Mohammed Golam Kaosar  from Murdoch University in Perth Australia.
Share

Contact me

Fellow researchers

    Latest news

    • Research
    • School

    Dr Mohammed Golam Kaosar
    PhD (Computer Science), MSc (Computer Engineering), BSc (Computer Science and Engineering), SnrMIEEE

    Senior Lecturer, Discipline of IT, Media and Communications - ABLSS

    About me

    Dr. Kaosar is currently working as a Senior Lecturer in the Discipline of Information Technology, Murdoch University Australia. Prior to that he has worked in several universities including RMIT University, Victoria University, Effat University and Charles Sturt University. Dr. Kaosar has worked in number of national and international research projects and grants. He has published number of research papers in reputable journals and conferences including – IEEE Transaction on Knowledge and Data Engineering (TKDE), Data and Knowledge Engineering (DKE), IEEE International Conference on Data Engineering (ICDE), Computer Communication (ComCom). He has been supervising many postgraduate students, mentoring junior colleagues, and collaborating with many national and international researchers. Dr. Kaosar is an active member of various professional organizations including – IEEE Senior, Australian Computer Society (ACS), European Alliance for Innovation (EAI), The Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST), South Pacific Competitive Programming Association, Industrial Engineering and Operation Management(IEOM). Dr. Kaosar is involved in arranging various events such as programming contests, conferences and workshops.

    For potential PhD/MS Students: AdmissionScholarshipsPotential Topics

    My Personal Website

    Teaching area

    Currently Teaching:

    • ICT582 Python Programming Principles and Practice (s2, 2020)
    • ICT100 Transition to IT (s2, 2020)
    • ICT167 Principles of Computer Science
    Previously Taught:
    • Database System, Network Project Management, Internet of Things, Information Security (Cryptography), Information Security Architecture, Data Structure, Computer Fundamentals, C/C++, Java, Algorithm Analysis, Mobile App, Development, Web Development, Human Computer Interaction, Operating System, Computer Networks, Computer Architecture, Research Methodology

    Research areas

    Areas of my research interest include but not limited to:

    • Information Security, Privacy, Cryptography and Blockchain
    • Cyber Security
    • Internet of Things (IoT)
    • Wireless Ad-hoc Network
    • Computer Network

    For potential PhD/MS Students: AdmissionScholarships, Potential Topics

    Current projects

    Some of the recent projects I have worked include but not limited to:

    • Private Searching on Streaming Data (ARC Discovery, 2019-2020, Role – Research Fellow)
    • Private Data Warehouse Query (ARC Discovery, 2009-2011, Role – Post-Doc Research Fellow)
    • Privacy Protection in Distributed Data Mining (ARC Discovery, 2008-2010, Role – Research Fellow)
    • Automatic Vehicle Locator(AVL) (2007-2008, Role – Programmer (Software development in the mobile and pocket PC end))

    Awards and grants

    Grants
    • Department of Defence - DSC Research Higher Degree Top-Up Grant, “Cybersecurity and Precision Agriculture”, 2021-2022, $15,000 [Under-Review] [CI]
    • Department of Defence Strategic Policy Grants Program 2021, “CORONA Virus Spread Prediction and Monitoring using Dynamic Graph Link Prediction”, 2021-2024, $800,000 [Under-Review] [CI]
    • Research Cluster Awards, Zayed University UAE, “Blockchain-Based Collaborative Intrusion Detection Systems and Trust Management for Industrial IoT”, 2021 – 2024, AED 491,000 [Co-PI]
    • Interdisciplinary Research Grant 2020- 3rd Cycle Qassim University, Saudi Arabia, “Developing a smart image-based disease detection system using machine learning techniques for the agricultural plants of Qassim region”, 2020-2022 (SR-150,000) [Co-PI]
    Some of the recent awards include but not limited to:
    • Best Event Organizer in the College, Effat University 2018-2019, Jeddah, Saudi Arabia
    • Best Student Support Award, Effat University 2016-2017, Jeddah, Saudi Arabia
    • Best Research Publication of the Year 2013-2014, Charles Sturt University, Australia

