• 273 Citations
  • 9 h-Index
20052020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference paper
2019

Optimisation of Lightweight Klein Encryption Algorithm With 3 S-box

Ghorashi, R., Zia, T. & Jiang, Y., 2019, SPT-IoT 2020: 4th IEEE PERCOM Workshop on Security Privacy and Trust in the Internet of Things: 4th IEEE PERCOM Workshop on Security Privacy and Trust in the Internet of Things.

Research output: Book chapter/Published conference paperConference paper

The myhealthrecord system impacts on patient workflow in general practices

Raza Khan, U., Zia, T. A., Pearce, C. & Perera, K., 08 Aug 2019, 27th Australian National Health Informatics Conference. Cummings, E., Merolli, M. & Schaper, L. K. (eds.). Vol. 266. p. 162-167 6 p. (Studies in Health Technology and Informatics).

Research output: Book chapter/Published conference paperConference paper

2018

A Dimension Reduction Model and Classifier for Anomaly-Based Intrusion Detection in Internet of Things

Zhao, S., Li, W., Zia, T. & Zomaya, A. Y., 02 Apr 2018, A Dimension Reduction Model and Classifier for Anomaly-Based Intrusion Detection in Internet of Things: 15th IEEE International Conference on Pervasive Intelligence and Computing (PICom 2017). United States, p. 836-843 8 p.

Research output: Book chapter/Published conference paperConference paper

6 Citations (Scopus)

A survey of anomaly and automation from a cybersecurity perspective

Donevski, M. & Zia, T., 13 Dec 2018, 2018 IEEE Globcom Workshops (GC Wkshps): 2018 IEEE Workshop on Communication, Computing, and Networking in Cyber Physical Systems. Red Hook NY, USA: IEEE, 6 p.

Research output: Book chapter/Published conference paperConference paper

1 Citation (Scopus)
1 Downloads (Pure)

Exploring secure communication in VANET broadcasting

Jafer, M., Khan, M., Rehman, S-U. & Zia, T., 25 Apr 2018, Security and Privacy in Communication Networks: SecureComm 2017 International Workshops Proceedings. Lin, X., Ghorbani, A., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer, p. 69-84 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 239).

Research output: Book chapter/Published conference paperConference paper

Perceptions and Experiences of General Practice Users About MyHealthRecord

Raza Khan, U., Zia, T., Pearce, C. & Perera, K., 2018, Health information science: 7th International Conference, HIS 2018, Cairns, QLD, Australia, October 5-7, 2018, proceedings. Siuly, S., Lee, I., Huang, Z., Zhou, R., Wang, H. & Xiang, W. (eds.). Cham, Switzerland: Springer, Vol. 11148. p. 3-16 14 p.

Research output: Book chapter/Published conference paperConference paper

2017

Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT)

Zia, T., Liu, P. & Han, W., 29 Aug 2017, Proceedings of the 12th International Conference on Availability, Reliability and Security: ARES 17. ACM Digital Library, p. 1-7 7 p. 55

Research output: Book chapter/Published conference paperConference paper

6 Citations (Scopus)

Broadcasting under Highway Environment in VANETs using Genetic Algorithm

Jafer, M., Khan, A., Rehman, S. U. & Zia, T. A., 16 Nov 2017, 2nd International Workshop on Research Advancements in Future Networking Technologies (RAFNET 2017) held in conjunction with IEEE 85th Vehicular Technology Conference (VTC 2017). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1-5 5 p.

Research output: Book chapter/Published conference paperConference paper

5 Citations (Scopus)

Optimizing Broadcasting Scheme for VANETs Using Genetic Algorithm

Jafer, M., Khan, M., Rehman, S-U. & Zia, T., 16 Feb 2017, Proceedings of the 41st Annual IEEE Conference on Local Computer Networks (LCN 2016). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 222-229 8 p. 7856160

Research output: Book chapter/Published conference paperConference paper

4 Citations (Scopus)
2016

An exploratory study of the role of eHealth in Healthy Ageing

Raza Khan, U., Zia, T. & Perera, K., 2016, Proceedings of the 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 1-5 5 p.

Research output: Book chapter/Published conference paperConference paper

Joint rate and queue based routing for vehicular ad-hoc networks

Rehman, S. U., Khan, M., Zia, T. & Zomaya, A. Y. H., 2016, Proceedings of the 41st Annual IEEE Conference on Local Computer Networks (LCN 2016). United States: IEEE, Institute of Electrical and Electronics Engineers, 6 p.

