Charles Sturt University
Charles Sturt University

Dr Quazi Mamun

Dr Quazi Mamun

BSc, MSc (Japan), PhD (Monash)

Dr Mamun is a Lecturer of Computing in the School of Computing and Mathematics, Faculty of Business, Justice and Behavioural Sciences, Charles Sturt University. He earned BSc Engineering degree in Computer Science and Engineering from Bangladesh University of Engineering and Technology (BUET), Masters degree (by research) in Global Information and Telecommunication Studies from Waseda University Japan, and PhD degree with the specialisation in distributed computing from Monash University, Australia.

Before joining CSU, Quazi has worked as a sessional academic and guest Lecturer in the Faculty of Information Technology of Monash University. He was also a Lecturer and Assistant Professor in the Department of Computer Science and Engineering of the University of Asia Pacific.

Quazi's research interests include, but not limited to, distributed systems, ad hoc and sensor networks, wireless networks, privacy and security in information networks. He is an active member of Advanced Networks Research Lab (ANRL) and ICT Security Group of Charles Sturt University.

Any potential PhD students are encouraged to contact him via email at qmamun@csu.edu.au to see possibilities of scholarships and discuss research interests.

Dr Mamun is a Member of IEEE (Institute of Electrical and Electronics Engineers), ACS (Australian Computer Society), IEICE (Institute of Electronics, Information and Communication Engineers), EAI  (European Alliance for Innovation). He served as publication chair in Securecomm 2013, editor for International Journal of Computer and Information Technology (IJCIT), technical Program Committee of IEEE ICC, IEEE WCNC, IEEE Globecomm, ARCHER conferences, reviewers of MDPI Sensors and  Ubiquitous Computing and Communication Journals.

Quazi has a passion for sports. He was a Victorian Premier Cricket umpire for many years, and is now serving as an umpire in the Wagga Wagga District Cricket Association. Besides this, Quazi is also a Tennis Australia accredited tennis umpire and he has served in the Grand Slam Australian Open as a line umpire.

Top of page


Teaching

My learning and teaching philosophy in three points can be depicted answering three simple questions:

1. To What End? : I would like to foster critical thinking, to facilitate the acquisition of life-long learning skills, to prepare students to function effectively, and to develop problem-solving strategies.

2. By What Means? : Firstly, by motivating the students. I like to make my lectures interesting by using animations, by showing real life examples connected with the theories, by increasing interaction in the class room, and by making the students working collaboratively in tutes and labs.

3. Why? : Because when I find the students solve a problem, I find it as a wonderful reward of my teaching.

Crafting my teaching goals can be summarised as attempting to:

  • I encourage students to be active in peer-discussion and peer-teaching, which helps the students to understand a theory and mechanics very easily.
  • Create a pleasant atmosphere in which students feel encouraged to learn through asking questions, taking part in the discussions, sharing their ideas with other members of the class, and taking their share of control and responsibility for their own learning. For example, use of teaching methods that foster an active rather than passive learning process in the classroom;
  • According to the level of understanding of my students, I produce real life example of technologies while describing a relatively complex topic.

Work at the students' level and show my concern and respect for students and their learning needs. I care for my students and make an extra effort to satisfy their needs. I always make myself available for scheduled student consultation and effectively respond to students' queries and problems on time.

In CSU, I teach the following subjects:

  • Mobile Application Development (Postgraduate)
  • Wireless Networks (Postgraduate & undergraduate)
  • Data Communications & Network Systems (Postgraduate & undergraduate)
  • Computer Systems & Organisation (Postgraduate & undergraduate)

Top of page


Research

Quazi's research interests include, but not limited to, distributed systems, ad hoc and sensor networks, wireless networks, privacy and security in information networks. He is an active member of Advanced Networks Research Lab (ANRL) and ICT Security Group, School of Computing and Mathematics of Charles Sturt University. He actively publishes in international conferences, symposiums, workshops, and refereed journals.

Current (2014) HDR Students:

  • Two PhD Students
  • Two Doctor of Information Technology students
  • One Honours student

Any potential PhD students are encouraged to contact him via email at qmamun@csu.edu.au to see possibilities of scholarships and discuss research interests.

