Information Security (KAU)
|
Information Security Research Group |
|
Introduction:
This research group has been established officially on Sep 1, 2012. The Group shall focus on research activities in two major challenging areas information security and cryptology. The theme of the group is to find innovative security solutions that will help to make emerging technologies safe for use in low computational time and storage. Emerging problem areas will be digital forensics, analysis and design of Cryptographic Protocols/Cryptographic primitives, Cryptanalysis, Security proving, data fusion, secure wireless mobile computing applications, intrusion detection as well as workflow security. In addition, the group focuses on the issues associated with the design and development of early warning systems that are capable of detecting and responding to a variety of cyber-based attacks, and on the security issues associated with the field of computer forensics and cryptographic protocols.
|
Aims:
The plan of the group has to establish a research lab on Information Security and Cryptology as the name “Information Security Research Lab” (ISRL). This will contain network that simulates the Internet and various wireless network environments for mobile devices such as smart card, PDA, cellular phone etc which works in very restricted resources like low power, low processor, bandwidth, memory and battery life. The simulation will analyze various attacks, find vournability of previous protocols to trace threat and security issues associated with the field of computer forensics.
|
Vision:
- To find Security/Cryptographic solution of existing protocols for various attacks.
- Design and development of Security Protocols/primitives for Mobile devices such as PDA, Smart card, Wireless Sensor Networks, etc.
|
Mission:
Information is the cooked data becoming a vital and sensitive. It differs radically from other resources for instance, it can be easily pirated without cost, it can be communicated at the speed of light, and it can be destroyed without leaving traces. It needs to find solution for secure computing, records management, privacy, and protect restricted information. This poses a new scientific challenge. The mission of Information Research Group (ISRG) will be
- To contribute and finding practical solutions for, known and emerging information security problems
- To develop techniques for securing tomorrow's global information infrastructure by exploring theoretical foundations, near-term practical applications, and long-range speculative research.
- To analyze the theoretical power of cryptography and the practical engineering of secure information systems, from appropriate definitions and proofs of security, through cryptographic algorithms and protocol design
- To implementations and testing of real applications with easy-to-use security features.
|
Objectives:
- Develop a model to understand the emerging concept of energy security of smart phones.
- Develop low cost methodologies and techniques to achieve energy security of smart phones;
- Validate the methodologies and techniques by means of analysis, simulations, and implementations.
- Improving the security and/or efficiency of cryptographic applications.
- Designing new, provably secure cryptographic primitives and protocols for mobile devices.
- Formalizing and analyzing common cryptographic practices.
|
Research Interest:
Some of the suggested research areas are given below, but are not limited to :
-
Designing new, provably secure cryptographic primitives and protocols using Elliptic Curve and Pairing based Cryptography.
-
To analyze the theoretical power of cryptography and the practical engineering of secure information systems, from appropriate definitions and proofs of security, through cryptographic algorithms and protocol design.
-
Develop a model to understand the emerging concept of energy security of smart phones and mobile devices.
-
Develop low cost methodologies and techniques to achieve energy security of smart phones and mobile devices.
-
Validate the methodologies and techniques by means of analysis, simulations, and implementations of the designed protocols and improve its security and efficiency.
|
[+] Seminars & Workshops::
Workshop:
- Topic: Collecting and Stopping Zero-day Polymorphic Worms.
First Day: Implementing honeynet network to collect zero- day polymorphic worms.
Second Day: Applying string matching algorithms to stop zero-day polymorphic worms.
- Presenter: Dr. Mohssen Mohammed, Al-Imam Muhammad Ibn Saud Islamic University
- Date and Time:Wed-Thursday (January 6-7, 2015 @ 9:00-2:00)
Workshop:
- Topic: Atomic Defense Against Zero-Day Polymorphic Worms in Communication Networks.
- Presenter: Dr. Mohssen Mohammed, Al-Imam Muhammad Ibn Saud Islamic University
- Location:
Gentlemen Campus:
FCIT Seminar Room
Ladies Campus:
FCIT F103 Room, Faysaliyah: 274
- Date and Time:
Tuesday - January 5, 2016 @
11:00 am - 01:00 pm.
Seminar:
- Topic: Digital Forensics: An introduction.
