Keynote Speakers

Dr J. Joshua Thomas,
Associate Professor, Department of Computing
UOW Malaysia KDU Penang University College, Penang, Malaysia

Title : Deep Neural Computation Enabled Hyper Graph Neural Networks: from Molecules to binding affinity Prediction

Profile: J. Joshua Thomas is an Associate Professor in Computer Science at UOW Malaysia KDU Penang University College. His work involves intelligent systems techniques in which he adopts computational algorithm implementation in inter-discipline field areas. His expertise is evident in working with International collaborators in publications, visiting research fellow Sathyabama institute of science and technology, He is an Honorary Professor at School of Computing Science and Engineering, Galgotias University, India. Joshua working in Deep learning algorithms specially targeting on Graph Convolutional Neural Networks (GCNN) and Graph Recurrent Neural Networks (GRNN), Hyper-Graph Attentions, End to end steering learning systems, design algorithms in drug discovery and Quantum machine learning. He is a principal investigator, co-investigator in various grants funding, including internal, national and international levels. Joshua has guest editor for Applied Sciences, Computations, Forecasting, Algorithms (MDPI), Mathematics Biosciences and Engineering (MBE) Journals. He has authored and edited eight books (Wiley, Elsevier and IGI publishers) Springer LNNS volume editors of ICO2022, ICO2023. He has published more than 80 papers in leading international conference proceedings and peer reviewed journals.


Dr. Funminiyi Olajide, Ph.D., MCSFS, FBCS, FHEA., United Kingdom,
Senior Lecturer in Information Security and Computer Forensics
Course Manager, MSc Engineering Management,
DofCS, SST, Academic Lead for NTU International Universities Collaboration

Title : Developing Methodology Approach for SCADA Forensics and Process for Incident Response of CNI

Profile: As Digital Technology is increasing, there is need for a sophisticated toolkits development for SCADA Forensic Incident Response (SFIR). SCADA is the term used as Supervisory Control and Data Acquisition (SCADA) systems in different Critical National Infrastructure (CNI) and these includes Electric Power, Oil & Gas, Manufacturing, Utility, Transportation services and others. Digital Society and at the pace at which technology are advancing, cyber threats are enormous and therefore, maintenance of SCADA cycle against cyberattack on CNI has become an important area for research innovation and development. The methodology approach for SCADA Forensics Incident Response (SFIR) and 'ICS Forensic Toolbag' research is evaluated on the need for rapid response of cyber incident. This is underpinning the control systems and as identified on characteristics of real time scenario for CNI critical safety. As various demanding, a Case study of an infected malware of digital device will be presented and as related to the forensics artifacts, for data and enterprise security of IT/IS infrastructures, in a secure operating systems environment.