Michael Hitchens

Associate Professor

  • 830 Citations
  • 16 h-Index
1992 …2019
If you made any changes in Pure these will be visible here soon.

Research Outputs 1992 2019

2019

A policy based security architecture for software-defined networks

Varadharajan, V., Karmakar, K., Tupakula, U. & Hitchens, M., Apr 2019, In : IEEE Transactions on Information Forensics and Security. 14, 4, p. 897-912 16 p., 8453023.

Research output: Contribution to journalArticleResearchpeer-review

Switches
Controllers
Network security
Communication
Specifications

Design and implementation of a secure and flexible access-right delegation for resource constrained environments

Rabehaja, T., Pal, S. & Hitchens, M., 1 Oct 2019, In : Future Generation Computer Systems. 99, p. 593-608 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Cryptography
Internet of things
Bandwidth
Data storage equipment

Energy efficient military surveillance: coverage meets connectivity

Thomas, D., Shankaran, R., Orgun, M., Hitchens, M. & Ni, W., 15 May 2019, In : IEEE Sensors Journal. 19, 10, p. 3902-3911 10 p., 8625552.

Research output: Contribution to journalArticleResearchpeer-review

surveillance
Energy efficiency
intrusion
Scheduling algorithms
Base stations

Modeling identity for the Internet of Things: survey, classification and trends

Pal, S., Hitchens, M. & Varadharajan, V., 4 Jan 2019, 2018 12th International Conference on Sensing Technology, ICST 2018. Institute of Electrical and Electronics Engineers (IEEE), Vol. 2018-December. p. 45-51 7 p. 8603595

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Internet of things
Systems analysis
Communication
Access control
Smart sensors
Internet of things

Teaching user centered conceptual design using cross-cultural personas and peer reviews for a large cohort of students

Anvari, F., Richards, D., Hitchens, M. & Tran, H. M. T., 27 May 2019, Proceedings 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering Education and Training ICSE-SEET 2019. Institute of Electrical and Electronics Engineers (IEEE), p. 62-73 12 p. 8802096

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Conceptual design
Teaching
Students
User centered design
Engineering technology

Towards a method for creating personas with knowledge and cognitive process for user centered design of a learning application

Anvari, F., Tran, H. M. T., Richards, D. & Hitchens, M., 27 May 2019, Proceedings 2019 IEEE/ACM 12th International Workshop on Cooperative and Human Aspects of Software Engineering: CHASE 2019. Institute of Electrical and Electronics Engineers (IEEE), p. 123-130 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Students
Industry
Teaching
User centered design
2018

A gamification design for the classroom

Hitchens, M. & Tulloch, R., 2018, In : Interactive Technology and Smart Education. 15, 1, p. 28-45 18 p.

Research output: Contribution to journalArticleResearchpeer-review

Students
classroom
student
autonomy
minority

eSport vs irlSport

McCutcheon, C., Hitchens, M. & Drachen, A., 2018, Advances in computer entertainment technology: 14th International Conference, ACE 2017, London, UK, December 14-16, 2017, Proceedings. Cheok, A. D., Inami, M. & Romão, T. (eds.). Cham: Springer, Springer Nature, p. 531-542 12 p. (Lecture Notes in Computer Science; vol. 10714).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Open Access
File
Sports
Critical Thinking
Embodiment
Term

Incremental acquisition of values to deal with cybersecurity ethical dilemmas

Richards, D., Dignum, V., Ryan, M. & Hitchens, M., 1 Jan 2018, Knowledge Management and Acquisition for Intelligent Systems: 15th Pacific Rim Knowledge Acquisition Workshop, PKAW 2018, Proceedings. Yoshida, K. & Lee, M. (eds.). Cham: Springer, Springer Nature, p. 32-45 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11016 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Dilemma
Ripple
Decision making
Decision Making
Knowledge Acquisition

Player retention in league of legends: a study using survival analysis

Demediuk, S., Murrin, A., Bulger, D., Hitchens, M., Drachen, A., Raffe, W. L. & Tamassia, M., 29 Jan 2018, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2018. New York: Association for Computing Machinery, Vol. Part F134893. p. 1-9 9 p. 3167937

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Industry
Hazards

Policy-based access control for constrained healthcare resources

Pal, S., Hitchens, M., Varadharajan, V. & Rabehaja, T., 28 Aug 2018, 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p. 8449813

