Ukieweb

Publications

If you have no critics, you'll likely have no success.

Co-Auhtor list: Sanjay Jha [UNSW], Yvo Desmedt [University College London (UCL), The University of Texas at Dallas], Mohamed Ali (Dali) Kaafar [Data61, CSIRO], Salil Kanhere [UNSW], Sandra-Scott Hayward [Queen's University of Belfast], Rajkumar Buyya [The Universtiy of Melbourne], Elisa Bertino [Purdue University]

Conference & Workshop (attended since 2014): ACM Asia Conference on Computer and Communications Security (ASIACCS) [2017], ACM CCS Conference on Computer and Communications Security (CCS) [2016], Australian Cyber Emergency Response Team Conference (AusCERT) [2016], IEEE Pervasive Computing and Communications (PerCom) [2016], IEEE NFV-SDN [2016], Association of anti-Virus Asia Researchers International Conference [2014], IoT Security Workshop of UNSW [2014].

Talks & Presentations (given since 2014): The University of Melbourne [2017], The University of New South Wales [2017], Data61, CSIRO [2017], The University of Texas at Dallas [2015], ACM Asia Conference on Computer and Communications Security (ASIACCS) [2017], ACM CCS Conference on Computer and Communications Security (CCS) [2016], IEEE NFV-SDN [2016], National ICT Australia (NICTA) [2015].

Work in Progress Publications:
Security of Software-Defined Clouds, with Prof. Buyya and Prof. Jha
Yvo Desmedt, Arash Shaghaghi: Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. Extension of ACM CCS work to be submitted to Journal in the coming months.
Recently Submitted:
Arash Shaghaghi,Salil Kanhere, Mohamed Ali Kaafar, Elisa Bertino and Sanjay Jha, "Gargoyle: Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations"

Peer-Reviewed Publications (since 2014):
Arash Shaghaghi, Mohamed Ali Kaafar, Rajkumar Buyya, and Sanjay Jha, Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions, Journal of Cluster Computing (Accepted with minor revision).
Shaghaghi, A., Kaafar, M.A., & Jha S., "WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Network (SDN)", Journal of Computer Networks, 2017. [Awaiting Decision, Journal Rank: A]
Shaghaghi, A., Kaafar, M.A., & Jha S., "WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Network (SDN)", Proceedings of the 12th ACM on Asia Conference on Computer and Communications Security (AsiaCCS), 2017 [Published, Conference Rank: B]
Shaghaghi, A., Kaafar, M.A., Scott-Hayward, S., Kanhere S., & Jha S., "Towards Policy Enforcement Point as a Service (PEPS)" IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), Paolo Alto, CA, USA, 2016. [Published]
Yvo Desmedt, Arash Shaghaghi: Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 89-92, 2016. [Published, Conference Rank: A*].
Shaghaghi, Arash, Jaesung Hong, and Sanjay Jha. "An SDN-based Framework for Detection of Illegal Rebroadcasting of Channels in P2PTV." Proceedings of the 2014 Workshop on Design, Quality and Deployment of Adaptive Video Streaming. ACM, 2014 [Published].
Contributed to the following publications (since 2014):
Rajkumar Buyya, Satish Narayana Srirama, et al., "A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade", [Available here ]
Sukhpal Singh Gill and Rajkumar Buyya, "SECURE: Self-Protection Approach in Cloud Resource Management", IEEE Cloud Computing, 2018. [Available here ]
Roger ClarkeRoger Clarke, Andrew A. Adams and Arash Shaghaghi, "Easy Privacy for Consumer-Oriented Social Media", the 4th Asian Privacy Scholars Network Conference, Meiji University, Tokyo, 10-11 July 2014. [Available here]
Roger Clarke, "How to Promote PET Usage", The Politics of Surveillance Workshop, University of Ottawa, 10 May 2014. [Available here]
Roger Clarke, "Can We Productise Secure eWorking Environments?", Workshop for 11th IFIP Summer School on Privacy and Identity Management 21-26 August 2016, Karlstad, Sweden. [Available here]
My ResearchGate Profile
My dblp Profile

Thesis
Proving the Applicability of Function Based Access Control, University College London (UCL), 2012. [Grade:A-]
Security of Social Networks: A Survey, Heriot-Watt University, 2011. [Grade:A+]