    Events and speaking engagements

    The list of presentations and talks includes but not limited to:

    • “Importance of programming for females in KSA”, SheCodes, first Effat University Programming Contest, Effat University, Jeddah Saudi Arabia, April, 2019
    • “Preparing for ICPC (ACM compliant International Collegiate Programming Contest)”, Effat University, Jeddah Saudi Arabia, September, 2018
    • “Workshop on PC2 (Programming Contest Control System)”, Teacher – Student forum, Effat University, Jeddah Saudi Arabia, December, 2017
    • “Privacy Preserving Participatory Sensor Network in Intelligent Rescue System”, The Center of Excellence in Intelligent Engineering Systems (CEIES), King AbdulAziz University, Jeddah Saudi Arabia, Dec, 2016
    • “Backtracking Based Integer Factorization, Primality Testing and Square Root Calculation”, The Fourth International conference on Computer Science and Information Technology (CCSIT 2014), 21-22 February 2014, Sydney, Australia
    • “(k-n) Oblivious Transfer using Fully Homomorphic Encryption System”, 9th International Conference on Security and Privacy in Communication Networks (SecureComm – ATIS 2013), Sydney, Australia, Sep 25-27
    • “Basic Techniques of Information Privacy and some Applications”, 2nd ICT Security Symposium 2013, CSU, Australia, Sep 2013
    • “Computer Science Research Trend”, Hajee Mohammad Danesh Science and Technology University (HSTU) Bangladesh, April 2012
    • “Optimized two Party Privacy Preserving Association Rule Mining using Fully Homomorphic Encryption”, 11th International Conference on Algorithms and Architecture for Parallel Processing (ICA3PP-11), Oct. , 2011, Melbourne, Australia
    • “Distributed Association Rule Mining with Minimum Communication Payload”, The Australasian Data Mining Conference (AusDM 2009), Dec. 2009, Melbourne, Australia
    • “Performance Improvement of Dynamic Source Routing Protocol Considering the Mobility Effect of Nodes in Cache Management”, The third IEEE and IFIP International Conference on wireless and Optical Communications Networks (WOCN 2006), Apr., 2006, Bangalore, India
    • “A Novel Solution Towards the N-Queen problem”, Computer Engineering Department, KFUPM, Saudi Arabia, 2005

    Professional and community service

    • Membership: IEEE, Australian Computer Society (ACS), European Alliance for Innovation (EAI), The Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (ICST), South Pacific Competitive Programming Association, Industrial Engineering and Operation Management(IEOM)
    • Editorial Board Member: International Journal in Foundations of Computer Science and Technology (IJFCST)
    • Program Committee: AIACT 2021 Shanghai China, Learning and Teaching Conference, Effat University, 2015-2019; International Workshop on Applications and Techniques in Information Security (ATIS), 2013
    • Reviewer: ATIS2013, NSS2013, SCI 2005, SCI 2006, Journal of KSU-CIS, Journal of Biomedical Informatics, Journal of Computers (JCP) etc.
    • Organizer: Effat L&T Conference (2015-2019), Various ACM-Compliant programming contests including She-Codes-2019 in KSA

