Branch Executive Committee and Chair of ACS SA Branch Government Relations Committee (Mar – Dec 2011)

5.       ACS Specialism Advisory "Information Security" Group (Mar 2012 – Current)

6.       Cloud Security Alliance Asia Pacific Education Council (Apr 2015 – Current)

7.       Cloud Security Alliance, Australia Chapter (May 2013 – Current)

8.       IEEE Communications and Information Security Technical Committee (CISTC) Technical Recognition Award Committee (2015, 2016, 2017)

9.       South Australia Pearcey Award Committee (2011 – Current)

10.    Pakistan Society of Criminology (2009 – Current)

Book Series Editor

1.       Syngress/Elsevier’s Book Series entitled “Advanced Topics in Security” (2014 – Current)

2.       SpringerBriefs on Cyber Security Systems and Networks (2017 – Current)

Book Proposal Reviewer

3.       Elsevier (2014, 2015, 2016)

4.       Routledge (2015)

5.       Springer (2015, 2017)

Book Manuscript Reviewer

6.       Stanford University Press (2015)

Journal Guest Editor

1.       Kim-Kwang Raymond Choo, Jemal Abawajy and Rafiqul Islam 2017. Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions. Journal of Computer and System Sciences 83(1): 1–2. http://dx.doi.org/10.1016/j.jcss.2016.09.001

2.       Kim-Kwang Raymond Choo, Yunsi Fei, Yang Xiang and Yu Yu 2017. Embedded Device Forensics and Security. ACM Transactions on Embedded Computing Systems 16(2): Article no 50. https://doi.org/10.1145/3015662

3.       Kim-Kwang Raymond Choo, Mehran Mozaffari Kermani, Reza Azarderakhsh, Manimaran Govindarasu 2017. Emerging Embedded and Cyber Physical System Security Challenges and Innovations. IEEE Transactions on Dependable and Secure Computing 14(3): 235–236. https://doi.org/10.1109/TDSC.2017.2664183

4.       Joseph L Liu, Kim-Kwang Raymond Choo, Xinyi Huang and Man Ho Au 2017. Special issue on security and privacy for smart cities. Personal and Ubiquitous Computing. http://dx.doi.org/10.1007/s00779-017-1043-z 

5.       Zheng Xu, Yunhuai Liu, Kim-Kwang Raymond Choo and Neil Y. Yen 2017. Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems. Wireless Personal Communications 95(3): 1855–1857. http://dx.doi.org/10.1007/s11277-017-4278-0

6.       Zhiyong Zhang and Kim-Kwang Raymond Choo 2017.  Guest Editorial: Multimedia Social Network Security and Applications. Multimedia Tools and Applications 76(3): 3163–3168. http://dx.doi.org/10.1007/s11042-016-4081-z

7.       Elisa Bertino, Kim-Kwang Raymond Choo, Dimitrios Georgakopoulos and Surya Nepal 2016. Internet of Things (IoT): Smart and Secure Service Delivery. ACM Transactions on Internet Technology 16(4): Article no 22. https://doi.org/10.1145/3013520

8.       Kim-Kwang Raymond Choo, Josep Domingo-Ferrer and Lei Zhang 2016. Cloud Cryptography: Theory, Practice and Future Research Directions. Future Generation Computer Systems 62: 51–53, 2016. http://dx.doi.org/10.1016/j.future.2016.04.017 

9.       Kim-Kwang Raymond Choo, Martin Herman, Michaela Iorga and Ben Martini 2016. Cloud Forensics: State-of-the-Art and Future Directions. Digital Investigation, 18: 77–78. http://dx.doi.org/10.1016/j.diin.2016.08.003

10.    Kim-Kwang Raymond Choo, Lior Rokach and Claudio Bettini 2016. Mobile security and privacy: Advances, challenges and future research directions. Pervasive and Mobile Computing 31: 1–2. http://dx.doi.org/10.1016/j.pmcj.2016.10.003

11.    Xiaodong Lin, Kim-Kwang Raymond Choo, Ying-Dar Lin and Peter Mueller 2016. Guest Editorial: Network Forensics and Surveillance for Emerging Networks. IEEE Network 30(6): 4–5. http://dx.doi.org/10.1109/MNET.2016.7764272

12.    Kim-Kwang Raymond Choo and Rick Sarre 2015. Guest Editors’ Introduction: Balancing Privacy with Legitimate Surveillance and Lawful Data Access. IEEE Cloud Computing 2(4): 8–13. http://dx.doi.org/10.1109/MCC.2015.84


