Avatar Image

Dr Hasmukh Morarji

Science and Engineering Faculty,
Electrical Engineering, Computer Science,
Data Science


Dr Hasmukh Morarji
Senior Lecturer
Science and Engineering Faculty,
Electrical Engineering, Computer Science,
Data Science
Discipline *
Other Information and Computing Sciences
+61 7 3138 2303
+61 7 3138 1516
View location details (QUT staff and student access only)

PhD (University of Kent At Canterbury), MSc (University of Canterbury), BE(Hons) (University of Canterbury)

* Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008


Research theme: Information and Security

Research discipline: Computer Science

Research areas  

Computer Forensics and Security: In particular, looking at computer profiling in an automated forensic examination of a computer system in order to provide a human investigator with a characterisation of the computer system’s use.

Computer Assisted Learning: In particular, the use of Computers in teaching of Computing and Mathematics.

Vulnerabilities in IPv6 Protocol: In particular, looking at Denial of Service attacks in IPv6 protocol.

This information has been contributed by Dr Hasmukh Morarji.


Teaching discipline: Computer Science

This information has been contributed by Dr Hasmukh Morarji.


  • Suriadi S, Tickle AB, Ahmed E, Smith J, Morarji HL, (2010) Risk modelling the transition of SCADA system to IPv6, What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience [IFIP Advances in Information and Communication Technology, 2010, Volume 328] p384-395
  • Marrington AD, Mohay GM, Morarji HL, Clark AJ, (2010) A model for computer profiling, Proceedings of the 5th International Conference on Availability, Reliability, and Security p635-640
  • Marrington AD, Mohay GM, Clark AJ, Morarji HL, (2007) Event-Based Computer Profiling for the Forensic Reconstruction of Computer Activity, AusCERT 2007, IT-Security: Finding the Balance p71-87
  • Marrington A, Mohay GM, Morarji HL, Clark A, (2006) Computer Profiling to Assist Computer Forensic Investigations, Recent Advances in Security Technology: Proceedings of the 2006 RNSA Security Technology Conference p287-301
  • Croll PR, Morarji HL, (2006) Perceived Risk: Human Factors Affecting ICT of Critical Infrastructure, The Social Implications of Information Security Measures on Citizens and Business p213-222
  • Mohay GM, Hynd JR, Morarji H, Sinfield P, (1997) The InfoTech ILE: An Integrated Learning Environment for Foundation Year IT Students, Proceedings of 1997 International Conference on Computers in Education
  • Mohay GM, Morarji H, Le Viet Q, Munday L, Caelli W, (1996) The CASS Shell, Lecture Notes in Computer Science, Vol. 1029: Cryptography, Policy and Algorithms
  • Mohay GM, Morarji H, Thomas R, (1995) Undergraduate, Graduate and Professional Education in Software Engineering in the '90's: A Case Study., Proceedings Software Education Conference (SRIG - ET '94)
  • Thomas R, Semeczko G, Morarji H, Mohay GM, (1995) Core Software Engineering Subjects: A Case Study ('86 - '94)., 1994 Software Education Conference.

For more publications by this staff member, visit QUT ePrints, the University's research repository.