Staff Directory

Muhammad Usman

Contact Details

Qualifications

BS (CS), MS (CS) – Pakistan; PhD – Griffith University, Australia
Postdoc in Cyber Security & Machine Learning – University of Surrey, UK

- Intel Teach Program, 2009 – Intel Corporation, USAJNO-350, Certified Internet Specialist, (JNCIS-ER)
2009

- Juniper Networks, California, USA, JNO-330, Certified Internet Specialist (JNCIS-JES), 2009, Juniper Networks, California, USA

- JNO-400, Certified Internet Associate, (JNCIA-EX), 2009 – Juniper Networks, California, USA

- JNO-342, Certified Internet Associate (JNCIA-ER), 2009 -Juniper Networks, California, USA

- Database Management Systems (DBMS), 2007, Quaid-I-Azam University, Islamabad, Pakistan

- Computer Networking, 2006, Quaid-I-Azam University, Islamabad, Pakistan

- Linux System Administration, 2006, Pakistan Computer Bureau, Islamabad, Pakistan

- E-Commerce (Webpage Designing), 2003, Trade Training Centre, Islamabad, Pakistan

About

Muhammad Usman received the M.S. degree in Computer Science from PMAS Arid Agriculture University, Rawalpindi, Pakistan, with first class, and the Ph.D. degree in Information and Communication Technology with specialisation in Cyber Security from the School of Information and Communication Technology, Griffith University, Brisbane, Australia.

He was a Postdoctoral Research Fellow in cyber security and machine learning with the University of Surrey, Guildford, U.K. He possesses 17 years of experience during which he has held several academic and industrial positions in different parts of the globe, including Australia, Asia, and Europe. He has proven track record of providing leadership to IT staff and teaching teams. His current research interests include design and analysis of security, privacy and trust techniques for complex, smart and cross-discipleship systems; formal and statistical modelling; and applied machine learning and data analytics in several domains. He has authored or coauthored more than 40 research papers in international journals and conferences, including prestigious journals, such as the IEEE TRANSACTIONS ON CONSUMER ELECTRONICS; the IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS; and the IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, and a book focused on mobile agent-based anomaly detection and verification system for smart home sensor networks. He has successfully supervised over 25 postgraduate research and undergraduate project students and supervising Ph.D. students. He has been actively collaborating with top academics across the globe.

Dr. Usman has been a recipient of several research and travel grants. He has led and acted as a Guest Editor for special issues in several IEEE transactions. He has served in different leading capacities, such as a focal person, publication Chair, organising committee member and/or TPC member of several IEEE conferences. He is a member of COVID 19 Outbreak Expert Database of UK Parliament. He is a leading founding member of an international consortium of academics working on Healthcare and Cybersecurity Informatics, working in four continents: Australia, Asia, Europe and North America. He is also a member of Computer Science Teachers Association, endorsed by Association for Computing Machinery, USA. He is a Juniper certified networking and security specialist. His research paper has received the Best Paper Award in IEEE ComTech 2017.

Experience

- Senior Lecturer in Cyber Security Nov 2019 to date – Cyber Security, Faculty of Computing Engineering and Science, University of South Wales, United Kingdom

- Research Fellow (Cyber Security and Machine Learning) Oct 2018 to Nov 2019 – Department of Computer Science, University of Surrey, United Kingdom

- Assistant Professor Feb 2016 to Oct 2018 – Department of Computer Sciences, Quaid-i-Azam University, Pakistan

- Lecturer (Level A) Aug 2015 to Jan 2016 – School of Information and Communication Technology, Griffith University, Queensland, Australia

- Instructor Feb 2012- July 2015 – School of Information and Communication Technology, Griffith University, Queensland, Australia

- Lecturer March 2011- To – Jan 2012 – Faculty of Computer Science, King Khalid University, Abha, Aseer, Kingdom of Saudi Arabia

- Lecturer and Project Manager (Research Centre) Oct 2010 – To – Feb 2011 – Faculty of Information Technology, University of Central Punjab, Lahore, Punjab, Pakistan

- Lecturer and System Administrator – PAF Fazaia College, Lower Topa, Murree, Punjab, Pakistan

