Photo of Dr Tanveer Zia Dr Tanveer A Zia

BSCS Southwestern, MBA Preston, MIMM UTS, PhD Sydney

Tanveer Zia is a Senior Lecturer in Computing, Course Coordinator for the Doctor of Information Technology course, and Associate Head of School, School of Computing & Mathematics, Faculty of Business, Charles Sturt University. He has earned his PhD from the University of Sydney in 2008, Master of Interactive Multimedia (MIMM) from University of Technology Sydney in 2004, MBA from Preston University USA in 1997, and Bachelors of Science in Computer Sciences from Southwestern University, Philippines in 1992. 

Tanveer has worked as a sessional lecturer in Information Systems at the University of Southern Queensland and University of Ballarat, Sydney campuses, from Jan 2000 to Jun 2008.

Tanveer is a Senior Member Australian Computer Society and Certified Professional (MACS Snr CP), Senior Member Institute of Electrical and Electronics Engineers (IEEE), Senior Member International Association of Computer Sciences and Information Technology (IACSIT), Member IEEE Computer Society, Member Australian Information Security Association (AISA),  Member ISACA and Academic Advocate for CSU.

Tanveer is on Editorial Board of Springer's Wireless Networks (WINET) – The Journal of Mobile Communication, Computation and Information.  He was General Co-Chair of SecureComm 2013 and has served in program committees for a number of international conferences, including IEEE GLOBECOM, IEEE WOWMOM, IEEE SPIN, IEEE ISSNIP, and SENSORCOMM.

Tanveer is also recognized as CSU's expert in ICT Security and has appeared in several live media outlets such as Prime News TV Wagga Wagga, Prime News TV Orange, ABC Riverina Radio, ABC SouthEast NSW. His interviews and commentary on important ICT security issues have been appeared in The Australian news paper, iTwire.com, iTnews.com and CSU News.

Top of page


Teaching & Administrative Responsibilities

Course Coordinator for:

  • Doctor of Information Technology (DInfoTech)

Member of the following committees:

  • Faculty of Business Courses Committee
  • Faculty of Business Research Committee
  • School of Computing & Mathematics Strategic Management Committee

Tanveer is also the primary contact for School of Computing and Mathematics research and marketing related matters.

Tanveer is author and convenor of ITC597 - 'Digital Forensics' subject which is taught in several postgraduate courses specifically in Master of Information Systems Security and Master of Information Technology. This subject provides an in-depth study of the rapidly changing and fascinating field of computer forensics. It combines both the technical expertise and the knowledge required to investigate, detect and prevent digital crimes. The subject covers the knowledge on digital forensics legislations, digital crime, forensics processes and procedures, data acquisition and validation, e-discovery tools, e-evidence collection and preservation, investigating operating systems and file systems, network forensics, art of steganography and mobile device forensics, email and web forensics, presenting reports and testimony as an expert witness.

He has also written a subject ITC712 'Conducting a Research Project in IT'.  This subject is taught in a professional higher research degree course Doctor of Information Technology. This subject enables students to apply a research methodology choosing from a broad range of quantitative and qualitative research methods relevant across the Information Technology (IT) discipline. Empirical research methods, data collection techniques, analysis and interpretation of data, using and/or developing simulations, and report presentations are covered in this subject.

Top of page


Research

Research Focus

Tanveer's broader research interests are in Network security. Specifically he is interested in security of low powered mobile devices. He is also interested in biometric security, cyber security, cloud computing security, information assurance, protection against identity theft, trust management, and forensic computing.  He actively publishes in international conferences, symposiums, workshops, and refereed journals.

Current Research Students
  • Sabih Rehman, PhD - Security of routing protocols in Vehicular Area Networks (VANETs)
  • Nesa Mouzehkesh Pirborj, PhD - Traffic adaptive MAC protocol for wireless sensor networks
  • Jason Hambly, PhD - Detecting and mapping extremely low frequency fields (ELF) in WSN
  • Craig Wright, PhD - The quantification of information systems risk
Past Research Students
  • Amjed Majeed, PhD (completed 2014) - Prolonging Network Life Time and Running Multi-Sequence Applications in Wireless Sensor Networks
  • Idrees Kocher, PhD (completed 2012) - Enhancing Wireless Sensor Networks Security (Uni Malaya)

Top of page


Professional Activities

  • Senior Member Australian Computer Society and Certified Professional (MACS Snr CP)
  • Senior Member Institute of Electrical and Electronics Engineers (SMIEEE)
  • Senior Member International Association of Computer Science and Information Technology (IACSIT)
  • Member Australian Information Security Association (AISA)
  • Member IEEE Computer Society (MIEEECS)
  • Member ISACA and Academic Advocate for Charles Sturt University

