Phd (Information Security), MSc (Information Security), MSc (Computer Science), BSc (Mathematics, Physics)
Senior Lecturer
- About
-
- Email Address
- raja.akram@abdn.ac.uk
- School/Department
- School of Natural and Computing Sciences
Biography
I joined the Department of Computer Science as Senior Lecturer in July 2020.
Previously, I have worked as Post Doctoral research assistant at the Information Security Group (ISG), Royal Holloway, University of London. During my time at ISG, I was involved with the research projects related to Data Control and Compliance, digital avionics, EMV and decentralised payment systems, transport ticketing and mobile contactless transactions. Previously, I have worked as Research Fellow at the Cyber Security Lab, Department of Computer Science, University of Waikato, New Zealand. At the Cyber Security Lab, I am involved with the user centric security and privacy paradigms. Before joining the University of Waikato, I worked as a Senior Research Fellow at Edinburgh Napier University. During my work at the Edinburgh Napier University, I worked on the RatTrap project. The RatTrap project designed a suite of preventive technologies to avoid online fraud - especially in the online affiliate marketing. I got my PhD in Information Security from Royal Holloway, University of London. I completed my MSc Information Security at Royal Holloway, University of London in September 2007. I also have MSc Computer Science from the University of Agriculture, Faisalabad and B.Sc (Mathematics, Physics and Geography) from the University of the Punjab, Lahore.
My current research interests revolve around the user centric applied security and privacy architectures, data ownership and control in a heterogeneous computing environment, security for machine learning and machine learning for security. In addition, I am also interested in smart card security, secure cryptographic protocol design and implementation, smartphone and IoT security, trusted platform architecture, trusted/secure execution environment and security & privacy issues in emerging technologies like blockchain, UAVs/Drone and autonomous vehicles.
Latest Publications
Autonomous vehicles: Cybersecurity and privacy challenges and opportunities
Cybersecurity in Transport Systems. Hawley, M. (ed.). Institution of Engineering and Technology, pp. 337-375, 39 pagesChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.1049/PBTR015E_ch9
- [ONLINE] View publication in Scopus
Secure mobile edge server placement using multi-agent reinforcement learning
Electronics (Switzerland), vol. 10, no. 17, 2098Contributions to Journals: ArticlesMulti-objective function-based node-disjoint multipath routing for mobile ad hoc networks
Electronics (Switzerland), vol. 10, no. 15, 1781Contributions to Journals: ArticlesP2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time
Energies, vol. 14, no. 3, 606Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.3390/en14030606
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstream/2164/16068/1/Kalbantner_etal_P2PEdge_VOR.pdf
A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings
- Teaching
-
Programmes
- Postgraduate, 3 semester, September start
- Publications
-
Page 4 of 4 Results 76 to 91 of 91
Recovering from Lost Digital Wallet
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/HPCC.and.EUC.2013.227
Remote Attestation Mechanism based on Physical Unclonable Functions
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.3233/978-1-61499-328-5-107
Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/CIS.2012.149
Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-642-34129-8_19
A Privacy Preserving Application Acquisition Protocol
Liverpool, United Kingdom: IEEE Computer Society Press.Other Contributions: Other ContributionsPseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis
.Other Contributions: Other ContributionsA User Centric Security Model for Tamper-Resistant Devices
469 pagesBooks and Reports: Commissioned ReportsCross-Platform Application Sharing Mechanism
Changsha, China: IEEE Computer Society Press.Other Contributions: Other ContributionsUser Centric Security Model for Tamper-Resistant Devices
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/ICEBE.2011.69
Application-Binding Protocol in the User Centric Smart Card Ownership Model
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-642-22497-3_14
Simulator Problem in User Centric Smart Card Ownership Model
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/EUC.2010.108
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-642-15257-3_15
Firewall Mechanism in a User Centric Smart Card Ownership Model
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-642-12510-2
A Paradigm Shift in Smart Card Ownership Model
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/ICCSA.2010.52
Location Based Application Availability
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-642-05290-3
Application Management Framework in User Centric Smart Card Ownership Model
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-642-10838-9_3