Advisory / Editorial Board Membership (Journals)

1.       Australian Journal of Forensic Sciences (2015 – Current; 2016 Impact Factor: 0.778)

2.       Cluster Computing (2016 – Current; 2016 Impact Factor: 2.040 – Quartile 2)

3.       Digital Communications and Networks (2017 – Current)

4.       Digital Investigation (2016 – Current; 2016 Impact Factor: 1.774 – Quartile 2)

5.       Future Generation Computer Systems (2015 – Current; 2016 Impact Factor: 3.997 – Quartile 1)

6.       INFORMATICA (2009 – Current; 2016 Impact Factor: 1.056 – Quartile 2)

7.       IEEE Access (2017 – Current; 2016 Impact Factor: 3.244 – Quartile 1)

8.       IEEE Cloud Computing (2014 – Current)

9.       International Journal of Computational Science and Engineering (2016 – Current)

10.    International Journal of Cyber Criminology (2012 – Current)

11.    International Journal of Distributed Sensor Networks (2013 – Current; 2016 Impact Factor: 1.239)

12.    International Journal of High Performance Computing and Networking (2016 – Current)

13.    International Journal of Security and Networks (2015 – Current)

14.    Journal of Cloud Computing: Advances, Systems and Applications (2015 – Current)

15.    Journal of Digital Forensics, Security and Law (2014 – Current)

16.    Journal of Information Privacy and Security (2015 – Current)

17.    Journal of Network and Computer Applications (2016 – Current; 2016 Impact Factor: 3.500 – Quartile 1)

18.    KSII Transactions on Internet and Information Systems (2017 – Current; 2016 Impact Factor: 0.452)

19.    PLoS ONE (2015 – Current; 2016 Impact Factor: 2.806 – Quartile 1)

20.    Security and Communication Networks (2015 – Current; 2016 Impact Factor: 1.067)

21.    Soft Computing (2017 – Current; 2016 Impact Factor: 2.472 – Quartile 2)

Reviewer for Academic Programs, Grants, and Thesis

1.       Member of the Judging Panel,

·        2012 Kaspersky Lab IT Security for the Next Generation – Asia Pacific & MEA Cup 2012, City University of Hong Kong

·        2012 National Security Short Story Competition, Australia

·        2013 Consensus IT Writers & Consensus IT Professional Awards, Australia

·        2013 Kaspersky Lab CyberSecurity for the Next Generation – Asia Pacific & MEA Cup 2013, National University of Singapore

·        2013 Kaspersky Lab CyberSecurity for the Next Generation – International Round 2013, Royal Holloway University of London

·        iAwards 2013, Australia

·        iAwards 2014 (Panel Judge for ‘Educator of the Year’ Category), Australia

·        iAwards 2015, Australia (Panel Judge for ‘Research & Development’ Category), Australia

2.       Grants review (Panel reviewer):

·        National Science Foundation, Secure and Trustworthy Cyberspace: Education (2017)

3.       Grants review:

·        United States Department of Justice, Office of Justice Programs (2010)

·        Australian Government’s Australia-India Strategic Research Fund (2013)

·        Australian Government’s National Drug Law Enforcement Research Fund (2010)

·        Australian Government’s Criminology Research Council (2010)

·        Australian Research Council (2015)

                                           i.     Discovery (2015, 2016)

                                          ii.     Linkage (2015, 2016)

·        EPSRC Joint Singapore-UK Research in Cyber Security (2015)

·        Israeli Ministry of Science, Technology and Space (2015)

·        Netherlands Organisation for Scientific Research (2014)

·        Science Foundation Ireland (2016)

·        University of Turin, Italy, UE (2011)

·        Qatar National Research Fund (QNRF)’s National Priorities Research Program (NPRP) (2012, 2014, 2015, 2016)

·        Qatar National Research Fund (QNRF)’s National Priorities Research Program (NPRP) –  Exceptional Proposals (2013)

4.       PhD Law Confirmation of Candidature (External) Review Panel Member, Faculty of Law, Queensland University of Technology (2012)

5.       Thesis examination:

·        Bachelor of Science (Honours) (Computer Science), Victoria University, Australia (2014)

·        Master by Research thesis (Master of Mathematical Sciences), University of Ballarat, Australia (2010)

·        Master of Computer Science Research thesis, University of Wollongong, Australia (2012)

·        Master of Philosophy (MPhil) thesis, Melbourne University, Australia (2014)

·        Master of Cyber Security thesis, University of Waikato (2015)