Awards 

  • Winner of the Outstanding Leadership Award as Track Chair of Network and Communications Security of the 6th International Symposium on Cyberspace Safety and Security (CSS 2014) held on August 20-22, 2014 in Paris, France
  • Winner of the 2014 Faculty of Business Academic Excellence Award
  • Winner of the 2014 Faculty of Business Sustained Excellence Award
  • Winner of the 2013 Faculty of Business Leadership Excellence Award (Team Award)
  • Winner of the 2011 Faculty of Business Research Excellence Award
  • Winner of the 2010 Faculty of Business Emerging Researcher Award
  • Winner of the 2010 inaugural School of Computing and Mathematics Research Excellence Award

Grants 

  • Nov. 2012 – Faculty of Business Compact Funding to support Hosting a top tiered conference (SecureComm 2013)". $8760
  • Jul. 2012 – CSU Research Infrastructure Block Grant (RIBG) to establish Advanced Networks Research Lab. $22000
  • Jun. 2012 – Faculty of Business Compact Funding to study a project "e-HealthCare Management as a Service". $13003
  • May 2012 – Group Mission Grant from Australia-China Science and Research Fund (ACSRF) from the Department of Industry, Innovation, Science, Research and Tertiary Education. $12210
  • Mar 2012 – NSW Science Leveraging Fund Conference Sponsorship Grant awarded by the NSW Department of Trade and Investment. $8800
  • Dec. 2011 – Faculty of Business Compact Funding to study a project "An Analytical study of IT Security Governance (ITSG) in Australian organisations from international perspectives". $9923
  • Dec. 2011 – Faculty of Business Compact Funding for a project "Computational Intelligence for Anomaly Detection in Networks: An Investigation". $8633
  • Sep. 2010 – Sponsorship to attend the World Computer Congress (WCC 2010) held in Brisbane awarded by the Australian Computer Society (ACS).  $2000
  • Aug. 2010 – Research Fellowship Infrastructure Support Grant awarded by the Centre for Research and Graduate Training (CRGT).  $2906
  • July 2010 to January 2011 – Research Fellowship with Centre for Research in Complex Systems (CRiCS). $45000
  • Aug. 2010 – Faculty Journal Publication Reward received from the Faculty of Business, CSU.  $1400
  • Jun. 2010 – Emerging Researcher Awardgrant awarded by the Faculty of Business, CSU. $3000
  • Nov. 2009 – CSUSmall Grant to study a project "Information Security in IT Service Management and IT Governance within International Contexts:  How is Australia doing"? $5977
  • Sep. 2008 - Seed Grant from the Faculty of Business, CSU, to conduct research on "Integration of Trust Management in Security Framework for Wireless Sensor Networks". $2965

Scholarly and Professional Activities

Member several program committees and reviewer of international journals as listed below:

2014

  • Member Technical Program Committee – The 39th IEEE Conference on Local Computer Networks (LCN 2014).  Sep 8-11, Edmonton, Canada
  • Vice Program Chair 'Network and Communications Security track' – The 6th International Symposium on Cyberspace Safety and Security (CSS 2014). August 20-22, 2014, Paris, France 
  • Member Technical Program Committee – IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014). June 16-19, 2014, Sydney, Australia.
  • Member Technical Program Committee – IEEE 5th International Conference on Intelligent and Advanced Systems (ICIA 2014). June 3-5, 2014, Kuala Lumpur, Malaysia
  • Member Advisory Committee – IEEE International Conference on Signal Processing & Integrated Networks (SPIN 2014).  February 21-22, 2014, Noida, UP, India.

  2013

  • Member Technical Program Committee – IEEE International Global Communications Conference (GLOBECOM 2013).  December 9-13, 2013, Atlanta, GA.
  • Member Technical Program Committee – The 8th IEEE International Conference on Broadband and Biomedical Communications (IB2COM 2012).  November 13-17, 2013, Guilin, China.
  • General Co-Chair – The 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013).   September 25-27, Sydney, Australia.
  • Member Technical Program Committee – The 7th International Conference on Sensor Technologies and Applications (Sensorcomm 2013).  August 25-31, 2013, Barcelona, Spain.
  • Member Technical Program Committee – The 4th International Conference on Ambient Systems, Networks and Technologies (ANT 2013).  June 25-28, 2013, Halifax, Nova Scotia, Canada.
  • Member Technical Program Committee – The IEEE Conference on Intelligent Sensors, Sensor Networks and Information Processing (IEEE ISSNIP 2013).  April 2-5, 2013, Melbourne, Australia.

