Name

Department

Research Interests

Email

Search Publications

Dr. Waleed Ahmad Alrodhan

CS

Privacy - Identity Management - Cryptography - Secure Protocols - Network Security

warodhan@imamu.edu.sa

https://0-scholar-google-com.brum.beds.ac.uk/citations?user=SQRMYeUAAAAJ&hl=en

Dr. Hamad Mohammad Binsalleeh

CS

Network Security, Malware Analysis, Cyber Threat Intelligence

hmbinsalleeh@imamu.edu.sa

https://0-scholar-google-com.brum.beds.ac.uk/citations?hl=en&user=b_7BDmEAAAAJ

Dr. Talal Saad Mangrah Albalawi

CS

Access control, Information Security

Tsalbalawi@imamu.edu.sa

https://0-scholar-google-com.brum.beds.ac.uk/citations?hl=en&user=ldWT9FMAAAAJ

Dr.Mohammad Hussein Al-Khatib

CS

Information Security- Cryptographic Algorithms

Mhalkhatib@imamu.edu.sa

https://0-scholar-google-com.brum.beds.ac.uk/citations?hl=en&user=PZa908cAAAAJ

Dr.Wojdan Mohammed Alsaeedan

CS

Using artificial intelligence in cybersecurity and digital forensics

wmasaeedan@imamu.edu.sa

https://scholar.google.com/citations?hl=en&user=AXG-ZLIAAAAJ

Dr. Feras Aljoma

CS

Network Security, Cloud Computing, Cryptography

faaljumah@imamu.edu.sa

https://scholar.google.com/citations?hl=en&user=pPajP6AAAAAJ

Dr. Mohammad Abdullah Aljammaz

CS

Malware Analysis

majammaz@imamu.edu.sa

 

Dr. Tahani Fahad  Albalawi

CS

Information security, Privacy, Behavioral InfoSec, Usable security and privacy

Tfalbalawi@imamu.edu.sa

‪https://0-scholar-google-com.brum.beds.ac.uk/citations?hl=en&user=gd8mh2cAAAAJ

Dr.  Fatmah Rtayan Alanazi

CS

Deep machine learning for cybersecurity

frzanazi@imamu.edu.sa

1 Alanazi, Fatmah, et al. "Ensemble Deep Learning Models for Mitigating DDoS Attack in
Software-Defined Network." Intelligent Automation & Soft Computing 33.2 (2022).
2 E13Loui, R. P., Kharpate, V., Deshpande, M., & Alanazi, F. (2017, May). Investigating a two-way-audio
query-response command interface with navigation data extraction for driver assistance. In
2017 IEEE International Conference on Electro Information Technology (EIT) (pp. 095-099).
IEEE

Dr. Sultan Al Qahtani

CS

Software engineering and security, SW vulnerability analysis, Machine learning and NLP application in SW engineering (e.g. SW bug reports analysis), Data-driven SW engineering

ssalqahtani@imamu.edu.sa

https://scholar.google.com/citations?hl=en&user=kcBvCc0AAAAJ

Dr. Mohamed Saad Saleh

IS

Federated learning privacy preservation for healthcare systems
Trust management schemes for smart cities applications
Information security risk management

msmsaleh@imamu.edu.sa

https://scholar.google.com/citations?hl=en&user=r23JgY8AAAAJ

Dr. Abdulaziz Assoug Alshammari.

IS

Including but not limited to:
Machine Learning for Cybersecurity, such as Intrusion detection.
Digital Image Forensics.

aashammari@imamu.edu.sa

https://scholar.google.com/citations?user=TfnTvZIAAAAJ&hl=en&oi=ao

Dr. Badr Soliman Alsamani

IS

IoT security, privacy, governance and risk management

bsalsamani@imamu.edu.sa

 https://www.linkedin.com/in/badr-alsamani-b6785a83

Dr. Taher Abdullah Alzahrani

IS

Including but not limited to:
Risk management and security fundamental requirements
Data classification and protecting the asset
Cybersecurity framework architectures, strategies and controls
Cybersecurity defence-in-depth
Zero Trust architectures
The behaviour of cybercriminal in complex networks and/or systems (enormous of social media networks)
Understanding the criminal thinking in cyber espionage
Complex networks and systems
Cryptography and coding
Cyberattacks, human psychology and protecting data
IT and security governance
GRC platform and framework for Intelligent systems
Ransomwares, manipulating and phishing

talzahrani@imamu.edu.sa

https://scholar.google.com/citations?hl=en&user=T-uird0AAAAJ&view_op=list_works&sortby=pubdate

Dr. Salem Saleh AlJanah

IS

Internet of Things (IoT) security, applied cryptography, authentication, secure communications, and network security.

ssaljanah@imamu.edu.sa

https://scholar.google.com/citations?hl=en&user=yaIS62IAAAAJ

Dr. Shafiq ur Rehman

IS

1. Security Requirements Engineering and their Counter Measures for Cyber-Physical Systems/IoT
2. Requirements Engineering Process Model for Cyber-Physical Systems
3. Threat Modelling for Cyber-Physical Systems/IoT
4. Intrusion Detection Systems for Cyber-Physical Systems/IoT
5. Identifying Security Requirements through Misuse Case for Cyber-Physical Systems/IoT
6. Towards an easy to secure Cyber-Physical Systems /IoT
7. A framework for the verification and diagnosis of the specification of security  requirements in Cyber-Physical Systems/IoT
8. Security Requirements Framework for the Verification & Validation of Cyber-Physical Systems/IoT

srehman@imamu.edu.sa

https://www.researchgate.net/profile/Shafiq-Ur-Rehman-9

Dr. Hisham Abdulrahman Alhulayyil

IS

Information Security - Computer Networks

halhulayyil@imamu.edu.sa

https://scholar.google.com/citations?user=qWM5KuYAAAAJ&hl=en

Dr.Mona Jubran Saeed Alshahrani

IS

Blockchain security
IoT security

mjshahrani@imamu.edu.sa

https://scholar.google.com/citations?hl=en&user=h4lXc9IAAAAJ

Dr. Habeeb Omotunde

IS

Software, Web and Database Security

homotunde@imamu.edu.sa

https://scholar.google.com/citations?hl=en&user=m-c7JXQAAAAJ

Dr. Waleed Rashideh

IS

Blockchain, project management, cryptocurrencies

wmrashideh@imamu.edu.sa

https://scholar.google.com/citations?hl=en&user=3F8kANUAAAAJ