·        Doctor of Philosophy (Ph.D.) thesis, Deakin University, Australia (2016)

·        Doctor of Philosophy (Ph.D.) thesis, Macquarie University, Australia (2011)

·        Doctor of Philosophy (Ph.D.) thesis, Queensland University of Technology, Australia (2013)

·        Doctor of Philosophy (Ph.D.) thesis, Thapar University, India (2016)

·        Doctor of Philosophy (Ph.D.) thesis, University of New South Wales (UNSW) Sydney, Australia (2017)

·        Doctor of Philosophy (Ph.D.) thesis, Universiti Putra Malaysia, Malaysia (2017)

·        Doctor of Philosophy (Ph.D.) thesis, University of Pretoria, South Africa (2015, 2017)

·        Doctor of Philosophy (Ph.D.) thesis, University of Wollongong, Australia (2016)

·        Doctor of Philosophy (Ph.D.) thesis, University of Wollongong, Australia (2017)

·        Doctor of Philosophy (Ph.D.) thesis, Victoria University of Wellington, New Zealand (2013)

Conference Organiser

1.       Co-Chair, "Cyber-of-Things: Cyber-Crimes, Cyber-Security and Cyber Forensics" minitrack, Hawaii International Conference on System Sciences (HICSS 2018), Hilton Waikoloa Village, Big Island, USA

2.       Co-Chair, " Cyber Threat Intelligence and Analytics" minitrack, Hawaii International Conference on System Sciences (HICSS 2018), Hilton Waikoloa Village, Big Island, USA

3.       Co-Chair, "Cyber-of-Things: Cyber-Crimes and Cyber-Security" minitrack, Hawaii International Conference on System Sciences (HICSS 2017), Hilton Waikoloa Village, Big Island, USA

4.       Program Co-Chair, 3rd International Conference on Green, Pervasive and Cloud Computing (GPC 2017), Amalfi Coast, Italy

5.       Program Co-Chair, 17th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2017), Helsinki, Finland

6.       Program Co-Chair, 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2017), Ningbo, China

7.       Program Co-Chair, 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2017)

8.       General Co-Chair, 12th International Conference on Future Information Technology (FutureTech 2017), Guilin, China

9.       Chair, Forensics  and Analytics Track, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), Sydney, Australia

10.    Co-Chair, Second Annual Big Data Security, Privacy and Trust Workshop (BigDataSPT 2017), in conjunction with 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2017)

11.    Co-Chair, Workshop on Big Data Research and Development in Knowledge Engineering, In conjunction with the 29th International Conference on Software Engineering and Knowledge Engineering (SEKE 2017), Pittsburgh, USA

12.    Co-Chair, IEEE International Symposium on Security, Privacy and Trust in Internet of Things, In conjunction with the IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017)

13.    Co-Chair, International Workshop on Biometrics-as-a-Service (IW-BAAS 2017)

14.    Steering Committee, International Workshop on Security in e-Science and e-Research (ISSR 2017)

15.    General Chair, International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2016)

16.    General Executive Chair, IEEE International Conference on Cyber, Physical and Social Computing (CPSCom 2016)

17.    Program Vice-Chair, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016)

18.    Steering Committee, International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

19.    Steering Committee, International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016), in conjunction with "The 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

20.    Workshop Chair, International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

21.    Co-Chair, (Inaugural) Forensics Track, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016)

22.    Co-Chair, "Cybercrimes, Cyber-Physical Innovations, and Emerging Investigation Challenges" minitrack, Hawaii International Conference on System Sciences (HICSS 2016), Kauai, Hawaii, USA

23.    Co-Chair, Advances in Big Data – Annual Big Data Security, Privacy and Trust Workshop (BigDataSPT), in conjunction with 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

24.    Co-Chair, International Symposium on Cyber Security (CS 2016), Fuzhou, China

25.    Co-Chair, International Workshop on the Crowdsensing and intelligent sensing on Mobile Media Analytics (SMMA 2016), in conjunction with The 9th EAI International Conference on Mobile Multimedia Communications (MobiMedia 2016)

26.    Co-Chair, Workshop on Big Data Research and Development in Knowledge Engineering, In conjunction with the 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016), San Francisco Bay, USA

27.    International Liaison Chair, Cyber Science and Technology Congress (CyberSciTech 2016), Auckland, New Zealand

28.    Publications Chair, EAI International Conference on Cybersecurity, Network Security, Critical Infrastructure Protection, Digital Investigation, Information Security and Cyber Defense (AFRISEC 2016)