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Internet of things
2017

An empirical investigation of the influence of persona with personality traits on conceptual design

Anvari, F., Richards, D., Hitchens, M., Babar, M. A., Tran, H. M. T. & Busch, P., 1 Dec 2017, In : Journal of Systems and Software. 134, p. 324-339 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Conceptual design
Engineers

On design of a fine-grained access control architecture for securing iot-enabled smart healthcare systems

Pal, S., Hitchens, M., Varadharajan, V. & Rabehaja, T., 7 Nov 2017, MobiQuitous 2017 Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. New York: Association for Computing Machinery (ACM), p. 432-441 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Authentication
Health
Internet of things
Sensors

On the design of security mechanisms for the Internet of Things

Pal, S., Hitchens, M. & Varadharajan, V., 2017, 2017 Eleventh International Conference on Sensing Technology (ICST): proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 286-291 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Security systems
Internet of things
Communication

Towards a secure access control Architecture for the Internet of Things

Pal, S., Hitchens, M. & Varadharajan, V., 14 Nov 2017, 2017 IEEE 42nd Conference on Local Computer Networks (LCN 2017): proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 219-222 4 p. 8109357

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Internet of things
2016

Policy based security architecture for software defined networks

Karmakar, K. K., Varadharajan, V., Tupakula, U. & Hitchens, M., 4 Apr 2016, 2016 Symposium on Applied Computing, SAC 2016. New York, USA: Association for Computing Machinery, Vol. 04-08-April-2016. p. 658-663 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Controllers
Switches
Communication

Predicting player churn in Destiny: a hidden Markov models approach to predicting player departure in a major online game

Tamassia, M., Raffe, W., Sifa, R., Drachen, A., Zambetta, F. & Hitchens, M., 2016, 2016 IEEE Conference on Computational Intelligence and Games (CIG): proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-8 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Hidden Markov models
Industry

The relationship between character identification and flow state within video games

Soutter, A. R. B. & Hitchens, M., 1 Feb 2016, In : Computers in Human Behavior. 55, p. 1030-1038 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Video Games
Immersion
Self Report
Research
2015

Cross-domain attribute conversion for authentication and authorization

Thaler, S., Den Hartog, J., Ayed, D., Sommer, D. & Hitchens, M., 16 Oct 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 652-659 8 p. 7299976

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Authentication
Terminology
Ontology
Animals

Effectiveness of persona with personality traits on conceptual design

Anvari, F., Richards, D., Hitchens, M. & Babar, M. A., 12 Aug 2015, Proceedings - 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, ICSE 2015. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), Vol. 2. p. 263-272 10 p. 7202971. (International Conference on Software Engineering Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Conceptual design
Students
Software engineering
Teaching

Generic constructions for role-based encryption

Zhou, L., Varadharajan, V. & Hitchens, M., 1 Oct 2015, In : International Journal of Information Security. 14, 5, p. 417-430 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Cryptography
Outsourcing

Provenance based classification access policy system based on encrypted search for cloud data storage

Fan, X., Varadharajan, V. & Hitchens, M., 2015, Information Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings. Lopez, J. & Mitchell, C. J. (eds.). Cham: Springer, Springer Nature, p. 283-298 16 p. (Lecture Notes in Computer Science; vol. 9290).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Provenance
Data Storage
Access control
Semantics
Data storage equipment

Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage

Zhou, L., Varadharajan, V. & Hitchens, M., 1 Nov 2015, In : IEEE Transactions on Information Forensics and Security. 10, 11, p. 2381-2395 15 p., 7155561.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Data storage equipment
Decision making
Control systems
Costs
2014

Antivirus security: Naked during updates

Min, B., Varadharajan, V., Tupakula, U. & Hitchens, M., 2014, In : Software - Practice and Experience. 44, 10, p. 1201-1222 22 p.

