• 267 Citations
  • 9 h-Index
20052020
If you made any changes in Pure these will be visible here soon.

Research Output 2005 2020

Filter
Conference paper
2019

The myhealthrecord system impacts on patient workflow in general practices

Raza Khan, U., Zia, T. A., Pearce, C. & Perera, K., 08 Aug 2019, 27th Australian National Health Informatics Conference. Cummings, E., Merolli, M. & Schaper, L. K. (eds.). Vol. 266. p. 162-167 6 p. (Studies in Health Technology and Informatics).

Research output: Book chapter/Published conference paperConference paper

Workflow
General Practice
Health
Interviews
Health Information Systems
2018
5 Citations (Scopus)

A Dimension Reduction Model and Classifier for Anomaly-Based Intrusion Detection in Internet of Things

Zhao, S., Li, W., Zia, T. & Zomaya, A. Y., 02 Apr 2018, A Dimension Reduction Model and Classifier for Anomaly-Based Intrusion Detection in Internet of Things: 15th IEEE International Conference on Pervasive Intelligence and Computing (PICom 2017). United States, p. 836-843 8 p.

Research output: Book chapter/Published conference paperConference paper

Intrusion detection
Classifiers
Principal component analysis
Labeling
Learning algorithms
1 Citation (Scopus)
1 Downloads (Pure)

A survey of anomaly and automation from a cybersecurity perspective

Donevski, M. & Zia, T., 13 Dec 2018, 2018 IEEE Globcom Workshops (GC Wkshps): 2018 IEEE Workshop on Communication, Computing, and Networking in Cyber Physical Systems. Red Hook NY, USA: IEEE, 6 p.

Research output: Book chapter/Published conference paperConference paper

Learning systems
Automation
Cyber Physical System
Internet of things

Exploring secure communication in VANET broadcasting

Jafer, M., Khan, M., Rehman, S-U. & Zia, T., 25 Apr 2018, Security and Privacy in Communication Networks: SecureComm 2017 International Workshops Proceedings. Lin, X., Ghorbani, A., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer, p. 69-84 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 239).

Research output: Book chapter/Published conference paperConference paper

Broadcasting
Traffic congestion
Supercomputers
Secure communication
Availability

Perceptions and Experiences of General Practice Users About MyHealthRecord

Raza Khan, U., Zia, T., Pearce, C. & Perera, K., 2018, Health information science: 7th International Conference, HIS 2018, Cairns, QLD, Australia, October 5-7, 2018, proceedings. Siuly, S., Lee, I., Huang, Z., Zhou, R., Wang, H. & Xiang, W. (eds.). Cham, Switzerland: Springer, Vol. 11148. p. 3-16 14 p.

Research output: Book chapter/Published conference paperConference paper

Health
2017
6 Citations (Scopus)

Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT)

Zia, T., Liu, P. & Han, W., 29 Aug 2017, Proceedings of the 12th International Conference on Availability, Reliability and Security: ARES 17. ACM Digital Library, p. 1-7 7 p. 55

Research output: Book chapter/Published conference paperConference paper

Internet of things
Digital forensics
Acoustic waves
Industry
4 Citations (Scopus)

Broadcasting under Highway Environment in VANETs using Genetic Algorithm

Jafer, M., Khan, A., Rehman, S. U. & Zia, T. A., 16 Nov 2017, 2nd International Workshop on Research Advancements in Future Networking Technologies (RAFNET 2017) held in conjunction with IEEE 85th Vehicular Technology Conference (VTC 2017). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1-5 5 p.

Research output: Book chapter/Published conference paperConference paper

Broadcasting
Genetic algorithms
Communication
4 Citations (Scopus)

Optimizing Broadcasting Scheme for VANETs Using Genetic Algorithm

Jafer, M., Khan, M., Rehman, S-U. & Zia, T., 16 Feb 2017, Proceedings of the 41st Annual IEEE Conference on Local Computer Networks (LCN 2016). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 222-229 8 p. 7856160

Research output: Book chapter/Published conference paperConference paper

Broadcasting
Genetic algorithms
Traffic congestion
Computational complexity
Communication
2016

An exploratory study of the role of eHealth in Healthy Ageing

Raza Khan, U., Zia, T. & Perera, K., 2016, Proceedings of the 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1-5 5 p.

