Bio:
KIM-KWANG RAYMOND CHOO received the Ph.D. in Information Security in 2006 from Queensland University of Technology, Australia. He currently holds the Cloud Technology Endowed Professorship at The University of Texas at San Antonio (UTSA), and has a courtesy appointment at the University of South Australia.
He serves as the Department Editor of IEEE Transactions on Engineering Management; the Associate Editor of IEEE Transactions on Dependable and Secure Computing, and IEEE Transactions on Big Data; and the Technical Editor of IEEE Network Magazine. He has also served as the Associate Technical Editor of IEEE Communications Magazine; and the Special Issue Guest Editor of ACM Transactions on Embedded Computing Systems, ACM Transactions on Internet Technology, IEEE Cloud Computing, IEEE Communications Magazine, IEEE Internet of Things Journal, IEEE Network, IEEE Transactions on Big Data, IEEE Transactions on Cloud Computing, IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Engineering Management, IEEE Transactions on Industrial Informatics, etc.
He is an ACM Distinguished Speaker (2021 - 2023), IEEE Computer Society Distinguished Visitor (2021 - 2023), and included in Web of Science's Highly Cited Researcher in the field of Cross-Field - 2020. He is named the Cybersecurity Educator of the Year - APAC (Cybersecurity Excellence Awards are produced in cooperation with the Information Security Community on LinkedIn) in 2016, and in 2015 he and his team won the Digital Forensics Research Challenge organized by Germany's University of Erlangen-Nuremberg. He is the recipient of the 2019 IEEE Technical Committee on Scalable Computing (TCSC) Award for Excellence in Scalable Computing (Middle Career Researcher), the 2018 UTSA College of Business Col. Jean Piccione and Lt. Col. Philip Piccione Endowed Research Award for Tenured Faculty, the Outstanding Associate Editor of 2018 for IEEE Access, the British Computer Society's 2019 Wilkes Award Runner-up, the 2014 Highly Commended Award by the Australia New Zealand Policing Advisory Agency, the Fulbright Scholarship in 2009, the 2008 Australia Day Achievement Medallion, and the British Computer Society's Wilkes Award in 2008. He has also received best paper awards from the IEEE Consumer Electronics Magazine for 2020, EURASIP Journal on Wireless Communications and Networking in 2019, IEEE TrustCom 2018, and ESORICS 2015; the Korea Information Processing Society's Journal of Information Processing Systems Outstanding Research Award (Most-cited Paper) for 2020 and Survey Paper Award (Gold) in 2019; the IEEE Blockchain 2019 Outstanding Paper Award; and Best Student Paper Awards from Inscrypt 2019 and ACISP 2005.
His research has been funded by NASA, National Security Agency, National Science Foundation, CPS Energy, LGS Innovations, MITRE, Texas National Security Network Excellence Fund, Australian Government National Drug Law Enforcement Research Fund, Australian Government Cooperative Research Centre for Data to Decision, Lockheed Martin Australia, auDA Foundation, Government of South Australia, BAE Systems stratsec, Australasian Institute of Judicial Administration Incorporated, Australian Research Council, etc. He is also a Fellow of the Australian Computer Society.
Available Lectures
To request a single lecture/event, click on the desired lecture and complete the Request Lecture Form.
-
An interdisciplinary STEAM approach to cyber security research
Culturally and economically open nations, such as the United States (US), have thrived on the wealth that cyberspace and technologies have enabled. However, just as cyberspace and technologies...
-
Internet of Things (IoT) Forensics: Challenges and Opportunities
Internet of Things (IoT) devices are becoming commonplace in our society, due to their widespread applications (e.g., environmental monitoring, smart cities, healthcare, surveillance, and...
-
Internet of Things (IoT) cyber security and threat intelligence: What are the research challenges and opportunities?
Internet of Things (IoT) devices are becoming commonplace in our society, due to their widespread applications (e.g., environmental monitoring, smart cities, healthcare, surveillance, and...
To request a tour with this speaker, please complete this online form.
If you are not requesting a tour, click on the desired lecture and complete the Request this Lecture form.
All requests will be sent to ACM headquarters for review.