Menu
CQUniversity Profiles
CQUniversity Profiles
Search Find an Expert Sign In
Publications
Journal article
Blockchain-based secured data sharing in healthcare: A systematic literature review

Tariq, U. U., Sabrina, F., Rashid, M. D. M., Gordon, S., Lin, Y., Wang, Z., & Azad, S. (2025). Blockchain-based secured data sharing in healthcare: A systematic literature review. IEEE Access, 13, 45415-45435. doi:10.1109/access.2025.3547953


An online parsing framework for semi-structured streaming system logs of Internet of Things systems

Bhattacharya, S., Ray, B., Chugh, R., & Gordon, S. (2023). An online parsing framework for semi-structured streaming system logs of Internet of Things systems. IEEE Open Journal of Instrumentation and Measurement, 2(2023), 1-18. doi:10.1109/ojim.2022.3232650


Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications

Rashid, M. M., Kamruzzaman, J., Mehedi Hassan, M., Imam, T., Wibowo, S., Gordon, S., & Fortino, G. (2022). Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications. Computers and Security, 120, 1-13. doi:10.1016/j.cose.2022.102783


An interpretable artificial intelligence based smart agriculture system

Sabrina, F., Sohail, S., Farid, F., Jahan, S., Ahamed, F., & Gordon, S. (2022). An interpretable artificial intelligence based smart agriculture system. Computers, Materials and Continua, 72(2), 3777-3797. doi:10.32604/cmc.2022.026363


A tree-based stacking ensemble technique with feature selection for network intrusion detection

Rashid, M., Kamruzzaman, J., Imam, T., Wibowo, S., & Gordon, S. (2022). A tree-based stacking ensemble technique with feature selection for network intrusion detection. Applied Intelligence, 52(9), 9768-9781. doi:10.1007/s10489-021-02968-1


Cyberattacks detection in iot-based smart city applications using machine learning techniques

Rashid, M. M., Kamruzzaman, J., Hassan, M. M., Imam, T., & Gordon, S. D. (2020). Cyberattacks detection in iot-based smart city applications using machine learning techniques. International Journal of Environmental Research and Public Health, 17(24), 1-21. doi:10.3390/ijerph17249347


Midpoint relay selection using social trust and battery level to enhance throughput in cooperative device-to-device communications

Khwakhali, U. S., Suksompong, P., & Gordon, S. D. (2020). Midpoint relay selection using social trust and battery level to enhance throughput in cooperative device-to-device communications. Sensors (Switzerland), 20(21), 1-32. doi:10.3390/s20216007


Base station assisted relay selection in device-to-device communications

Khwakhali, U. S., Suksompong, P., & Gordon, S. D. (2020). Base station assisted relay selection in device-to-device communications. International Journal of Ad Hoc and Ubiquitous Computing, 33(1), 22-35. doi:10.1504/IJAHUC.2020.104711


Implementing a peer-support programme by group videoconferencing for isolated carers of people with dementia

Banbury, A. E., Parkinson, L., Gordon, S. D., & Wood, D. L. (2019). Implementing a peer-support programme by group videoconferencing for isolated carers of people with dementia. Journal of Telemedicine and Telecare, 25(9), 572-577. doi:10.1177/1357633X19873793


Safety message verification using history-based relative-time zone priority scheme

Banani, S., Kittipiyakul, S., Thiemjarus, S., & Gordon, S. D. (2019). Safety message verification using history-based relative-time zone priority scheme. Journal of Computer Networks and Communications, 2019, 1-14. doi:10.1155/2019/8568912


Verifying safety messages using relative-time and zone priority in vehicular ad hoc networks

Banani, S., Gordon, S., Thiemjarus, S., & Kittipiyakul, S. (2018). Verifying safety messages using relative-time and zone priority in vehicular ad hoc networks. Sensors, 18(4), 1-21. doi:10.3390/s18041195


Recursive matrix oblivious RAM: An ORAM construction for constrained storage devices

Gordon, S., Huang, H., Miyaji, A., Su, C., Sumongkayothin, K., & Wipusitwarakun, K. (2017). Recursive matrix oblivious RAM: An ORAM construction for constrained storage devices. IEEE Transactions on Information Forensics and Security, 12(12), 3024-3038. doi:10.1109/TIFS.2017.2730584


A matrix based ORAM: Design, implementation and experimental analysis

Gordon, S., Miyaji, A., Su, C., & Sumongkayothin, K. (2016). A matrix based ORAM: Design, implementation and experimental analysis. IEICE Transactions on Information and Systems, E99.D(8), 2044-2055. doi:10.1587/transinf.2015INP0012