Responsibilities

- Teaching undergraduate and postgraduate courses (modules) focused on Cyber Security – currently teaching (i) Practical Application Security and (ii) Security and System Administration to Masters and Undergraduate students respectively
- Writing and biding for applied research grants focused on multiple domains, primarily focused on complex Cyber-Physical Systems such as IOT-enabled smart systems; healthcare systems; connected vehicular networks; aerospace systems; maritime systems; and others
- Supervising undergraduate and postgraduate students including PhD students
- Carry out editorial activities
- Involved in organisation of international conferences
- Administrative activities

Publications

Books/ Editorials
39. Guest Editorial: Security, Reliability, Privacy, and Quality in Industrial Automation and Control, M. Usman, et al., IEEE Transactions on Industry Applications, June 2020 (to appear).

38. Book: Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks,
M. Usman, V. Muthukkumarasamy, X.-W. Wu, and S. Khanum, Springer, 2018.

Journal
37. Closing the Loop in Feedback Driven Learning Environments Using Trust Decision Making and Utility Theory, K. Mahmud, M. Usman, M. A. Sindhu, A. Jolfaei and G. Srivastava, IEEE Transactions on Emerging Topics in Computational Intelligence, April 2020 (accepted).

36. Privacy Preserved Ranking of Industrial Sensing Services Using Topological Information, A. Hameed, M. Usman and O. Maqbool, IEEE Transactions on Industry Applications, March 2020 (in press).

35. A provably secure and efficient authenticated key agreement scheme for Energy Internet based Vehicle-to-Grid technology framework, A. Irshad, M. Usman, S. A. Chaudhry, H. Naqvi and M. Shafiq, IEEE Transactions on Industry Applications, January 2020 (in press).

34. An improved biometric Multi-Server Authentication Scheme for Chang et al. protocol, A. Irshad, S. Ashraf, M. Shafiq, M. Usman, and S. Kumari, Information Technology and Control, vol. X. No. x. 2019.

33. A provable and secure mobile user authentication Scheme for Mobile Cloud Computing Services, A. Irshad, S. A. Chaudhry, M. Shafiq, M. Usman, M. Asif and Anwer Ghani, International Journal of Communication Systems, vol. x. No. x. 2019.

32. Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme, A. Irshad, H. Naqvi, S. A. Chaudhary, M. Usman, M. Shafiq, O. Mir, and A. Kanwal, Information Technology and Control, Vol. 47, No. 3, 2018.

31. Trust Establishment and Estimation in Cloud Services: A Systematic Literature Review, K. Mahmud and M. Usman, Journal of Network and Systems Management, October 2018.

30. Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks, Muhammad Shafiq, Maqbool Ahmad, Azeem Irshad, Moneeb Gohar, Muhammad Usman, Muhammad Khalil Afzal, Heejung Yu, and Jin-Ghoo Choi, Sensors, vol. 18, June 2018.

29. An efficient and secure design of multi-server authenticated key agreement protocol, Azeem Irshad, Syed Husnain Abbas Naqvi, Shehzad Ashraf Chaudhary, Shoukat Raheem, Saru Kumari, Ambrina Kanwal, and Muhammad Usman, The Journal of Supercomputing, vol. x, pp. 1-27, July 2018.

28. Disease-Disease Association Using Network Modeling: Challenges and Opportunities, Zahra Batool, Muhammad Usman, Khalid Saleem, M. Abdullah-Al-Wadud, Fazal-e-Amin, Abdulhameed Al-Eliwi, Journal of Medical Imaging and Health Informatics, vol. 8, pp. 1-10, 2018.

27. An improved lightweight multi-server authentication scheme, Azeem Irshad, Shehzad Ashraf Chaudhary, Saru Kumari, Muhammad Usman, Khalid Mahmood, and Muhammad Shahzad Faisal, International Journal of Communication Systems, 4 July 2017.

26. Mobile Agent-based Cross Layer Anomaly Detection in Smart Home Sensor Networks, M. Usman,
V. Muthukkumarasamy, and X.-W. Wu, IEEE Transactions on Consumer Electronics, May 2015.