- Presenter: Wafi Bedewi, Hassan Labani, Budoor Salem Eidhad, Supervised by Dr.Daniyal Alghazzawi
- Date and Time:Sunday - May 10, 2015 @ 11-12:30
Workshop:
- Topic: Introduction to Cryptography [download]
- Date and Time: 31st of January to 5th of February (Lecture: 9-12pm, Lunch: 12-1pm, Lab: 1-3pm).
- Location: King Fahad Medical Research Center (KFMRC), first floor, workshop room.
Workshop:
- Topic: Computer Security II. [download]
- Date and Time:24th - 29th of January (Lecture: 9-12pm, Lunch: 12-1pm, Lab: 1-3pm).
- Location: King Fahad Medical Research Center (KFMRC), first floor, workshop room
Seminar:
Seminar:
Seminar:
|
- B.U.H. Sheikh, and Aasim Zafar. (2023). “Unlocking adversarial transferability: a security threat towards deep learning-based surveillance systems via black box inference attack- a case study on face mask surveillance”. Multimed Tools Appl, August 2023, Springer. DOI: 10.1007/s11042-023-16439-x.
[Link]
- Daniyal Alghazzawi, Anser Alquraishee, Sahar Badri, and Syed Hasan. (2023). "ERF-XGB: Ensemble Random Forest-Based XG Boost for Accurate Prediction and Classification of E-Commerce Product Review". Sustainability, Vol. 15, No. 9, April 2023, ISSN: 2076-3417. DOI: 10.3390/su15097076. (WoS Impact Factor: 3.251)
[View][Link]
- Majda Wazzan, Daniyal Algazzawi, Aiiad Albeshri, Syed Hasan, Osama Rabie and Muhammad Asghar. (2022). "Cross Deep Learning Method for Effectively Detecting the Propagation of IoT Botnet", Sensors, Vol. 22, No. 10, May 2022, ISSN: 1424-8220, MDPI. DOI: 10.3390/s22103895. (WoS Impact Factor: 3.576)
[View][Link]
- Khushnaseeb Roshan, Aasim Zafar. (2022). "A Systematic Review of Deep Learning Approaches for Computer Network and Information Security”. Lecture Notes in Electrical Engineering, Vol. 853, March 2022, Springer. DOI: 10.1007/978-981-16-9885-9_29.
[Link]
- Khushnaseeb Roshan, Aasim Zafar. (2021). “Utilizing XAI Technique To Improve Autoencoder Based Model For Computer Network Anomaly Detection With Shapley Additive Explanation (SHAP)”. International Journal of Computer Networks & Communications (IJCNC), Vol.13, No.6, November 2021. DOI: 10.5121/ijcnc.2021.13607.
[View]
- Ghadah Aldabbagh, Daniyal Alghazzawi, Syed Hasan, Mohammed Alhaddad, Areej Malibari, and Li Cheng . (2021). "Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography". Applied Sciences, Vol. 11, No. 12, June 2021, ISSN: 2076-3417. DOI: 10.3390/app11125316 (WoS Impact Factor: 2.474)
[View][Link]
- Farrukh Nadeem, Daniyal Alghazzawi, Abdulfattah Mashat, Khalid Fakeeh, Abdullah Almalaise, Hani Hagras. (2017). "Modeling and Predicting Execution Time of Scientific Workflows in the Grid Using Radial Basis Function Neural Network". Cluster Computing, July 2017, Page: 1-15, ISSN: 1386-7857, Springer. DOI: 10.1007/s10586-017-1018-x. (WoS Impact Factor: 2.040)
[Link]
- Syed Hasan, Daniyal Alghazzawi, and Aasim Zafar. (2017). "Integrating Java Coding Into Project Based Learning In M-Learning Environment". The Malaysian Journal of Computer Science, Vol. 30, No. 2, June 2017, Page: 91-98, ISSN: 0127-9084. DOI: 10.22452/mjcs.vol30no2.2. (WoS Impact Factor: 0.65)
[View][Link]
- Giovanni Acampora, Daniyal Alghazzawi, Hani Hagras, Autilia Vitiello. (2016). "An interval type-2 fuzzy logic based framework for reputation management in Peer to Peer e-commerce". Information Sciences, Volume 333, March 10th 2016, Pages 88–107, ISSN: 0020-0255, Elsevier. Doi:10.1016/j.ins.2015.11.015. (WoS Impact Factor: 4.038)
[View][Link]
- Jacob Sayid , Isaac Sayid and Jayaprakash Kar. (2016). "Certificateless Public Key Cryptography: A Research Survey". International Journal of Security and Its Applications, Vol. 10, N0. 7, Page: 103–118, ISSN: 1738-9976, SERSC.
