Phd (Information Security), MSc (Information Security), MSc (Computer Science), BSc (Mathematics, Physics)
Senior Lecturer
- About
-
- Email Address
- raja.akram@abdn.ac.uk
- School/Department
- School of Natural and Computing Sciences
Biography
I joined the Department of Computer Science as Senior Lecturer in July 2020.
Previously, I have worked as Post Doctoral research assistant at the Information Security Group (ISG), Royal Holloway, University of London. During my time at ISG, I was involved with the research projects related to Data Control and Compliance, digital avionics, EMV and decentralised payment systems, transport ticketing and mobile contactless transactions. Previously, I have worked as Research Fellow at the Cyber Security Lab, Department of Computer Science, University of Waikato, New Zealand. At the Cyber Security Lab, I am involved with the user centric security and privacy paradigms. Before joining the University of Waikato, I worked as a Senior Research Fellow at Edinburgh Napier University. During my work at the Edinburgh Napier University, I worked on the RatTrap project. The RatTrap project designed a suite of preventive technologies to avoid online fraud - especially in the online affiliate marketing. I got my PhD in Information Security from Royal Holloway, University of London. I completed my MSc Information Security at Royal Holloway, University of London in September 2007. I also have MSc Computer Science from the University of Agriculture, Faisalabad and B.Sc (Mathematics, Physics and Geography) from the University of the Punjab, Lahore.
My current research interests revolve around the user centric applied security and privacy architectures, data ownership and control in a heterogeneous computing environment, security for machine learning and machine learning for security. In addition, I am also interested in smart card security, secure cryptographic protocol design and implementation, smartphone and IoT security, trusted platform architecture, trusted/secure execution environment and security & privacy issues in emerging technologies like blockchain, UAVs/Drone and autonomous vehicles.
Latest Publications
Autonomous vehicles: Cybersecurity and privacy challenges and opportunities
Cybersecurity in Transport Systems. Hawley, M. (ed.). Institution of Engineering and Technology, pp. 337-375, 39 pagesChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.1049/PBTR015E_ch9
- [ONLINE] View publication in Scopus
Secure mobile edge server placement using multi-agent reinforcement learning
Electronics (Switzerland), vol. 10, no. 17, 2098Contributions to Journals: ArticlesMulti-objective function-based node-disjoint multipath routing for mobile ad hoc networks
Electronics (Switzerland), vol. 10, no. 15, 1781Contributions to Journals: ArticlesP2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time
Energies, vol. 14, no. 3, 606Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.3390/en14030606
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/16068/1/Kalbantner_etal_P2PEdge_VOR.pdf
A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Teaching
-
Programmes
- Postgraduate, 3 semester, September start
- Publications
-
Page 2 of 4 Results 26 to 50 of 91
Security, privacy and safety evaluation of dynamic and static fleets of drones
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/DASC.2017.8101984
Serverless protocols for inventory and tracking with a UAV
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/DASC.2017.8102113
Artificial Ambient Environments for Proximity Critical Applications
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1145/3098954.3098964
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1145/3098954.3098971
Provisioning Software with Hardware-Software Binding
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1145/3098954.3103158
Enhancing EMV Tokenisation with Dynamic Transaction Tokens
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-62024-4_8
Proximity Assurances Based on Natural and Artificial Ambient Environments
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-69284-5
Application Development Environments for Java and SIM Toolkit
Smart Cards, Tokens, Security and Applications. Mayes, K., Markantonakis, K. (eds.). 2 edition. Springer International Publishing AG, pp. 253-281, 29 pagesChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-50500-8_10
Multi-Application Smart Card Platforms and Operating Systems
Smart Cards, Tokens, Security and Applications. Mayes, K., Markantonakis, K. (eds.). Springer International Publishing AG, pp. 59-92, 34 pagesChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-50500-8_3
Smart Card Reader and Mobile APIs
Smart Cards, Tokens, Security and Applications. Mayes, K., Markantonakis, K. (eds.). Springer International Publishing AG, pp. 305-349, 45 pagesChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-50500-8_12
Preventing relay attacks in mobile transactions using infrared light
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1145/3019612.3019794
Towards trusted execution of multi-modal continuous authentication schemes
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1145/3019612.3019652
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1145/3055186.3055201
Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/MOBISECSERV.2017.7886559
Extending EMV Tokenised Payments To Offline-Environments
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/TrustCom.2016.0095
Log Your Car: The Non-invasive Vehicle Forensics
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/TrustCom.2016.0164
Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/TrustCom.2016.0116
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/TrustCom.2016.0060
Can you call the software in your device firmware?
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/ICEBE.2016.040
An Exploratory Analysis of the Security Risks of the Internet of Things in Finance
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-64483-7_11
Log Your Car: Reliable Maintenance Services Record
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-54705-3_30
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsAn efficient, secure and trusted channel protocol for avionics wireless networks
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/DASC.2016.7777967
Security and performance comparison of different secure channel protocols for Avionics Wireless Networks
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/DASC.2016.7777966
A secure and trusted boot process for Avionics Wireless Networks
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/ICNSURV.2016.7486322