25. Specifications and Validation of Agent-based Anomaly Detection and Verification System for Resource Constrained Networks, M. Usman, V. Muthukkumarasamy, and X.-W. Wu, Journal of Networks, July 2015.

24. A Resource-Efficient System for Mobile Agent-based Anomaly Detection and Verification in Wireless Sensor Networks, M. Usman, V. Muthukkumarasamy, and X.-W. Wu, Journal of Networks, Vol. 9, No. 12, pp. 3427-3444, Dec. 2014.

23. Mobile Agent Based Hierarchical Intrusion Detection System in Wireless Sensor Networks S. Khanum,
M. Usman, and A. Alwabel, International Journal of Computer Science Issues (IJCSI), vol. 9, iss. 1, January 2012.

22. Performance Evaluation of Group Mobility in Mobile Ad hoc Networks, E. Irshad, W. Noshairwan,
M. Shafiq, S. Khurram, A. Irshad, and M. Usman, International Journal of Future Generation Communication and Networking, pp. 13-22, vol. 4, no. 1, 2011.

21. Security Enhancement in MANET Authentication by checking the CRL Status of Servers, A. Irshad,
W. Noshairwan, M. Shafiq, S. Khurram, E. Irshad, and M. Usman, International Journal of Advanced Science & Technology (IJAST), Korea, 2008.

Conference/ Workshop:
20. Security Hardening for Implantable Cardioverter Defibrillators, I. Jaffar, M. Usman, and A. Jolfaei, Special Session on Security Hardening of Industrial IoT Systems in 20th IEEE international conference on industrial technology, IEEE-ICIT, 2019.

19. Elective Learning Objects Group Recommendation Using Non-Cooperative Game Theory, A. Zia and
M. Usman, 16th IEEE International Conference on Frontiers of Information Technology (FIT), 17-19 December 2018.

18. E-HOSA: Extended-Hybrid Optical Switch Architecture for Cloud Computing Data Centers, S. Lone and M. Usman, 16th IEEE International Conference on Frontiers of Information Technology (FIT), 17-19 December 2018.

17. Sum-of-the-Parts Valuation-based Scheduling of Parallel Applications over Global Grid, A. Hameed and
M. Usman, Frontiers of Information Technology (FIT), Islamabad, Pakistan, 18-20 December 2017.

16. Dynamic Trust Evaluation of Learning Objects, K. Mehmood and M. Usman, International Conference on Communications Technologies (ComTech – 2017), pp. 195-200, Rawalpindi, Pakistan, April 2017. (Best Paper Award)

15. Anomaly Detection in Wireless Sensor Network: Challenges and Future Trends, M. Usman,
V. Muthukkumarasamy, X-W. Wu, S. Khanum, Book chapter, Security for Multihop Wireless Networks, Auerbach publications, Taylor & Francis Group, pp. 273-304, USA, 2014.

14. Agent-enabled Anomaly Detection in Resource Constrained Wireless Sensor Networks, M. Usman, in proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1-2, Sydney, Australia, June 2014.

13. Formal Verification of Mobile Agent Based Anomaly Detection in Wireless Sensor Networks,
M. Usman, V. Muthukkumarasamy, X-W. Wu, in proceedings of the IEEE 38th conference on Local Computer Networks (LCN Workshops), pp. 1001-1009, Sydney, Australia, October 2013.

12. Efficient Clique Based Clustering and Routing Mechanism in Wireless Sensor Networks, K. Biswas,
V. Muthukkumarasamy, E. Sithirasenan, and M. Usman, in proceedings of the 9th IEEE International Wireless Communications and Mobile Computing Conference, (IWCMC), pp. 171-176, Sardinia, Italy, July 2013.

11. Securing Mobile Agent Based Wireless Sensor Network Applications on Middleware, M. Usman,
V. Muthukkumarasamy, X.-W. Wu, and S. Khanum, IEEE 12th International Symposium on Communication and Information Technology (ISCIT), Gold Coast, Australia, October 2012.

10. Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection, M. Usman,
V. Muthukkumarasamy, X.-W. Wu, and S. Khanum, in proceedings of the IEEE 9th conference on Ubiquitous intelligence and Computing (UIC), pp. 322-329, Japan, September 2012.

