المجموعة البحثية لأمن المعلومات ISRG

أن التطور السريع في برامج التجسس والبرامج الخبيثة أدى إلى تحديات كبيره في أمن المعلومات. المجموعة البحثية لأمن المعلومات هي جزء أساسي من كلية الحاسبات وتقنية المعلومات وجامعة تبوك. أنشأت هذه المجموعة لبناء منظومة معرفية في امن المعولمات. حيث تتناول الابحاث والجوانب التقنية الرئيسية والخصوصية لأمن المعلومات – مثل التشفير والنظام الأمني. في نفس الوقت، تعمل المجموعة على أنظمة هندسة البرمجيات والشبكات لتوفير حلول أمنية، ومعالجة الجوانب الإنسانة والإقتصادية والاجتماعية لأمن المعلومات مثل رفع الوعي في أمن المعلومات.

 

بعض المواضيع البحثية الرئيسية التي تتناولها المجموعة:

المستشعرات الحيوية والتحكم بالمرور.

التهديد الداخلي.

أمن الشبكات.

 

أمن وخصوصية قواعد البيانات وإدارتها.

أمن البنية التحتية.

 

Research Group No:

Research Area: Information Security

Proposed Research Group Title:

Information Security Research Group (ISRG)

Proposed Research Group Website:

Academic Title

Members Names

Affiliation

Specialty

E-Mail

Associate Professor

Awad Awadelkarim

FCIT, UT

Information Security

awad@ut.edu.sa

Assistant Professor

Abdulaziz Almehmadi

FCIT, UT

Information Security

aalmehmadi@ut.edu.sa

Assistant Professor

Asim Elshiekh

FCIT, UT

Database Security

aelshiekh@ut.edu.sa

Assistant Professor

Salim Ben Chaabane

FCIT, UT

Digital Signal Processing

s.chaabane@ut.edu.sa

Assistant Professor

Umar Albalawi

FCIT, UT

Information Security

ualbalwi@ut.edu.sa

           
 

 

الابحاث المنشورة:

 

Abdulaziz Almehmadi, “Intention-based Trust Re-evaluation” PST2016, IEEE

المجموعة البحثية للمعلوماتية

هذه المجموعة تهتم بالبحوث المتعددة التخصصات التي تأخذ في الاعتبار تأثير تكنولوجيا المعلومات في تعزيز المجتمع المحلي من خلال توفير الحلول الحاسوبية ذات الجودة العالية. المجموعة لديها خبرات كبيرة في مختلف المجالات من علوم الكمبيوتر والتي تسمح بتحقيق طموحاتها.

الأهداف:

- توفير الحلول التقنية لمشاكل الحياة الحقيقية.

- توفير بيئة بحثية عالية الجودة لطلاب البكالوريوس وطلاب الدراسات العليا.

- نشر أوراق بحثية متميزة في مجلات علمية ذات سمعة جيدة.

 

Research Group No: 2

Research Area: Health Information System; Bioinformatics; Software Engineering; Human computer Interaction

Proposed Research Group Title:              Informatics

Proposed Research Group Website:

Academic Title

Members Names

Affiliation

Specialty

E-Mail

Assistant Prof.

عبدالعزيز محمد المحمادي

University Of Tabuk

Information Security

aalmehmadi@gmail.com

Assistant Prof.

محمد العتيبي

Bioinformatics/Health Information System

mmalotaibi@ut.edu.sa

Assistant Prof.

عبدالرحمن عثمان الفكي

Software Engineering/HCI

a.elfaki@ut.edu.sa

Assistant Prof.

يحي المرتضي

Artificial Intelligent/ Software Engineering

y.murtadha@ut.edu.sa

Assistant Prof.

عثمان عبدالله

Artificial Intelligent/ Software Engineering

o_mohammed@ut.edu.sa

Assistant Prof.

أحمد شمسان

Networking

ah_saleh@ut.edu.sa

Assistant Prof.

ماجد ابوركبة

Software Engineering

m.aborokbah@ut.edu.sa

Assistant Prof.

