If you have no critics, you'll likely have no success.

Co-Auhtor list: Sanjay Jha [UNSW], Yvo Desmedt [University College London (UCL), The University of Texas at Dallas], Mohamed Ali (Dali) Kaafar [Data61, CSIRO], Salil Kanhere [UNSW], Sandra-Scott Hayward [Queen's University of Belfast], Rajkumar Buyya [The Universtiy of Melbourne], Elisa Bertino [Purdue University]

Conference & Workshop (attended since 2014): ACM Asia Conference on Computer and Communications Security (ASIACCS) [2017], ACM CCS Conference on Computer and Communications Security (CCS) [2016], Australian Cyber Emergency Response Team Conference (AusCERT) [2016], IEEE Pervasive Computing and Communications (PerCom) [2016], IEEE NFV-SDN [2016], Association of anti-Virus Asia Researchers International Conference [2014], IoT Security Workshop of UNSW [2014].

Talks & Presentations (given since 2014): The University of Melbourne [2017], The University of New South Wales [2017], Data61, CSIRO [2017], The University of Texas at Dallas [2015], ACM Asia Conference on Computer and Communications Security (ASIACCS) [2017], ACM CCS Conference on Computer and Communications Security (CCS) [2016], IEEE NFV-SDN [2016], National ICT Australia (NICTA) [2015].

Work in Progress Publications:
Security of Software-Defined Clouds, with Prof. Buyya and Prof. Jha
Shaghaghi, A., Kaafar, M.A., & Jha S., "Venaticus: An Intrusion Prevention System for Software Defined Networks (SDN)"
Recently Submitted:

Peer-Reviewed Publications (since 2014):
Arash Shaghaghi, Salil Kanhere, Mohamed Ali Kaafar and Sanjay Jha, "Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems", IEEE 17th International Symposium on Network Computing and Applications (NCA), USA, 2018. [Accepted, Core Rank: A]
Yvo Desmedt, and Arash Shaghaghi, "Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations", From Database to Cyber Security, Springer LNCS Festschrifts series, 2018. [Accepted, Joint Corresponding Author]
Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kaafar, Elisa Bertino and Sanjay Jha, "Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations", IEEE 43rd Conference on Local Computer Networks (LCN), USA, 2018. [Accepted, Core Rank: A]
Arash Shaghaghi, Mohamed Ali Kaafar, Rajkumar Buyya, and Sanjay Jha, "Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions", Journal of Cluster Computing (Accepted, SJR: Q2).
Shaghaghi, A., Kaafar, M.A., & Jha S., "WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Network (SDN)", Proceedings of the 12th ACM on Asia Conference on Computer and Communications Security (AsiaCCS), 2017 [Full Paper, Core Rank: B, Acceptance rate: <20%]
Shaghaghi, A., Kaafar, M.A., Scott-Hayward, S., Kanhere S., & Jha S., "Towards Policy Enforcement Point as a Service (PEPS)" IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), Paolo Alto, CA, USA, 2016. [Full Paper, Published]
Yvo Desmedt, Arash Shaghaghi, "Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor". Proceedings of the ACM CCS International Workshop on Managing Insider Security Threats, 89-92, 2016. [Published, Core Rank: A*, Joint Corresponding Author].
Shaghaghi, Arash, Jaesung Hong, and Sanjay Jha. "An SDN-based Framework for Detection of Illegal Rebroadcasting of Channels in P2PTV." Proceedings of the 2014 Workshop on Design, Quality and Deployment of Adaptive Video Streaming. ACM, 2014 [Published].
Contributed to the following publications (since 2014):
Rajkumar Buyya, Satish Narayana Srirama, et al., "A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade", [Available here ]
Sukhpal Singh Gill and Rajkumar Buyya, "SECURE: Self-Protection Approach in Cloud Resource Management", IEEE Cloud Computing, 2018. [Available here ]
Roger ClarkeRoger Clarke, Andrew A. Adams and Arash Shaghaghi, "Easy Privacy for Consumer-Oriented Social Media", the 4th Asian Privacy Scholars Network Conference, Meiji University, Tokyo, 10-11 July 2014. [Available here]
Roger Clarke, "How to Promote PET Usage", The Politics of Surveillance Workshop, University of Ottawa, 10 May 2014. [Available here]
Roger Clarke, "Can We Productise Secure eWorking Environments?", Workshop for 11th IFIP Summer School on Privacy and Identity Management 21-26 August 2016, Karlstad, Sweden. [Available here]
My ResearchGate Profile
My dblp Profile
My Google Scholar Profile

Proving the Applicability of Function Based Access Control, University College London (UCL), 2012. [Grade:A-]
Security of Social Networks: A Survey, Heriot-Watt University, 2011. [Grade:A+]