 2012

  • Member Technical Program Committee – The 7th IEEE International Conference on Broadband and Biomedical Communications (IB2COM 2012). November 5-8, 2012, Sydney, Australia.
  • Program Committee Co-Chair – The Fourth International Conference on Computer Technology and Development (ICCTD 2012). November 24-25, 2012, Bangkok, Thailand.
  • Member Technical Program Committee – The Fourth FTRA International Conference on Computer Science and its Applications (FTRA CSA 2012). November 22-25, 2012, Jeju, Korea.
  • Member Technical Program Committee – The 2012 International Workshop on Human centric computing, P2P, Grid and Cloud Computing (FTRA WCC-HPGC 2012). November 22-25, 2012, Jeju, Korea.
  • Member Technical Program Committee – The Eighth IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNet 2012). October 22-25, 2012, Clearwater, FL, USA.
  • Member Program Committee – The Fifth International Conference on Human-centric Computing (HumanCom 2012). September 6-8, 2012 in Gwangju, Korea.
  • Member Technical Program Committee – The 3rd International Conference on Ambient Systems, Networks and Technologies (ANT 2012).  August 27-29, 2012, Niagra Falls, ON, Canada.
  • Member Program Committee – The Sixth International Conference on Sensor Technologies and Applications (Sensorcomm 2012). August 19-24, 2012 in Rome, Italy.
  • Member Technical Program Committee – The 2012 FTRA International Conference on Advanced IT, Engineering and Management (FTRA SIM 2012). July 10-12, 2012, Jeju, Korea.
  • Conference Technical Chair – Third International Conference on Signal and Information Processing (ICSIP 2012). July 7-8, 2012, London, UK.
  • Member Technical Program Committee – International Workshop on Wireless Sensor Actor and Actuator Networks (WiSAAN). June 10-15, 2012, Ottawa, ON, Canada.
  • Member Technical Program Committee – The Fourth International Workshop on Performance Control in Wireless Sensor Networks (PWSN 2012). May 18, 2012, Hangzhou, China.
  • Conference General Chair – International Conference on Security Science and Technology (ICSST 2012). March 10-12, 2012, Hong Kong.
  • Conference General Chair – The Fourth International Conference on Machine Learning and Computing (ICMLC 2012). March 10-12, 2012, Hong Kong.
  • Member Technical Program Commitee – The 2012 FTRA International Conference on Advanced IT, engineering and Management (AIM 2012). February 6-8, 2012, Seoul, Korea.

2011

  • Chair Symposium on Sensor Networks – The Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2011). December 6-9, 2011, Adelaide, Australia.
  • Track Chair – Mobile/Ad hoc wireless networks, mobicast, sensor placement, target tracking Third International Conference on Computational Intelligence, Modeling and Simulation (CIMSim 2011) . September 20 – 22, 2011, Langkawi, Malaysia.
  • Member Technical Program Committee – The 2011 International Workshop on Human centric computing, P2P, Grid and Cloud Computing (FTRA WCC-HPGC 2011). December 12-15, 2011 in Jeju, Korea.
  • Reviewer – 9th Australian Information Security Management Conference (secau Security Congress 2011). December 5 – 7, 2011, Perth, Australia
  • Reviewer – 9th Australian Digital Forensics Conference (secau Security Congress 2011). December 5 – 7, 2011, Perth, Australia
  • Member Program Committee – The 3rd International Conference on Computer Science and its Applications (CSA 2011). December 12-15, 2011 in Jeju, Korea.
  • Member Technical Program Committee – The 2nd International Conference on Ambient Systems, Networks and Technologies (ANT 2011).  September 19-21, 2011 in Ontario, Canada.
  • Member Program Committee – The Fifth International Conference on Sensor Technologies and Applications (Sensorcomm 2011). August 21-27, 2011 in Cote d'Azur, France.
  • Member Program Committee – The Fourth International Conference on Human-centric Computing (HumanCom 2011). August 11-13, 2011 in Enshi, China.
  • Member Technical Program Committee – The 2011 International Workshop on Multimedia, Communication and Convergence technologies (MCC 2011).   June 28-30, 2011 in Crete, Greece.