سعد المطيري

Software Engineering

s.almutairi@ut.edu.sa

 

بعض المنشورات البحثية لأعضاء هيئة التدريس:

 

2019:

 

  1. O. Akanbi, A. Aljaedi, and X. Zhou, “Proactive load shifting for distributed SDN control plane architecture,” in Proceedings of the IEEE 16th Consumer Communications and Networking Conference (CCNC), 2019.
  2. Saad Almutairi, S. Manimurugan and Majed Aborokbah, "A New Secure Transmission Scheme between Senders and Receiver Using HVCHC without Any Loss", EURASIP Journal on Wireless Communications and Networking (2019), 2019:88. (Springer). https://doi.org/10.1186/s13638-019-1399-z
  3. H. Alhussian, N. Zakaria, A. Patel, A. Jaradat, S. Jadid, A. Y. Ahmed, A. Alzahrani, S. Fageeri, A. Elsheikh, and J Watada, “Investigating the Schedulability of Periodic Real-Time Tasks in Virtualized Cloud Environment,” this article has been accepted for publication in a future issue of this journal, DOI 10.1109/ACCESS.2019.2900288, IEEE Access.
  4. Mohammad Mustafa, Mohammed M. Abu Shquier, Afag Salah Aldeen, Mohammed E. Zidan, Ra’ed M. Al-Khatib, Novel approach in multilingual and mixed English-Arabic test, collection, International Journal of Computing and Mathematics, inderScience, Accpeted and to be published
  5. Osman A. Abdalla, Majed M. Aborokbah, Abdelrahman Osman ELfaki, Developing Classification Model to Investigate the Problem of Computing Students Studies Length, IJMLC, Vol. 9, No. 2, April 2019
  6. Mohammad Mustafa, Afag Salah Aldeen, Mohammed E. Zidan, Rihab E. Ahmed, Yasir Eltigani, Developing Two Different Novel Techniques for Arabic Text Stemming, Intelligent Information Management 2019(1):1·21, January 2019

 

 

2018:

 

  1. Aljaedi, C. E. Chow, E. Ashary, and F. Torres-Reyes, “OTMEN: Offloading traffic monitoring to edge nodes in software-defined datacenter networks,” in Proceedings of the IEEE 2nd Conference on Dependable and Secure Computing (DSC), 2018.
  2. Said Jadid Abdulkadir, Hitham Alhussian, Muhammad Nazmi, and Asim A Elsheikh, “Long Short Term Memory Recurrent Network for Standard and Poor's 500 Index Modelling,” International Journal of Engineering & Technology, 7 (4.15) (2018) 25-29.
  3. N. Alamri, C. E. Chow, A. Aljaedi, and A. Elgzil, “UFAP: Ultra-fast handoff authentication protocol for wireless mesh networks,” in Proceedings of the IFIP/IEEE 10th Conference on Wireless Days (WD), 2018.
  4. O. Akanbi, A. Aljaedi, and X. Zhou, "PLS: Proactive load shifting for distributed SDN controllers," in Proceedings of the IEEE 43rd Conference on Local Computer Networks (LCN), 2018.
  5. Aljuhni, C. E. Chow, A. Aljaedi, S. Yusuf, and F. Torres-Reyes, “Towards understanding application performance and system behavior with the full dynticks feature,” in Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018
  6. Ahmed Shamsan , "Random traveling wave pulse-coupled oscillator algorithm of energy-efficient wireless sensor networks"  International Journal of Distributed Sensor Networks, 2018, Vol. 14(4) . (ISI journal, IF: 1.787)
  7.  
  8. Alotaibi, M., Albalawi, M. and Alwakeel, L. (2018). A Smart Mobile Pregnancy Management and Awareness System for Saudi?Arabia. International Journal of Interactive Mobile Technologies (iJIM), 12(5), p.112.
  9. Alotaibi, M. and Albalawi, M. "A Mobile Gestational Diabetes Management and Educational System for Gulf Countries: System Architecture," 2018 9th IEEE Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, Malaysia, 2018, pp. 193-196.
  10. Jaber K. M., Alia O. M., Shuaib M. M., “P-HS-SFM: A Parallel Harmony Search Algorithm for the Reproduction of Experimental Data in the Continuous Microscopic Crowd Dynamic Models”, Journal of Experimental & Theoretical Artificial Intelligence, vol. 30, no. 2, Jan 2018, pp. 235-255, doi:10.1080/0952813X.2017.1421267.
  11. Osman A. Abdalla, Majed M. Aborokbah, Abbdelrahman Osman Elfaki, Improving Pre-hospital Care of Road Traffic Accident's Victims with Smartphone Technology, International Journal of Interactive Mobile Technologies, Vol 12, No 2 (2018)
  12. Alia O. M., “A dynamic harmony search-based fuzzy clustering protocol for energy-efficient wireless sensor networks”, Annals of Telecommunications, vol. 73, no. 5-6, June 2018, pp. 353-365, https://doi.org/10.1007/ s12243-017-0611-6.
  13. S.Manimurugan.,"A Smart Irrigation System in Agriculture with Cloud Support using Internet of Things",Indian Journal of Science & Technology, Vol 11, Issue 45, December 2018. Print ISSN : 0974-6846, Online ISSN : 0974-5645
  14. C.Narmatha, P.Manimegalai and S.Manimurugan.,"A Grayscale Image Hiding Encode Scheme for Secure Transmission",Current Signal Transduction Therapy, Vol. 13, Pp.1-6, 2018. ISSN: 2212-389X (Online), ISSN: 1574-3624 (Print).
  15. Yahya M AlMurtadha , Public response sentimental analysis model to review educational program seeking academic accreditation,ICCMB 2018, ACM, Sant Antony College, Oxford.Uk 
  16. C.Narmatha, P.Manimegalai and S.Manimurugan., "A Decode Technique of MSI for Efficient Reconstruction Process", International Journal of Engineering & Technology, Vol. 7, No. 3.6, Pp.110-114, 2018. ISSN: 2227-524X. 
  17. M. Alotaibi and M. Albalawi, "A Mobile Gestational Diabetes Management and Educational System for Gulf Countries: System Architecture," 2018 9th IEEE Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, Malaysia, 2018, pp. 193-196
  18. Alotaibi, M., Albalawi, M. and Alwakeel, L. (2018). A Smart Mobile Pregnancy Management and Awareness System for Saudi Arabia. International Journal of Interactive Mobile Technologies (iJIM), 12(5), p.112.
  19. Ali Alakeel, “Using Concurrency to Improve Assertions-Based Software Testing,” International Journal of Computer Science and Information Security,, Vol. 16, No. 12, pp. 86-90, December 2018.
  20. Hassan AlQarni, Yahya AlMurtadha, Abdelrahman Elfaki, a twitter sentiment analysis model for measuring security and educational challenges: a case study in Saudi Arabia. Journal of Computer Science. Vol 14 (3), 2018.
  21. Alia O. M., Abualhasnat M., Bramantoro A., Jawarneh M. S., “Automatic Initialization of Level Set Methods in Discontinuity Regions of Liver in CT Scans”, Current Medical Imaging Reviews, vol. 14, no. 3, June 2018, pp. 444-453(10).