Research output: Contribution to journalArticleResearchpeer-review

Computer systems
Malware

A trust management framework for secure cloud data storage using cryptographic role-based access control

Zhou, L., Varadharajan, V. & Hitchens, M., 2014, E-Business and Telecommunications: International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013 Revised Selected Papers. Obaidat, M. S. & Filipe, J. (eds.). Heidelberg: Springer, Springer Nature, p. 226-251 26 p. (Communications in Computer and Information Science; vol. 456).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Access control
Data storage equipment
Security of data
Managers

Cryptographic role-based access control for secure cloud data storage systems

Zhou, L., Varadharajan, V. & Hitchens, M., 2014, Security, Privacy and Trust in Cloud Systems. Nepal, S. & Pathan, M. (eds.). Heidelberg: Springer, Springer Nature, p. 313-344 32 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Access control
Data storage equipment
Costs

Cultivation planning application to enhance decision making among Sri Lankan farmers

Ginige, T., Richards, D. & Hitchens, M., 2014, Knowledge Management and Acquisition for Smart Systems and Services: 13th Pacific Rim Knowledge Acquisition Workshop, PKAW 2014 Gold Cost, Qld, Australia, December 1-2, 2014 Proceedings. Kim, Y. S., Kang, B. H. & Richards, D. (eds.). Switzerland: Springer, Springer Nature, p. 180-194 15 p. (Lecture Notes in Artificial Intelligence; vol. 8863).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Crops
Ontology
Information systems
Decision making
Decision Making

Reality and terror, the first-person shooter in current day settings

Hitchens, M., Patrickson, B. & Young, S., 2014, In : Games and Culture. 9, 1, p. 3-29 27 p.

Research output: Contribution to journalArticleResearchpeer-review

terrorism
human being
military-industrial complex
Propaganda
propaganda

Secure administration of cryptographic role-based access control for large-scale cloud storage systems

Zhou, L., Varadharajan, V. & Hitchens, M., 2014, In : Journal of Computer and System Sciences. 80, 8, p. 1518-1533 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Role-based Access Control
Storage System
Access control
Encryption
Cryptography

Six questions

Hitchens, M., 2014, Peer review of learning and teaching in higher education: international perspectives. Sachs, J. & Parsell, M. (eds.). Dordrecht, Heidelberg, London, NewYork: Springer, Springer Nature, p. 85-102 18 p. (Professional Learning and Development in Schools and Higher Education; vol. 9).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Towards quantifying player's involvement in 3D games based-on player types

Hanna, N., Richards, D., Hitchens, M. & Jacobson, M. J., 2 Dec 2014, Proceedings of the 2014 Conference on Interactive Entertainment. Blackmore, K., Nesbitt, K. & Smith, S. P. (eds.). New York: Association for Computing Machinery, p. 1-10 10 p. 26

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

2013

Achieving secure role-based access control on encrypted data in cloud storage

Zhou, L., Varadharajan, V. & Hitchens, M., 2013, In : IEEE Transactions on Information Forensics and Security. 8, 12, p. 1947-1960 14 p., 6642048.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Cryptography
Cloud computing
Data storage equipment

Evaluating the impact of the human-agent teamwork communication model (HAT-CoM) on the development of a shared mental model

Hanna, N., Richards, D. & Hitchens, M., 2013, PRIMA 2013: principles and practice of multi-agent systems: 16th international conference, Dunedin, New Zealand, December 1-6, 2013, proceedings. Boella, G., Elkind, E., Savarimuthu, B. T. R., Dignum, F. & Purvis, M. K. (eds.). Heidelberg: Springer, Springer Nature, p. 453-460 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8291 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Mental Models
Team Work
Communication
Model
Human

Form over function: the use of Lovecraftian elements in World of Warcraft

Hitchens, M. & Ruch, A., 2013, IE 2013 - Proceedings of the 9th Australasian Conference on Interactive Entertainment: Matters of Life and Death. Greuter, S. (ed.). New York: Association for Computing Machinery (ACM), p. 1-8 8 p. 23

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Integrating trust with cryptographic role-based access control for secure cloud data storage

Zhou, L., Varadharajan, V. & Hitchens, M., 2013, Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13, 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, 16-18 July 2013, Melbourne, Victoria, Australia. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 560-569 10 p. 6680887

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Data storage equipment
Scalability
Decision making
Control systems

Trust-based secure cloud data storage with cryptographic role-based access control

Zhou, L., Varadharajan, V. & Hitchens, M., 2013, ICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings. Portugal: SciTePress, p. 62-73 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Data storage equipment
Large scale systems
Control systems
2012

A cross-disciplinary approach to degree programs in video games

Hitchens, M., Tulloch, R. & Ruch, A., 2012, In : Asian Social Science. 8, 14, p. 49-57 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File
computer game
interactive media
cultural studies
Video Games
Cross-disciplinary

