- Home
- People
- Chief Investigators
- Matthew Roughan
Professor Matthew Roughan
The University of Adelaide
I obtained my PhD in Applied Mathematics from the University of Adelaide in 1994. I have since worked for the Co-operative Research Centre for Sensor Signal and Information Processing (CSSIP), in conjunction with DSTO; at the Software Engineering Research Centre at RMIT and the University of Melbourne, in conjunction with Ericsson; and at the AT&T Shannon Research Labs in the United States.
For the last decade or so I have worked at the School of Mathematical Sciences at the University of Adelaide, in South Australia.
Research Interests:
Anomaly Detection
Applied probability
Graph Theory
network topology
networks
Performance analysis
Routing
Security
Traffic
Qualifications:
PhD in Applied Mathematics
Projects
Publications
Invited talks, refereed proceedings and other conference outputs
Herath, S., Roughan M., & Glonek G.
(2020). Landmarks-based Blocking Method For Large-scale Entity Resolution.
2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA). doi: 10.1109/DSAA49011.2020.00110
Roughan, M.
(2019). Space in Narrative Networks.
The Fourth Annual Australian Social Network Analysis Conference 2019.
Roughan, M., Tuke J., & Parsonage E.
(2019). Estimating the parameters of the Waxman random graph.
16th Workshop on Algorithms and Models for the Web Graph (WAW 2019). 11631, 71-86. doi: 10.1007/978-3-030-25070-6_6
South, T., Roughan M., & Mitchell L.
(2019). Critical transition of eigen-centrality of artists as a function of popularity.
The Fourth Annual Australian Social Network Analysis Conference 2019.
Feutrill, A., Ranathunga D., Yarom Y., & Roughan M.
(2018). The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay.
2018 Sixth International Symposium on Computing and Networking (CANDAR) . 1-10. doi: 10.1109/CANDAR.2018.00009
Hamza, A., Ranathunga D., Gharakheili H. Habibi, Roughan M., & Sivaraman V.
(2018). Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles.
SIGCOMM IoT Security and Privacy - IoT S&P '18. 8 - 14. doi: 10.1145/3229565.3229566
Tune, P., Roughan M., &
(2018). Hierarchical Traffic Matrices: Axiomatic Foundations to Practical Traffic Matrix Synthesis.
Asia-Pacific Signal and Information Processing Association (ASIPA) Conference. 1591-1600.
Michaelson, G., Roughan M., Tuke J., Wand M., & Bush R.
(2018). Rasch analysis of HTTP reachability.
Proceedings of International Federation for Information Processing Networking 2018. 1, 1-9. doi: 10.23919/IFIPNetworking.2018.8696525
Gray, C., Mitchell L., & Roughan M.
(2018). Super-blockers and the Effect of Network Structure on Information Cascades.
Companion of the The Web Conference 2018. 1435 - 1441. doi: 10.1145/3184558.3191590
Roughan, M.
(2018). Cybersecurity of critical systems, 2020 and beyond.
ITNAC 2018 : The 28th International Telecommunication Networks and Application Conference (ITNAC 2018).
TARCA, SILVIO., Roughan M., Etugrul N., & Bean N. G.
(2017). Dispatchability of Wind Power with Battery Energy Storage in South Australia.
1st International Conference on Energy and Power, RMIT Univ, Melbourne, AUSTRALIA, 14 Dec 2016 - 16 Dec 2016. Energy Procedia, 1-7. doi: 10.1016/j.egypro.2017.03.131
Gong, L., Huang L., Tune P., Han J., Chuah C-N., Roughan M., et al.
(2017). ForestStream: Accurate Measurement of Cascades in Online Social Networks.
2017 26th International Conference on Computer Communication and Networks (ICCCN)2017 26th International Conference on Computer Communication and Networks (ICCCN). 1 - 9. doi: 10.1109/ICCCN.2017.8038387
Ranathunga, D., Nguyen H., & Roughan M.
(2017). Verifiable Policy-Defined Networking using Metagraphs.
IFIP Networking.
Tune, P., Cho K., & Roughan M.
(2016). A Comparison of Information Criteria for Traffic Model Selection.
10th International Conference on Signal Processing and Communications Systems (ICSPCS). doi: 10.1109/ICSPCS.2016.7843299
Ranathunga, D., Roughan M., Kernick P., Falkner N., Nguyen H., Mihailescu M., et al.
(2016). Verifiable Policy-defined Networking for Security Management.
International Conference on Security and Cryptography. 344-351. doi: 10.5220/0005990303440351
Ranathunga, D., Roughan M., Kernick P., & Falkner N.
(2016). The Mathematical Foundations for Mapping Policies to Network Devices.
International Conference on Security and Cryptography. doi: 10.5220/0005946201970206
Roughan, M.
(2016). Keynote: Lies, Damn Lies, and Internet Measurements: Statistics and Network Measurements.
Traffic Monitoring and Analysis workshop (TMA 2016).
Roughan, M.
(2016). Keynote: A short history of Internet traffic matrices.
First IEEE International Conference on Computer Communication and the Internet (ICCCI 2016).