 

 

2017:

 

  1. Elgzil, C. E. Chow, A. Aljaedi, and N. Alamri, “Cyber anonymity based on software-defined networking and onion routing (SOR),” in Proceedings of the IEEE Conference on Dependable and Secure Computing (DSC), 2017.
  2. Ahmed Shamsan, "Bio-Inspired Technique:An Adaptive R?uting f?r Reliability and Energy Efficiency Method in Wireless Sens?r Netw?rks" International Journal of Communication Networks and Information Security (IJCNIS), Vol. 9, No. 2, August 2017
  3. Awadelkarim, A. M. and Anass A. Nour. Security Criteria and Indicators of RDBMSs: A Comparative Study. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278- 8727, Volume 19, Issue 2, Ver. III (Mar.-Apr. 2017), PP 56-67 www.iosrjournals.org [DOI: 10.9790/0661-1902035667] March 2017.
  4. Alia O. M., Al-Ajouri, A., “Maximizing Wireless Sensor Network Coverage with Minimum Cost using Harmony Search Algorithm”, IEEE Sensors Journal, vol. 17, no. 3, pp. 882-896, Feb 2017, DOI: 10.1109/JSEN.2016.2633409.
  5. Alia O. M., “A Dynamic Relocation of Mobile Base Station in Wireless Sensor Networks using a Cluster-based Harmony Search Algorithm”, Information Sciences, vol. 385, April 2017, pp. 76-95.
  6. Hitham Alhussian, Said Jadid Abdulkadir, Nordin Zakaria, Ahmed Patel, Ahmed Alzahrani and Asim A. Elsheikh, “Performance Evaluation of Real-Time Multiprocessor Scheduling Algorithms: A Practical Perspective,” has been ACCEPTED by Programme Committee of The Seventh International Conference on Information Technology and Multimedia 2017 (ICIMU 2017), organized by the College of Computer Science and Information Technology, Universiti Tenaga Nasional (UNITEN) held on the 8th & 9th of November 2017 at Hotel Bangi-Putrajaya, Selangor, Malaysia.
  7. Nojood O. Aljehane and William J. Teahan, “Grammar-Based Pre-Processing for PPM”, International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 1, February 2017.
  8. Nojood O. Aljehane and William J. Teahan, “Word-Based Grammars for PPM”, International Journal of Advanced Computer Science and Applications (IJACSA), Vol 8, No 10, Oct 2017
  9. Albelwi, Saleh, and Ausif Mahmood. "A deep architecture for Face Recognition based on multiple feature extraction techniques." 2017 IEEE International Conference on Signal and Image Processing Applications (ICSIPA). IEEE, 2017.
  10. Aljaedi, C. E. Chow, A. Elgzil, N. Alamri, and I. Bahkali, “Network virtualization with OpenFlow for large-scale datacenter networks” in IJCSNS, vol. 17, no. 9, pp. 10-20, 2017.
  11. Rajeh, W., Jin, H. & Zou, D. Saudi cloud infrastructure: a security analysis. Science China Information Science. (2017) 60: 122102. 
  12. Albelwi, Saleh, and Ausif Mahmood. "A framework for designing the architectures of deep convolutional neural networks." Entropy 19.6 (2017): 242.
  13. Shquier, Mohammed Mahmoud Abu, and Khaled M. Alhawiti. "Fully automated Arabic to English machine translation system: transfer-based approach of AE-TBMT." IJICT 10.4 (2017): 376-391.
  14. Rajeh, W., Alshreef, A. A Novel three-tier SQLidetection and mitigation scheme for cloud environments. 2017 International Conference on Electrical Engineering and Computer Science (ICECOS) - Communications and Vehicular Technology. Palembang, Indonesia. Aug. 22-23.
  15. Rajeh, W., Jin, H. & Zou, D. Saudi cloud infrastructure: a security analysis. Science China Information Science. (2017) 60: 122102.
  16. Mohammad Mustafa, Afag Salah Eldeen, Sulieman Bani-Ahmad, Abdelrahman Osman Elfaki, A Comparative Survey on Arabic Stemming: Approaches and Challenges, Intelligent Information Management 2017(9):39-67 · March 2017