Research output: Book chapter/Published conference paperConference paper

1 Citation (Scopus)
6 Downloads (Pure)

Joint rate and queue based routing for vehicular ad-hoc networks

Rehman, S. U., Khan, M., Zia, T. & Zomaya, A. Y. H., 2016, Proceedings of the 41st Annual IEEE Conference on Local Computer Networks (LCN 2016). United States: IEEE, Institute of Electrical and Electronics Engineers, 6 p.

Research output: Book chapter/Published conference paperConference paper

2015

Organisations Capability and Aptitude towards IT Security Governance

Zia, T., 2015, proceedings of the 2015 5th International Conference on IT Convergence and Security (ICITCS 2015). US: IEEE, Institute of Electrical and Electronics Engineers, p. 1-4 4 p.

Research output: Book chapter/Published conference paperConference paper

Governance
Business process
Decision-making process
Mitigation
3 Citations (Scopus)

Quality of Service Based Cross Layer Routing Protocol for VANETs

Rehman, S-U., Khan, M., Zia, T. & Jafer, M., 2015, Proceedings of the 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). US: IEEE, Institute of Electrical and Electronics Engineers, p. 1-6 6 p.

Research output: Book chapter/Published conference paperConference paper

2014
5 Citations (Scopus)
5 Downloads (Pure)

Cross Layer Routing for VANETs

Rehman, S-U., Khan, M. & Zia, T., 2014, WoWMoM 2014. USA: IEEE, p. 1-4 4 p.

Research output: Book chapter/Published conference paperConference paper

Vehicular ad hoc networks
OSI model
Network architecture
1 Citation (Scopus)

EP²AC: An Efficient Privacy-Preserving Data Access Control Scheme for Data-Oriented Wireless Sensor Networks

Yang, P. & Zia, T., 2014, 6th Proceedings. United States: IEEE, p. 755-762 8 p.

Research output: Book chapter/Published conference paperConference paper

Data privacy
Access control
Wireless sensor networks
Ecosystems
Cryptography
4 Citations (Scopus)
5 Downloads (Pure)

Wireless Transmission Modeling for Vehicular Ad-hoc Networks

Rehman, S-U., Khan, M. & Zia, T., 2014, 2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS) : Proceedings. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 398-403 6 p.

Research output: Book chapter/Published conference paperConference paper

Vehicular ad hoc networks
Communication
2013
7 Citations (Scopus)

An Efficient and Secure Digital Image Watermarking Using Features from Iris Image

Dutta, M. K., Singh, A. & Zia, T., 2013, ICCC 2013. US: IEEE Digital Explore, p. 451-456 6 p.

Research output: Book chapter/Published conference paperConference paper

Image watermarking
Biometrics
Digital watermarking
Signal processing
Electronic document identification systems
13 Citations (Scopus)

D2MAC: Dynamic delayed Medium Access Control (MAC) protocol with fuzzy technique for Wireless Body Area Networks

Mouzehkesh Pirborj, N., Zia, T., Shafigh, S. & Zheng, L., 2013, Proceedings of the 2013 IEEE International Conference on Body Sensor Networks . Palmer, J. & Hoyt, R. (eds.). United States: Institute of Electrical and Electronics Engineers, p. 1-6 6 p. 6575472

Research output: Book chapter/Published conference paperConference paper

Medium access control
Network protocols
Telecommunication traffic
Sensor nodes
Fuzzy logic
2 Citations (Scopus)

Light-Weight History-Based Medium Access Control (MAC) Protocol for Wireless Body Area Networks

Mouzehkesh Pirborj, N., Shafigh, S., Zia, T. & Zheng, L., 2013, ICIST 2013. United States: IEEE Digital Explore, p. 91-96 6 p.

Research output: Book chapter/Published conference paperConference paper

Medium access control
Engines
Sensors
7 Citations (Scopus)
5 Downloads (Pure)

Traffic Aware Fuzzy-Tuned Delay Range for Wireless Body Area Networks Medium Access Control Protocol (MAC)

Mouzehkesh Pirborj, N., Zia, T. & Shafigh, S., 2013, Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing. Palaniswami, M. (ed.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 60-65 6 p.