    Doctoral and masters supervisions

    PhD Supervision: 1

    PhD Co-Supervision: 1

    MS Supervision: 1

    Capstone Projects: More than 15

    Publications

    Journals

    • A. Rahman, M. Kaosar, “A Collaborative Study on Industry 4.0 and 5G through Software Defined Networking-based Security”, Journal of Manufacturing Letters, 2020,[Submitted]
    • K. M. Haroon, M. Kaosar, “Comparative Analysis of Different Neural Spike Sorting Algorithms Used for Overlapping Spikes”, Journal of Multimedia Systems, 2020,[Submitted]
    • M. Billah, M. Kaosar, “DeepSigma70: Bacterial Sigma 70 Promoter Identification Using Deep Convolutional Neural Network”, Journal of Multimedia Systems, 2020,[Submitted]
    • H. Sharif, A. T. Oo, K. M. Haroon, M. Kaosar, “Protection of Interconnected Transmission Network using Phasor Measurement Unit Scheme”, International Research Journal of Engineering and Technology (IRJET), Vol. 07, Issue 08, Aug 2020
    • M. Qiangqiang, N. Hasan, M. Rahman,R. Roslynna,N. Saeid, M. Kaosar, M. Mohiuddin, “Relationship between GSD and porosity”, Journal of Granular Computing, 2020,[Submitted]
    • K. M. Haroon, H. Sharif, M. Kaosar, H. Javed, “A Review on Different Algorithms and Methods used for Neural Spike Detection”, International Research Journal of Engineering and Technology (IRJET), Vol. 07, Issue 08, Aug 2020
    • H. Sharif, A. T. Oo, K. M. Haroon, M. Kaosar, “A review on various Smart Grid Technologies used in Power System”, International Research Journal of Engineering and Technology (IRJET), Vol. 07, Issue 08, Aug 2020
    • M. Kaosar, X. Yi, “Privacy Preserving Participatory Sensor Network on Named Data Networking Infrastructure”, International Journal of Wireless & Mobile Networks (IJWMN), Vol. 12, No. 1, Pages 1-12 January 2020
    • H.Sharif, K. Haroon, Z. Paracha, M. Kaosar, H. Javed, “Identification of Low Frequency Oscillation Disturbance with the Help of Phasor Measurement Unit”, Journal of Solid State Technology, Vol.63, No.1, 2020
    • C. Trang, R. Ahmed, M. Kaosar, “Liquid Water Film on the Outer Surface of a Half-Submerged Rotating Drum”, Journal of Plastic Film & Sheeting, February, 2019
    • Shaima Albugami, Baraa Arief, Mohammed Kaosar, “Privacy Statement Regulating Based on User Preferences Using Document Mining” International Journal of Security, Privacy and Trust Management ( IJSPTM), April 2018
    • Adel Binajjaj, Tarek Sheltami, Farouq Aliyu, Mohammed Kaosar, “Design and Implementation of a Wearable Gas Sensor Network for Oil and Gas Industry Workers” Journal of Computers Volume 13, Number 3, March 2018, Pages 300-308, doi: 10.17706/jcp.13.3.300-308
    • Abdulatif, M. Kaosar, “Privacy Preserving Cloud Computation using Domingo Ferrer Scheme” Journal of King Saud University Computer and Information Sciences Volume 28, Issue 1, January 2016, Pages 27-36
    • M. Kaosar, Q. Mamun, “Privacy Preserving Interest Group Formation in Online Social Networks (OSNs) using Fully Homomorphic Encryption”, Journal of Information Privacy and Security (JIPS), 2014, doi = {10.1080/15536548.2014.912909}.
    • Q. mamun, R. Islam, M. Kaosar, “Anomaly Detection in Wireless Sensor Networks”, Journal of Networks (JNW, ISSN 17962056), 2014.
    • Q. Mamun, M. Kaosar, R. Islam “Secured Communication Key Establishment for Cluster based Wireless Sensor Networks”, International Journal of Wireless Networks and Broadband Technologies (IJWNBT), 2014
    • R. Paulet, M. Kaosar, X. Yi E. Bertino, “Privacy Preserving and Content Protecting Location Based Queries”, IEEE Transactions on Knowledge and Data Engineering(TKDE), vol.99, no pre-print, ISSN: 10414347, 2013
    • X. Yi, M. G. Kaosar; R. Paulet, E. Bertino, “Single-Database Private Information Retrieval from Fully Homomorphic Encryption”, Transactions on Knowledge and Data Engineering (TKDE), vol.25, no.5, pp.1125-1134, May 2013
    • M. G. Kaosar, Russell Paulet, X. Yi, “Fully Homomorphic Encryption Based Two Party Association Rule Mining”, journal of Data & Knowledge Engineering (DKE), 2012, March, http://dx.doi.org/10.1016/j.bbr.2011.03.031
    • M. G. Kaosar, X. Yi, “Secure Two-Party Association Rule Mining Based on One-pass FP-Tree”, International Journal of Information Security and Privacy (IJISP), 2011, vol-5, issue 2, pp. 13-32, January.
    • M. G. Kaosar, X. Yi, “Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices”, International Journal of Computer Science and Information Security (IJCSIS), 2010, April, vol – 8, no – 1, pp. 44-51.
    • M. G. Kaosar, X. Yi, “Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment”, Ubiquitous Computing and Communication Journal (UBICC), 2010, Volume 5, ISSN Online 1992-8424, ISSN Print 1994-4608, 2010
    • M. G. Kaosar, T. R. Sheltami, “Voice Transmission over Ad-Hoc Network Adapting Optimum Approaches to Maximize the Performance”, Computer Communications, 2008. doi:10.1016/j.comcom.2008.11.028
    • T. R. Sheltami, M. G. Kaosar, “Improved Caching Mechanism for Ad-hoc Network Routing Protocol”, PCTE Journal of Computer Sciences, 2006, December, Vol. 2, Issue 2 Jul-Dec
    • M. G. Kaosar, “Shortest and Simplest Solutions for N-Queen Problem”, PCTE Journal of Computer Sciences, 2006, December, Vol. 2, Issue 2 Jul-Dec
    • M. G. Kaosar, “Finding Multiple Solutions from a Single Solution of N-queen Problem”, PCTE Journal of Computer Sciences, 2005, December, Vol. 1, Issue 2, Jul-Dec.