9. An Optimal Mutual Authentication Scheme in GSM Networks, A. Haleem and M. Usman, in proceedings of the IEEE International Conference on Information and Communication Technologies (ICICT), pp. 1-5, Karachi, Pakistan, July 2011.

8. Hash-chain based peer-peer key management and establishment of Security Associations in MANETS,
A. Irshad, S. M. Gilani, S. Khurram, M. Shafiq, A. W. Khan, M. Usman, in proceedings of the IEEE International Conference on Information and Emerging Technologies (ICIET), pp. 1-6, Karachi, Pakistan, 2010.

7. Performance Evaluation of Authentication Certificate Based Seamless Vertical Handoff in GPRS- WLAN, M. Usman, S. Khanum, W. Noshairwan, E. Irshad, and A. Irshad High Performance Computing and Applications (HPCA), LNCS, Springer-Verlag, pp. 384-389, 2010.

6. Energy-Efficient Intrusion Detection System for Wireless Sensor Network Based on MUSK Architecture, S. Khanum, M. Usman, K. Hussain, R. Zafar, and M. Sher, High Performance Computing and Applications (HPCA), LNCS, Springer-Verlag, pp. 212–217, 2010.

5. Certificate Chain based Authentication in MANETS using 4th generation Technologies, A. Irshad,
W. Noshairwan, M. Shafiq, A. W. Khan, M. Usman, and E. Irshad, in proceedings of the IEEE 2nd International Conference on Computer Science and Information Technology (ICCSIT), pp. 518-523, Beijing, China, August 2009.

4. Authentication of Nodes among Different Symmetric Key Groups in MANETs using 4G Technologies,
A. Irshad, W. Noshairwan, M. Rashid, S. M. Gilani, E. Irshad, and M. Usman, in proceedings of the IEEE International Conference on Computer Engineering and Technology (ICCET), pp. 261-265, Singapore, Jan 2009.

3. A Secure interaction among nodes from different MANET Groups using 4G technologies, A. Irshad,
M. Shafiq, A. Rahman, S. Khurram, M. Usman, and E. Irshad, Oct 2009, In proceedings of the IEEE International Conference on Emerging Technologies (ICET), pp. 476-481, Rawalpindi, Pakistan, 2009.

2. Seamless vertical handoff using Authentication Certificate in GPRS-WLAN tightly coupled integrated networks, M. Usman, W. Noshairwan, M. Gilani, A. Irshad, and E. Irshad, in proceedings of the 4th IEEE International Conference on Emerging Technologies, pp. 199-204, Pakistan, 2008.

1. Group Mobility in Mobile Ad hoc Networks, E. Irshad, W. Noshairwan, M. Usman, A. Irshad,
M. Gilani WWW/Internet, IADIS, pp. 1-5, Germany, 13-15 Oct 2008.

Memberships

- Member Network Security Research Group, Griffith University, Australia
- Member Computer Science Teachers Association endorsed by ACM, USA
- Certified Networking and Security Specialist, Juniper Networks, USA

External

Honors and Awards:
- Best Research Paper Award in IEEE ComTech 2017, Research paper titled as “Dynamic Trust Evaluation of Learning objects” co-authored with Ms. Kanwal Mahmud won the best paper award in the IEEE ComTech 2017 conference.

- Griffith University International Postgraduate Research Scholarship (GUIPRS) for PhD 2012-2015, Honoured with highly competitive GUIPRS (tuition fee) scholarship to pursue PhD studies from a well accredited Australian University

- Griffith University Postgraduate Research Scholarship (GUPRS) for PhD 2012-2015, Honoured with highly competitive GUPRS (living stipend) scholarship to pursue PhD studies from a well accredited Australian university
Conference Travel Grant – WoWMoM 2014 2014

- Awarded with conference travel grant amounting to 906AUD by School of ICT, Griffith University, Australia in Semester 1, 2014, Conference Travel Grant – 38th LCN 2013

- Awarded with conference travel grant amounting to 450AUD by School of ICT, Griffith University, Australia in Semester 2, 2013, Professional Certifications