Recursive M-ORAM: A matrix ORAM for clients with constrained storage space

Sumongkayothin, K., Gordon, S., Miyaji, A., Su, C., & Wipusitwarakun, K. (2016). Recursive M-ORAM: A matrix ORAM for clients with constrained storage space. Communications in Computer and Information Science, 651, 130-141. doi:10.1007/978-981-10-2741-3_11


A framework for dynamically selecting gain in LEDBAT algorithm for high speed networks

Abu, A. J., & Gordon, S. (2011). A framework for dynamically selecting gain in LEDBAT algorithm for high speed networks. Information Technology Journal, 10(2), 358-366. doi:10.3923/itj.2011.358.366


Performance of handovers between NEMO and mobile Ad Hoc networks using buffering

Thaenthong, J., & Gordon, S. (2011). Performance of handovers between NEMO and mobile Ad Hoc networks using buffering. IEICE Transactions on Communications, E94-B(10), 2763-2775. doi:10.1587/transcom.E94.B.2763


Delay and packet loss analysis for handovers between MANETs and NEMO networks

Thaenthong, J., & Gordon, S. (2009). Delay and packet loss analysis for handovers between MANETs and NEMO networks. World Academy of Science, Engineering and Technology: International Journal of Computer and Information Engineering, 3(8), 2118-2123. Retrieved from https://waset.org/


Analysing a missile simulator with coloured Petri nets

Gordon, S. D., & Billington, J. (1998). Analysing a missile simulator with coloured Petri nets. International Journal on Software Tools for Technology Transfer, 2(2), 144-159. doi:10.1007/s100099800001


Conference paper
Online machine learning-based anomaly detection in Internet of Things applications

Rashid, M. D. M., Sabrina, F., Imam, T., Ray, B., Gordon, S., Morshed, A., & Wibowo, S. (2023). Online machine learning-based anomaly detection in Internet of Things applications. In Proceedings of The IEEE CSDE (pp. 306-310). Piscataway, NJ: IEEE. doi:10.1109/CSDE59766.2023.10487703


Empowering patients to delegate and revoke access to blockchain-based electronic health records

Sabrina, F., Sahama, T., Rashid, M. M., & Gordon, S. (2023). Empowering patients to delegate and revoke access to blockchain-based electronic health records. In Proceedings of 2023 Australian Computer Science Week (ACSW 2023) (pp. 66-71). New York, NY: ACM. doi:10.1145/3579375.3579384


An integrated framework for evaluating cloud technology adoption in Australian local councils

Balasooriya, P., Wibowo, S., Wells, M., & Gordon, S. (2022). An integrated framework for evaluating cloud technology adoption in Australian local councils. In Proceedings: 2022 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM) (pp. 60-64). Piscataway, NJ: IEEE. doi:10.1109/CCEM57073.2022.00018


Anomaly Detection in IoT Applications Using Deep Learning with Class Balancing

Rashid, M. M., Sabrina, F., Ray, B., Morshed, A., Steven, G., & Wibowo, S. (2022). Anomaly Detection in IoT Applications Using Deep Learning with Class Balancing. In Proceedings of the IEEE CSDE (pp. 643-648). Piscataway, NJ: IEEE. Retrieved from https://ieeexplore.ieee.org/document/10089252


Performance enhancement of intrusion detection system using bagging ensemble technique with feature selection

Rashid, M. M., Kamruzzaman, J., Ahmed, M., Islam, N., Wibowo, S., & Gordon, S. D. (2020). Performance enhancement of intrusion detection system using bagging ensemble technique with feature selection. In 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) (pp. 1-5). Piscataway, NJ: IEEE. doi:10.1109/CSDE50874.2020.9411608


A sustainable connectivity model of the Internet access technologies in rural and low-income areas

Villapol, M. E., Liu, W., Gutierrez, J., Qadir, J., Gordon, S., Tan, J., . . . Zhang, W. (2018). A sustainable connectivity model of the Internet access technologies in rural and low-income areas. In P. H. J. Chong, B. -C. Seet, M. Chai, & S. U. Rehman (Eds.), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Vol. LNICST 245 (pp. 93-102). Cham, Switzerland: Springer. doi:10.1007/978-3-319-94965-9_10


Social-aware relay selection for device to device communications in cooperative cellular networks