    Book Chapters

    • M. Kaosar, Q. Mamun, R. Islam, and X. Yi, “(k-n) oblivious transfer using fully homomorphic encryption system” in Security and Privacy in Communication Networks, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, T. Zia, A. Zomaya, V. Varadharajan, and M. Mao, Eds. Springer International Publishing, 2013, vol. 127, pp. 380-392.
    • Q. Mamun, R. Islam, and M. Kaosar, “Ensuring data integrity by anomaly node detection during data gathering in WSNS” in Security and Privacy in Communication Networks, ser. Lecture Notes of the Institute for Computer Sciences,Social Informatics and Telecommunications Engineering, T. Zia, A. Zomaya, V. Varadharajan, and M. Mao, Eds. Springer International Publishing, 2013, vol. 127, pp. 367-379
    • M. G. Kaosar, X. Yi, “Privacy Preserving Data Gathering in Wireless Sensor Networks”, Ch.12, pp. 237-251, Book: Network Security, Administration and Management, ISSN: 9781609607777, pub. IGI Global, 2011.

    Conference Papers

    • M. Magomelo, M. Kaosar, “Security and Privacy Preserving in Precision Agriculture”, Proceedings of the 2nd African International Conference on Industrial Engineering and Operations Management Harare, Zimbabwe, December 8-10, 2020.
    • T. Chimeura, M. Kaosar, “User Identity Preservation and Data Protection in the Internet of Things”, Proceedings of the 2nd African International Conference on Industrial Engineering and Operations Management Harare, Zimbabwe, December 8-10, 2020.
    • A. Alhamid, K. Al-Khaldi, M. Kaosar, “Smart home base safe playground for kids”, Playground Conference KSU, Ryadh, KSA, 2015.
    • S. AlBugami, B. Arif, M. Kaosar, “Shaping and Regulating Privacy Statements to Increase Customer Satisfaction”, Customer Service in the Public Sector Conference, The Saudi Ministry of Civil Service, 17-19 Nov 2015
    • Q. Mamun, M. Kaosar, “What is the First Step in Designing an Application Protocol for Wireless Sensor Networks (WSNs)?”, IEEE Sensors Applications Symposium (SAS) 2014, February 1820, 2014, Queenstown, New Zealand
    • K. Rabbi, M. Kaosar R. Islam, Q. Mamun, “A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) System”, 10th International Conference on Security and Privacy in Communication Networks (SecureComm 1014), 2426 September, 2014, Beijing, China.
    • K. Rabbi, R. Islam, Q. Mamun, M. Kaosar, “MTTG – An Efficient Technique for Test Data Generation”, SKIMA2014, 18-20 December 2014, Dhaka, Bangladesh
    • M. Begum, Q. Mamun, M. Kaosar, “A Privacy Preserving Framework for Personally Controlled Electronic Health Record (PCEHR) System”, 2013 SRI Security Congress, The Proceedings of 2nd Australian e-Health Informatics and Security Conference pp. 1-10, 2-4 December, 2013 Perth, Western Australia
    • A. K. Mandal, M. O. Islam, M. Kaosar, M. D. Hossain, “An Approach for Enhancing Message Security in Audio Steganography”, 16th International Conference on Computer and Information Technology (ICCIT’2013), pp. 383-388, 8-10 March 2014, Khulna, Bangladesh