Research output: Book chapter/Published conference paperConference paper

1 Citation (Scopus)
6 Downloads (Pure)
2015

Organisations Capability and Aptitude towards IT Security Governance

Zia, T., 2015, proceedings of the 2015 5th International Conference on IT Convergence and Security (ICITCS 2015). US: IEEE, Institute of Electrical and Electronics Engineers, p. 1-4 4 p.

Research output: Book chapter/Published conference paperConference paper

Quality of Service Based Cross Layer Routing Protocol for VANETs

Rehman, S-U., Khan, M., Zia, T. & Jafer, M., 2015, Proceedings of the 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). US: IEEE, Institute of Electrical and Electronics Engineers, p. 1-6 6 p.

Research output: Book chapter/Published conference paperConference paper

3 Citations (Scopus)
2014

Cross Layer Routing for VANETs

Rehman, S-U., Khan, M. & Zia, T., 2014, WoWMoM 2014. USA: IEEE, p. 1-4 4 p.

Research output: Book chapter/Published conference paperConference paper

6 Citations (Scopus)
5 Downloads (Pure)

EP²AC: An Efficient Privacy-Preserving Data Access Control Scheme for Data-Oriented Wireless Sensor Networks

Yang, P. & Zia, T., 2014, 6th Proceedings. United States: IEEE, p. 755-762 8 p.

Research output: Book chapter/Published conference paperConference paper

1 Citation (Scopus)

Wireless Transmission Modeling for Vehicular Ad-hoc Networks

Rehman, S-U., Khan, M. & Zia, T., 2014, 2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS) : Proceedings. United States: IEEE, Institute of Electrical and Electronics Engineers, p. 398-403 6 p.

Research output: Book chapter/Published conference paperConference paper

4 Citations (Scopus)
5 Downloads (Pure)
2013

An Efficient and Secure Digital Image Watermarking Using Features from Iris Image

Dutta, M. K., Singh, A. & Zia, T., 2013, ICCC 2013. US: IEEE Digital Explore, p. 451-456 6 p.

Research output: Book chapter/Published conference paperConference paper

7 Citations (Scopus)

D2MAC: Dynamic delayed Medium Access Control (MAC) protocol with fuzzy technique for Wireless Body Area Networks

Mouzehkesh Pirborj, N., Zia, T., Shafigh, S. & Zheng, L., 2013, Proceedings of the 2013 IEEE International Conference on Body Sensor Networks . Palmer, J. & Hoyt, R. (eds.). United States: Institute of Electrical and Electronics Engineers, p. 1-6 6 p. 6575472

Research output: Book chapter/Published conference paperConference paper

13 Citations (Scopus)

Light-Weight History-Based Medium Access Control (MAC) Protocol for Wireless Body Area Networks

Mouzehkesh Pirborj, N., Shafigh, S., Zia, T. & Zheng, L., 2013, ICIST 2013. United States: IEEE Digital Explore, p. 91-96 6 p.

Research output: Book chapter/Published conference paperConference paper

2 Citations (Scopus)

Traffic Aware Fuzzy-Tuned Delay Range for Wireless Body Area Networks Medium Access Control Protocol (MAC)

Mouzehkesh Pirborj, N., Zia, T. & Shafigh, S., 2013, Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing. Palaniswami, M. (ed.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 60-65 6 p.

Research output: Book chapter/Published conference paperConference paper

7 Citations (Scopus)
5 Downloads (Pure)

Wireless accelerometer sensor data filtering using Recursive Least Squares adaptive filter

Shafigh, S., Zia, T. & Mouzehkesh Pirborj, N., 2013, Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing. Palaniswami, M. (ed.). United States: IEEE, Institute of Electrical and Electronics Engineers, p. 66-70 5 p.

Research output: Book chapter/Published conference paperConference paper

6 Downloads (Pure)
2012

A Border Base Directional Routing (BBDR) Protocol for VANETs

Rehman, S-U., Zia, T. & Zheng, L., 2012, IB2COM: Broadband Communications and National Broadband Networks and Applications. Agbinya, J. (ed.). Sydney: River Publishers, p. 26-31 6 p.

Research output: Book chapter/Published conference paperConference paper

DSS: Dynamic Switching Sets for Prolonging Network Lifetime in Sensor Nodes

Abdul Majeed, A. & Zia, T., 2012, Proceedings of the 37th Annual IEEE Conference on Local Computer Networks (LCN 2012). Pfeifer, T., Jayasumana, A. & Turgut, D. (eds.). United States: Institute of Electrical and Electronics Engineers, p. 726-731 6 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
1 Citation (Scopus)
17 Downloads (Pure)

Modeling system audit as a sequential test with discovery as a failure time endpoint

Wright, C. & Zia, T., 2012, Proceedings of the 2012 International Conference on Electronics, Information and Communication Engineering (EICE 2012) . Germany: Springer, p. 1-11 11 p.

