Chaudhry Junaid Ahsen Ali
Cyber Security Professional & Researcher
Senior Member IEEE,
CEO Duja Inc. Australia.
53 Darch Street, Yokine, Perth, Western Australia.
(+61) 4021 827-86
www.duja.com.au
junaid@duja.com.au

Scientific Publications (Selected)

Submitted Articles

  • Chaudhry et.al. So, what are the Risks in Adoption of Cloud-sourcing for Health Enterprises?, BMC Public Health, 2017.
  • Chaudhry et.al. Secure Detection of Critical Cardiac Abnormalities for Wireless Body Area Networks, Journal of Computer Systems Science and Engineering, 2017.
  • Chaudhry et.al. Discovering Trends for the Development of Novel Authentication Applications for Dementia Patients, International Conference on Applications and Techniques in Cyber Intelligence (ATCI), 2017.
  • Chaudhry et.al. Data Security among ISO/IEEE 11073 Compliant Personal Healthcare Devices through Statistical ngerprinting, GCC2017.
  • Chaudhry et.al. Internet of Threats and Context Aware Security: Part One, IEEE Future Directions, 2017.
  • Chaudhry et.al. Internet of Threats and Context Aware Security: Part two, IEEE Future Directions, 2017.

Published Articles

  1. P. A. T. Palpanas, J. Chaudhry and Y. Velegrakis, Entity lifecycle management for okkam, in SWAE, 2008, pp. 729733.
  2. H. Youn, S. Jang, and E. Lee, A novel approach for performance improvement of multi-agent based system architecture, International Journal of Software Engineering and Its Applications, vol. 2, no. 1, pp. 110, 2008.
  3. J. A. Chaudhry, Automatic self healing using immune systems, in Encyclopedia of Multimedia Technology and Networking, Published by Idea Group Inc. Idea Group Publishers, 2009, vol. 2, pp. 200809.
  4. A. I. Ali Kashif Basheer, Junaid Chaudhry, Internet of threats and context aware security: Part one, IEEE Future Directions, 2017.
  5. Y. Lee, J. A. Chaudhry, D. Min, S. Han, and S. Park, A dynamically adjustable rule engine for agile business computing environments, in Advances in Data and Web Management. Springer, 2007, pp. 785796.
  6. Y. Lee, J. A. Chaudhry, D. Min, S. Park, and D. Chung, A comparative performance analysis of cbd application framework with jbean application framework for improved distributed appli- cation development, in Intelligent Pervasive Computing, 2007. IPC. The 2007 International Conference on. IEEE, 2007, pp. 7679.
  7. K. A. Kamal, J. A. Chaudhry, S. Ali, M. Ahmad, M. A. B. Ngadi, and A. H. Abdullah, A synopsis of self-healing functions in wireless networks, in Multitopic Conference (INMIC), 2011 IEEE 14th International. IEEE, 2011, pp. 176181.
  8. J. Chaudhry, U. Qidwai, and L. Malrey, Dynamic health level 7 packetizer for on-the- y integrated healthcare enterprises (ihe) in disaster zones, in Neural Information Processing. Springer Berlin/Heidelberg, 2012, pp. 432438.
  9. J. A. Chaudhry and U. A. Qidwai, On critical point avoidance among mobile terminals in healthcare monitoring applications: saving lives through reliable communication software, in Open Systems (ICOS), 2012 IEEE Conference on. IEEE, 2012, pp. 15.
  10. Y. Lee, D. Min, J. A. Chaudhry, and S. Park, A study of software architecture and comparative performance analysis for an ejb-based exible enterprise application framework, International Journal of Software Engineering and its Applications, vol. 2, no. 1, pp. 91104, 2008.
  11. J. A. Chaudhry, Y. Lee, S. Park, and D. Min, Self-organization and recon guration-on self- aware delay time based service request optimization for gateway stability in autonomic self- healing systems, Lecture Notes in Computer Science, vol. 4761, pp. 348357, 2007.