[View]
- Jayaprakash Kar and Daniyal Alghazzawi. (2015). "On Construction of Signcryption Scheme for Smart Card Security". The 2015 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2015), Baltimore, MD, USA, May 27th-29th, 2015, Page: 109-113, ISBN: 978-1-4799-9888-3, IEEE. DOI: 10.1109/ISI.2015.7165948.
[View]
[Link]
- Aasim Zafar, Syed Hasan, and Mohamed Trigui (2014). "Towards Secure m-Learning: An Analysis", MAGNT Research Report, Vol: 2, No: 05, Septemper 2014, Page: 148-159, ISSN: 1444-8939.
[View]
- Anser Alquraishee, Aasim Zafar, Syed Hasan. (2014). "Security Issues in Wireless Sensor Networks", MAGNT Research Report, Vol: 2, No: 04, July 2014, Page: 82-91, ISSN: 1444-8939.
[View]
- Mohamed Trigui, Syed Hasan and Anser Alquraishee. (2014). "Block Cipher Based Cryptographic Algorithm For Data Security", INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY, Vol: 8, No: 3, February 2014, Page: 1424-1429, ISSN: 2278-5612. [View]
- Syed Hasan and Anser Alquraishee. (2012). "Scalar Multiplication Algorithms for Wireless Sensor Network", International Journal of Smart Home (IJSH), Volume: 06, No: 04, October 2012, Page: 81-92, ISSN: 1975-4094. [View]
|
FACULTY NAME |
TITLE |
KAU EMAIL |
FIELD |
RESEARCH INTEREST |
Prof. Daniyal Alghazzawi |
Professor |
dghazzawi [at] kau.edu.sa |
Intelligent Information Security |
Information security and cyber security. |
Prof. Muhammad Ramzan |
Professor |
msramadan [at] kau.edu.sa |
Information Security |
|
Prof. Omaimah Bamasag |
Professor |
obamasek [at] kau.edu.sa |
Electronic Information Security |
|
Prof. Syed Hamid Hasan |
Professor |
shassan [at] kau.edu.sa |
Network Security |
Computer & Network Security. |
Dr. Aiiad Albeshri |
Associate Professor |
aaalbeshri [at] kau.edu.sa |
Security in Cloud Computing |
Security in Cloud Computing, Security in Big Data. |
Dr. Abdullah Algarni |
Associate Professor |
amsalgarni [at] kau.edu.sa |
Software Engineering and Software Security |
Software Security. |
Dr. Bander Alzahrani |
Associate Professor |
baalzahrani [at] kau.edu.sa |
Information Security |
Network Security. |
Dr. Iftikhar Ahmad |
Associate Professor |
iakhan [at] kau.edu.sa |
Intrusion Detection/ Information Security |
Information Security, IoT Security, Healthcare & Information Systems & Security, Network Security, Digital Forensics. |
Dr. Khalid Alsubhi |
Associate Professor |
kalsubhi [at] kau.edu.sa |
Computer Science |
Security, specifically Authentication, for Internet of Things, Healthcare data security in the cloud, Design of security solutions and protocols for networked/distributed applications, Communication Security, Security in mobile computing. |
Dr. Riaz Shaikh |
Associate Professor |
rashaikh [at] kau.edu.sa |
Computer and Network Security |
Security. |
Dr. Salma Elhag |
Associate Professor |
smomar [at] kau.edu.sa |
Automating Knowledge Base of Intrusion detecting using Hybrid Intelligent Systems |
Network Security, Cyber Security, Artificial Intelligence, Machine Learning. |
Dr. Abdulmohsen Almalawi |
Associate Professor |
balmalowy [at] kau.edu.sa |
Supervisory control and data acquisition (SCADA) SECURITY |
Intrusion detection and cybersecurity of traditional and industrial SCADA network with emphasis on data mining, machine learning, and fast algorithms. |
Dr. Ahmed Alzahrani |
Assistant Professor |
aaalzahrani9 [at] kau.edu.sa |
Cybersecurity |
Digital Forensic, Human-Centered Cyber Security, Cyber Security Incidents Analysis, Cyber security gamification, Cyber security decision making, IoT security, Web Security, Security Compliance, AI Security. |
