Dr. Nour MoustafaBased in Canberra, ACT, Australia
Dr Nour Moustafa is Postgraduate Discipline Coordinator (Cyber) and Lecturer in Cyber Security at the School of Engineering and Information Technology (SEIT), University of New South Wales (UNSW)'s UNSW Canberra Australia. He is ACM Dinghied Speaker, who is interested in presenting Artificial Intelligence-enabled Cyber Defenses, including network security, intrusion detection systems, privacy preservation, digital forensics, IoT security, deep learning, and machine learning techniques. He is interested in designing and developing threat detection and forensic mechanisms to the Industry 4.0 technology for identifying malicious activities from cloud computing, fog computing, IoT and industrial control systems over virtual machines and physical systems. He was a Postdoctoral Fellow in Cybersecurity at UNSW Canberra from June 2017 till February 2019. He received his PhD degree in the field of Cyber Security from UNSW in 2017. He obtained his bachelor’s and master’s degrees in Information Systems in 2009 and 2014, respectively, from the Faculty of Computer and Information, Helwan University, Egypt. He has several research grants with totaling over $1.2 million. He has been awarded the 2020 prestigious Australian Spitfire Memorial Defence Fellowship award. He is a Senior IEEE Member, ACM member, and CSCRC Fellowship. He has published more than 50 research outputs in top-tier computing and security journals and conferences, such as IEEE Transactions on forensics and Security, IEEE IoT, and IEEE Transactions on Industrial Informatics. He has served his academic community, as the guest associate editor of IEEE transactions journals, including IEEE Transactions on Industrial Informatics, IEEE Access, Future Internet, and Information Security Journal: A Global Perspective. He has also served over seven conferences in leadership roles, involving vice-chair, session chair, Technical Program Committee (TPC) member and proceedings chair, including 2020 IEEE TrustCom and 2020 33rd Australian Joint Conference on Artificial Intelligence.
To request a single lecture/event, click on the desired lecture and complete the Request Lecture Form.
A New Distributed Architecture for Evaluating AI-based Security Systems at the Edge: Network TON\_IoT Datasets
While there has been a significant interest in understanding the cyber threat landscape of Internet of Things (IoT) networks, and the design of Artificial Intelligence (AI)-based security...
A Novel Cognitive Computing Technique using Convolutional Networks for Automating the Criminal Investigation Process in Policing
Criminal Investigation (CI) plays an important role in policing, where police use various traditional techniques to investigate criminal activities such as robbery and assault. However, the...
- Attacking Techniques and Intrusion Detection: Getting insights of Signature vs Anomaly modelsIn this lecture, we will discuss Intrusion Techniques Viruses and Worms. We will also describe the concepts of signature vs anomaly detection in network systems. We will Learn Signature...
- Distributed Anomaly Detection System as a Service using Statistical Learning for Industrial IoT-Edge-Cloud NetworksAs Industrial Internet of Things (IIoT) systems have become more commonplace, there are various data management and security monitoring tools deployed at the cloud for logging and inspecting...
To request a tour with this speaker, please complete this online form.
If you are not requesting a tour, click on the desired lecture and complete the Request this Lecture form.
All requests will be sent to ACM headquarters for review.
- Attacking Techniques and Intrusion Detection: Getting insights of Signature vs Anomaly models