Research output: Book chapter/Published conference paperConference paper

Medium access control
Telecommunication traffic
Network protocols
Fuzzy logic
Sensor networks
6 Downloads (Pure)

Wireless accelerometer sensor data filtering using Recursive Least Squares adaptive filter

Shafigh, S., Zia, T. & Mouzehkesh Pirborj, N., 2013, Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing. Palaniswami, M. (ed.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 66-70 5 p.

Research output: Book chapter/Published conference paperConference paper

Adaptive filters
Accelerometers
Sensors
Robotic arms
2012

A Border Base Directional Routing (BBDR) Protocol for VANETs

Rehman, S-U., Zia, T. & Zheng, L., 2012, IB2COM: Broadband Communications and National Broadband Networks and Applications. Agbinya, J. (ed.). Sydney: River Publishers, p. 26-31 6 p.

Research output: Book chapter/Published conference paperConference paper

Vehicular ad hoc networks
Routing protocols
Communication
Hazards
1 Citation (Scopus)
17 Downloads (Pure)

DSS: Dynamic Switching Sets for Prolonging Network Lifetime in Sensor Nodes

Abdul Majeed, A. & Zia, T., 2012, Proceedings of the 37th Annual IEEE Conference on Local Computer Networks (LCN 2012). Pfeifer, T., Jayasumana, A. & Turgut, D. (eds.). United States: Institute of Electrical and Electronics Engineers, p. 726-731 6 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Sensor nodes
Wireless sensor networks
Energy utilization

Modeling system audit as a sequential test with discovery as a failure time endpoint

Wright, C. & Zia, T., 2012, Proceedings of the 2012 International Conference on Electronics, Information and Communication Engineering (EICE 2012) . Germany: Springer, p. 1-11 11 p.

Research output: Book chapter/Published conference paperConference paper

Sequential test
System modeling
Audit
Information systems
Audit process
5 Downloads (Pure)

Position Aware MAC (PA-MAC) Protocol For Wireless Body Area Networks

Shafigh, S., Zia, T. & Mouzehkesh Pirborj, N., 2012, IB2COM: International conference on Broadband Communications and National Broadband Networks. Agbinya, J. (ed.). Australia: River Publishers, p. 49-54 6 p.

Research output: Book chapter/Published conference paperConference paper

Network protocols
Packet loss
Sensor nodes

Privacy-preserving Efficient Data Aggregation in Wireless Sensor Networks

Yang, P. & Zia, T., 2012, ICICT 2012. China, p. 8 1 p.

Research output: Book chapter/Published conference paperConference paper

Wireless sensor networks
Agglomeration
Data privacy
Communication
Sensor nodes
146 Downloads (Pure)

The Security Challenges and Countermeasures of Virtual Cloud

Mansukhani, B. & Zia, T., 2012, SecAU2012: 10th Australian Information Security Management Conference. Williams, M. J. T. & Valli, C. V. C. (eds.). Perth: Edith Cowen University, p. 51-58 8 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Cloud computing
Computer hardware
Industry
Data storage equipment
Costs
32 Downloads (Pure)

You are what you type: Privacy in online social networks

Sar, R. K., Al-Saggaf, Y. & Zia, T., 2012, Conference Proceedings of AiCE 2012: Sixth Australian Institute of Computer Ethics Conference. Leitch, S. & Warren, M. (eds.). Melbourne, Australia: Deakin University, p. 13-18 6 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
HTTP
2011
9 Citations (Scopus)
17 Downloads (Pure)

Addressing the Confidentiality and Integrity of Assistive Care Loop Framework using Wireless Sensor Networks

Balasubramanian, V., Hoang, D. B. & Zia, T., 2011, International Conference on Systems Engineering. United States: Institute of Electrical and Electronics Engineers, p. 416-421 6 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Wireless sensor networks
Monitoring
Health
Data privacy
Communication

A Dynamic Back-off Approach for Wireless Sensor Networks

Mouzehkesh Pirborj, N. & Zia, T., 2011, proceedings of the The Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing . Nandagopal, D. (ed.). United States: Institute of Electrical and Electronics Engineers, p. 247-252 6 p.