Khwakhali, U. S., Gordon, S. D., & Suksompong, P. (2017). Social-aware relay selection for device to device communications in cooperative cellular networks. In 2017 International Electrical Engineering Congress (iEECON) (pp. 1-4). Piscataway, NJ: IEEE. doi:10.1109/IEECON.2017.8075812


Analysis of adaptive multi-hop time synchronization in large wireless sensor networks

N. Sangjumpa., S. Gordon., & K. Kaemarungsi. (2016). Analysis of adaptive multi-hop time synchronization in large wireless sensor networks. In Proceedings: 7th International Conference of Information and Communication Technology for Embedded Systems 2016 (IC-ICTES 2016) (pp. 79-84). Piscataway, NJ: Institute of Electrical and Electronic Engineers. doi:10.1109/ICTEmSys.2016.7467126


Recursive M-ORAM: A matrix ORAM for clients with constrained storage space

Sumongkayothin, K., Gordon, S., Miyaji, A., Su, C., & Wipusitwarakun, K. (2016). Recursive M-ORAM: A matrix ORAM for clients with constrained storage space. In L. Batten, & G. Li (Eds.), Communications in Computer and Information Science (pp. 130141-141). Singapore: Springer. Retrieved from https://link.springer.com/book/10.1007/978-981-10-2741-3


Security and experimental performance analysis of a matrix ORAM

Gordon, S., Miyaji, A., Su, C., & Sumongkayyothin, K. (2016). Security and experimental performance analysis of a matrix ORAM. In Proceedings of the 2016 IEEE International Conference on Communications (ICC 2016) (pp. 3280-3285). Piscataway, NJ: IEEE. doi:10.1109/ICC.2016.7511195


A proxy-based passive duplicate address detection protocol for IPv6 wireless sensor networks

D. Blouin., & S. Gordon. (2015). A proxy-based passive duplicate address detection protocol for IPv6 wireless sensor networks. In Proceedings IEEE International Conference on Control System, Computing and Engineering (ICCSCE) (pp. 248-253). Piscataway, NJ: IEEE. doi:10.1109/ICCSCE.2015.7482192


Analysis of path ORAM toward practical utilization

Gordon, S., Miyaji, A., Su, C., & Sumongkayyothin, K. (2015). Analysis of path ORAM toward practical utilization. In L. Barolli, M. Takizawa, H. Hsu, T. Enokido, & F. Xhafa (Eds.), Proceedings: 2015 18th International Conference on Network-Based Information Systems (pp. 646-651). Piscataway, NJ: IEEE. doi:10.1109/NBiS.2015.113


iACK: Implicit acknowledgements to improve multicast reliability in wireless sensor networks

K. Tharatipayakul., S. Gordon., & K. Kaemarungsi. (2014). iACK: Implicit acknowledgements to improve multicast reliability in wireless sensor networks. In Proceedings of the International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) (pp. 229-234). Piscataway, NJ.: IEEE. doi:10.1109/ECTICon.2014.6839749


Selecting basic safety messages to verify in VANETs using zone priority

S. Banani., & S. Gordon. (2014). Selecting basic safety messages to verify in VANETs using zone priority. In Proceedings of the the 20th Asia-Pacific Conference on Communication (APCC2014) (pp. 423-428). Piscataway, New Jersey: IEEE. doi:10.1109/APCC.2014.7092849


Impact of delay variability on LEDBAT performance

Abu, A. J., & Gordon, S. (2011). Impact of delay variability on LEDBAT performance. In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (pp. 708-715). Piscataway, NJ: IEEE. doi:10.1109/AINA.2011.98


Transforming state tables to coloured petri nets for automatic verification of internet protocols

S. Choosang., & S. Gordon. (2011). Transforming state tables to coloured petri nets for automatic verification of internet protocols. In Proceedings International Joint Conference on Computer Science and Software Engineering (pp. 69-74). Piscataway, NJ: IEEE. doi:10.1109/JCSSE.2011.5930096


A dynamic algorithm for stabilising LEDBAT congestion window

Abu, A. J., & Gordon, S. (2010). A dynamic algorithm for stabilising LEDBAT congestion window. In 2010 Second International Conference on Computer and Network Technology (pp. 157-161). Piscataway, NJ: IEEE. doi:10.1109/ICCNT.2010.37


Performance analysis of BitTorrent and its impact on real-time video applications