2010

  • Session Chair - Algorithms, designs and methods session, Annual International Conference on Information Technology Security (ITS 2010). November 29-30, 2010. Phuket, Thailand.
  • Member Program Committee – 21st Australian Conference on Information Systems (ACIS 2010) December 1-3, 2010, Brisbane, Australia.
  • Member Program Committee – The 3rd International Workshop on Smart Homes for Tele-Health (smartel 2010). Held in conjunction with IEEE Globecom 2010.  December 6, 2010, Miami, Florida, USA
  • Member Program Committee – The 3rd International Conference on Human-centric Computing (HumanCom 2010).  August 11-13, 2010, Cebu, Philippines
  • Member Technical Program Committee – The Fourth International Conference on Sensor Technologies and Applications (Sensorcomm 2010).  July 18-25, 2010, Venice, Italy
  • Reviewer ICIEA 2010 – The 5th IEEE Conference on Industrial Electronics and Applications.  June 15-17, Taichung, Taiwan
  • Co-Chair 'Security and Information Assurance Track' – 2010 ACS/IEEE International Conference on Computer Systems and Applications. May 16-19, 2010 in Hammamet, Tunisia.

2009

  • Member Program Committee – The 2nd International Conference on Computer Science and its Applications (CSA 2009), December 10-12, 2009, Jeju, Korea.
  • Reviewer  – The 2nd International Multi-Conference on Engineering and Technologica; Innovation: IMETI 2009. July 10-13, 2009, Orlando, Florida, USA
  • Co-Chair QoSecWSN09 – The 1st International Workshop on Quality of Security (QoSec) in Wireless Sensor Networks, to be held in conjunction with the 3rd International Conference on Network & System Security (NSS 2009), October 19-21, 2009, Gold Coast, Australia.
  • Member Technical Program Committee – The International Workshop on Frontiers of Information Assurance & Security (FIAS 2009), held in conjunction with the 3rd International Conference on Network & System Security (NSS 2009). October 19-21, 2009, Gold Coast, Australia.
  • Member Technical Program Committee – The International Conference on Sensor Technologies and Applications (Sensorcomm 2009) June 18-23, 2009, Athens, Greece
  • Member Technical Program Committee – The 4th International ICST Conference on Scalable Information Systems (INFOSCALE 2009). June 10-12, 2009, Hong Kong, China
  • ReviewerICIEA 2009 – the 4th IEEE Conference on Industrial Electronics and Applications.  May 25-27, International Conference Center, Xi'an, China

2008

  • Chair technical session on Wireless Sensor Networks at ISSNIP 2008 – Fourth International Conference on Intelligent Sensors, Sensor Networks and Information Processing ISSNIP 2008, December 15-18, 2008, Sydney, Australia
  • Member Technical Program Committee – The International Conference on Sensor Technologies and Applications (Sensorcomm 2008) Aug. 25-31, 2008, Cap Esterel, France

2007

  • Reviewer IEEE Globecom 2007 Ad-hoc and Sensor Networking Symposium, Nov 26-30, 2007 Washington, DC, USA
  • Reviewer NPC 2007 (IFIP International Conference on Network and Parallel Computing). September 18-21, 2007, Dalian, China.
  • Reviewer ICEME2, International Conference on Embedded Systems, Mobile Communication and Computing August 3-5, 2007, PESIT, Bangalore, India
  • Served as Co-Chairman for the Technical Session "Authentication Protocol of ICONS'07, Jan 29, 2007, Erode, Tamil Nadu, India

2006

  • Reviewer MASS 2006, the Third IEEE International Conference on Mobile Ad-hoc and Sensor Systems, October 9 – 12, 2006, Vancouver, Canada.
  • Reviewer LCN 2006, the 31st Annual IEEE Conference on Local Computer Networks (LCN), November 14 – 16, 2006, Tampa, Florida

2006-2014

  • Editor Springer's Wireless Networks (WINET): The Journal of Mobile Communication, Computation and Information  (since August 2013)
  • Reviewer ACM Transactions on Sensor Networks
  • Reviewer Journal of King Saud University – Computer and Information Sciences  
  • Reviewer Wiley Journal of Security and Communication Networks
  • Reviewer Elsevier Journal of Computer Communications
  • Reviewer Elsevier Journal of Parallel and Distributed Computing
  • Reviewer Journal of Zhejiang University – Science" http://www.zju.edu.cn/jzus/reviewer.htm
  • Reviewer ETRI (Electronics and Telecommunications Research Institute) Journal
  • Reviewer of ACM Computing reviews