    • M. Kaosar, “Backtracking Based Integer Factorization, Primality Testing and Square Root Calculation”, The Fourth International conference on Computer Science and Information Technology (CCSIT 2014), 21-22 February 2014, Sydney, Australia, Computer Science Conference Proceedings, pp. 77-83.
    • Q. Mamun, M. Kaosar, R. Islam “Establishing Secured Communication in Cluster based Wireless Sensor Networks”, 8th International Symposium on Wireless Pervasive Computing (ISWPC) 2013, Taipei, Taiwan 20-22nd November 2013.
    • Russell Paulet, M. G. Kaosar, Xun Yi, Elisa Bertino, “Privacy Preserving and Content Protection Location Based Queries”, 28th IEEE International Conference on Data Engineering (ICDE 2012), Washington, DC, USA, April 1-5, 2012.
    • M. G. Kaosar, Russell Paulet, X. Yi, “Optimized two Party Privacy Preserving Association Rule Mining using Fully Homomorphic Encryption”, 11th International Conference on Algorithms and Architecture for Parallel Processing (ICA3PP-11), October 24-26, 2011, Melbourne, Australia, LNCS 7016, Springer Verlag Berlin Heidelberg.
    • R. Paulett, M. G. Kaosar, X. Yi, “k-Anonymous Private Query Based on Blind Signature and Oblivious Transfer”, International Cyber Resilience Conference, 2011,12 August, Perth, Australia
    • M. G. Kaosar, Russell Paulet, X. Yi, “Secure Two Party Association Rule Mining”, In Proc. Australasian Informatio Security Conference (AISC 2011), Perth, Australia. CRPIT, 116. Colin Boyd and Josef Pieprzyk Eds., ACS. pp. 15-22
    • M. G. Kaosar, Z. Xu, X. Yi, “Distributed Association Rule Mining with Minimum Communication Payload”, The Australasian Data Mining Conference (AusDM 2009), 2009,1-4 December, Vol 101, pp 17-23, Melbourne, Australia
    • M. G Kaosar, Tarek R. Sheltami, Ashraf S. HasanMahmoud, “Delay and Power Efficient Voice Transmission over MANET”, IEEE International Conference on Communication (ICC 07), 2007, 24-28 June, Pp. 3313-3318, United Kingdom
    • M. G. Kaosar, T. R. Sheltami, “Effect of Voice Transmission over MANET using Energy Aware Cluster Based Routing Protocol”, TSSA and WSSA 2006, 2006, 8-9 December, Indonesia
    • M. G. Kaosar, T. R. Sheltami, “Simulation Study of Delay Analysis for Voice Transmission over MANET”, First IEEE International Conference on Information and Industrial Systems ICIIS 2006, 8-11 August, IEEE Catalogue Number: 06EX1355C, ISBN: 1424403327, Library of Congress: 2006922875, Sri Lanka
    • M. G. Kaosar, T. R. Sheltami, “Mobility Based On-demand MANET Routing Protocol”, First IEEE International Conference on Information and Industrial Systems ICIIS 2006, 8-11 August, IEEE Catalogue Number: 06EX1355C,ISBN: 1424403327, Library of Congress: 2006922875, Sri Lanka
    • H. M. Asif, M. G. Kaosar, “Performance Comparison of IP, MPLS and ATM Based Network Cores”, First IEEE International Conference on Information and Industrial Systems ICIIS 2006, 8-11 August, IEEE Catalogue Number: 06EX1355C, ISBN: 1424403327, Library of Congress: 2006922875, Sri Lanka
