Name | Department | Research Interests | Email | Search Publications |
Dr. Waleed Ahmad Alrodhan | CS | Privacy - Identity
Management - Cryptography - Secure Protocols - Network Security | warodhan@imamu.edu.sa | https://0-scholar-google-com.brum.beds.ac.uk/citations?user=SQRMYeUAAAAJ&hl=en
|
Dr. Hamad Mohammad Binsalleeh | CS | Network Security, Malware
Analysis, Cyber Threat Intelligence | hmbinsalleeh@imamu.edu.sa | https://0-scholar-google-com.brum.beds.ac.uk/citations?hl=en&user=b_7BDmEAAAAJ |
Dr. Talal Saad Mangrah
Albalawi | CS | Access control, Information
Security | Tsalbalawi@imamu.edu.sa | https://0-scholar-google-com.brum.beds.ac.uk/citations?hl=en&user=ldWT9FMAAAAJ |
Dr.Mohammad Hussein Al-Khatib | CS | Information Security-
Cryptographic Algorithms | Mhalkhatib@imamu.edu.sa | https://0-scholar-google-com.brum.beds.ac.uk/citations?hl=en&user=PZa908cAAAAJ |
Dr.Wojdan Mohammed Alsaeedan | CS | Using artificial
intelligence in cybersecurity and digital forensics | wmasaeedan@imamu.edu.sa | https://scholar.google.com/citations?hl=en&user=AXG-ZLIAAAAJ |
Dr. Feras Aljoma | CS | Network Security, Cloud
Computing, Cryptography | faaljumah@imamu.edu.sa | https://scholar.google.com/citations?hl=en&user=pPajP6AAAAAJ |
Dr. Mohammad Abdullah Aljammaz | CS | Malware Analysis | majammaz@imamu.edu.sa | |
Dr. Tahani Fahad
Albalawi | CS | Information security,
Privacy, Behavioral InfoSec, Usable security and privacy | Tfalbalawi@imamu.edu.sa | https://0-scholar-google-com.brum.beds.ac.uk/citations?hl=en&user=gd8mh2cAAAAJ |
Dr. Fatmah Rtayan Alanazi | CS | Deep machine learning for
cybersecurity | frzanazi@imamu.edu.sa | 1 Alanazi,
Fatmah, et al. "Ensemble Deep Learning Models
for Mitigating DDoS Attack in
Software-Defined Network." Intelligent Automation & Soft Computing
33.2 (2022).
2 E13Loui, R. P., Kharpate, V., Deshpande, M.,
& Alanazi, F. (2017, May). Investigating a
two-way-audio
query-response command interface with navigation data extraction for driver
assistance. In
2017 IEEE International Conference on Electro Information Technology (EIT)
(pp. 095-099).
IEEE |
Dr.
Sultan Al Qahtani | CS | Software engineering and
security, SW vulnerability analysis, Machine learning and NLP application in
SW engineering (e.g. SW bug reports analysis), Data-driven SW engineering | ssalqahtani@imamu.edu.sa | https://scholar.google.com/citations?hl=en&user=kcBvCc0AAAAJ |
Dr. Mohamed Saad Saleh | IS | Federated learning privacy
preservation for healthcare systems
Trust management schemes for smart cities applications
Information security risk management | msmsaleh@imamu.edu.sa | https://scholar.google.com/citations?hl=en&user=r23JgY8AAAAJ
|
Dr. Abdulaziz Assoug Alshammari. | IS | Including but not limited
to:
Machine Learning for Cybersecurity, such as Intrusion detection.
Digital Image Forensics. | aashammari@imamu.edu.sa | https://scholar.google.com/citations?user=TfnTvZIAAAAJ&hl=en&oi=ao |
Dr. Badr
Soliman Alsamani | IS | IoT security, privacy,
governance and risk management | bsalsamani@imamu.edu.sa | https://www.linkedin.com/in/badr-alsamani-b6785a83
|
Dr. Taher Abdullah Alzahrani | IS | Including but not limited
to:
Risk management and security fundamental requirements
Data classification and protecting the asset
Cybersecurity framework architectures, strategies and controls
Cybersecurity defence-in-depth
Zero Trust architectures
The behaviour of cybercriminal in complex networks
and/or systems (enormous of social media networks)
Understanding the criminal thinking in cyber espionage
Complex networks and systems
Cryptography and coding
Cyberattacks, human psychology and protecting data
IT and security governance
GRC platform and framework for Intelligent systems
Ransomwares, manipulating and phishing | talzahrani@imamu.edu.sa | https://scholar.google.com/citations?hl=en&user=T-uird0AAAAJ&view_op=list_works&sortby=pubdate |
Dr. Salem Saleh AlJanah | IS | Internet of Things (IoT)
security, applied cryptography, authentication, secure communications, and
network security. | ssaljanah@imamu.edu.sa | https://scholar.google.com/citations?hl=en&user=yaIS62IAAAAJ |
Dr. Shafiq ur
Rehman | IS | 1. Security Requirements
Engineering and their Counter Measures for Cyber-Physical Systems/IoT
2. Requirements Engineering Process Model for Cyber-Physical Systems
3. Threat Modelling for Cyber-Physical Systems/IoT
4. Intrusion Detection Systems for Cyber-Physical Systems/IoT
5. Identifying Security Requirements through Misuse Case for Cyber-Physical
Systems/IoT
6. Towards an easy to secure Cyber-Physical Systems /IoT
7. A framework for the verification and diagnosis of the specification of security requirements
in Cyber-Physical Systems/IoT
8. Security Requirements Framework for the Verification & Validation of
Cyber-Physical Systems/IoT | srehman@imamu.edu.sa | https://www.researchgate.net/profile/Shafiq-Ur-Rehman-9 |
Dr. Hisham Abdulrahman Alhulayyil | IS | Information Security - Computer Networks | halhulayyil@imamu.edu.sa | https://scholar.google.com/citations?user=qWM5KuYAAAAJ&hl=en |
Dr.Mona Jubran Saeed Alshahrani | IS | Blockchain security
IoT security | mjshahrani@imamu.edu.sa | https://scholar.google.com/citations?hl=en&user=h4lXc9IAAAAJ |
Dr. Habeeb Omotunde | IS | Software, Web and Database
Security | homotunde@imamu.edu.sa | https://scholar.google.com/citations?hl=en&user=m-c7JXQAAAAJ |
Dr. Waleed Rashideh | IS | Blockchain, project
management, cryptocurrencies | wmrashideh@imamu.edu.sa | https://scholar.google.com/citations?hl=en&user=3F8kANUAAAAJ |