Dr Masood Mansoori

Dr Masood Mansoori

Lecturer
  • PhD Graduate of School of Engineering and Computer Science, Victoria University of Wellington (VUW), 2017New Zealand
  • Master of Computer Science, University Malaya, 2010Malaysia
  • Bachelor of Computer Science and Information Technology, Eastern Mediterranean University, 2005, Cyprus
UNSW Canberra
School of Professional Studies

Masood completed his PhD in Engineering from Victoria University of Wellington (VUW) focusing on browser-based geolocation attacks and how users’ systems, browsers and associated attributes contribute to their exposure to targeted attacks. His area of research is primarily intrusion detection and deception systems and, honeypots with several publications in the field. He has designed and developed two client honeypots (i.e. YALIH and miniC) and has contributed to many other open-source honeypot projects (e.g. Cowrie Honeypot) through supervision of students’ projects.

Masood has extensive experience in curriculum design, course coordination and teaching roles in both undergraduate and graduate-level courses for a wide range of topics including but not limited to cybersecurity (offensive and defensive) and digital forensics, risk management, data communication and networking, operating systems, databases, and programming languages.

Location
D236, UNSW Canberra, Reid Campus
  • Journal articles | 2024
    Mamun AA; Al-Sahaf H; Welch I; Mansoori M; Camtepe S, 2024, 'Detection of advanced persistent threat: A genetic programming approach', Applied Soft Computing, 167, http://dx.doi.org/10.1016/j.asoc.2024.112447
    Journal articles | 2022
    Abbasi MS; Al-Sahaf H; Mansoori M; Welch I, 2022, 'Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection', Applied Soft Computing, 121, http://dx.doi.org/10.1016/j.asoc.2022.108744
    Journal articles | 2022
    Haseeb J; Malik SUR; Mansoori M; Welch I, 2022, 'Corrigendum to ‘Probabilistic modelling of deception-based security framework using markov decision process’ [Computers & Security 115 (2022)/102599] (Computers & Security (2022) 115, (S0167404821004223), (10.1016/j.cose.2021.102599))', Computers and Security, 117, http://dx.doi.org/10.1016/j.cose.2022.102689
    Journal articles | 2022
    Haseeb J; Malik SUR; Mansoori M; Welch I, 2022, 'Probabilistic modelling of deception-based security framework using markov decision process', Computers and Security, 115, http://dx.doi.org/10.1016/j.cose.2021.102599
    Journal articles | 2022
    Haseeb J; Mansoori M; Hirose Y; Al-Sahaf H; Welch I, 2022, 'Autoencoder-based feature construction for IoT attacks clustering', Future Generation Computer Systems, 127, pp. 487 - 502, http://dx.doi.org/10.1016/j.future.2021.09.025
    Journal articles | 2020
    Mansoori M; Welch I, 2020, 'How do they find us? A study of geolocation tracking techniques of malicious web sites', Computers and Security, 97, http://dx.doi.org/10.1016/j.cose.2020.101948
    Journal articles | 2017
    Mansoori M; Welch I; Choo KKR; Maxion RA; Hashemi SE, 2017, 'Real-world IP and network tracking measurement study of malicious websites with HAZOP', International Journal of Computers and Applications, 39, pp. 106 - 121, http://dx.doi.org/10.1080/1206212X.2017.1283910
    Journal articles | 2012
    Mansoori M; Zakaria O; Gani A, 2012, 'Improving exposure of intrusion deception system through implementation of hybrid honeypot', International Arab Journal of Information Technology, 9
  • Conference Papers | 2021
    Haseeb J; Mansoori M; Welch I, 2021, 'Failure modes and effects analysis (FMEA) of honeypot-based cybersecurity experiment for IoT', in Proceedings - Conference on Local Computer Networks, LCN, pp. 645 - 648, http://dx.doi.org/10.1109/LCN52139.2021.9525010
    Conference Papers | 2020
    Haseeb J; Mansoori M; Al-Sahaf H; Welch I, 2020, 'IoT attacks: Features identification and clustering', in Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, pp. 353 - 360, http://dx.doi.org/10.1109/TrustCom50675.2020.00056
    Conference Papers | 2020
    Haseeb J; Mansoori M; Welch I, 2020, 'A Measurement Study of IoT-Based Attacks Using IoT Kill Chain', in Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, pp. 557 - 567, http://dx.doi.org/10.1109/TrustCom50675.2020.00080
    Conference Papers | 2019
    Mansoori M; Welch I, 2019, 'Geolocation Tracking and Cloaking of Malicious Web Sites', in Proceedings - Conference on Local Computer Networks, LCN, pp. 274 - 281, http://dx.doi.org/10.1109/LCN44214.2019.8990794
    Conference Papers | 2016
    Kumar S; Gao X; Welch I; Mansoori M, 2016, 'A machine learning based web spam filtering approach', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 973 - 980, http://dx.doi.org/10.1109/AINA.2016.177
    Conference Papers | 2016
    Mansoori M; Hirose Y; Welch I; Choo KKR, 2016, 'Empirical analysis of impact of HTTP referer on malicious website behaviour and delivery', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 941 - 948, http://dx.doi.org/10.1109/AINA.2016.113
    Conference Papers | 2016
    Mansoori M; Welch I; Choo KKR; Maxion RA, 2016, 'Application of HAZOP to the design of cyber security experiments', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 790 - 799, http://dx.doi.org/10.1109/AINA.2016.115
    Conference Papers | 2016
    Mansoori M; Welch I; Hashemi SE, 2016, 'Measurement of IP and network tracking behaviour of malicious websites', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/2843043.2843358
    Conference Papers | 2014
    Mansoori M; Welch I; Fu Q, 2014, 'YALIH, yet another low interaction honeyclient', in Conferences in Research and Practice in Information Technology Series, pp. 7 - 15
    Conference Papers | 2013
    Mohammadzadeh H; Mansoori M; Welch I, 2013, 'Evaluation of fingerprinting techniques and a windows-based dynamic honeypot', in Conferences in Research and Practice in Information Technology Series, pp. 59 - 66
    Conference Papers | 2012
    Zangooei T; Mansoori M; Welch I, 2012, 'A hybrid recognition and recall based approach in graphical passwords', in Proceedings of the 24th Australian Computer-Human Interaction Conference, OzCHI 2012, pp. 665 - 673, http://dx.doi.org/10.1145/2414536.2414637
    Conference Papers | 2009
    Lashkari AH; Mansoori M; Danesh AS, 2009, 'Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA)', in 2009 International Conference on Signal Processing Systems, ICSPS 2009, pp. 445 - 449, http://dx.doi.org/10.1109/ICSPS.2009.87

  • Best Student Paper Award in Australian Information Security Conference (ACSW - AISC), January 29 - February 1, 2013, Adelaide, Australia
  • Best Student Paper Award in Australian Information Security Conference (ACSW - AISC), 20 – 23 January 2014, Auckland, New Zealand
  • Victoria University of Wellington Scholarship, 2013
  • The Computing Research and Education Association of Australasia, CORE scholarship (2015)