- Home
- People
- Chief Investigators
- Matthew Roughan
Professor Matthew Roughan
The University of Adelaide
I obtained my PhD in Applied Mathematics from the University of Adelaide in 1994. I have since worked for the Co-operative Research Centre for Sensor Signal and Information Processing (CSSIP), in conjunction with DSTO; at the Software Engineering Research Centre at RMIT and the University of Melbourne, in conjunction with Ericsson; and at the AT&T Shannon Research Labs in the United States.
For the last decade or so I have worked at the School of Mathematical Sciences at the University of Adelaide, in South Australia.
Research Interests:
Anomaly Detection
Applied probability
Graph Theory
network topology
networks
Performance analysis
Routing
Security
Traffic
Qualifications:
PhD in Applied Mathematics
Projects
Publications
Invited talks, refereed proceedings and other conference outputs
Herath, S., Roughan M., & Glonek G.
(2020). Landmarks-based Blocking Method For Large-scale Entity Resolution.
2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA). doi: 10.1109/DSAA49011.2020.00110
South, T., Roughan M., & Mitchell L.
(2019). Critical transition of eigen-centrality of artists as a function of popularity.
The Fourth Annual Australian Social Network Analysis Conference 2019.
Roughan, M.
(2019). Space in Narrative Networks.
The Fourth Annual Australian Social Network Analysis Conference 2019.
Roughan, M., Tuke J., & Parsonage E.
(2019). Estimating the parameters of the Waxman random graph.
16th Workshop on Algorithms and Models for the Web Graph (WAW 2019). 11631, 71-86. doi: 10.1007/978-3-030-25070-6_6
Hamza, A., Ranathunga D., Gharakheili H. Habibi, Roughan M., & Sivaraman V.
(2018). Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles.
SIGCOMM IoT Security and Privacy - IoT S&P '18. 8 - 14. doi: 10.1145/3229565.3229566
Tune, P., Roughan M., &
(2018). Hierarchical Traffic Matrices: Axiomatic Foundations to Practical Traffic Matrix Synthesis.
Asia-Pacific Signal and Information Processing Association (ASIPA) Conference. 1591-1600.
Michaelson, G., Roughan M., Tuke J., Wand M., & Bush R.
(2018). Rasch analysis of HTTP reachability.
Proceedings of International Federation for Information Processing Networking 2018. 1, 1-9. doi: 10.23919/IFIPNetworking.2018.8696525
Gray, C., Mitchell L., & Roughan M.
(2018). Super-blockers and the Effect of Network Structure on Information Cascades.
Companion of the The Web Conference 2018. 1435 - 1441. doi: 10.1145/3184558.3191590
Roughan, M.
(2018). Cybersecurity of critical systems, 2020 and beyond.
ITNAC 2018 : The 28th International Telecommunication Networks and Application Conference (ITNAC 2018).
Feutrill, A., Ranathunga D., Yarom Y., & Roughan M.
(2018). The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay.
2018 Sixth International Symposium on Computing and Networking (CANDAR) . 1-10. doi: 10.1109/CANDAR.2018.00009
Ranathunga, D., Nguyen H., & Roughan M.
(2017). Verifiable Policy-Defined Networking using Metagraphs.
IFIP Networking.
TARCA, SILVIO., Roughan M., Etugrul N., & Bean N. G.
(2017). Dispatchability of Wind Power with Battery Energy Storage in South Australia.
1st International Conference on Energy and Power, RMIT Univ, Melbourne, AUSTRALIA, 14 Dec 2016 - 16 Dec 2016. Energy Procedia, 1-7. doi: 10.1016/j.egypro.2017.03.131
Gong, L., Huang L., Tune P., Han J., Chuah C-N., Roughan M., et al.
(2017). ForestStream: Accurate Measurement of Cascades in Online Social Networks.
2017 26th International Conference on Computer Communication and Networks (ICCCN)2017 26th International Conference on Computer Communication and Networks (ICCCN). 1 - 9. doi: 10.1109/ICCCN.2017.8038387
Ranathunga, D., Roughan M., Kernick P., & Falkner N.
(2016). The Mathematical Foundations for Mapping Policies to Network Devices.
International Conference on Security and Cryptography. doi: 10.5220/0005946201970206
Roughan, M.
(2016). Keynote: Lies, Damn Lies, and Internet Measurements: Statistics and Network Measurements.
Traffic Monitoring and Analysis workshop (TMA 2016).
Roughan, M.
(2016). Keynote: A short history of Internet traffic matrices.
First IEEE International Conference on Computer Communication and the Internet (ICCCI 2016).
Ranathunga, D., Roughan M., Kernick P., & Falkner N.
(2016). Malachite: Firewall policy comparison.
2016 IEEE Symposium on Computers and Communication (ISCC). doi: 10.1109/ISCC.2016.7543759
Tune, P., Cho K., & Roughan M.
(2016). A Comparison of Information Criteria for Traffic Model Selection.
10th International Conference on Signal Processing and Communications Systems (ICSPCS). doi: 10.1109/ICSPCS.2016.7843299
Ranathunga, D., Roughan M., Kernick P., Falkner N., Nguyen H., Mihailescu M., et al.