 

2016:

 

  1. Aljaedi and C. E. Chow, “PathSeer: A centralized tracer of packet trajectories in software- defined datacenter networks,” in Proceedings of the IEEE 9th Conference on Principles, Systems and Applications of IP Telecommunications (IPTComm), 2016.
  2. M Alotaibi, Z. Aldubaisi, T. Alkhudaydi A social hypertension awareness and management system for gulf countries (SHAMS): system architecture, the 2016 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE2016)
  3. Aljaedi, C. E. Chow, and J. Rao, “Elastic edge-overlay methods using OpenFlow for cloud networks,” in Proceedings of the 13th International Conference on Information Technology: New Generations (ITNG), Springer, 2016.
  4. Alotaibi, Bandar, and Khaled Elleithy. "A new mac address spoofing detection technique based on random forests." Sensors 16.3 (2016): 281.
  5. Albelwi and A. Mahmood, "Automated Optimal Architecture of Deep Convolutional Neural Networks for Image Recognition," in 15th IEEE International Conference on Machine Learning and Applications, (ICMLA) 2016, Anaheim, CA, USA, pp. 53-60, 2016.
  6. Alotaibi, Bandar. Empirical techniques to detect rogue wireless devices. Diss. University of Bridgeport, 2016.
  7. Albelwi, Saleh, and Ausif Mahmood. "Analysis of instance selection algorithms on large datasets with Deep Convolutional Neural Networks." Systems, Applications and Technology Conference (LISAT), 2016 IEEE Long Island. IEEE, 2016.
  8. Mohammed Mustafa and Hussein Suleman, “Mixed-Language Information Retrieval”, in the Proceedings of Annual Conference of Computational Linguistics and Intelligent Text Processing, Volume 9042 of the series LNCS Springer, pp 427-447
  9. Alotaibi, Bandar, and Khaled Elleithy. "Rogue access point detection: Taxonomy, challenges, and future directions." Wireless Personal Communications 90.3 (2016): 1261-1290.
  10. Jaber K. M. , Shuaib M. M., Maraqa R., Alia O. M., 2016. A Comparative Taxonomy of Parallel Algorithms for Crowd Dynamics Models and their Simulators. International Journal of Soft Computing, 11: 427-436
  11. Osman A. Abdalla, Elfaki, A.O. & Al-Murtadha, Y. J. Comput. Educ. Springer (2016) 3: 439.
  12. Yahya M. AlMurtadha, Khaled M. Alhawiti, Abdelrahman Osman Elfaki, Osman A. Abdalla, Factors Influencing Academic Achievement of Undergraduate Computing Students, International Journal of Computer Applications (0975 – 8887), Volume 146 – No.3, July 2016.
  13. L. Alwakeel, A. Gazdar, and A. Alghamdi, “A Novel Interaction Technique for Transferring Files between Smartphones and Public Displays,” Procedia Computer Science, vol. 94, p. 65–74, 2016.
  14. L. Alwakeel, A. Gazdar, and A. Alghamdi, “Interaction with public display through smartphones,” presented at the poster session of the CCIS Show Day of KSU 2016, KSA Riyadh, May 2016.
  15. L. Alwakeel, A. Gazdar, and A. Alghamdi, “Interaction with public display through smartphones,” presented at the poster session of the PSU Exhibition,KSA Riyadh, March 2016.