Phd (Information Security), MSc (Information Security), MSc (Computer Science), BSc (Mathematics, Physics)
Senior Lecturer
- About
-
- Email Address
- raja.akram@abdn.ac.uk
- School/Department
- School of Natural and Computing Sciences
Biography
I joined the Department of Computer Science as Senior Lecturer in July 2020.
Previously, I have worked as Post Doctoral research assistant at the Information Security Group (ISG), Royal Holloway, University of London. During my time at ISG, I was involved with the research projects related to Data Control and Compliance, digital avionics, EMV and decentralised payment systems, transport ticketing and mobile contactless transactions. Previously, I have worked as Research Fellow at the Cyber Security Lab, Department of Computer Science, University of Waikato, New Zealand. At the Cyber Security Lab, I am involved with the user centric security and privacy paradigms. Before joining the University of Waikato, I worked as a Senior Research Fellow at Edinburgh Napier University. During my work at the Edinburgh Napier University, I worked on the RatTrap project. The RatTrap project designed a suite of preventive technologies to avoid online fraud - especially in the online affiliate marketing. I got my PhD in Information Security from Royal Holloway, University of London. I completed my MSc Information Security at Royal Holloway, University of London in September 2007. I also have MSc Computer Science from the University of Agriculture, Faisalabad and B.Sc (Mathematics, Physics and Geography) from the University of the Punjab, Lahore.
My current research interests revolve around the user centric applied security and privacy architectures, data ownership and control in a heterogeneous computing environment, security for machine learning and machine learning for security. In addition, I am also interested in smart card security, secure cryptographic protocol design and implementation, smartphone and IoT security, trusted platform architecture, trusted/secure execution environment and security & privacy issues in emerging technologies like blockchain, UAVs/Drone and autonomous vehicles.
Latest Publications
SoK: Towards Privacy-Centric Collaborative Machine Learning—A Classification Framework for Privacy Solutions
SN Computer ScienceContributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1007/s42979-025-04482-4
DECML: Distributed Edge Consensus Machine Learning Framework
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsEnhancing diagnosis: ensemble deep-learning model for fracture detection using X-ray images
Clinical Radiology, vol. 79, no. 11, pp. e1394-e1402Contributions to Journals: Articles- [ONLINE] DOI: https://doi.org/10.1016/j.crad.2024.08.006
- [OPEN ACCESS] http://aura.abdn.ac.uk/bitstreams/e4decd7d-7217-4aa0-a23d-6dab9fb603db/download
- [ONLINE] View publication in Scopus
CO-TSM: A Flexible Model for Secure Embedded Device Ownership and Management
Smart Cities, vol. 7, no. 5, pp. 2887-2909Contributions to Journals: ArticlesUsing Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study
IEEE Access, vol. 12, pp. 150372 - 150386Contributions to Journals: Articles
- Teaching
-
Programmes
- Postgraduate, 3 semester, September start
- Publications
-
Page 6 of 10 Results 51 to 60 of 96
Log Your Car: Reliable Maintenance Services Record
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-54705-3_30
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks
Chapters in Books, Reports and Conference Proceedings: Conference ProceedingsAn efficient, secure and trusted channel protocol for avionics wireless networks
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/DASC.2016.7777967
Security and performance comparison of different secure channel protocols for Avionics Wireless Networks
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/DASC.2016.7777966
A secure and trusted boot process for Avionics Wireless Networks
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/ICNSURV.2016.7486322
Challenges of security and trust of mobile devices as digital avionics component
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/ICNSURV.2016.7486323
Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1145/2899015.2899029
Secure Application Execution in Mobile Devices
The New Codebreakers. Ryan, P. A., Naccache, D., Quisquater, J. (eds.). Springer, pp. 417-438, 22 pagesChapters in Books, Reports and Conference Proceedings: Chapters- [ONLINE] DOI: https://doi.org/10.1007/978-3-662-49301-4_26
Secure and Trusted Application Execution on Embedded Devices
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1007/978-3-319-27179-8_1
A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags
Chapters in Books, Reports and Conference Proceedings: Conference Proceedings- [ONLINE] DOI: https://doi.org/10.1109/Trustcom.2015.426