Top of page


Publications

Books
  • Zia, T. A., Zomaya, A. Y., Varadharajan, V., and Mao, M. (Eds) (2013). Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013. Lecture Notes of the Institute for Computer Science, Social Informatics and Telecommunications Engineering 127. Springer-Verlag. Berlin. DOI 10.1007/978-3-319-04283-1, ISBN 978-3-319-04282-4,e-ISBN 978-3-319-04283-1, ISSN 1867-8211, e-ISSN 867-822X.
  • Zia, T. A. (2013). A Security Framework for Wireless Sensor Networks (WSN).  Lambert Academic Publishing.  Germany. ISBN 978-3-659-50331-3.
Book Chapters
  • Yang, P., and Zia, T. A. (2013). An Efficient Attribute-Based Signature with Application to Secure Attribute-Based Messaging System. A chapter in the book Theory and Practice of Cryptography Solutions for Secure Information Systems to be published by IGI Global. DOI: 10.4018/978-1-4666-4030-6, ISBN13: 9781466640306, ISBN10: 1466640308, EISBN13: 9781466640313 
  • Zia, T. A., and Zomaya, A. Y. (2008). SecurityIssues and Countermeasures in Wireless Sensor Networks. Book Chapter (Chapter 16) pp 479-502  in Algorithms and Protocols in Wireless Sensor Networks edited by  Prof Azzedine Boukerche, John Wiley Publishers.  ISBN-13: 978-0471798132.
Refereed journal articles
  • Rehman, S., Khan, M. A., Zia, T. A., and Khokhar, R. (2013). A Synopsis of Simulation and Mobility in Vehicular Ad-hoc Networks (VANETs). IOSR Journal of Computer Engineering. p-ISSN 2278-8727, e-ISSN: 2278-0661.
  • Gawdan, I. S., Chow, C. O., Ishii, H., and Zia, T. A. (2013). Threat Models and Security Issues in Wireless Sensor Networks. International Journal of Computer Theory and Engineering. IACSIT Press. Vol. 5, No. 5. DOI: 10.7763/IJCTE2013.V5.806. ISSN: 1793-8201.
  • Khokhar, R. H., Zia, T. A., Ghafoor, K. Z., and Lloret, J. (2013). Realistic and Efficient Radio Propagation Model to handle Obstacles for V2X Communications. KSII Transactions on Internet and Information Systems. Vol. 7, No. 8, Aug. 2013, Page 1933-1954, http://dx.doi.org/10.3837/tiis.2013.08.011. ISSN: 1976-7277.
  • Rehman, S., Khan, M. A., Zia, T. A., and Zheng, L. (2013). Vehicular Ad-Hoc Networks (VANETs): An Overview and Challenges. Journal of Wireless Networking and Communications. Volume 3, Number 3, p 29-38, 2013. DOI:10.5923/j.jwnc.20130303.02. p-ISSN 2167-7328, e-ISSN: 2167-7336.
  • Zia, T. A., and Mansukhani, B. (2012). A Virtualized High Trust Zone (VHTZ) to Mitigate the Security and Privacy Issues in Cloud Computing, International Journal of Computer Science and Network Security (IJCSNS). Vol. 12, No. 12. pp 6-14 ISSN (Online): 1738-7906.
  • Zia, T. A., and Zomaya, A. Y. (2011). A Lightweight Security Framework for Wireless Sensor Networks, Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA).Published byInnovative Information Science & Technology Research Group.Vol. 2, No. 3. ISSN (print):2093-5374, ISSN (on-line): 2093-5382. (2012 ERA listed journal).
  • Gawdan, I. S, Chow, C. Zia, T. A. and Sarhan, Q. I. (2011). Cross-layer based security solutions for wireless sensor networks. International Journal of the Physical Sciences Vol. 6 (17), pp. 4245-4254. Academic Journals. ISSN 1992-1950
  • Yang, P., Cao, Z., Dong, X., and Zia, T. A.(2011). An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks. IEEE Communication Letters. ISSN1: 1089-7798 ISSN2: 1558-2558. (2012 ERA listed journal)
  • Labraoui, N., Gueroui, M., Aliouat, M., Zia, T. A. (2011). Data Aggregation Security Challenges in Wireless Sensor Networks: A Survey.International Journal of Ad-hoc & Sensor Wireless Networks. Old City Publishing, Inc. Vol. 12, pp.295-324. (2012 ERA listed journal)   
  • Zia, T. A., and Zomaya, A. Y. (2010). Quality of Security (QoSec) through Triple Key Scheme in Wireless Sensor Networks, Journal of Wireless Communications and Mobile Computing. Wiley Interscience.Vol. 10, Issue 5, pp. 722-732. (2010 ERA-ranked A journal).
  • Zia, T. A., Al-Saggaf, Y., Islam, M. Z., Zheng, L., and Weckert, J., (2009). The Digital Divide in Asia:Cases from Yemen, Bangladesh, Pakistan and China. Journal of Information Ethics (JIE). McFarland & Company, Inc. Publishers.Fall 2009, Vol. 18, No. 2, pp. 50-76. (2010 ERA-ranked B journal).