A Flexible cryptographic approach for secure data storage in the cloud using role-based access control

Zhou, L., Varadharajan, V. & Hitchens, M., 2012, In : International journal of cloud computing. 1, 2-3, p. 201-220 20 p.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Data storage equipment
Control systems
Cryptography
Managers

An investigation of player to player character identification via personal pronouns

Hitchens, M., Drachen, A. & Richards, D., 2012, Playing the system: poceedings of the 8th Australasian Conference on Interactive Entertainment, 21-22 July 2012 Auckland University of Technology, Auckland, New Zealand. Cermak-Sassenrath, D. (ed.). New York, NY: Association for Computing Machinery (ACM), p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

An investigation of Vladimir Propp's 31 functions and 8 broad character types and how they apply to the analysis of video games

Brusentsev, A., Hitchens, M. & Richards, D., 2012, Playing the system: poceedings of the 8th Australasian Conference on Interactive Entertainment, 21-22 July 2012 Auckland University of Technology, Auckland, New Zealand. Cermak-Sassenrath, D. (ed.). New York, NY: Association for Computing Machinery (ACM), p. 1-10 10 p. 2

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

A novel agent based control scheme for RTS games

Cabanag, M., Richards, D. & Hitchens, M., 2012, Playing the system: poceedings of the 8th Australasian Conference on Interactive Entertainment, 21-22 July 2012 Auckland University of Technology, Auckland, New Zealand. Cermak-Sassenrath, D. (ed.). New York, NY: Association for Computing Machinery (ACM), p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Multi agent systems
Controllers
Experiments

Metadata based forensic analysis of digital information in the web

Salama, U., Varadharajan, V. & Hitchens, M., 2012, Proceedings of the 7th Annual Symposium on Information Assurance (ASIA 2012) and 5th Secure Knowledge Management Conference (SKM 2012). ALBANY, NY: University of Albany, p. 9-15 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Metadata
Websites
Decision making
Cameras
Internet

Trusted administration of large-scale cryptographic role-based access control systems

Zhou, L., Varadharajan, V. & Hitchens, M., 2012, Proceedings: the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2012): 25-27 June 2012, Liverpool, UK. Min, G., Wu, Y., Liu, L. C., Jin, X., Jarvis, S. & Al-Dubai, A. Y. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 714-721 8 p. 6296040

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Access control
Control systems
Outsourcing
Cryptography
Large scale systems
2011

A survey of first-person shooters and their avatars

Hitchens, M., Dec 2011, In : Game Studies. 11, 3, p. 1-30 30 p.

Research output: Contribution to journalArticleResearchpeer-review

Avatar
Person
Game
human being
genre

Enforcing role-based access control for secure data storage in the cloud

Zhou, L., Varadharajan, V. & Hitchens, M., Oct 2011, In : Computer Journal. 54, 10, p. 1675-1687 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Cryptography
Data storage equipment
2010

Analysis of property based attestation in trusted platforms

Nagarajan, A., Varadharajan, V. & Hitchens, M., 2010, Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 833-840 8 p. 5703617

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Web services
Trusted computing
2009

A focus group study of student attitudes to lectures

Hitchens, M. & Lister, R., 2009, Proceedings of the Eleventh Australasian Conference on Computing Education, ACE 2009. Hamilton, M. & Clear, T. (eds.). Darlinghurst, NSW: Australian Computer Society, Vol. 95. p. 93-100 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

Students

ALOPA: authorization logic for property attestation in trusted platforms

Nagarajan, A., Varadharajan, V. & Hitchens, M., 2009, Autonomic and Trusted Computing: 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings. González Nieto, J., Reif, W., Wang, G. & Indulska, J. (eds.). Berlin: Springer, Springer Nature, p. 134-148 15 p. (Lecture Notes in Computer Science; vol. 5586).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Authorization
Access control
Logic
Specifications
Resources

B.J.'s family: A survey of first person shooters and their avatars

Hitchens, M., 2009, Proceedings of the 6th Australasian Conference on Interactive Entertainment, IE 2009. Ryan, M. & Pisan, Y. (eds.). New York, USA: Association for Computing Machinery, p. 1-9 9 p. 4

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionResearchpeer-review

First Person
Avatar
Appearings
Interaction
Players