Research output: Book chapter/Published conference paperConference paper

Wireless sensor networks
Network protocols
Medium access control
Energy utilization
Sensors

An empirical study of challenges in managing the security in cloud computing

Mansukhani, B. & Zia, T., 2011, 9th Australian Information Security Management Conference (secau Security Congress 2011). Valli, C. (ed.). Perth: SecAU Security Congress, ECU, p. 172-181 10 p.

Research output: Book chapter/Published conference paperConference paper

Cloud computing
Information technology
Industry
Productivity
Costs
12 Citations (Scopus)
15 Downloads (Pure)

A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks

Sarhan Gawdan, I., Chow, C-O., Zia, T. & Idrees Sarhan, Q., 2011, CimSim 2011. CA: IEEE, p. 312-316 5 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Wireless sensor networks
Sensor nodes
Sensor networks
Topology
3 Citations (Scopus)
6 Downloads (Pure)

A Quantitative Analysis into the Economics of Correcting Software Bugs

Wright, C. & Zia, T., 2011, Computational Intelligence in Security for Information Systems: Proceedings of the 4th International Conference, CISIS 2011. Herrero, Ã. & Corchado, E. (eds.). Germany: Springer, Vol. 6694. p. 198-205 8 p. (Security and Cryptology).

Research output: Book chapter/Published conference paperConference paper

Economics
Testing
Chemical analysis
Software engineering
Productivity

Efficient and expressive attribute-based signature in the standard model

Yang, P., Zia, T., Cao, Z. & Dong, X., 2011, 9th Australian Information Security Management Conference (secau Security Congress 2011). Valli, C. (ed.). Perth: SecAU Security Congress, ECU, p. 252-261 10 p.

Research output: Book chapter/Published conference paperConference paper

Authentication
Secure communication

Efficient and expressive fully secure attribute-based signature in the standard model

Yang, P., Zia, T. A., Cao, Z. & Dong, X., 01 Dec 2011, Proceedings of the 9th Australian Information Security Management Conference. p. 252-261 10 p.

Research output: Book chapter/Published conference paperConference paper

Authentication
Secure communication
30 Downloads (Pure)

Of Black Swans, Platypii and Bunyips

Wright, C. S. & Zia, T., 2011, CACS 2011: Navigating a steady course in uncharted waters - Protect. Govern. Empower. Brisbane, QLD: Conference IT, p. 1-17 17 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Vulnerability
Attack
Empirical evidence
Economic cost
Psychological
40 Downloads (Pure)

Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls

Wright, C. & Zia, T., 2011, Computational Intelligence in Security for Information Systems: Proceedings of the 4th International Conference, CISIS 2011. Herrero, Ã. & Corchado, E. (eds.). Germany: Springer, Vol. 6694. p. 206-213 8 p. (Security and Cryptology).

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Negative externalities
Costs
Economics
Profit
Cost function
19 Downloads (Pure)

Source code embedded (SCEM) security framework

Zia, T. & Rizvi, A., 2011, 9th Australian Information Security Management Conference (secau Security Congress 2011). Valli, C. (ed.). Perth: SecAU Security Congress 2011, ECU, p. 262-269 8 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Software engineering
Life cycle
Systems analysis
National security
Taxation
1 Citation (Scopus)

Towards Detecting Extremely Low Frequency Fields using a Wireless Sensor Network

Hambly, J. & Zia, T., 2011, ACIS SNDP 2011: 12th proceedings. Chowdhury, SI. R. M. & Lee, R. L. R. (eds.). Sydney: IEEE, p. 150-156 7 p.