29.    Co-Chair, Information Security, International Symposium on Intelligence Computation and Applications (ISICA 2015), Guangzhou, China

30.    Organising Chair, Australasian Conference on Information Systems 2015, Adelaide, Australia

31.    Co-Chair, "IS Security, Cyber Crime and Digital Investigations "track, Australasian Conference on Information Systems 2015, Adelaide, Australia

32.    Workshop Co-Chair, IEEE Technical Committee on Scalable Computing (DSDIS 2015), Sydney, Australia

33.    Co-Chair, IEEE International Symposium on Trust and Security in Cloud Computing (TSCloud 2015) In Affiliation with IEEE TrustCom 2015

34.    Co-Chair, IEEE International Symposium on Trust and Security in Cloud Computing (TSCloud 2014) In Affiliation with IEEE TrustCom 2014

35.    International Publicity Chair (Academia), International Forum on Mobile Technology and Applications 2014, Hong Kong

36.    Organising Committee, Australasian Computer Science Week 2013 (ACSW2013), Adelaide, Australia

37.    Co-Convener, 2012 Fulbright Symposium "Securing our Cyber Future", Adelaide, Australia

38.    Co-Chair, 3-week stratsec/UniSA IT Security Research Winter School 2012, Adelaide, Australia

39.    Co-Chair, 4-week stratsec/UniSA IT Security Research Winter School 2011, Adelaide, Australia

40.    Chair, Security Stream, Australian Computer Society’s Canberra 2011 Branch Conference, Canberra, Australia

41.    Co-Chair, Symposium on Cyber Terrorism, Defense Science Research Conference and Expo (DSR 2011), Singapore

42.    PhD Workshop Coordinator, Safeguarding Australia 2008 PhD National Security Workshop (2008)

Conference Program Committee Member (and Reviewer)

2018

1.       International Conference on Big Data and Advanced Wireless Technologies (BDAW 2018)

2017

2.       ACM Symposium on Applied Computing (SAC 2017), Special Track on Internet of Things (IoT)

3.       Australasian Conference on Information Security and Privacy (ACISP 2017)

4.       Australasian Information Security Conference (ACSW-AISC 2017)

5.       IEEE Global Communications Conference: Communication & Information System Security (Globecom 2017 – CISS)

6.       IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2017)

7.       IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2017), Services Applications and Business Track

8.       International Conference on Cloud Computing Technology and Science (CloudCom 2017)

9.       International Conference on Digital Forensics & Cyber Crime (ICDF2C 2017)

10.    International Conference on Information Systems (ICIS 2017), Security, Privacy and Ethics of IS Track

11.    International Conference on Network and System Security (NSS 2017)

12.    International Conference on Provable Security (ProvSec 2017)

13.    International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2017)

14.    International Workshop on Autonomics and Cloud Security (ACS 2017)

15.    International Workshop on Cloud Security and Forensics (WCSF 2017), in conjunction with IEEE International Conference on Trust, Security And Privacy In Computing And Communications (TrustCom2017)

16.    International Workshop on Digital Forensics (WSDF 2017), in conjunction with Conference on Availability, Reliability and Security (ARES 2017)

17.    International Workshop on Securing IoT Networks (SITN-2017), in conjunction with the 10th  IEEE International Conference on Internet of Things (iThings 2017)

18.    International Workshop on Security in Big Data (SECBD 2017), in conduction with International Conference on Network and System Security (NSS 2017)

19.    National Cyber Summit (NCS 2017)

20.    Workshop on Security and Privacy in Cyber-Physical Systems 2017 (SPCPS 2017), in conduction with the 3rd IEEE International Conference on Cybernetics (CYBCONF 2017)

2016

21.    Annual Conference on Privacy, Security and Trust (PST 2016)

22.    Australasian Conference on Information Security and Privacy (ACISP 2016)

23.    Australasian Information Security Conference (ACSW-AISC 2016)

24.    EAI International Conference on Cloud, Networking for IoT Systems (CN4IoT 2016)

25.    EAI International Conference on Security and Privacy in Vehicular Network (SPVAN 2016)

26.    DFRWS USA 2016

27.    IEEE Global Communications Conference: Communication & Information System Security (Globecom 2016 – CISS)

28.    IEEE International Conference on Communications (ICC 2016)

·        Communications and Information Systems Security Symposium

29.    IEEE International Conference on Pervasive Intelligence and Computing (PICom 2016)

30.    IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2016), Services Applications and Business Track

31.    IEEE Workshop on Legal and Technical Issues in Cloud Computing and the Internet of Things

32.    IEEE Workshop on Security and Privacy in the Cloud (IEEE SPC 2016), conjunction with the IEEE Conference on Communications and Network Security