- 1st Position in Computer Networks Group of MS (CS) 2006-2009

- 1st position in Computer Networks Group in MS (CS)

- Vice Chancellor Merit Scholarship 2nd Semester of MS (Computer Science)

- Vice Chancellor Merit Scholarship in 2nd Semester of MS (CS) by scoring 4.0/4.0 GPA

- Academic Standing Last three semesters of MS (Computer Science)

- Scored three consecutive 4/4 GPAs in last three semesters of MS (CS)

Consultancy

• Member of COVID 19 Outbreak Expert Database of UK Parliament
• Member of Recruitment Panel of ICT executive and lower level staff at Islamabad High Court, Pakistan
• Advisor to Recruitment Panels of several ICT and Cyber Security Companies
• Free Lance Consultant Cyber Security

Research

Funded Projects:
1. SPEAR: Secure and PrivatE smart gRid (October 2018 – October 2019)
o Dr. Muhammad Usman (Research Fellow) with Principal Investigator, Dr. Emmanouil (Manos) Panaousis (University of Surrey, United Kingdom)
o A large European Union Funded Project under the H2020 program
o The project is being run by a consortium of 17 (7 higher education and 10 industry) partners from 11 European countries
o Amount: Several Hundred Thousand Euros

2. Design and Analysis of Web Services Ranking Methods for Internet of Things (2017 – 2018)
o Dr. Muhammad Usman, Principal Investigator, and Dr. Onaiza Maqbool, Co-Principal Investigator
o Amount: PKR 0.477 million
o Funded by Higher Education Commission of Pakistan

3. Data Leak Prevention (2017 – 2018)
o Dr. Muddassar Azam Sindhu, Principal Investigator, Dr. Muhammad Usman, Co-Principal Investigator, and Dr. Onaiza Maqbool, Co-Principal Investigator
o Amount: PKR 0.15 million
o Funded by a Public Sector Organization

4. Code Vulnerability Scanner for Java Language (2017 – 2018)
o Dr. Muddassar Azam Sindhu, Principal Investigator, Dr. Muhammad Usman, Co-Principal Investigator, and Dr. Onaiza Maqbool, Co-Principal Investigator
o Amount: PKR 0.15 million
o Funded by a Public Sector Organization

5. Code Vulnerability Scanner for C Language (2017 – 2018)
o Dr. Muddassar Azam Sindhu, Principal Investigator, Dr. Muhammad Usman, Co-Principal Investigator, and Dr. Onaiza Maqbool, Co-Principal Investigator
o Amount: PKR PKR 0.15 million
o Funded by a Public Sector Organization

Editorial Activities:
- Special Issue on Computational Intelligence for Human in the Loop Cyber Physical Systems – IEEE Transactions on Emerging Topics in Computational Intelligence (Expected Publication Date: end of 2020/ early 2021)
Editorial Team: Alireza Jolfaei, Macquarie University, Australia; Muhammad Usman, University of South Wales, United Kingdom; Manuel Roveri, Politecnico di Milano, Milano, Italy; Michael Sheng, Macquarie University, Australia; Marimuthu Palaniswami, University of Melbourne, Australia; Krishna Kant, Temple University, USA

- Special Issue on Security, Reliability, Privacy, and Quality in Industrial Automation and Control – IEEE Transactions on Industry Applications (Expected Publication Date: second half of 2020) – Editorial Team: Muhammad Usman, University of South Wales, United Kingdom; Alireza Jolfaei, Macquarie University, Australia; Iqbal Gondal, Federation University, Australia; Krishna Kant, Temple University, USA; Anurag Srivastava, Washington State University, Pullman, USA; Sukumar Kamalasadan, University of North Carolina, Charlotte, USA

Areas of Expertise

My current areas of interest are listed below:
- Security and Privacy Issues of Cyber-Physical Systems
- Security and Privacy Issue of IoT-Enabled and Smart Systems
- Security, Trust and Privacy of cross-discipline domains
- Formal and Statistical Modelling
- Applied Machine Learning and Data Analytics in several domains such as health, social science, etc.

If you are a journalist on deadline and you need to speak with a member of university staff with particular expertise, please contact the Press Office.