Top of page


Professional Activities

Academic and Administrative Leadership

  • Member of the CSU SCM Marketing committee
  • Member of the CSU SCM  Course moderating committee
  • Member of ANRL Research group

Esteem and Scholarship Indicators

  • Member of IEEE (Institute of Electrical and Electronics Engineers)
  • Member of ACS (Australian Computer Society)
  • Member of IEICE (Institute of Electronics, Information and Communication Engineers )
  • Member of EAI (European Alliance for Innovation)
  • Publication Chair, Securecomm 2013
  • Editor: International Journal of Computer and Information Technology (IJCIT)
  • Technical Program Committee: IEEE ICC (2007-), IEEE WCNC(2008-), IEEE Globecomm(2009-), Securecomm(2012), ARCHER (2010); Editorial board: MDPI Sensors (2011-); Ubiquitous Computing and Communication Journal;
  • Conference/Symposium Session Chairperson: IEEE Tencon, Securecomm, ARCHER.

Research Funding/Scholarships:              

  • Research Infrastructure Block Grants 2012, Charles Sturt University. AUD 22,000
  • COMPACT Fund Round 3 2012, Charles Sturt University, AUD 13,003
  • Research Fund,Charles Sturt University, 2012, AUD 3,000
  • Monash International postgraduate Research Scholarship, 2007 – 2010, AUD 80,885
  • Monash Graduate Scholarships, 2007-2010, AUD 68,656
  • Japan Human Resource Development Scholarship (JICA, Japan). 2004 – 2006, JPY 7,776,000
  • Bangladesh University of Engineering and Technology Deans List Scholarship, 1999-2001
  • Bangladesh University of Engineering and Technology Merit Scholarship 1995
  • Dhaka Education Board Scholarship, Ministry of Education, Bangladesh     1992, 1994

Top of page


Selected Publications

insert div

Over 50. The list of research papers from June 2012 to Dec 2014 is provided below:

Book Chapters

  • Mamun, Q., Islam, R., & Kaosar, M. (2013). Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs. In Zia, T. et al (Ed.), Security and Privacy in Communication Networks, Volume 127, chapter 23, pp. 367-379. Springer International Publishing.
  • Kaosar, M., Mamun, Q., Islam, R., & Xun, Y. (2013). (k-n) Oblivious Transfer using Fully Homomorphic Encryption System. In Zia, T. et al (Ed.), Security and Privacy in Communication Networks, Volume 127, chapter 24, pp. 380-392. Springer International Publishing.

Journals

  • Mamun, Q., Islam, R., Kaosar, M. (2014). Secured Communication Key Establishment for Cluster based Wireless Sensor Network. Accepted in the International Journal of Wireless Networks and Broadband Technologies (IJWNBT).
  • Mamun, Q., & Rahman, A. (2014, September). A Robust Data Gathering Technique for Large Scaled Wireless Sensor Networks, Journal of Networks, 9(9),  2342-2352. doi:10.4304/jnw.9.9.2342-2352.  (ERA 2010 A ranked Journal)
  • Rahman, A., McCulloch, J., & Mamun, Q. (2014). Prediction With Uncertainty: A Novel Framework for Analyzing Sensor Data Streams, IEEE Sensors Journal, 15(1), 382–386. doi: 10.1109/JSEN.2014.2344683. (SJR Q1 Ranked Journal)
  • Mamun, Q., Islam, R., & Kaosar, M. (2014, November). Anomaly Detection in Wireless Sensor Networks. Journal of Networks, Vol 9, No 11, 2914-2924. doi:10.4304/jnw.9.11.2914-2924. (ERA 2010 A ranked Journal)
  • Kaosar, M., & Mamun, Q. (2014 June). Privacy-Preserving Interest Group Formation in Online Social Networks (OSNs) Using Fully Homomorphic Encryption. Journal of Information Privacy and Security, 10(1), 44 – 52. doi:10.1080/15536548.2014.912909. (ERA 2012 enlisted Journal)
  • Mamun, Q. (2013, September). A coverage-based scheduling algorithm for WSNs, International Journal of Wireless Information Networks, 20(3). doi: 10.1007/s10776-013-0231-7
  • Mamun, Q. (2013, July). A tessellation-based localized chain construction scheme for chain-oriented sensor networks. IEEE Sensors Journal, 13(7), 2648–2658. doi: 10.1109/JSEN.2013.2252162. (SJR Q1 Ranked Journal)
  • Mamun, Q. (2013, June). Design issues in constructing chain oriented logical topology for wireless sensor networks and a Solution. Journal of Sensor and Actuator Networks, 2(2), 354–387. doi: 10.3390/jsan2020354
  • Mamun, Q. (2013, February). Designing logical topology for wireless sensor networks: A multi-chain oriented approach. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), 4(1), 1–20. doi: 10.5121/ijasuc.2013.4101
  • Mamun, Q. (2012, November). A qualitative comparison of different logical topologies for wireless sensor networks. Sensors 12(11), 14887–14913. doi: 10.3390/s121114887. (5 year Impact Factor 2.457 (2013))