Refereed conferences
  • Yang, P., and Zia, T. A. (2014). EP2AC: An Efficient Privacy=Preserving Data Access Control Scheme for Data-Oriented Wireless Sensor Networks.  The 6th International Symposium on Cyberspace Safety and Security. August 20-22, Paris, France.
  • Rehman, S., Khan, M. A., and Zia, T. A. (2014).  Cross Layer Routing for VANETs. The 2014 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2014). June 16-19, 2014, Sydney, Australia. 
  • Dutta, M. K., Singh, A., and Zia, T. A. (2013).  An Efficient and Secure Digital Image Watermarking Using Features from Iris Image. International Conference on Control, Communication and Computing (IEEE ICCC 2013). Dec 13-15, Kerala, India.
  • Mouzehkesh, N., Zia, T. A., Shafigh, S., and Zheng, L. (2013).  Light-Weight History-Based Medium Access Control (MAC) Protocol for Wireless Body Area Networks. The 7th International Conference on Sensing Technology (ICST 2013). Dec 3-5, Wellington, New Zealand.
  • Mouzehkesh, N., Zia, T. A., Shafigh, S., and Zheng, L. (2013).  D2MAC: Dynamic Delayed Medium Access Control Protocol with Fuzzy Technique for Wireless Body Area Networks. The 10th IEEE International Body Sensor Networks Conference (IEEE BSN 2013). May 6-9, 2013 MIT, Cambridge, MA, USA.
  • Shafigh, S., Zia, T. A., and Mouzehkesh, N. (2013).  Wireless Acceleration Sensor Data Filtering Using Recursive Least Squares Filter. The 2013 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (IEEE ISSNIP 2013). April 2-5, 2013, Melbourne, Australia.
  • Mouzehkesh, N., Zia, T. A., and Shafigh, S. (2013).  Traffic Aware Fuzzy-Tuned Delay Range for Wireless Body Area Networks Medium Access Control Protocol (MAC). The 2013 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (IEEE ISSNIP 2013). April 2-5, 2013, Melbourne, Australia.
  • Rehman, S., Zia, T. A., and Zheng, L. (2012).  A Border Base Directional Routing (BBDR) Protocol for VANETs. The 2012 International Conference on Broadband and Biomedical Communications (IB2COM). November 5-8, 2012, Sydney, Australia. (Received best paper award).
  • Shafigh, S., Zia, T. A., and Mouzehkesh, N. (2012).  Position Aware MAC (PA-MAC) Protocol for Wireless Body Area Networks. The 2012 International Conference on Broadband and Biomedical Communications (IB2COM). November 5-8, 2012, Sydney, Australia. (Received best paper award) .
  • Rehman, S., Zia, T. A., and Zheng, L. (2012).  A virtualized framework for implementation of a realistic Vehicular Ad-hoc Network (Extended Abstract). The 2012 International Conference on Broadband and Biomedical Communications (IB2COM). November 5-8, 2012, Sydney, Australia.
  • Shafigh, S., and Zia, T. A. (2012).  A Study on the Shimmer Wireless Acceleration Sensor Data (Extended Abstract). The 2012 International Conference on Broadband and Biomedical Communications (IB2COM). November 5-8, 2012, Sydney, Australia.
  • Majeed, A., and Zia, T. A. (2012). DSS:  Dynamic Switching Sets for Prolonging Network Lifetime in Sensor Nodes.  In the proceedings of the 8th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNet 2012) co-located with Local Computer Networks (LCN 2012), Oct 22-25, 2012. Clearwater, FL, USA.
  •  Sar, R. K., Al-Saggaf, Y., and Zia, T. A. (2012). You are what you type:  Privacy in online social networks.  The sixth Australian Institute of Computer Ethics Conference (AiCE 2012). February 13, 2012.  Melbourne, Australia.
  • Yang, P., and Zia, T. A. (2012).  Privacy-preserving Efficient Data Aggregation in Wireless Sensor Networks. International Conference on Information, Computing and Telecommunications (ICICT 2012), January 7-9, 2012, Harbin, China.
  • Zia, T. A., and Rizvi, A. (2011).Source Code Embedded (SCEM) Security Framework. 9th Australian Information Security Management Conference (secau Security Congress 2011). December 5 - 7, 2011, Perth, Australia. (2010 ERA-ranked B conference).
  • Yang, P., Zia, T. A., Cao, Z., and Dong, X. (2011).Efficient and Expressive Attribute-Based Signature in the standard model. 9th Australian Information Security Management Conference (secau Security Congress 2011). December 5 - 7, 2011, Perth, Australia. (2010 ERA-ranked B conference).