Research output: Book chapter/Published conference paperConference paper

Position Aware MAC (PA-MAC) Protocol For Wireless Body Area Networks

Shafigh, S., Zia, T. & Mouzehkesh Pirborj, N., 2012, IB2COM: International conference on Broadband Communications and National Broadband Networks. Agbinya, J. (ed.). Australia: River Publishers, p. 49-54 6 p.

Research output: Book chapter/Published conference paperConference paper

5 Downloads (Pure)

Privacy-preserving Efficient Data Aggregation in Wireless Sensor Networks

Yang, P. & Zia, T., 2012, ICICT 2012. China, p. 8 1 p.

Research output: Book chapter/Published conference paperConference paper

The Security Challenges and Countermeasures of Virtual Cloud

Mansukhani, B. & Zia, T., 2012, SecAU2012: 10th Australian Information Security Management Conference. Williams, M. J. T. & Valli, C. V. C. (eds.). Perth: Edith Cowen University, p. 51-58 8 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
168 Downloads (Pure)

You are what you type: Privacy in online social networks

Sar, R. K., Al-Saggaf, Y. & Zia, T., 2012, Conference Proceedings of AiCE 2012: Sixth Australian Institute of Computer Ethics Conference. Leitch, S. & Warren, M. (eds.). Melbourne, Australia: Deakin University, p. 13-18 6 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
32 Downloads (Pure)
2011

Addressing the Confidentiality and Integrity of Assistive Care Loop Framework using Wireless Sensor Networks

Balasubramanian, V., Hoang, D. B. & Zia, T., 2011, International Conference on Systems Engineering. United States: Institute of Electrical and Electronics Engineers, p. 416-421 6 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
9 Citations (Scopus)
17 Downloads (Pure)

A Dynamic Back-off Approach for Wireless Sensor Networks

Mouzehkesh Pirborj, N. & Zia, T., 2011, proceedings of the The Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing . Nandagopal, D. (ed.). United States: Institute of Electrical and Electronics Engineers, p. 247-252 6 p.

Research output: Book chapter/Published conference paperConference paper

An empirical study of challenges in managing the security in cloud computing

Mansukhani, B. & Zia, T., 2011, 9th Australian Information Security Management Conference (secau Security Congress 2011). Valli, C. (ed.). Perth: SecAU Security Congress, ECU, p. 172-181 10 p.

Research output: Book chapter/Published conference paperConference paper

A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks

Sarhan Gawdan, I., Chow, C-O., Zia, T. & Idrees Sarhan, Q., 2011, CimSim 2011. CA: IEEE, p. 312-316 5 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
12 Citations (Scopus)
16 Downloads (Pure)

A Quantitative Analysis into the Economics of Correcting Software Bugs

Wright, C. & Zia, T., 2011, Computational Intelligence in Security for Information Systems: Proceedings of the 4th International Conference, CISIS 2011. Herrero, Ã. & Corchado, E. (eds.). Germany: Springer, Vol. 6694. p. 198-205 8 p. (Security and Cryptology).

Research output: Book chapter/Published conference paperConference paper

3 Citations (Scopus)
6 Downloads (Pure)

Efficient and expressive attribute-based signature in the standard model

Yang, P., Zia, T., Cao, Z. & Dong, X., 2011, 9th Australian Information Security Management Conference (secau Security Congress 2011). Valli, C. (ed.). Perth: SecAU Security Congress, ECU, p. 252-261 10 p.

Research output: Book chapter/Published conference paperConference paper

Efficient and expressive fully secure attribute-based signature in the standard model

Yang, P., Zia, T. A., Cao, Z. & Dong, X., 01 Dec 2011, Proceedings of the 9th Australian Information Security Management Conference. p. 252-261 10 p.

Research output: Book chapter/Published conference paperConference paper

Of Black Swans, Platypii and Bunyips

Wright, C. S. & Zia, T., 2011, CACS 2011: Navigating a steady course in uncharted waters - Protect. Govern. Empower. Brisbane, QLD: Conference IT, p. 1-17 17 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
30 Downloads (Pure)

Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls

Wright, C. & Zia, T., 2011, Computational Intelligence in Security for Information Systems: Proceedings of the 4th International Conference, CISIS 2011. Herrero, Ã. & Corchado, E. (eds.). Germany: Springer, Vol. 6694. p. 206-213 8 p. (Security and Cryptology).