Research output: Book chapter/Published conference paperConference paper

Wireless sensor networks
Electromagnetic fields
Health
Magnetic fields
Communication
30 Downloads (Pure)

Using checklists to make better best

Wright, C. & Zia, T., 2011, 9th Australian Information Security Management Conference (secau Security Congress 2011). Valli, C. (ed.). Perth: SecAU Security Congress, ECU, p. 245-251 7 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Multitasking
Information technology
Railroad cars
Servers
Experiments
2010
1 Citation (Scopus)
4 Downloads (Pure)

An Analytical study of IT Security Governance and its adoption in Australian Organisations

Zia, T., 2010, SecAU 2010: 8th Australian Digital Forensics (ADF) Conference. Bolan, C. (ed.). Perth, WA: secau - Security Research Centre, ECU, p. 182-194 13 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
governance
maturity
audit

Cloud Computing Adoption in Indian Organisations

Mansukhani, B. & Zia, T., 2010, ICINC 2010. Yushu, Z. (ed.). Chengdu, China: IACSIT, p. VI438-442

Research output: Book chapter/Published conference paperConference paper

Cloud computing
Personal digital assistants
Mobile devices
Personal computers
Costs
8 Citations (Scopus)

Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks

Zia, T. & Islam, M. Z., 2010, IEEE International Conference on Availability, Reliability and Security (AReS). Takizawa, M. & Tjoa, A. M. (eds.). Australia: Conference Publishing Services (CPS), p. 347-352 6 p.

Research output: Book chapter/Published conference paperConference paper

Wireless sensor networks
Sensor nodes
Sensor networks
Monitoring
Communication
17 Downloads (Pure)

Development Delivery and Dynamics of a New Digital Forensics Subject

Zia, T., 01 Dec 2010, SecAU 2010: 8th Australian Digital Forensics (ADF) Conference. Woodword, A. (ed.). Perth, WA: SECAU, Edith Cowan University, p. 175-182 8 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
data acquisition
evaluation
testimony
witness
information system
16 Downloads (Pure)

IT Security Governance (ITSG) in Australian Context

Zia, T. & Ahmad, Z., 2010, Annual International Conference on Information Technology Security, ITS 2010. Singapore: Global Science and Technology Forum (GSTF), p. I3-I7

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Security of data
Information technology
Communication
9 Citations (Scopus)

Multi-Set Architecture for Multi-Applications Running in Wireless Sensor Networks

Abdul Majeed, A. & Zia, T., 2010, IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA). Chang, E. & Barolli, L. (eds.). USA: Institute of Electrical and Electronics Engineers Press, p. 299-304 6 p.

Research output: Book chapter/Published conference paperConference paper

Wireless sensor networks
Mobile agents
Middleware
Sensor nodes
Military applications
74 Downloads (Pure)

Network Security: Contents, delivery and assessments of an undergraduate subject

Zia, T., 2010, Annual International Conference on Information Technology Security, ITS 2010. Singapore: Global Science and Technology Forum (GSTF), p. 8-11 4 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Network security
Wireless networks
Students
Virtual private networks
Internet protocols

The Economics of Developing Security Embedded Software

Wright, C. & Zia, T., 2010, 8th Australian Information Security Management Conference (secau Security Congress 2010). Bolan, C. (ed.). Perth, WA: secau - Security Research Centre, ECU, p. 163-172 10 p.

Research output: Book chapter/Published conference paperConference paper

Economics
Software
Costs
Vendors
Derivative markets
17 Downloads (Pure)

Threat Models and Security Issues in Wireless Sensor Networks

Kocher, I. S., Chow, C-O., Ishii, H. & Zia, T., 2010, ICINC 2010. Yushu, Z. (ed.). Chengdu, China: IACSIT, p. VI384-389

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Wireless sensor networks
Sensor networks
Network security
Sensors
2009

Cryptographic Vs Trust Based Secure Data Aggregation in Wireless Sensor Networks

Labraoui, N., Guerroui, M., Aliouat, M. & Zia, T., 2009, GIIS Sustainable Communications for all Regions. Kamoun, F. (ed.). USA: IEEE Xplore, p. 1-4 4 p.

Research output: Book chapter/Published conference paperConference paper

Wireless sensor networks
Agglomeration
Energy resources
Sensor nodes
Sensor networks
16 Downloads (Pure)

Data Aggregation Security Challenges in Wireless Sensor Networks

Labraoui, N., Guerroui, M. & Zia, T., 2009, ISPS2009. MAHDAOUI, L. (ed.). France: USTHB University, Vol. 1. p. 142-150 9 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
Wireless sensor networks
Agglomeration
Energy resources
Sensor nodes
Defects