  • Mansukhani, B., and Zia, T. A. (2011).An Empirical Study of Challenges in Managing the Security in Cloud Computing. 9th Australian Information Security Management Conference (secau Security Congress 2011). December 5 - 7, 2011, Perth, Australia. (2010 ERA-ranked B conference).
  • Wright, C.S., and Zia, T. A. (2011).Using Checklists to make better best. 9th Australian Information Security Management Conference (secau Security Congress 2011). December 5 - 7, 2011, Perth, Australia. (2010 ERA-ranked B conference).
  • Wright, C.S., and Zia, T. A. (2011). Modeling System Audit as a Sequential test with Discovery as a Failure Time Endpoint. International Conference on Business Intelligence and Financial Engineering (ICBIFE 2011). December 12-13, 2011, Hong Kong. (in-press)
  • Mouzehkesh, N., and Zia, T. A. (2011).A Dynamic Back-off Approach for Wireless Sensor Networks. Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2011). Dec 6 - 9, 2011, Adelaide, Australia. (2010 ERA-ranked B conference).
  • Gawdan, I. S, Chow, C. Zia, T. A. and Sarhan, Q. I. (2011). A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks. Third International Conference on Computational Intelligence, Modeling and Simulation (CIMSim 2011). September 20 - 22, 2011, Langkawi, Malaysia.
  • Wright, C.S., and Zia, T. A. (2011). Of Black Swans, Platypii and Bunyips. ISACA's Oceania Computer Audit Control Security Conference (CACS 2011). Sep 18 - 23, 2011, Brisbane, Australia.
  • Balasubramanian, V., Zia, T. A. and Hoang, D. B. (2011). Addressing the Confidentiality and Integrity of Assistive Care Loop Framework using Wireless Sensor Networks. 21st International Conference on Systems Engineering (ICSEng 2011). August 16 - 18, 2011, Las Vegas, USA. (2010 ERA-ranked B conference).
  • Hambly, J. T. and Zia, T. A. (2011). Towards Detecting Extremely Low Frequency Fields using a Wireless Sensor Network. 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNDP 2011), to be held on July 6 - 8, 2011, Sydney, Australia.
  • Wright, C.S., and Zia, T. A. (2011). Rationally Opting for the Insecure Alternative:Negative Externalities and the Selection of Security Controls. 4th International Conference in Security for Information Systems (CISIS 2011). June 8 - 10, 2011, Torremolinos, Malaga, Spain. (2010 ERA-ranked B conference).
  • Wright, C.S., and Zia, T. A. (2011). A Quantitative Analysis into the Economics of Correcting Software Bugs. 4th International Conference in Security for Information Systems (CISIS 2011). June 8 - 10, 2011, Torremolinos, Malaga, Spain. (2010 ERA-ranked B conference).
  • Zia, T. A. (2010). An Analytical study of IT Security Governance and its adoption in Australian Organizations. 8th Australian Information Security Management Conference (secau Security Congress 2010). November 30 - December 2, 2010, Perth, Australia. (2010 ERA-ranked B conference).
  • Zia, T. A. (2010). Development Delivery and Dynamics of a New Digital Forensics Subject. 8th Australian Digital Forensics Conference (secau Security Congress 2010). November 30 - December 2, 2010, Perth, Australia. (2010 ERA-ranked B conference).
  • Wright, C.S., and Zia, T. A. (2010). The Economics of Developing Security Embedded Software.8th Australian Information Security Management Conference (secau Security Congress 2010). November 30 - December 2, 2010, Perth, Australia. (2010 ERA-ranked B conference).
  • Zia, T. A., and Ahmad, Z. (2010). IT Security Governance in Australian Context. Annual International Conference on Information Technology Security (ITS 2010). November 29-30, 2010. Phuket, Thailand.
  • Zia, T. A. (2010). Network Security: Contents, delivery and assessments of an undergraduate subject. Annual International Conference on Information Technology Security (ITS 2010. November 29-30, 2010. Phuket, Thailand.
  • Mansukhani, B., and Zia, T. A. (2010). Adoption of Cloud Computing in Indian Organizations. International Conference on Intelligent Network and Computing (ICINC 2010). November 26-28, 2010, Kuala Lumpur, Malaysia.
  • Sarhan, I., Chow, C. O., Ishii, H., and Zia, T. A. (2010). Threat Models and Security Issues in Wireless Sensor Networks. International Conference on Intelligent Network and Computing (ICINC 2010). November 26-28, 2010, Kuala Lumpur, Malaysia.