Abu, A. J., & Gordon, S. D. (2009). Performance analysis of BitTorrent and its impact on real-time video applications. In B. Papasratorn, W. Chutimskul, K. Porkaew, & V. Vanijja (Eds.), Advances in information technology: Third international conference, IAIT 2009: proceedings Vol. 55 CCIS (pp. 1-10). Berlin, Germany: Springer. doi:10.1007/978-3-642-10392-6_1


Formal analysis of PANA authentication and authorisation protocol

Gordon, S. (2008). Formal analysis of PANA authentication and authorisation protocol. In Proceedings: Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies (pp. 277-284). Los Aamitos, California: IEEE Computer Society. doi:10.1109/PDCAT.2008.12


A flow based detection mechanism against flooding attacks in mobile ad hoc networks

Guo, Y., Gordon, S., & Perreau, S. (2007). A flow based detection mechanism against flooding attacks in mobile ad hoc networks. In 8th IEEE Wireless Communications and Networking Conference (WCNC 2007) (pp. 3107-3112). Piscataway, NJ: IEEE. doi:10.1109/WCNC.2007.574


A Flow Based Detection Mechanism against Flooding Attacks in Mobile Ad Hoc Networks

Y. Guo., S. Gordon., & S. Perreau. (2007). A Flow Based Detection Mechanism against Flooding Attacks in Mobile Ad Hoc Networks. In 2007 IEEE Wireless Communications and Networking Conference (pp. 3105-3110).


A general framework for context transfer in mobile IP networks

Duong, H., Dadej, A., & Gordon, S. D. (2006). A general framework for context transfer in mobile IP networks. In VTC2006-Spring, Melbourne: 2006 IEEE 63rd Vehicular Technology Conference Vol. 2 (pp. 1017-1021). Piscataway, NJ: IEEE. doi:10.1109/VETECS.2006.1682978


Analysing the WAP class 2 Wireless Transaction Protocol using coloured petri nets

Gordon, S. D., & Billington, J. (2000). Analysing the WAP class 2 Wireless Transaction Protocol using coloured petri nets. In M. Nielsen, & D. Simpson (Eds.), Application and theory of Petri nets 2000: 21st international conference: ICATPN 2000 Vol. LNCS 1825 (pp. 207-226). Berlin: Springer Verlag. Retrieved from https://link.springer.com/chapter/10.1007/3-540-44988-4_13


Avoiding bottlenecks due to traffic aggregation at relay nodes in multi-hop wireless networks

Ngo, B., & Gordon, S. D. (2005). Avoiding bottlenecks due to traffic aggregation at relay nodes in multi-hop wireless networks. In 2005 Asia-Pacific Conference on Communication (pp. 769-773). Piscataway, NJ: IEEE. doi:10.1109/APCC.2005.1554166


Design of high capacity wireless LANs based on 802.11b technology

Gordon, S., & Dadej, A. (2003). Design of high capacity wireless LANs based on 802.11b technology. In C. McDonald (Ed.), Converged networking: Data and real-time communications over IP: IFIP TC6/WG6.2 Sixth International Symposium on Communications Interworking (Interworking 2002) Vol. IFIPAICT 119 (pp. 133-144). Boston, MA: Springer New York LLC. doi:10.1007/978-0-387-35673-0


Hybrid quality of service architecture for wireless/mobile environment

Zheng, L., Dadej, A., & Gordon, S. D. (2003). Hybrid quality of service architecture for wireless/mobile environment. In C. McDonald (Ed.), Converged networking: Data and real-time communications over IP: IFIP TC6/WG6.2 Sixth International Symposium on Communications Interworking (Interworking 2002) Vol. IFIPAICT 119 (pp. 341-352). Boston, MA: Springer New York LLC. doi:10.1007/978-0-387-35673-0


Modelling the WAP transaction service using coloured petri nets

Gordon, S. D., & Billington, J. (1999). Modelling the WAP transaction service using coloured petri nets. In H. V. Leong, W. -C. Lee, B. Li, & L. Yin (Eds.), Mobile data acces: first international conference, MDA '99: proceedings Vol. LCNS 1748 (pp. 109-118). Berlin: Springer Verlag. Retrieved from https://link.springer.com/chapter/10.1007/3-540-46669-X_10


Proactive context transfer in WLAN-based access networks

Duong, H. H., Dadej, A., & Gordon, S. D. (2004). Proactive context transfer in WLAN-based access networks. In WMASH 2004: Proceedings of the Second ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots: co-located with MobiCom 2004 (pp. 61-70). New York, NY: Association for Computing Machinery. Retrieved from https://www.scopus.com/


