Personal details
- Name
- Professor Colin Fidge
- Position(s)
- Professor
Faculty of Science,
School of Computer Science - Discipline *
- Computation Theory and Mathematics, Computer Software
- Phone
- +61 7 3138 2870
- c.fidge@qut.edu.au
- Location
- View location details (QUT staff and student access only)
- Identifiers and profiles
-
- Qualifications
-
PhD (Australian National University)
- Keywords
-
Complex system modelling and analysis, High-integrity software engineering, Safety-critical and security-critical systems
* Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008
Biography
- Full list of publications
- Citations and h-index
- Full list of funded research projects
- Research interests:
- High-integrity software engineering
- Modelling and analysis of complex, computer-based systems
- Business process modelling and analysis
- Teaching:
- IFB104 – Building IT Systems (Unit Coordinator)
- Affiliations:
- Contact addresses for current or prospective students:
- To request a change to your class timetable go to https://qutvirtual4.qut.edu.au/group/student/enrolment/class-registration or send an email to sef.enquiry@qut.edu.au
- For all queries about IFB104 send email to ifb104.query@qut.edu.au
- For general academic enquiries contact SEF Student Services, O-Block Podium Level 3; sef.enquiry@qut.edu.au; 07-3138-8822
- For problems accessing Blackboard contact the IT Helpdesk via ithelpdesk@qut.edu.au; 3138 4000
- To apply for an assignment extension go to http://www.student.qut.edu.au/studying/assessment/late-assignments-and-extensions
- For student counselling in general go to http://www.student.qut.edu.au/services-and-facilities/all-services/student-counselling-services
- For information about how to enrol as a higher degree student (PhD or Masters by Research) go to http://www.qut.edu.au/study/phds-and-research-degrees
This information has been contributed by Professor Colin Fidge.
Publications
- Furda A, Fidge C, Barros A, (2018) A practical approach for detecting multi-tenancy data interference, Science of Computer Programming p160-173
- Pika A, Leyer M, Wynn M, Fidge C, ter Hofstede A, van der Aalst W, (2017) Mining resource profiles from event logs, ACM Transactions on Management Information Systems
- Zhang Y, Tian G, Kelly W, Fidge C, (2017) Scalable and efficient data distribution for distributed computing of all-to-all comparison problems, Future Generation Computer Systems p152-162
- Zhang Y, Tian G, Fidge C, Kelly W, (2016) Data-aware task scheduling for all-to-all comparison problems in heterogeneous distributed systems, Journal of Parallel and Distributed Computing p87-101
- Pika A, van der Aalst W, Wynn M, Fidge C, ter Hofstede A, (2016) Evaluating and predicting overall process risk using event logs, Information Sciences p98-120
- Goonasekera N, Caelli B, Fidge C, (2015) LibVM: an architecture for shared library sandboxing, Software - Practice and Experience p1597-1617
- Chakraborty S, Mengersen K, Fidge C, Ma L, Lassen D, (2015) Multifaceted modelling of complex business enterprises, PLoS One p1-30
- Tian G, Tian G, Fidge C, (2014) Precise relative clock synchronization for distributed control using TSC registers, Journal of Network and Computer Applications p63-71
- Hauser C, Tronel F, Fidge C, Me L, (2013) Intrusion detection in distributed systems, an approach based on taint marking, Proceedings of the 2013 IEEE International Conference on Communications (ICC) p1962-1967
- Pika A, van der Aalst W, Fidge C, ter Hofstede A, Wynn M, (2013) Predicting deadline transgressions using event logs, Business Process Management Workshops: BPM 2012 International Workshops Revised Papers [Lecture Notes in Business Information Processing, Volume 132] p211-216
For more publications by this staff member, visit QUT ePrints, the University's research repository.
Research projects
Grants and projects (Category 1: Australian Competitive Grants only)
- Title
- Legacy2Service: A Novel, Model-Driven Technique for Re-engineering On-Demand, Software Services out of Legacy Applications
- Primary fund type
- CAT 1 - Australian Competitive Grant
- Project ID
- DP140103788
- Start year
- 2014
- Keywords
- Service-oriented architecture;Software re-engineering;Software-as-a-service
- Title
- Practical cyber security for next generation power transmission networks
- Primary fund type
- CAT 1 - Australian Competitive Grant
- Project ID
- LP120200246
- Start year
- 2013
- Keywords
- Control Systems;Power Transmission;System Integrity;Information Security
- Title
- Risk-Aware Business Process Management
- Primary fund type
- CAT 1 - Australian Competitive Grant
- Project ID
- DP110100091
- Start year
- 2011
- Keywords
- Risk Management;Information System;Business Process Model;Workflow Management
- Title
- Information Security Evaluation of Embedded Computer Software
- Primary fund type
- CAT 1 - Australian Competitive Grant
- Project ID
- LP0776344
- Start year
- 2007
- Keywords
- Information Security;Computer Software;Embedded Programming;Dataflow Analysis;Computer Networks
- Title
- Rapidly Locating Items in Distribution Networks with Process-Driven Nodes
- Primary fund type
- CAT 1 - Australian Competitive Grant
- Project ID
- DP0773012
- Start year
- 2007
- Keywords
- Information technology;Business process modelling;Workflow analysis techniques;Distribution networks;Physical security
Supervision
Completed supervisions (Doctorate)
- Enabling Large-Scale Dataset Analysis in Resource-Constrained Environments through Application-Aware Preprocessing (2020)
- Data Distribution and Task Scheduling for Distributed Computing of All-to-All Comparison Problems (2016)
- Mining Process Risks and Resource Profiles (2015)
- A Framework for Identifying Associations in Digital Evidence Using Metadata (2014)
- A basis for instrusion detection in distributed systems using kernel-level data tainting (2013)
- Program-level Support for Protecting an Application from Untrustworthy Components (2012)
- Quality Metrics for Assessing Security-Critical Computer Programs (2012)
- QoS-Aware Web Service Composition Using Genetic Algorithms (2011)
- Network Protocols and Predictive Control Strategies for Distributed Real -Time Control Applications (2010)