  12. J. A. Chaudhry, Y. Lee, D. Min, S. Park, C.-H. Chang, and D. Chung, Applied self-healing: Self-aware service request optimization for gateway stability in ubiquitous zone-based networks, in Dependable Computing, 2007. PRDC 2007. 13th Paci c Rim International Symposium on. IEEE, 2007, pp. 179186.
  13. U. Qidwai, J. Chaudhry, and M. Lee, Dynamic health level seven packetizer for on-the- y inte- grated healthcare enterprises in disaster zones, in Qatar Foundation Annual Research Forum, no. 2012, 2012, p. CSP15.
  14. J. A. Chaudhry, Autonomic self healing-based load assessment for load division in okkam backbone cluster, Journal of Information Processing Systems, vol. 5, no. 2, pp. 6976, 2009.
  15. J. A. Chaudhry, S. Ali, M. A. Binngadi, and A. H. Abdullah, Autonomic service composi- tion through context orientation approach, Journal of Theoretical and Applied Information Technology, vol. 34, no. 1, 2011.
  16. J. A. Chaudhry and S. Park, Context aware servers and ubiquitous application development, GES Journal: Computer Science and Telecommunications, vol. 2, no. 9, pp. 240249, 2006.
  17. J. A. Chaudhry, Self-healing Systems and Wireless Networks Management. CRC Press, 2013.
  18. A. S. Al Barrak, J. Chaudhry, B. Yang, S. Chaudhry, J. Ma, A. Elsharkawi, A.-u. Morshad, I. A. Basheer, A. Man a, A. Dafa-Alla et al., Organizing committee of ans10.
  19. J. Chaudhry, U. Qidwai, and M. H. Miraz, Health care data security among iso/ieee 11073 dim compliant personal health devices through statistical ngerprinting.
  20. J. A. Chaudhry and M. Imran, Autonomic fault identi cation for ubiquitous self healing sys- tems, in Ubiquitous Intelligence Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2010 7th International Conference on. IEEE, 2010, pp. 370374.
  21. Y. Javed, A. S. Khan, B. Qureshi, and J. Chaudhry, Estimating diabetic cases in ksa through search trends and creating cyber diabetic community, 2016.
  22. J. Chaudhry, U. Qidwai, and M. Ahmad, Performance evaluation of tcp and udp trac in ieee 1451 compliant healthcare infrastructure, in Neural Information Processing. Springer Berlin/Heidelberg, 2012, pp. 396403.
  23. J. Chaudhry and S. A. Chaudhry, Secure calls and caller id spoo ng countermeasures, 2016.
  24. M. Ahmad, J. A. Chaudhry, and M. A. Ngadi, Congestion control in multi channel 802.11 b and 802.11 g wireless networks, SCIENCE AND TECHNOLOGY, vol. 15, no. 2, pp. 146154, 2012.
  25. R. G. Rittenhouse, M. Lee, J. A. Chaudhry, and U. A. Qidwai, Power and task management in wireless body area network based medical monitoring systems, in International Conference on Neural Information Processing. Springer, 2012, pp. 404414.
  26. U. A. Q. Junaid Ahsenali Chaudhry and L. Malrey, Dynamic health level 7 packetizer for on-the- y integrated healthcare enterprises (ihe) in disaster zones, Lecture Notes in Computer Science, vol. 7663, no. 1, pp. 432438, 2012.
  27. J. Chaudhry, A. Ibrahim, and A. K. Bashir, Internet of threats and the context aware security: Part one, Newsletter, vol. 2016, 2016.
  28. T. Palpanas, J. Chaudhry, P. Andritsos, and Y. Velegrakis, Entity data management in okkam, in Database and Expert Systems Application, 2008. DEXA08. 19th International Workshop on. IEEE, 2008, pp. 729733.
  29. I. Ahmedy, M. A. Ngadi, S. N. Omar, and J. Chaudhry, A review on wireless sensor networks routing protocol: Challenge in energy perspective, Scienti c Research and Essays, vol. 6, no. 26, pp. 56285649, 2011.
  30. C. Beak, J. A. Chaudhry, K. Lee, S. Park, and M. Kim, A novel packet marketing method in ddos attack detection, American Journal of Applied Sciences, vol. 4, no. 10, pp. 741745, 2007.
