Dr Nour Moustafa

Master of Cyber Security Programs Coordinator
School of Engineering and Information Technology
UNSW Canberra Cyber

LOCATION

Building 15, room 108

  • ABOUT
  • PUBLICATIONS

Dr. Nour Moustafa is Postgraduate Discipline Coordinator (Cyber) and Lecturer in Cyber Security at the School of Engineering and Information Technology (SEIT), University of New South Wales (UNSW)'s UNSW Canberra Australia. He was a Postdoctoral Fellow in Cybersecurity at UNSW Canberra from June 2017 till February 2019. He received his PhD degree in the field of Cyber Security from UNSW in 2017. He obtained his Bachelor’s and master’s degrees in Information Systems in 2009 and 2014, respectively, from the Faculty of Computer and Information, Helwan University, Egypt. His areas of interest include Cyber Security, in particular, Network Security, host- and network- intrusion detection systems, statistics, deep learning, and machine learning techniques. He is interested in designing and developing threat detection and forensic mechanisms to the Industry 4.0 technology for identifying malicious activities from cloud computing, fog computing, IoT and industrial control systems over virtual machines and physical systems. 

He established a new theme, the so-called Intelligent Security, at UNSW Canberra Cyber which focuses on developing novel artificial intelligence models for protecting smart systems against cyber threat attacks in 2019. He has several research grants with totalling over AUD 800,000$. He has been awarded the 2020  prestigious Australian Spitfire Memorial Defence Fellowship award. He is also a Senior IEEE Member, ACM member, and CSCRC Fellowship. He has published more than 40 research outputs between 2014 and 2020 in top-tier computing and security journals and conferences, such as IEEE Transactions on forensics and Security, IEEE IoT, and IEEE Transactions on Industrial Informatics. He has served his academic community, as the guest associate editor of IEEE transactions journals, including IEEE Transactions on Industrial Informatics, IEEE IoT Journal, as well as the journals of IEEE Access, Future Internet and Information Security Journal: A Global Perspective.  He has also served over seven conferences in leadership roles, involving vice-chair, session chair, Technical Program Committee (TPC) member and proceedings chair, including 2020IEEE TrustCom and 2020 32nd Australasian Joint Conference on Artificial Intelligence.   

His data sets for evalauting Cyber applications-based machine learning:  

Book Chapters

Moustafa N; Slay J, 2018, 'A Network Forensic Scheme Using Correntropy-Variation for Attack Detection', in Advances in Digital Forensics XIV, Springer, Cham, IFIP International Federation for Information Processing 2018, pp. 225 - 239, http://dx.doi.org/10.1007/978-3-319-99277-8_13

Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1

Moustafa NM; Creech G; Slay J, 2017, 'Big Data Analytics for Intrusion Detection System: Statistical Decision-making using Finite Dirichlet Mixture Models', in Carrascosa IP; Kalutarage HK; Huang Y (ed.), Data Analytics and Decision Support for Cybersecurity, Springer, Cham, pp. 127 - 156, http://dx.doi.org/10.1007/978-3-319-59439-2_5

Journal articles

Ahmed Khan I; Pi D; Moustafa N; Haider W; Li B; Jolfaei A, 2020, 'A Multi-Level Intrusion Detection Approach-based Deep Learning for Discovering Anomalous Behaviors from Industrial Control Systems', IEEE Transactions on Industry Applications

Koroniotis N; Moustafa N; Schiliro F; Gauravaram P; Janicke H, 2020, 'A Holistic Review of Cybersecurity and Reliability Perspectives in Smart Airports', IEEE Access

Sobb T; Turnbull B; Moustafa N, 2020, 'Supply Chain 4.0: A Survey of Cyber Security Challenges, Solutions and Future Directions', Electronics (Switzerland)

Al-Hawawreh M; Moustafa N; Garg S; Hossain S, 2020, 'Deep Learning-enabled Threat Intelligence Scheme in the Internet of Things Networks', IEEE Transactions on Network Science and Engineering

Ali I; Sallam K; Moustafa N; Chakrabortty R; Ryan M; Choo K-KR, 2020, 'An Automated Task Scheduling Model using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems', IEEE Transactions on Cloud Computing, http://dx.doi.org/10.1109/TCC.2020.3032386

Pratim Ray P; Dash D; Moustafa N, 2020, 'Streaming service provisioning in IoT-based healthcare: An integrated edge-cloud perspective', Transactions on Emerging Telecommunications Technologies, vol. 31, http://dx.doi.org/10.1002/ett.4109