    • M. G. Kaosar, A. S. H. Mahmoud, T. R. Sheltami, “Performance Improvement of Dynamic Source Routing Protocol Considering the Mobility Effect of Nodes in Cache Management”, The third IEEE and IFIP International Conference on wireless and Optical Communications Networks (WOCN 2006), 2006,11-13 April, Catalogue No: 06EX1360C,ISBN: 1424403405, Bangalore, India
    • M. G. Kaosar, H. M. Asif, T R. Sheltami, A. S. H. Mahmoud, “Simulation Based Comparative Study of On Demand Routing Protocols for MANET”, International Conference on Wireless Networking and Mobile Computing (ICWNMC’05 ), 2005,28-30 December, Vol. 1, pp. 201-206, Chennai, India.
    • M. G. Kaosar, “Solving the N-Queen Problem Using Direct Placement Method”, International Conference On Intelligent Systems (ICIS 2005), 1-3 December, Kuala Lumpur, Malaysia.
    • M. M. Hassan, S.M.S Islam, M. G. Kaosar, “”Virtual Ear”: A Center Based Visual Clustering Approach”, International Conference on Intelligent Systems (ICIS 2005), 1-3 December, Kuala Lumpur, Malaysia.
    • M. G. Kaosar, Hafiz M.Asif, “Comparative Study of Two MANET Routing Protocols DSR and TORA Using OPNET”, 2nd CIIT Workshop on Research in Computing, 2005, 18 November, PP 23-28, ISBN: 9698779086, Lahore, Pakistan
    • M. G. Kaosar, “Primality Test – An Enhanced Method”, International Conferences on Challenges and Opportunities in IT Industry (ICCII 2005), 2005, November, Page no. 82, Punjab, India.
    • M. G. Kaosar, “Finding Multiple Solutions from a single solution of N-Queen Problem”, International Conferences on Challenges and Opportunities in IT Industry (ICCII 2005), 2005, November, Page no. 44, Punjab, India.
    • M. G. Kaosar, M. Shorfuzzaman and S. Ahmed, “A novel approach to solving N-queens problem”, 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2004), 2004, July, Vol. 5. pp. 186-190.
    • S. Hossain, M. Kaosar, “Intellectual Property Theft in Precision Agriculture: Challenges and a Solution”, Journal of Human-Computer Interaction, 2020, [Submitted]
    • H. Sharif, A. T. Oo, K. M. Haroon, M. Kaosar, “Protection of Interconnected Transmission Network using Phasor Measurement Unit Scheme”, International Research Journal of Engineering and Technology (IRJET), Vol. 07, Issue 08, Aug 2020
    • M. Patwary, M. Kaosar, “Predicting COVID-19 affected people and area using dynamic graph link prediction”, Journal of Human-Computer Interaction, 2020, [Submitted]
    • M. Qiangqiang, N. Hasan, M. Rahman,R. Roslynna,N. Saeid, M. Kaosar, M. Mohiuddin, “Relationship between GSD and porosity”, Journal of Granular Computing, 2020,[Submitted]
    • K. M. Haroon, H. Sharif, M. Kaosar, H. Javed, “A Review on Different Algorithms and Methods used for Neural Spike Detection”, International Research Journal of Engineering and Technology (IRJET), Vol. 07, Issue 08, Aug 2020
    • M. Magomelo, M. Kaosar, “An Exploratory Model to Empirically Test the Impact of Organisational Values and Culture on Information Security”, Journal of Human-Computer Interaction, 2020, [Submitted]
    • H. Sharif, A. T. Oo, K. M. Haroon, M. Kaosar, “A review on various Smart Grid Technologies used in Power System”, International Research Journal of Engineering and Technology (IRJET), Vol. 07, Issue 08, Aug 2020