member of ISACA 2017 - ICIW Industry/Research Advisory Committee Associate 2006 - Institute of Electrical and Electronics Engineers 2006 -
selected publications academic article McIntosh TWatters PKayes ASMNg AChen P. Enforcing situation-aware access control to build malware-resilient file systems. Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 115:568-582. 2021 Full text if available Kayes ASMIslam MSWatters PANg AKayesh H. Automated Measurement of Attitudes Towards Social Distancing Using Social Media: A COVID-19 Case Study. First Monday. 11. 2020 Full text if available Kayes ASMKalaria RSarker IHIslam MSWatters PANg AHammoudeh MBadsha SKumara I. A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues. Sensors. 20:1-34. 2020 Full text if available Sarker IHKayes ASMBadsha SAlqahtani HWatters PANg A. Cybersecurity data science: an overview from machine learning perspective. Journal of Big Data. 7:1-29. 2020 Full text if available Chen SNg AGreenfield P. A performance evaluation of distributed database architectures. Concurrency and Computation: Practice and Experience. 25:1524-1546. 2013 Full text if available Ng AWatters PChen S. A consolidated process model for identity management. Information Resources Management Journal. 25:1-29. 2012 Full text if available Ng A. An evaluation of the performance of web services using table-driven XML. International Journal of Business Process Integration and Management. 2:172-172. 2007 Full text if available book Ng ACK. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities 2018 chapter Piconi JMaruatona ONg AKayes ASMWatters PA. A Machine Learning-Based Cyber Defence System for an Intelligent City. 271-299. 2021 Full text if available Nowrozy RKayes ASMWatters PAlazab MNg AChowdhury MMaruatona O. A Blockchain-Based Secure Data Sharing Framework for Healthcare. 1-10. 2020 Alkhalifah ANg AKayes ASMChowdhury MJMAlazab MWatters PA. A taxonomy of blockchain threats and vulnerabilities. 3-28. 2020 Ng AChen S. A Study of Contemporary System Performance Testing Framework. 1546-1561. 2019 Full text if available Ng AWatters PChen S. A technology and process analysis for contemporary identity management frameworks. 955-1008. 2019 Full text if available Ng AChen S. A Study of Contemporary System Performance Testing Framework. 7563-7576. 2018 Full text if available Ng AWatters PAChen S. A technology and process analysis for contemporary identity management frameworks. 1-52. 2014 Full text if available conference paper Chowdhury MJMJKayes ASMKWatters PAScolyer-Gray PDNg ACDillon T. Patient Controlled, Privacy Preserving IoT Healthcare Data Sharing Framework. Proceedings of the 53rd Hawaii International Conference on System Sciences. 3700-3710. 2020 Full text if available Kayes ASMHammoudeh MBadsha SWatters PNg AMohammed FIslam M. Responsibility attribution against data breaches. 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT’20). 498-503. 2020 Full text if available Alkhalifah ANg AChowdhury MJMKayes ASMWatters PA. An Empirical Analysis of Blockchain Cybersecurity Incidents. 2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE). 2019 Full text if available Yao JNg AChen SLiu DFriedrich CNepal S. A performance evaluation of public cloud using TPC-C. Lecture Notes in Computer Science. 3-13. 2013 Full text if available McCombie SWatters PNg AWatson B. Forensic characteristics of phishing petty theft or organized crime?. WEBIST 2008 - 4th International Conference on Web Information Systems and Technologies, Proceedings. 149-157. 2008 Ng A. Towards a Table Driven XML QoS Aware Transmission Framework. 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). 1117-1123. 2007 Full text if available Chen SYan BZic JLiu RNg A. Evaluation and Modeling of Web Services Performance. 2006 IEEE International Conference on Web Services (ICWS'06). 437-444. 2006 Full text if available Ng A. Evaluation of the Serialisation and Deserialisation Performance of Table Driven XML. Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06). 178. 2006 Full text if available Ng A. Optimising Web services performance with table driven XML. Australian Software Engineering Conference (ASWEC'06). 100-109. 2006 Full text if available Ng ACPaul GShiping C. A Study of the Impact of Compression and Binary Encoding on SOAP Performance. Sixth Australasian Workshop on Software and System Architectures(AWSA2005). 2005 Ng AC. TDXML: Table Driven XML. Best Practices and Methodologies in Service-oriented Architectures: Paving the Way to Web-services Success Workshop. 2004 Ng ACPaul GShiping C. An evaluation of contemporary commercial soap implementations. Fifth Australian Workshop on Software and System Architectures (AWSA2004). 2004
investigator on A Multi-Objective, Multi-Constraint Modelling Approach for Energy Minimisation in Data Centres awarded by Specialised Lighting Solutions 2020 - 2021
teaching activities Cybersecurity Incident Management Developed course 2019 - CSE1ACF Cyber Algorithms That Changed the Future Developed course 2018 - CSE5ITP Information Technology Project Developed course 2018 - Cybersecurity Governance Taught course 2019 Cybersecurity Incident Management Taught course 2019 CSE5ITP Information Technology Projects Taught course 2018 CSE1ACF Cyber Algorithms That Changed the Future Taught course 2018 Professional Environment Taught course 2018
education and training PHD, Macquarie University 2002 - 2006 MTech (Software Engineering), Macquarie University 1997 - 1999