fbpx

Information Security

Information Security

Security concerns have taken center stage in the internal processes of public and private organizations of all sizes, as well as in the everyday life of individuals.

The research focus of the Information Security group is on innovative techniques, protocols and systems for identifying Cyber Security threats, assessing risks, protecting information and communication infrastructures from attacks, guaranteeing confidentiality, integrity, availability, authentication, accountability, as well as on validating security policies via audit and forensics.

Research staff

Dr. Abdulhadi Shoufan

Assistant Professor

Dr. Chan Yeob Yeun

Associate Professor

Dr. Ernesto Damiani

Professor

Dr. Hadi Otrok

Associate Professor

Dr. Jamal Zemerly

Associate Professor

Dr. Khaled Salah

Professor

Dr. Rabeb Mizouni

Associate Professor

Dr. Thanos Stouraitis

Professor and Chair

Dr. Yousof Al-Hammadi

Assistant Professor

Dr. Yousuf Al Salami

Assistant Professor

  • Wireless and mobile security
  • Cloud and Big Data security
  • Security of Cyber-Physical Systems
  • IoT and SCADA security
  • Audit
  • Penetration testing
  • Digital forensics
  • C. A. Ardagna, E. Damiani, F. Frati, D. Rebeccani, “A Configuration-Independent Score-Based Benchmark for Distributed Databases,” IEEE Transactions on Services Computing, vol. 9, no. 1, pp. 123-137, 2016.
  • N. Werghi, C. Tortorici, S. Berretti, and A. Del Bimbo, “Boosting 3D LBP-Based Face Recognition by Fusing Shape and Texture Descriptors on the Mesh,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 5, pp. 964-979, 2016.
  • W. Van Der Aalst and E. Damiani, “Processes Meet Big Data: Connecting Data Science with Process Science,” IEEE Transactions on Services Computing, vol. 8, no. 6, pp. 810-819, 2015.
  • M. Alzaabi, K. Taha, and T. A. Martin, “CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2196-2211, 2015.
  • K. Salah, M. Hammoud, and S. Zeadally, “Teaching Cybersecurity Using the Cloud,” IEEE Transactions on Learning Technologies, vol. 8, no. 4, pp. 383-392, 2015.
  • Shoufan, Z. Lu, and S. A. Huss, “A web-based visualization and animation platform for digital logic design,” IEEE Transactions on Learning Technologies, vol. 8, no. 2, pp. 225-239, 2015.
  • J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, “A secure cloud computing based framework for big data information management of smart grid,” IEEE Transactions on Cloud Computing, vol. 3, no. 2, pp. 233-244, 2015.

New to site? Create an Account


Login

Lost password? (close)

Already have an account? Login


Signup

(close)