Dr. Abeer Alhuthali |
Assistant Professor |
aalhathle [at] kau.edu.sa |
Information Security |
Cyber Security, Web Security, Web Application Security. |
Dr. Dania Aljeaid |
Assistant Professor |
daljeaid [at] kau.edu.sa |
Cybersecurity |
Cybersecurity, Information Security, Security Threats Detection, Security Protocol. |
Dr. Ehab Abozinadah |
Assistant Professor |
eabozinadah [at] kau.edu.sa |
Cybersecurity and Data Science |
Information and Network Security, Security of Big Data and IoT. |
Dr. Eman Alashwali |
Assistant Professor |
ealashwali [at] kau.edu.sa |
Cyber Security |
Computer Security, Network Security. |
Dr. Fawaz Alsaadi |
Assistant Professor |
fesalsaadi [at] kau.edu.sa |
Biometric Security |
Information Security. |
Dr. Hanan Hebshi |
Assistant Professor |
hhebshi [at] kau.edu.sa |
Security |
Cybersecurity. |
Dr. Husam Lahza |
Assistant Professor |
hlahza [at] kau.edu.sa |
Cybersecurity |
Digital Forensics. |
Dr. Manal bayousef |
Assistant Professor |
mbayousif [at] kau.edu.sa |
Information Security |
|
Dr. Maha Sabir |
Assistant Professor |
msaber [at] kau.edu.sa |
Cyberforensics and Data Science |
Cyber forensics, Cybersecurity, AI, and Data Science. |
Dr. Reemah Alhebshi |
Assistant Professor |
ralhebshi [at] kau.edu.sa |
Networks Security |
Cryptography, Security, Cyber Security. |
Dr. Rania Molla |
Assistant Professor |
rmolla [at] kau.edu.sa |
Information Security |
Cryptography, Cyber Security, Information Security. |
Dr. Rayan Mosli |
Assistant Professor |
rmosli [at] kau.edu.sa |
Cybersecurity |
Digital Forensics, AI Security. |
Dr. Suaad Alarifi |
Assistant Professor |
Salarifi [at] kau.edu.sa |
Information Security |
The philosophy of information security and privacy, Data Privacy – GDPR the new data protection law and regulation in Europe, Security Auditing, Cloud computing security, Small to medium enterprise security. |
Dr. Suhair Alshehri |
Assistant Professor |
sdalshehri [at] kau.edu.sa |
Information Security |
Cybersecurity and Applied Cryptography. |
Dr. Sahar Albadri |
Assistant Professor |
skbadri [at] kau.edu.sa |
critical infrastructure automated immuno response system (CIAIRS) |
Security protocols, Cryptosystems; Cyber Security, network security, Cybersecurity, information security. |
Dr. Bassma Alsulami |
Assistant Professor |
balsulami [at] kau.edu.sa |
Computer Science - Wireless Security |
Wireless Security, Cybersecurity. |
Dr. Osama Rabie |
Assistant Professor |
obrabie [at] kau.edu.sa |
IDS/IPS |
IDS/IPS, cyberterrorism prevention, semantics, value theory, Markov. |
Dr. Wafi Bedewi |
Assistant Professor |
wbedewi [at] kau.edu.sa |
Information Security and cybersecurity |
Information Security and Privacy. |
Ms. Abeer Albluwi |
Lecturer |
aaalblwe2 [at] kau.edu.sa |
Computer Forensics and Cyber Analysis |
Information Security, IOT Security, Digital Forensics, Media and Mobile Security, network security, privacy. |
Ms. Amina Gamlo |
Lecturer |
ahgamlo [at] kau.edu.sa |
Dynamic Elastic Authentication for Mobile Cloud Computing |
Information Security. |
Ms. Mona Kherees |
Lecturer |
mkhares [at] kau.edu.sa |
Information System Security |
|
Mr. Marwan Alsahafi |
Lecturer |
mnalsahafi [at] kau.edu.sa |
Cryptography |
Cryptography, Bioinformatics, DNA Sequencing, Computer Vision. |
Mr. Trad Albalawi |
Lecturer |
talbalawi [at] kau.edu.sa |
Network Security |
Network Security. |
Mr. Mohamed Salim Trigui |
Lecturer |
mstrigui [at] kau.edu.sa |
Information Technology |
Cybersecurity. |
|
|
Last Update
10/7/2023 10:14:08 PM
|
|