Ranger, a novel intrusion detection system architecture for mobile ad hoc networks

Guo, Y., & Gordon, S. D. (2005). Ranger, a novel intrusion detection system architecture for mobile ad hoc networks. In TENCON 2005 - 2005 IEEE Region 10: Incorporating ATNAC 2005 (pp. 1-6). Piscataway, NJ: IEEE. doi:10.1109/TENCON.2005.301191


Using rate balancing to improve throughput in a wireless multi-hop chain topology

Ngo, B., Gordon, S. D., & Duong, H. (2005). Using rate balancing to improve throughput in a wireless multi-hop chain topology. In TENCON 2005 - 2005 IEEE Region 10: Incorporating ATNAC 2005 (pp. 1-6). Piscataway, NJ: IEEE. doi:10.1109/TENCON.2005.301197


Using relay balance and AQM schemes to improve performance in multi-hop wireless networks

Ngo, B., Gordon, S., & Jayasuriya, A. (2007). Using relay balance and AQM schemes to improve performance in multi-hop wireless networks. In Proceedings of IEEE Wireless Communications and Networking Conference (WCNC 2007), 11 -15 March 2007, Kowloon, Hong Kong. (pp. 879-884). New York: IEEE. doi:10.1109/WCNC.2007.167


Verification of a revised WAP wireless transaction protocol

Gordon, S., Kristensen, L. M., & Billington, J. (2002). Verification of a revised WAP wireless transaction protocol. In J. Esparza, & C. Lakos (Eds.), Application and theory of Petri nets 2002: 23rd International Conference: proceedings Vol. LNCS 2360 (pp. 182-202). Berlin: Springer. Retrieved from https://link.springer.com/chapter/10.1007/3-540-48068-4_12


Weighted fairness for flows in wireless mesh networks

Gordon, S., Ngo, B., & Jayasuriya, A. (2007). Weighted fairness for flows in wireless mesh networks. In Proceedings of Asia-Pacific Conference on Communications, 2007, 18-20 Oct. 2007, Bangkok, Thailand. (pp. 127-130). New York: IEEE. doi:10.1109/APCC.2007.4433516


Book chapter
Cloud effects on organisational performance: A local government perspective

Balasooriya, P., Wibowo, S., Wells, M., & Gordon, S. (2022). Cloud effects on organisational performance: A local government perspective. In S. R. Pokhrel, M. Yu, & G. Li (Eds.), Applications and techniques in information security: 12th international conference, ATIS 2021 Virtual Event, December 16–17, 2021 Revised selected papers (Vol. 1554 CCIS, pp. 149-156). Singapore: Springer. doi:10.1007/978-981-19-1166-8_12


Adaptive midpoint relay selection: Enhancing throughput in D2D communications

Khwakhali, U. S., Suksompong, P., & Gordon, S. D. (2020). Adaptive midpoint relay selection: Enhancing throughput in D2D communications. In R. Lee (Ed.), Software engineering, artificial intelligence, networking and parallel/distributed computing (Vol. 850, pp. 191-207). Cham, Switzerland: Springer-Verlag London Ltd.. doi:10.1007/978-3-030-26428-4_13


Caring for carers of people with dementia: A protocol for harnessing innovation through deploying leading edge technologies to enable virtual support groups and services

Parkinson, L., Banbury, A. E., Livingstone, A., Gordon, S., Ray, B., Byrne, L. C., . . . Wood, D. L. (2018). Caring for carers of people with dementia: A protocol for harnessing innovation through deploying leading edge technologies to enable virtual support groups and services. In M. E. L. van den Berg, & A. J. Maeder (Eds.), Telehealth for our Ageing Society: Selected papers from Global Telehealth 2017 (Vol. 246, pp. 29-41). Amsterdam, Netherlands: IOS Press. doi:10.3233/978-1-61499-845-7-29


M-ORAM: A matrix ORAM with Log N bandwidth cost

Gordon, S., Miyaji, A., Su, C., & Sumongkayothin, K. (2016). M-ORAM: A matrix ORAM with Log N bandwidth cost. In H. Kim, & D. Choi (Eds.), Information Security Applications: 16th International Workshop, WISA 2015
Jeju Island, Korea, August 20–22, 2015 Revised Selected Papers
(Vol. 9503, pp. 3-15). Cham, Switzerland: Springer-Verlag London Ltd.. doi:10.1007/978-3-319-31875-2_1