Dunn C; Moustafa N; Turnbull B, 2020, 'Robustness evaluations of sustainable machine learning models against data poisoning attacks in the internet of things', Sustainability (Switzerland), vol. 12, pp. 6434 - 6434, http://dx.doi.org/10.3390/SU12166434

Haider W; Moustafa N; Keshk M; Fernandez A; Choo KKR; Wahab A, 2020, 'FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems', Computers and Security, vol. 96, pp. 101906 - 101906, http://dx.doi.org/10.1016/j.cose.2020.101906

Keshk M; Turnbull B; Moustafa N; Vatsalan D; Choo KKR, 2020, 'A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks', IEEE Transactions on Industrial Informatics, vol. 16, pp. 5110 - 5118, http://dx.doi.org/10.1109/TII.2019.2957140

Asharf J; Moustafa N; Khurshid H; Debie E; Haider W; Wahab A, 2020, 'A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions', Electronics (Switzerland), vol. 9, pp. 1177 - 1177, http://dx.doi.org/10.3390/electronics9071177

Koroniotis N; Moustafa N; Sitnikova E, 2020, 'A New Network Forensic Framework based on Deep Learning for Internet of Things Networks: A Particle Deep Framework', Future Generation Computers Systems

Alsaedi A; Moustafa N; Tari Z; Mahmood A; Anwar A, 2020, 'TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems', IEEE ACCESS, vol. 8, pp. 165130 - 165150, http://dx.doi.org/10.1109/ACCESS.2020.3022862

Alkadi O; Moustafa N; Turnbull B, 2020, 'A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions', IEEE Access, vol. 8, pp. 104893 - 104917, http://dx.doi.org/10.1109/ACCESS.2020.2999715

Ashraf J; Bakhshi AD; Moustafa N; Khurshid H; Javed A; Beheshti A, 2020, 'Novel Deep Learning-Enabled LSTM Autoencoder Architecture for Discovering Anomalous Events From Intelligent Transportation Systems', IEEE Transactions on Intelligent Transportation Systems, pp. 1 - 12, http://dx.doi.org/10.1109/tits.2020.3017882

Alkadi O; Moustafa N; Turnbull B; Choo K-KR, 2020, 'A Deep Blockchain Framework-enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks', IEEE Internet of Things Journal, pp. 1 - 1, http://dx.doi.org/10.1109/jiot.2020.2996590

Alkadi O; Moustafa N; Turnbull B; Choo K-KR, 2019, 'An ontological graph identification method to improve Localization of IP prefix hijacking in network systems', IEEE Transactions on Information Forensics and Security

Koroniotis N; Moustafa N; Sitnikova E; Turnbull B, 2019, 'Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset', Future Generation Computer Systems

Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, vol. 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006

Moustafa N; Choo K-KR; Radwan I; Camtepe S, 2019, 'Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2018.2890808

Alkadi O; Moustafa N; Turnbull B; Choo K-KR, 2019, 'Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers', IEEE ACCESS, vol. 7, pp. 114607 - 114618, http://dx.doi.org/10.1109/ACCESS.2019.2935142

Radwan I; Moustafa N; Keating B; Choo K-KR; Goecke R, 2019, 'Hierarchical Adversarial Network for Human Pose Estimation', IEEE ACCESS, vol. 7, pp. 103619 - 103628, http://dx.doi.org/10.1109/ACCESS.2019.2931050

Koroniotis N; Moustafa N; Sitnikova E, 2019, 'Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions', IEEE Access, vol. 7, pp. 61764 - 61785, http://dx.doi.org/10.1109/ACCESS.2019.2916717

Keshk M; Sitnikova E; Moustafa N; Hu J; Khalil I, 2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657

Hassan M; Moustafa N; Sitnikova E; Turnbull B, 2018, 'Privacy-preserving big data analytics for cyber-physical systems', Wireless Networks, http://dx.doi.org/10.1007/s11276-018-01912-5

Moustafa N; Turnbull B; Raymond Choo K-K, 2018, 'An Ensemble Intrusion Detection Technique based on proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things', IEEE Internet of Things Journal, http://dx.doi.org/10.1109/JIOT.2018.2871719

Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981

Moustafa NM; Adi ERWIN; Turnbull BENJAMIN; Hu JIANKUN, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, vol. 6, pp. 32910 - 32924, http://dx.doi.org/10.1109/ACCESS.2018.2844794