(2016). Verifiable Policy-defined Networking for Security Management.
International Conference on Security and Cryptography. 344-351. doi: 10.5220/0005990303440351
Tuke, J., & Roughan M.
(2015). The Hitchhikers Guide to sharing graph data.
IEEE International Conference on Open and Big Data. doi: 10.1109/FiCloud.2015.76
Ranathunga, D., Kernick P., Falkner N., Nguyen H., & Roughan M.
(2015). Identifying the missing aspects of the ANSI/ISA best practices for security policy.
ASIACCS 2015. doi: 10.1145/2732198.2732201
Henecka, W., & Roughan M.
(2015). Lossy Compression of dynamic, weighted graphs.
IEEE International Conference on Open and Big Data. doi: 10.1109/FiCloud.2015.64
Ranathunga, D., Kernick P., Faulkner N., & Roughan M.
(2015). Towards standardising firewall reporting.
Conference on Cybersecurity of Industrial Control Systems (CyberICS).
Bowden, R., Roughan M., & Bean N. G.
(2014). COLD.
The 10th ACM International on Conference on emerging Networking Experiments and Technologies. doi: 10.1145/2674005.2675012
Tune, P., & Roughan M.
(2014). Maximum entropy traffic matrix synthesis.
ACM SIGMETRICS Performance Evaluation Review. 42(2), 43-45. doi: 10.1145/2667522.2667536
Journal Articles
Herath, S., Roughan M., & Glonek G.
(2020). Simulating Name-like Vectors for Testing Large-scale Entity Resolution.
arXiv. arXiv:2009.03014v1.
Roughan, M.
(2019). Practically surreal: Surreal arithmetic in Julia.
SoftwareX. 9, 293 - 298. doi: 10.1016/j.softx.2019.03.005
Gray, C., Mitchell L., & Roughan M.
(2019). Generating connected random graphs.
(Gleeson, J., Ed.).Journal of Complex Networks. 7(6), 896 - 912. doi: 10.1093/comnet/cnz011
Hamza, A., Ranathunga D., Gharakheili H. Habibi, Benson T. A., Roughan M., & Sivaraman V.
(2019). Verifying and Monitoring IoTs Network Behavior using MUD Profiles.
arXiv. arXiv:1902.02484v1.
Roughan, M., Mitchell L., & South T.
(2019). How the Avengers assemble: Ecological modelling of effective cast sizes for movies.
arXiv. arXiv:1906.08403v1.
Edwards, M., Mitchell L., Tuke J., & Roughan M.
(2018). The one comparing narrative social network extraction techniques.
arXiv preprint arXiv:1811.01467.
Xia, H., Fang B., Roughan M., Cho K., & Tune P.
(2018). A BasisEvolution framework for network traffic anomaly detection.
Computer Networks. 135, 15 - 31. doi: 10.1016/j.comnet.2018.01.025
Ranathunga, D., Nguyen H.., & Roughan M.
(2017). MGtoolkit: A python package for implementing metagraphs.
SoftwareX. 6, 91 - 93. doi: 10.1016/j.softx.2017.04.001
Parsonage, E., & Roughan M.
(2017). Fast Generation of Spatially Embedded Random Networks.
IEEE Transactions on Network Science and Engineering. 4(2), 112 - 119. doi: 10.1109/TNSE.2017.2681700
Tune, P., & Roughan M.
(2017). Controlled Synthesis of Traffic Matrices.
IEEE/ACM Transactions on Networking. 25(3), 1582 - 1592. doi: 10.1109/TNET.2016.2639066
Michaelson, G., Roughan M., Tuke J., Wand M., & Bush R.
(2017). Rigorous statistical analysis of HTTPS reachability.
arXiv preprint arXiv:1706.02813.
Vaisman, R., Roughan M., & Kroese D.
(2017). The Multilevel Splitting algorithm for graph colouring with application to the Potts model.
Philosophical Magazine. 97(19), 1646 - 1673. doi: 10.1080/14786435.2017.1312023
Ranathunga, D., Roughan M., Nguyen H., Kernick P., & Falkner N.
(2016). Case studies of SCADA firewall configurations and the implications for best practices.
IEEE Transactions on Network and Service Management. 13(4), 871-884. doi: 10.1109/TNSM.2016.2597245
Henecka, W., & Roughan M.
(2015). Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases.
IEEE Transactions on Dependable and Secure Computing. 12(6), 640-651. doi: 10.1109/TDSC.2014.2382573
Tune, P., & Roughan M.
(2015). Spatiotemporal Traffic Matrix Synthesis.
ACM Sigcomm. doi: 10.1145/2829988.2787471
Technical reports and unrefereed outputs
Ranathunga, D., Roughan M., & Nguyen H.
(2018). Mathematical Reconciliation of Medical Privacy Policies.
IEEE Journal of Biomedical and Health Informatics.
Ranathunga, D., Roughan M., & Nguyen H.
(2017). Understanding Course Pathways using Metagraphs.