Ranathunga, D., Roughan M., Kernick P., & Falkner N.
(2016). Malachite: Firewall policy comparison.
2016 IEEE Symposium on Computers and Communication (ISCC). doi: 10.1109/ISCC.2016.7543759
Henecka, W., & Roughan M.
(2015). Lossy Compression of dynamic, weighted graphs.
IEEE International Conference on Open and Big Data. doi: 10.1109/FiCloud.2015.64
Ranathunga, D., Kernick P., Faulkner N., & Roughan M.
(2015). Towards standardising firewall reporting.
Conference on Cybersecurity of Industrial Control Systems (CyberICS).
Tuke, J., & Roughan M.
(2015). The Hitchhikers Guide to sharing graph data.
IEEE International Conference on Open and Big Data. doi: 10.1109/FiCloud.2015.76
Ranathunga, D., Kernick P., Falkner N., Nguyen H., & Roughan M.
(2015). Identifying the missing aspects of the ANSI/ISA best practices for security policy.
ASIACCS 2015. doi: 10.1145/2732198.2732201
Bowden, R., Roughan M., & Bean N. G.
(2014). COLD.
The 10th ACM International on Conference on emerging Networking Experiments and Technologies. doi: 10.1145/2674005.2675012
Tune, P., & Roughan M.
(2014). Maximum entropy traffic matrix synthesis.
ACM SIGMETRICS Performance Evaluation Review. 42(2), 43-45. doi: 10.1145/2667522.2667536
Journal Articles
Herath, S., Roughan M., & Glonek G.
(2020). Simulating Name-like Vectors for Testing Large-scale Entity Resolution.
arXiv. arXiv:2009.03014v1.
Roughan, M.
(2019). Practically surreal: Surreal arithmetic in Julia.
SoftwareX. 9, 293 - 298. doi: 10.1016/j.softx.2019.03.005
Gray, C., Mitchell L., & Roughan M.
(2019). Generating connected random graphs.
(Gleeson, J., Ed.).Journal of Complex Networks. 7(6), 896 - 912. doi: 10.1093/comnet/cnz011
Hamza, A., Ranathunga D., Gharakheili H. Habibi, Benson T. A., Roughan M., & Sivaraman V.
(2019). Verifying and Monitoring IoTs Network Behavior using MUD Profiles.
arXiv. arXiv:1902.02484v1.
Roughan, M., Mitchell L., & South T.
(2019). How the Avengers assemble: Ecological modelling of effective cast sizes for movies.
arXiv. arXiv:1906.08403v1.
Edwards, M., Mitchell L., Tuke J., & Roughan M.
(2018). The one comparing narrative social network extraction techniques.
arXiv preprint arXiv:1811.01467.
Xia, H., Fang B., Roughan M., Cho K., & Tune P.
(2018). A BasisEvolution framework for network traffic anomaly detection.
Computer Networks. 135, 15 - 31. doi: 10.1016/j.comnet.2018.01.025
Michaelson, G., Roughan M., Tuke J., Wand M., & Bush R.
(2017). Rigorous statistical analysis of HTTPS reachability.
arXiv preprint arXiv:1706.02813.
Vaisman, R., Roughan M., & Kroese D.
(2017). The Multilevel Splitting algorithm for graph colouring with application to the Potts model.
Philosophical Magazine. 97(19), 1646 - 1673. doi: 10.1080/14786435.2017.1312023
Ranathunga, D., Nguyen H.., & Roughan M.
(2017). MGtoolkit: A python package for implementing metagraphs.
SoftwareX. 6, 91 - 93. doi: 10.1016/j.softx.2017.04.001
Parsonage, E., & Roughan M.
(2017). Fast Generation of Spatially Embedded Random Networks.
IEEE Transactions on Network Science and Engineering. 4(2), 112 - 119. doi: 10.1109/TNSE.2017.2681700
Tune, P., & Roughan M.
(2017). Controlled Synthesis of Traffic Matrices.
IEEE/ACM Transactions on Networking. 25(3), 1582 - 1592. doi: 10.1109/TNET.2016.2639066
Ranathunga, D., Roughan M., Nguyen H., Kernick P., & Falkner N.
(2016). Case studies of SCADA firewall configurations and the implications for best practices.
IEEE Transactions on Network and Service Management. 13(4), 871-884. doi: 10.1109/TNSM.2016.2597245
Henecka, W., & Roughan M.
(2015). Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases.
IEEE Transactions on Dependable and Secure Computing. 12(6), 640-651. doi: 10.1109/TDSC.2014.2382573
Tune, P., & Roughan M.
(2015). Spatiotemporal Traffic Matrix Synthesis.
ACM Sigcomm. doi: 10.1145/2829988.2787471
Technical reports and unrefereed outputs
Ranathunga, D., Roughan M., & Nguyen H.
(2018). Mathematical Reconciliation of Medical Privacy Policies.
IEEE Journal of Biomedical and Health Informatics.
Ranathunga, D., Roughan M., & Nguyen H.
(2017). Understanding Course Pathways using Metagraphs.