Dr Seyit Camtepe
This person does not currently hold a position at QUT.
BiographyDr Seyit A. Camtepe has eleven years of international research, teaching and student mentoring, and additional six years of industrial experience in computer network security. Dr Camtepe has produced more than 40 refereed publications in wireless sensor network security, mobile security and cyber security. His publications have received more than 1900 citations with h-index 19 (Google scholar). Erdős number of Dr Camtepe is 2 (Oakland University Erdős Number Project).
Dr Camtepe has commenced his career in the banking industry as a network and security engineer in 1996. Following six years of industrial experience and extensive training on Microsoft, IBM, Cisco, HP-UX and Checkpoint network and security technologies, he pursued his PhD study in Computer Science at the Rensselaer Polytechnic Institute, New York, USA. During his PhD study, he worked on security research projects funded by US National Science Foundation and US Air Force Research Laboratory in Rome (New York) covering topics key management in wireless sensor networks, attack modelling and detection, and social network analysis. He assisted the network security, and cryptography and malicious cryptography classes for five years. He received the PhD degree in 2007.
Dr Camtepe has worked as a research group leader at the Technische Universitaet Berlin, Germany, from 2007 to 2012. His responsibilities included research, research project acquisition and management, thesis mentoring, and teaching. He has led a research group composed of 2 postdoctoral researchers, 7 PhD candidates and 11 MSc students. Together with his team, he has acquired research projects (more than 4 M€ total funding in five years) from national, international and industry sources. Dr Camtepe has taught graduate and undergraduate lectures, projects and seminars on communication network security, pervasive security and autonomous security for five years. He has mentored 7 PhD candidates starting from the first year in their PhD study. Total of 9 Diplom, 8 MSc and 6 BSc degrees have been granted under his supervision.
Dr Camtepe is currently an ECARD (Early Career Academic Recruitment and Development) Lecturer at the Information Security Institute of the Electrical Engineering and Computer Science School, Science and Engineering Faculty, Queensland University of Technology, Australia. Research interests and research results of Dr Camtepe cover topics cyber security, mobile security, wireless sensor network security, and applied and malicious cryptography.
mobile and wireless security, pervasive security, attack modelling and impact analysis, cyber security, information security, intrusion and anomaly detection, network security, non-intrusive security, applied and malicious cryptography, security simulation
Computer Software, Data Format, Distributed Computing
Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008
- PhD in Computer Science (Rensselaer Polytechnic Institute NY)
Professional memberships and associations
IEEE (Institute of Electrical and Electronics Engineers)
- Member of the Communication Society (ComSoc)
- Member since 2007
- Student member 2004-2007
ACM (Association for Computing Machinery)
- Member of the Special Interest Group on Security, Audit and Control (SIGSAC)
- Member since 2007
- IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 17)
- Int. Conference on Malicious and Unwanted Software (Malware 12, 13, 14, 15).
- Int. Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 15).
- Int. Symposium on Security in Computing and Communications (SSCC 13).
- Int. Workshop on Inform. Quality & Quality of Service for Pervasive Comp. (IQ2S 13).
- IFIP Int. Conf. on New Technologies, Mobility and Security (NTMS 11), Security Track.
- IEEE Int. Workshop on SEcurity and SOCial Networking (SESOC 10, 11, 12, 13).
- IEEE Int. Workshop on Cyberspace Safety and Security (CSS 08).
- Int. Conf. on Security and Privacy for Communication Networks (SecureComm 08).
Conference Session Chairing
- RSA and Cryptanalysis in the 18th Australasian Conference on Information Security and Privacy (ACISP 13).
- Network Intrusion Detection I-II in the 4th International Conference on Security and Privacy in Communication Networks (SecureComm 08).
- Ad Hoc Networks in the 3rd International Conference on Security and Privacy in Communication Networks (SecureComm 07).
- (MSc): IFN643 Computer System Security (2015, 2016)
- (MSc): IFN642 Applied Cryptography and Network Security (2015,2016)
- (BSc): CAB440 Network and Systems Administration (2016)
- (MSc): IFN661 Mobile and Pervasive Systems (2015)
- (BSc): INB351 Unix Network Administration (2014)
- (MSc): INN351 Unix Network Administration (2014)
- (BSc/MSc): INB353 / INN353 Wireless and Mobile Networks (2014)
- (BSc/MSc): INB271 / INN271 The Web (2013)
Lecturer, Technische Universitaet Berlin, Germany, (2007 – 2012)
- (MSc Lecture): Special Topics in Communication Networks and Pervasive Security (Winter 2010/11, 2011/12)
- (BSc Lecture): Communication Network Security (Summer 2010, 2011, 2012)
- (MSc Seminar): Autonomous Security (Winter 2010/11, 2011/12)
- (BSc Seminar): Communication and Security (Winter 2010/11, 2011/12, Summer 2010, 2011, 2012)
- (BSc Project): Communication Network Security (Winter 2010/11, 2011/12 , Summer 2010, 2011, 2012)
- (MSc Project): Autonomous Security I – II (Winter & Summer 2007, 2008, 2009)
Teaching Assistant, Rensselaer Polytechnic Institute, New York, USA, (2002 – 2007)
- (Graduate/Undergraduate): Network Security – II (Spring 2006, 2007)
- (Graduate/Undergraduate): Network Security – I (Fall 2003, 2004, 2005, 2006)
- (Graduate/Undergraduate): Algorithms (Spring 2005)
- (Undergraduate): Introduction to Computer Programming (Fall 2006)
Research Group Leader and Lecturer, Technische Universitaet Berlin, Germany (2007 – 2012)
- Led a research group of 2 postdoctoral researchers, 7 PhD candidates and 11 MSc students.