33.    International Conference on Ambient Systems, Networks and Technologies (ANT 2016), Systems Security and Privacy Track

34.    International Conference on Digital Forensics & Cyber Crime (ICDF2C 2016)

35.    International Conference on Information Security Practice and Experience (ISPEC 2016)

36.    International Conference on Information Security Theory and Practice (WISTP 2016)

37.    International Conference on Network and System Security (NSS 2016)

38.    International Conference on Provable Security (ProvSec 2016)

39.    International Workshop on Digital Forensics (WSDF 2016), in conjunction with Conference on Availability, Reliability and Security (ARES 2016)

40.    International Workshop on Security and Forensics in Communication Systems (SFCS 2016), in conjunction with International Conference on Distributed Computing and Networking (ICDCN 2016)

41.    International Workshop on Trust in Cloud Computing (IWTCC 2016)

2015

42.    Annual ADFSL Conference on Digital Forensics, Security and Law (ADFSL 2015)

43.    Australasian Conference on Information Security and Privacy (ACISP 2015)

44.    Australasian Information Security Conference (ACSW-AISC 2015)

45.    IEEE International Conference on Communications (ICC 2015)

·        Communications and Information Systems Security Symposium

·        Social Networking Track

46.    IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2015)

47.    IEEE International Symposium on Nanoelectronic and Information Systems (iNIS 2015)

48.    IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2015), Services Applications and Business Track

49.    International Conference on Connected Vehicles & Expo (ICCVE 2015)

50.    International Conference on Digital Society (ICDS 2015)

51.    International Conference on Human Aspects of Information Security, Privacy and Trust (HAS 2015), in conjunction with International Conference on Human-Computer Interaction (HCII 2015)

52.    International Conference on Systematic Approaches to Digital Forensics Engineering (SADFE 2015)

53.    International Workshop on Cloud Security and Forensics (WCSF 2015), in conjunction with Conference on Availability, Reliability and Security (ARES 2015)

54.    International Workshop on Digital Forensics (WSDF 2015), in conjunction with Conference on Availability, Reliability and Security (ARES 2015)

55.    International Workshop on Digital Forensics and Incident Analysis (WDFIA 2015)

56.    International Workshop on Security and Forensics in Communication Systems (SFCS 2015), in conjunction with IEEE ISCC 2015

57.    International Workshop on Trust for the Converged Cloud and Internet of Things (CCIoT 2015)

58.    International Workshop on Trust in Cloud Computing (IWTCC 2015)

59.    Smart Card Research and Advanced Application Conference (CARDIS 2015)

2014

60.    Australasian Conference on Information Security and Privacy (ACISP 2014)

61.    Australasian Conference on Information Systems (ACIS 2014)

62.    Australasian Information Security Conference (ACSW-AISC 2014)

63.    Cybercrime and Trustworthy Computing Workshop (CTC 2014)

64.    FTRA International Conference on Creative Converged IT (CCIT 2014)

65.    FTRA International Symposium on Digital Forensics and Information Security (DFIS 2014)

66.    FTRA International Workshop on Advanced Multimedia Computing (AMC 2014)

67.    IEEE International Conference on Communications (ICC 2014), Communications and Information Systems Security Symposium

68.    International Conference on Computational Intelligence and Software Engineering (CiSE 2014)

69.    IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2014), Security Track

70.    International Conference on Connected Vehicles & Expo (ICCVE 2014)

71.    International Conference on Digital Society (ICDS 2014)

72.    International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2014), Security, Privacy and Trust Track

73.    International Symposium on Information and Communication Technology (SoICT 2014)

74.    International Workshop on Applications and Technologies in Cyber Security (ATCS 2014), in conjunction with the International conference on Security and Privacy in Communication Networks (SECURECOMM 2014)

75.    IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2014), Services Applications and Business Track

76.    International Workshop on Digital Forensics (WSDF 2014)

77.    International Workshop on Security and Forensics in Communication Systems (SFCS 2014), in conjunction with ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS 2014)

2013

78.    Australasian Conference on Information Security and Privacy (ACISP 2013)

79.    Australasian Conference on Information Systems (ACIS 2013), Social Media and Social Networks in Organisations Track