  • Majeed, A., andZia, T. A. (2010). Multi-Set Architecture for Multi-Applications Running in Wireless Sensor Networks.In the sixth International Workshop on Heterogeneous Wireless Networks (HWISE) co-located with the International Conference on Advanced Information Networking and Applications (AINA 2010), April 20-23, 2010. Perth, Australia. (AINA 2010 acceptance rate 25%). AINA is ERA-ranked B conference.
  • Zia, T. A. (2010). Revisiting Reputation-based Trust Management in Wireless Sensor Networks. ICaST - ICST's Global Community Magazine.ICaST 10.03 - March 2010 ISSN: 2032-8745. Belgium.(Published as a technical paper)
  • Zia, T. A., and Islam, M.Z. (2010). Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks, in the proceedings of 5th International Conference on Availability, Reliability and Security (ARES 2010). February 15-18, 2010, Krakow, Poland. (ARES 2010 acceptance rate 22%) ARES is ERA-ranked B conference.
  • Majeed, A., and Zia, T. A. (2009). Running Multi-Sequence Applications in Wireless Sensor Networks.In the proceedings of the 7th (ACM) International Conference on Advances in Mobile Computing & Multimedia (MoMM 2009), Dec 14-16, 2009. Kuala Lumpur, Malaysia. (MoMM 2009 acceptance rate 28%)
  • Labraoui, N., Gueroui, M., Aliouat, M., Zia, T. A. (2009). Cryptographic vs Trust Based Secure Data Aggregation in Wireless Sensor Networks.In the proceedings IEEE Global Information Infrastructure Symposium (GIIS 2009), June 22-26, 2009. Hammamet, Tunisia. (GIIS 2009 acceptance rate 32%)
  • Labraoui, N., Gueroui, M., Zia, T. A. (2009). Data Aggregation Security Challenges in Wireless Sensor Networks.In the proceedings of the 9th International Symposium on Programming and Systems (ISPS 2009), May 25-27, 2009. Algiers, Algeria.
  • Labraoui, N., Gueroui, M., Zia, T. A. (2009). Secure In-Network Data Aggregation in Wireless Sensor Networks.In the proceedings of 6 ème Colloque sur l'Optimisation et les Systèmes d'Information (COSI 2009), May 25-27, 2009. Annaba, Algeria.
  • Zia, T. A. (2008). Reputation-based Trust Management in Wireless Sensor Networks. In the proceedings of the Fourth International Conference on Intelligent Sensors, Sensor Networks and Information Processing ISSNIP 2008, December 15-18, 2008, Sydney, Australia.(ISSNIP 2008 acceptance rate 27%).ISSNIP is ERA-ranked B conference.
  • Zia, T. A.,Zomaya, A. Y. and Ababneh, N. (2007). Evaluation of Overheads in Security Mechanisms in Wireless Sensor Networks. In the proceedings of the International Conference on Sensor Technologies and Applications SENSORCOMM 2007, October 14-20 2007, Valencia, Spain. (SENSORCOMM 2007 acceptance rate 34%)
  • Zia, T. A., and Zomaya, A. Y. (2007). Secure Localization in Wireless Sensor Networks. In the proceedings of the Fourth Asian Conference on Communication Systems and Networks (AsiaCSN 2007), April 2-4 2007, Phuket, Thailand.
  • Zia, T. A., and Zomaya, A. Y. (2007). Malicious Node Detection Mechanism in Wireless Sensor Networks. In the proceedings of the International Conference on Network Security ICONS 2007, Jan 29-31 2007, Erode, India. This paper has received the best paper presentation award.
  • Zia, T. A., and Zomaya, A. Y. (2006). Security Issues in Wireless Sensor Networks. In the proceedings of the International Conference on Systems and Networks ICSNC 2006, Nov 2- 4, 2006, Tahiti, French Polynesia. (ICSNC 2006 acceptance rate 34%)
  • Zia, T. A., and Zomaya, A. Y. (2006). A Secure Triple-Key Management Scheme for Wireless Sensor Networks. In the proceedings of the IEEE INFOCOM 2006 Workshop, April 23-24, 2006, Barcelona, Spain. (INFOCOM 2006 acceptance rate 18%). INFOCOM is ERA-ranked A and CORE A* conference.
  • Zia, T. A., and Zomaya, A. Y. (2006). WSNSF: Wireless Sensor Networks Security Framework. In the proceedings of the IEEE Sensor Applications Symposium SAS 2006, February 7-9, 2006, Houston, Texas.
  • Zia, T. A., and Zomaya, A. Y. (2005). An Analysis of Simulations and Programming in Wireless Sensor Networks. In the proceedings of the International Workshop on Sensor Networks and Applications SNA 2005, October 21-22, 2005, Beijing, China.

Top of page