International Conferences/Symposium/Workshops

  • Rabbi, K., Islam, R., Mamun, Q., & Kaosar, M. (2014, December). MTTG: An Efficient Technique for Test Data Generation, In proc of 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), Dhaka, Bangladesh. (Acceptance rate 25%)
  • Nabulsi, H., Islam, R., & Mamun, Q. (2014, December). Detecting SQL Injection Attacks Using SNORT IDS, In proc of Asia-Pacific World Congress on Computer Science and Engineering 2014, Fiji.
  • Islam, Z., Mamun, Q., & Rahman, G. (2014, November). Data Cleansing during Data Collection from Wireless Sensor Networks, In proc of the 12th Australasian Data Mining Conference (AusDM 2014), Brisbane, Australia.  (ERA Ranked B Conference)
  • Syed, S., & Mamun, Q. (2014, September). Cloud Security from Users Point of View: A Pragmatic Study with Thematic Analysis. In proc of the 10th International Conference on Security and Privacy in Communication Network (Securecomm 2014), Beijing, China. (ERA 2010 A ranked Conference)
  • Rabbi, K., Kaosar, M., Islam, R., & Mamun, Q. (2014, September). A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System, In proc of the 10th International Conference on Security and Privacy in Communication Network (Securecomm 2014), Beijing, China. (ERA 2010 A ranked Conference)
  • Nabulsi, H., Islam, R., Mamun, Q. & Chowdhury, M. (2014, September). Defense Against Code Injection Attacks, In proc of the 10th International Conference on Security and Privacy in Communication Network (Securecomm 2014), Beijing, China. (ERA 2010 A ranked Conference)
  • Mamun, Q., Kaosar, M. (2014, February). What is the first step in designing an application protocol for wireless sensor networks (WSNs)? 2014 IEEE Sensors Applications Symposium (SAS 2014), pp. 333–338. doi: 10.1109/SAS.2014.6798971
  • Begum, M., Mamun, Q., Kaosar, M. (2013, December). A Privacy-Preserving Framework for Personally Controlled Electronic Health Record (PCEHR) System, Australian eHealth informatics and security conference, Security Research Institute (SRI) Conferences, pp. 1–10, Perth, Australia.
  • Mamun, Q., Islam, R., Kaosar, M. (2013, November). Establishing secured communications in cluster based wireless sensor networks, 2013 International Symposium on Wireless and Pervasive Computing (ISWPC 2013), pp.1–6. doi: 10.1109/ISWPC.2013.6707426. (Acceptance rate 35% )
  • Mamun, Q., Islam, R., & Kaosar, M. (2013, September). Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs. In proc of the 9th International Conference on Security and Privacy in Communication Network, Sydney, Australia. (ERA 2010 A ranked Conference)
  • Kaosar, M., Mamun, Q., Islam, R., & Xun, Y. (2013, September). (k-n) Oblivious Transfer using Fully Homomorphic Encryption System. In proc of the 9th International Conference on Security and Privacy in Communication Network, Sydney, Australia. (ERA 2010 A ranked Conference)

Top of page