80.    Australasian Information Security Conference (ACSW-AISC 2013)

81.    Cloud Security Alliance APAC CISO Forum 2013

82.    Cybercrime and Trustworthy Computing Workshop (CTC 2013)

83.    FTRA International Conference on Advanced IT, engineering and Management (AIM 2013)

84.    FTRA International Symposium on Ubiquitous Computing and Embedded Systems (UCES 2013)

85.    IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS-2013), Track 4: Grid And P2P Distributed Infrastructure for Intelligent Networking and Collaborative Systems

86.    IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), Security Track

87.    IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2013), Services Applications and Business Track

88.    International Conference on Connected Vehicles & Expo (ICCVE 2013)

89.    International Conference on Digital Forensics & Cyber Crime (ICDF2C 2013)

90.    International Conference on Technical and Legal Aspects of the e-Society (CYBERLAWS 2013)

91.    International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security (ACCESS 2013)

92.    International Higher Education Teaching and Learning Association Conference: Exploring Spaces for Learning (Review Board Member)

93.    International Symposium on Trust and Security in Cloud Computing (IEEE TSCloud 2013)

94.    International Workshop on Digital Forensics (WSDF 2013)

95.    Kaspersky Lab’s Cyber Security for the Next Generation – Asia Pacific & MEA Cup 2013

2012

96.    Australasian Information Security Conference (AISC 2012)

97.    Cybercrime and Trustworthy Computing Workshop (CTC 2012)

98.    FTRA International Conference on Advanced IT, engineering and Management (AIM 2012)

·        Track3 : Advanced Vehicular Communications Technology

·        Track5 : Strategic Security Management for Industrial Technology

99.    FTRA International Conference on Advanced IT, engineering and Management (AIM Summer 2012)

100. FTRA International Conference on Information Technology Convergence and Services (ITCS 2012)

101. FTRA International Workshop on Advanced Future Multimedia Services (AFMS 2012)

102. IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS-2012), "Cloud Computing Security and Privacy" Track

103. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012)

104. International Conference on Network-Based Information Systems (NBiS-2012)

105. International Conference on Provable Security (ProvSec 2012)

106. International Conference on Technical and Legal Aspects of the e-Society (CYBERLAWS 2012)

107. International Symposium on Trust and Security in Cloud Computing (IEEE TSCloud 2012), in conjunction with IEEE TrustCom 2012

108. International Workshop on Digital Forensics (WSDF 2012), in conjunction with the 7th International Conference on Availability, Reliability and Security (ARES 2012)

109. Kaspersky Lab’s IT Security for the Next Generation - Asia Pacific & MEA Cup 2012

2011

110. Australasian Information Security Conference (AISC 2011)

111. Cybercrime and Trustworthy Computing Workshop (CTC 2011)

112. FTRA International Conference on Information Technology Convergence and Services (ITCS 2011), Track 5: Electronic Commerce, Business and Management

113. FTRA International Workshop on Advanced Future Multimedia Services (AFMS 2011)

114. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2011), Security Track

115. IEEE International Workshop on Security in Computers, Networking and Communications (SCNC), in conjunction with IEEE INFOCOM 2011

116. International Workshop on Trust and Security in Cloud Computing (IEEE TSCloud 2011), in conjunction with IEEE TrustCom 2011

117. International Conference on Information and Communication Security (ICICS 2011)

2010

118. Cybercrime and Trustworthy Computing Workshop (CTC-2010)

119. FTRG 2010 International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2010)

120. International Symposium on u- and e- Service, Science and Technology (UNESST 2010)

121. International Workshop on Advanced Future Multimedia Services (AFMS 2010)

2009

122. ASIACRYPT 2009

123. International Conference on Security and Cryptography (SECRYPT 2009)

124. International Symposium on u- and e- Service, Science and Technology (UNESST 2009)

125. International Workshop on Mobile Multimedia Information Retrieval (MoMIR 2009)

126. Personal, Indoor and Mobile Radio Communications Symposium (PIMRC 2009)

2008

127. International Conference on Security and Cryptography (SECRYPT 2008)

128. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2008) – Track #4: Applications, Services & Business Approach

129. International Symposium on u- and e- Service, Science and Technology (UNESST 2008)

2007

130. International Workshop on Group-Oriented Cryptographic Protocols (GOCP 2007), in conjunction with 34th International Colloquium on Automata, Languages and Programming (ICALP 2007)

131. International Conference on Security and Cryptography (SECRYPT 2007)

132. International Conference on Provable Security (ProvSec 2007) – previously known as Applied Cryptography and Information Security (ACIS)