Research output: Book chapter/Published conference paperConference paper

Open Access
File
42 Downloads (Pure)

Source code embedded (SCEM) security framework

Zia, T. & Rizvi, A., 2011, 9th Australian Information Security Management Conference (secau Security Congress 2011). Valli, C. (ed.). Perth: SecAU Security Congress 2011, ECU, p. 262-269 8 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
19 Downloads (Pure)

Towards Detecting Extremely Low Frequency Fields using a Wireless Sensor Network

Hambly, J. & Zia, T., 2011, ACIS SNDP 2011: 12th proceedings. Chowdhury, SI. R. M. & Lee, R. L. R. (eds.). Sydney: IEEE, p. 150-156 7 p.

Research output: Book chapter/Published conference paperConference paper

1 Citation (Scopus)

Using checklists to make better best

Wright, C. & Zia, T., 2011, 9th Australian Information Security Management Conference (secau Security Congress 2011). Valli, C. (ed.). Perth: SecAU Security Congress, ECU, p. 245-251 7 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
31 Downloads (Pure)
2010

An Analytical study of IT Security Governance and its adoption in Australian Organisations

Zia, T., 2010, SecAU 2010: 8th Australian Digital Forensics (ADF) Conference. Bolan, C. (ed.). Perth, WA: secau - Security Research Centre, ECU, p. 182-194 13 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
1 Citation (Scopus)
4 Downloads (Pure)

Cloud Computing Adoption in Indian Organisations

Mansukhani, B. & Zia, T., 2010, ICINC 2010. Yushu, Z. (ed.). Chengdu, China: IACSIT, p. VI438-442

Research output: Book chapter/Published conference paperConference paper

Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks

Zia, T. & Islam, M. Z., 2010, IEEE International Conference on Availability, Reliability and Security (AReS). Takizawa, M. & Tjoa, A. M. (eds.). Australia: Conference Publishing Services (CPS), p. 347-352 6 p.

Research output: Book chapter/Published conference paperConference paper

8 Citations (Scopus)

Development Delivery and Dynamics of a New Digital Forensics Subject

Zia, T., 01 Dec 2010, SecAU 2010: 8th Australian Digital Forensics (ADF) Conference. Woodword, A. (ed.). Perth, WA: SECAU, Edith Cowan University, p. 175-182 8 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
23 Downloads (Pure)

IT Security Governance (ITSG) in Australian Context

Zia, T. & Ahmad, Z., 2010, Annual International Conference on Information Technology Security, ITS 2010. Singapore: Global Science and Technology Forum (GSTF), p. I3-I7

Research output: Book chapter/Published conference paperConference paper

Open Access
File
17 Downloads (Pure)

Multi-Set Architecture for Multi-Applications Running in Wireless Sensor Networks

Abdul Majeed, A. & Zia, T., 2010, IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA). Chang, E. & Barolli, L. (eds.). USA: Institute of Electrical and Electronics Engineers Press, p. 299-304 6 p.

Research output: Book chapter/Published conference paperConference paper

9 Citations (Scopus)

Network Security: Contents, delivery and assessments of an undergraduate subject

Zia, T., 2010, Annual International Conference on Information Technology Security, ITS 2010. Singapore: Global Science and Technology Forum (GSTF), p. 8-11 4 p.

Research output: Book chapter/Published conference paperConference paper

Open Access
File
77 Downloads (Pure)

The Economics of Developing Security Embedded Software

Wright, C. & Zia, T., 2010, 8th Australian Information Security Management Conference (secau Security Congress 2010). Bolan, C. (ed.). Perth, WA: secau - Security Research Centre, ECU, p. 163-172 10 p.

Research output: Book chapter/Published conference paperConference paper

Threat Models and Security Issues in Wireless Sensor Networks

Kocher, I. S., Chow, C-O., Ishii, H. & Zia, T., 2010, ICINC 2010. Yushu, Z. (ed.). Chengdu, China: IACSIT, p. VI384-389

Research output: Book chapter/Published conference paperConference paper

Open Access
File
17 Downloads (Pure)
2009

Cryptographic Vs Trust Based Secure Data Aggregation in Wireless Sensor Networks

Labraoui, N., Guerroui, M., Aliouat, M. & Zia, T., 2009, GIIS Sustainable Communications for all Regions. Kamoun, F. (ed.). USA: IEEE Xplore, p. 1-4 4 p.

Research output: Book chapter/Published conference paperConference paper