  31. J. Chaudhry and S. Park, Ahsenautonomic healing-based self management engine for network management in hybrid networks, Advances in Grid and Pervasive Computing, pp. 193203, 2007.
  32. J. A. Chaudhry, U. Tariq, M. A. Amin, and R. G. Rittenhouse, Dealing with sinkhole attacks in wireless sensor networks, Advanced Science and Technology Letters, vol. 29, no. 2, pp. 712, 2013.
  33. J. A. Chaudhry and S. Park, Using arti cial immune systems for self healing in hybrid net- works, Encyclopedia of Multimedia Technology and Networking, Published by Idea Group Inc, pp. 200809, 2006.
  34. J. Chaudhry and S. Park, On seamless service delivery, in The 2nd International Conference on Natural Computation (ICNC06) and the 3rd International Conference on Fuzzy Systems and Knowledge Discovery (FSKD06), 2006, pp. 253261.
  35. J. A. Chaudhry, U. Tariq, M. A. Amin, and R. G. Rittenhouse, Sinkhole vulnerabilities in wireless sensor networks, International Journal of Security and Its Applications, vol. 8, no. 1, pp. 401410, 2014.
  36. J. A. Chaudhry and S. Park, A novel autonomic rapid application composition scheme for ubiq- uitous systems, in International Conference on Autonomic and Trusted Computing. Springer, 2006, pp. 4856.
  37. J. A. Chaudhry, S. A. Chaudhry, and R. G. Rittenhouse, Phishing attacks and defenses, International Journal of Security and Its Applications, vol. 10, no. 1, pp. 247256, 2016.
  38. J. A. Chaudhry and S.-K. Park, Some enabling technologies for ubiquitous systems, Journal of computer Science, vol. 2, no. 8, pp. 627633, 2006.
  39. J. Chaudhry, T. Palpanas, P. Andritsos, and A. Mana, Entity lifecycle management for okkam, 2008.
  40. J. Chaudhry, U. A. Qidwai, R. G. Rittenhouse, and M. Lee, Vulnerabilities and veri cation of cryptographic protocols and their future in wireless body area networks, in Emerging Tech- nologies (ICET), 2012 International Conference on. IEEE, 2012, pp. 15.
  41. U. Qidwai, J. A. Chaudhry, and M. Shakir, Ubiquitous monitoring system for critical car- diac abnormalities, in Biomedical Engineering and Sciences (IECBES), 2012 IEEE EMBS Conference on. IEEE, 2012, pp. 872877.
  42. J. A. Chaudhry, M. Ahmad et al., A study on elliptic curve digital signature algorithm (ecdsa) for reliable e-commerce applications, SmartCR, vol. 2, no. 1, pp. 7178, 2012.
  43. J. A. Chaudhry and R. G. Rittenhouse, Phishing: Classi cation and countermeasures, in Mul- timedia, Computer Graphics and Broadcasting (MulGraB), 2015 7th International Conference on. IEEE, 2015, pp. 2831.
  44. J. A. Chaudhry and M. Lee, Security vulnerabilities in r d networks, International journal of advanced smart convergence, vol. 2, no. 2, pp. 2735, 2013.
  45. S. Ali, A. Naveed, M. A. B. Ngadi, and J. A. Chaudhry, Interference nomenclature in wireless mesh networks, Wireless personal communications, vol. 75, no. 4, pp. 19832003, 2014.
  46. R. G. Rittenhouse and J. A. Chaudhry, A survey of alternative authentication methods, 2016.
  47. A. Behnia, R. A. Rashid, and J. A. Chaudhry, A survey of information security risk analysis methods, SmartCR, vol. 2, no. 1, pp. 7994, 2012.
  48. K. Hussain, A. Hussain, M. Sharif, and J. A. Chaudhry, Throughput incorporated cluster head election technique for mobile ad hoc networks, Journal of Computational and Theoretical Nanoscience, vol. 13, no. 1, pp. 736742, 2016.
  49. M. Pagani, Encyclopedia of Multimedia Technology and Networking. IGI Global, 2008, vol. 3.
  50. M.-S. Baek, Y.-S. Kim, J. Yun, S. Kwak, N.-H. Hur, and H. Lim, Mulgrab 2015.