133. International Workshop on Mobile Multimedia Information Retrieval (MoMIR 2007), in conjunction with 5th International Conference on Mobile Computing and Multimedia (MoMM 2007)

134. International WorkShop on Ubiquitous Application & Security Service (UASS 2007)

2006

135. Applied Cryptography and Information Security (ACIS 2006), in conjunction with 2006 International Conference on Computational Science and its Applications (ICCSA 2006)

136. Workshop on Internet Communications Security (WISC 2006), in conjunction with 2006 International Conference on Computational Science and its Applications (ICCSA 2006)

137. International Workshop on Mobile Multimedia Information Retrieval (MoMIR 2006), in conjunction with 4th International Conference on Mobile Computing and Multimedia (MoMM 2006)

Conference Reviewer

2015

1.       Hawaiian International Conference on System Sciences (HICSS 2016)

2015

2.       Americas Conference on Information Systems (AMCIS 2015)

3.       Hawaiian International Conference on System Sciences (HICSS 2015)

2014

4.       Americas Conference on Information Systems (AMCIS 2014)

5.       ASIACRYPT 2014

6.       Hawaiian International Conference on System Sciences (HICSS 2014)

7.       IEEE Enterprise Computing Conference (IEEE EDOC 2014)

2013

8.       Pacific Asia Conference on Information Systems (PACIS 2013)

9.       Australasian Conference on Information Systems (ACIS 2013), Information Security Management Track

2012

10.    6th International Symposium on Wearable Computers (ISWC 2012)

11.    9th Annual IEEE Consumer Communications and Networking Conference (CCNC 2012)

2011

12.    2011 International Cyber Resilience Conference

13.    4th International Workshop on Digital Forensics (WSDF 2011)

2010

14.    International Workshop on Security – IWSEC 2010

15.    INDOCRYPT 2010

16.    ACM Symposium on Information, Computer and Communications Security – ASIACCS 2009

17.    Financial Cryptography and Data Security 2010

2009

18.    International Conference on Information Security and Cryptology – ICISC 2009

2008

19.    Africacrypt 2008

20.    ASIACRYPT 2008

21.    International Conferences on Information Security and Cryptology – Inscrypt 2008

22.    International Conference on Provable Security – ProvSec 2008

23.    Information Security Conference 2008 – ISC 2008

2007

24.    ACM Conference on Computer and Communications Security – CCS 2007 (Research Track)

25.    International Workshop on Security – IWSEC 2007

26.    International Conference on Computational Science and Its Applications – ICCSA 2007

27.    Information Security Practice and Experience Conference – ISPEC 2007

2006

28.    Advances in Cryptology – ASIACRYPT 2006

29.    Australasian Information Security Workshop 2006

30.    International Workshop on Issues in the Theory of Security – WITS 2006

31.    SKLOIS Conference on Information Security and Cryptology 2006

2005

32.    Advances in Cryptology – ASIACRYPT 2005

33.    SKLOIS Conference on Information Security and Cryptology 2005

Journal Reviewer

1.       ACM Computing Surveys (2017)

2.       ACM Transactions on Cyber-Physical Systems (2017)

3.       ACM Transactions on Intelligent Systems and Technology (2017)

4.       Ad Hoc Networks (2015)

5.       Applied Computing and Informatics (2016)

6.       Applied Soft Computing (2016)

7.       Asian Journal of Criminology (2007, 2009–2010),

8.       Australian Journal of Telecommunications and the Digital Economy – formerly known as Telecommunications Journal of Australia (2013)