- CI / Lead-CI in national, international and industry funded research projects (more than 4 M€ total funding in five years):
- Privacy preservation in smart spaces (01/2012 - 12/2012), EU
- Critical information infrastructure security (09/2010 - 02/2012), Government
- Anomaly detection and early warning systems (05/2010 - 04/2012), Industry
- Quantitative risk management (4/2009 - 06/2012), Industry
- Graded security (8/2009-1/2010), Industry
- Smart mobile (5/2008 - 12/2009), Industry
- Activity-based verification (07/2008 - 12/2009), Industry
- Android security (7/2008-6/2009), Industry
- Performance management & optimization (01/2009 – 09/2009), Industry
- Smart senior (04/2009 – 03/2012), Government
- User centric paradigm for seamless mobility in future Internet (05/2008 - 04/2011), EU
- Mentored PhD candidates:
- Dr.-Ing. A.-D. Schmidt, Detection of smartphone malwares, (degree granted in 2012)
- Dr.-Ing. R. Bye, Collaborative intrusion and malware detection, (degree granted in 2013)
- S. Schmidt, A Quantitative methodology for online IT risk management
- A. Messerman, Non-Intrusive user identification & verification
- L. Batyuk, Context-aware security
- Supervised/co-supervised Diplom, MSc and BSc theses:
- K. Raddatz, Survey and proof-of-concept implementation of novel authentication methods for mobile devices, (Dipl. 2012)
- Y. Dai, Simulation of P2P protocols for collaborative intrusion detection systems, (Dipl. 2012)
- S. R. Aranda, Development and evaluation of a P2P collaboration framework between IDS, (MSc 2011)
- Y. Li, A graphical authentication method for smartphones, (MSc 2011)
- R. Rozenberg, Enhanced keystroke dynamics authentication in real time environment, (MSc 2011)
- T. Blaesing, Android application sandbox for suspicious software detection, (Dipl. 2010)
- H.-G. Schmidt, Feature selection & extraction on android-based smartphones for anomaly & context detection, (Dipl. 2010)
- J. Shen, Smartphone security, (MSc 2010)
- B. Su, A taxonomy of intrusion and malware detection systems for smartphones, (MSc 2010)
- J. Chinnow, Simulation and evaluation of a network computer worm counter measure, (Dipl. 2008)
Research and Teaching Assistant, Rensselaer Polytechnic Institute (RPI), New York, USA (2002 – 2007)
- Research projects:
- Study of Dynamically Evolving Social Groups in Communication Networks (US NSF ITR Award # 0324947)
- Surveillance, Analysis and Modeling of Chatroom Communities (US NSF ACT Award # 0442154)
- Active Access Control for Insider Threat Detection and Response in Wireless Networks (US Air Force Research Laboratory in Rome, New York, Award # A71039)
- Spread of Internet Worms (RPI Internal project)
Network and Security Engineer, Banking Industry (1996 - 2002)
- Installed and administered LAN, and Internet infrastructure and services for 3 headquarters and 160 branch offices.
- Received extensive training on Microsoft, IBM, Cisco, HP-UX and Checkpoint network and security technologies.
- Camtepe S, Yener B, (2007) Combinatorial design of key distribution mechanisms for wireless sensor networks, IEEE/ACM Transactions on Networking, 15 (2) p346
- Schmidt D, Radke K, Camtepe S, Foo E, Ren M, (2016) A survey and analysis of the GNSS spoofing threat and countermeasures, ACM Computing Surveys, 48 (4) p1
- Tian G, Camtepe S, Tian G, (2016) A deadline-constrained 802.11 MAC protocol with QoS differentiation for soft real-time control, IEEE Transactions on Industrial Informatics, 12 (2) p544
- Amoah R, Camtepe S, Foo E, (2016) Formal modelling and analysis of DNP3 secure authentication, Journal of Network and Computer Applications, 59 () p345
- Djamaludin C, Foo E, Camtepe S, Corke P, (2016) Revocation and update of trust in autonomous delay tolerant networks, Computers and Security, 60 () p15
- Schmidt A, Peters F, Lamour F, Scheel C, Camtepe S, Albayrak S, (2009) Monitoring smartphones for anomaly detection, Mobile Networks and Applications, 14 (1) p92
- Blasing T, Batyuk L, Schmidt A, Camtepe S, Albayrak S, (2010) An Android Application Sandbox system for suspicious software detection, Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software p55
- Schmidt A, Schmidt H, Batyuk L, Clausen J, Camtepe S, Albayrak S, Yildizli C, (2009) Smartphone malware evolution revisited: Android next target?, Proceedings of the 2009 4th International Conference on Malicious and Unwanted Software p1
- Schmidt A, Bye R, Schmidt H, Clausen J, K O, Yuksel K, Camtepe S, Albayrak S, (2009) Static analysis of executables for collaborative malware detection on Android, Proceedings of the 2009 IEEE International Conference on Communications p1
- Camtepe S, Yener B, Yung M, (2006) Expander graph based key distribution mechanisms in wireless sensor networks, Proceedings of the 2006 IEEE International Conference on Communications p2262