Al-Hawawreh M; Moustafa N; Sitnikova E, 2018, 'Identification of Malicious Activities in Industrial Internet of Things Based on Deep Learning Models', Journal of Information Security and Applications, vol. 41, pp. 1 - 11, http://dx.doi.org/10.1016/j.jisa.2018.05.002

Moustafa NM; Misra G; Slay J, 2018, 'Generalized Outlier Gaussian Mixture technique based on Automated Association Features for Simulating and Detecting Web Application Attacks', IEEE Transactions on Sustainable Computing, http://dx.doi.org/10.1109/TSUSC.2018.2808430

Moustafa N; Slay J; Creech G, 2017, 'Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-Scale Networks', IEEE Transactions on Big Data, http://dx.doi.org/10.1109/TBDATA.2017.2715166

Moustafa N; Slay J, 2016, 'The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set', Information Security Journal, vol. 25, pp. 18 - 31, http://dx.doi.org/10.1080/19393555.2015.1125974

Moustafa N, 'A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing', , http://arxiv.org/abs/1906.01055v1

Moustafa N; Slay J, 'RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis', RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis, http://arxiv.org/abs/1711.02824v1

Conference Papers

Moustafa N; Ahmed M; Ahmed S, 2020, 'Data Analytics-enabled Intrusion Detection: Evaluations of Linux ToN_IoT Datasets', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020

Moustafa N; Hassan M; Debie E; Janicke H, 2020, 'Federated TON_IoT Windows Datasets for Evaluating AI-based Security Applications', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020

Moustafa N; Salim S; Turnbull B, 2020, 'Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social Media', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020

Wu P; Moustafa N; Yang S; Guo H, 2020, 'Densely Connected Residual Network for Attack Recognition', Guangzhou, China, presented at The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Guangzhou, China, 31 December 2020

Weinge B; Kim J; Sim A; Nakashima M; Moustafa N; Wu J, 2020, 'Enhancing IoT Anomaly Detection Performance for Federated Learning', Tokyo, Japan, presented at The 16th International Conference on Mobility, Sensing and Networking (MSN 2020), Tokyo, Japan, 19 December 2020 - 19 December 2020

Hassan M; Moustafa N; Sitnikova E; Turnbull B; Vatsalan D, 2020, 'Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems', Tokyo, Japan, presented at The 16th International Conference on Mobility, Sensing and Networking (MSN 2020), Tokyo, Japan, 19 December 2020

Yamany W; Moustafa N; Turnbull B, 2020, 'A Tri-level Programming Framework for Modelling Attacks and Defences in Cyber-Physical Systems', Canberra, Australia, presented at The 33rd Australasian Joint Conference on Artificial Intelligence (AJCAI 2020), Canberra, Australia, 16 December 2020

Schiliro F; Moustafa N; Beheshti A, 2020, 'Cognitive Privacy: AI-enabled Privacy using EEG Signals in the Internet of Things', Fiji- Virtual Conference, presented at IEEE International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Fiji- Virtual Conference, 14 December 2020 - 16 December 2020

Hassanin M; Moustafa N; Tahtali M, 2020, 'A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models', Canberra, Australia, presented at The 2020 IEEE Symposium Series on Computational Intelligence (SSCI), Canberra, Australia, 04 December 2020

Moustafa N; Jolfaei A, 2020, 'Autonomous detection of malicious events using machine learning models in drone networks', in Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, ACM, presented at MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, http://dx.doi.org/10.1145/3414045.3415951

schiliro F; Beheshti A; Moustafa N, 2020, 'A Novel Cognitive Computing Technique using Convolutional Networks for Automating the Criminal Investigation Process in Policing', Amsterdam, Netherlands, presented at Intelligent Systems Conference (IntelliSys), Amsterdam, Netherlands, 03 September 2020 - 04 March 2020

Alkadi O; Moustafa N; Turnbull B, 2020, 'A Collaborative Intrusion Detection System using Deep Blockchain Framework for Securing Cloud Networks', 2020 Amsterdam, Netherlands, presented at Intelligent Systems Conference (IntelliSys), 2020 Amsterdam, Netherlands, 03 September 2020 - 04 September 2020

Debie E; Moustafa N; Whitty M, 2020, 'A Privacy-Preserving Generative Adversarial Network Method for Securing EEG Brain Signals', in IEEE World Congress on Computaional Intelligence (IEEE WCCI), 2020, IEEE, Glasgow, United kingdom, presented at IEEE World Congress on Computaional Intelligence (IEEE WCCI), 2020, Glasgow, United kingdom, 19 July 2020 - 24 July 2020

Showing 1 - 50 of 69 publications