9.       Behaviour & Information Technology (2014, 2016–2017),

10.    Big Data Research (2017)

11.    Communications of the ACM (2016, 2017)

12.    Computer Communications (2009, 2017)

13.    Computer Journal (2011–2012)

14.    Computer Methods and Programs in Biomedicine (2017)

15.    Computer Networks (2010, 2016)

16.    Computer Standards & Interfaces (2015–2016)

17.    Computers and Electrical Engineering (2011)

18.    Computers & Security (2008, 2013–2017)

19.    Concurrency and Computation: Practice and Experience (2013, 2016)

20.    Crime, Law and Social Change (2009, 2012)

21.    Crime Prevention and Community Safety (2013)

22.    Designs, Codes and Cryptography (2007–2008, 2011)

23.    Digital Investigation (2015)

24.    Electronic Commerce Research (2017)

25.    EURASIP Journal on Wireless Communications and Networking (2006)

26.    European Journal of Criminology (2016)

27.    European Review of Organised Crime (2015),

28.    Expert Systems With Applications (2014, 2016, 2017)

29.    Flinders Law Journal (2012)

30.    Forensic Science International (2016)

31.    Frontiers of Computer Science in China (2011)

32.    Frontiers of Information Technology & Electronic Engineering (2017)

33.    Future Generation Computer Systems (2015–2017)

34.    IBM Journal of Research and Development (2015)

35.    IEEE Communications Letters (2007–2008, 2010)

36.    IEEE Communications Magazine (2017)

37.    IEEE Computer (2012, 2014)

38.    IEEE Network (2016)

39.    IEEE Security & Privacy (2017)

40.    IEEE Sensors Journal (2017)

41.    IEEE Software (2017)

42.    IEEE Transactions on Big Data (2017)

43.    IEEE Transactions on Circuits and Systems for Video Technology (2013, 2017)

44.    IEEE Transactions on Cloud Computing (2015–2017)

45.    IEEE Transactions on Computers (2014, 2017)

46.    IEEE Transactions on Computational Social Systems (2015, 2017)

47.    IEEE Transactions on Dependable and Secure Computing (2017)

48.    IEEE Transactions on Emerging Topics in Computing (2015, 2017)

49.    IEEE Transactions on Information Forensics and Security (2015– 2017)

50.    IEEE Transactions on Parallel and Distributed Systems (2010, 2012)

51.    IEEE Transactions on Services Computing (2016, 2017)

52.    IEEE Transactions on Sustainable Computing (2016, 2017)

53.    IEEE Wireless Communications (2017)

54.    IET Cyber-Physical Systems: Theory & Applications (2017)

55.    IET Information Security (2007–2010, 2012–2013, 2015)

56.    INFORMATICA (2006–2014)

57.    Information and Computer Security (2017)

58.    Information and Management (2016, 2017)

59.    Information Management and Computer Security (2013–2014)

60.    Information Processing Letters (2015), Information Sciences (2015–2017)

61.    Information Systems Frontiers (2017)

62.    Information Systems Journal (2016)

63.    International Journal of Communication Networks and Distributed Systems (2013)

64.    International Journal of Communication Systems (2016)

65.    International Journal of Cyber Criminology (2012, 2013)

66.    International Journal of High Performance Systems Architecture (2013)

67.    International Journal of Information Security (2008, 2011–2012, 2014, 2016, 2017)

68.    International Journal of Network Security (2005–2008, 2010–2011, 2014)

69.    International Journal of Security and Networks (2011, 2015)

70.    International Journal of High Performance Systems Architecture (2013)

71.    Journal of Ambient Intelligence and Humanized Computing (2016 – 2017)

72.    Journal of Applied Research in Higher Education (2012, 2013)

73.    Journal of Computational Science (2016)

74.    Journal of Communications and Networks (2006)

75.    Journal of Computer and System Sciences (2015–2016)

76.    Journal of Computer Science and Technology (2007)

77.    Journal of Convergence (2013)

78.    Journal of Forensic Sciences (2015–2017)

79.    Journal of Information Privacy and Security (2016)

80.    Journal of Information Security and Applications (2017)

81.    Journal of Medical Systems (2013)

82.    Journal of Network and Computer Applications (2016)

83.    Journal of Parallel and Distributed Computing (2007, 2016, 2017)

84.    Journal of Policing, Intelligence and Counter Terrorism (2013)

85.    Journal of Supercomputing (2013–2015)

86.    Journal of System and Software (2006–2009, 2011)

87.    Journal of Universal Computer Science (2007, 2009, 2016)

88.    Knowledge-Based Systems (2016)

89.    Mathematical & Computer Modelling (2011)

90.    Microsystem Technologies (2016)

91.    Mobile Networks and Applications (2016, 2017)

92.    Multimedia Tools and Applications (2016, 2017)

93.    Pervasive and Mobile Computing (2016)

94.    PLOS ONE (2015–2016)

95.    Precedent: Journal of the Australian Lawyers Alliance (2011)

96.    Security and Communication Networks (2009, 2012–2014)

97.    Signal Processing (2014)

98.    SpringerPlus (2016)

99.    Software: Practice and Experience (2016)

100. Theory of Computing Systems (2014)

101. Trends & Issues in Crime and Criminal Justice (2010–2011, 2013)

102. Trends in Organized Crime (2012)

103. Victims and Offenders (2013–2014)

104. World Medical & Health Policy (2012)

105. Wireless Personal Communications (2010–2014)

Comments