Calendar

Information Security Research at KU

Information Security Research at KU

Security concerns have taken center stage in the internal processes of public and private organizations of all sizes, as well as in the everyday life of individuals.

The research focus at Khalifa University is on innovative techniques, protocols and systems for identifying Cyber Security threats, assessing risks, protecting information and communication infrastructures form attacks, guaranteeing confidentiality, integrity, availability, authentication, accountability, as well as on validating security policies via audit and forensics.

Research staff

Dr. Yousof Al-Hammadi

Assistant Professor

Dr. Joonsang Baek

Assistant Professor

Dr. Ernesto Damiani

Professor

Dr. Rabeb Mizouni

Assistant Professor

Dr. Hadi Otrok

Associate Professo

Dr. Khaled Salah

Associate Professor

Dr. Abdulhadi Shoufan

Assistant Professor

Dr. Thanos Stauraitis

Professor

Dr. Chan Yeob Yeun

Assistant Professor

Dr. Jamal Zemerly

Associate Professor

   

 

  • Wireless and mobile security
  • Cloud and Big Data security
  • Security of Cyber-Physical Systems
  • IoT and SCADA security
  • Audit
  • Penetration testing
  • Digital forensics
  • C. A. Ardagna, E. Damiani, F. Frati, D. Rebeccani, “A Configuration-Independent Score-Based Benchmark for Distributed Databases,” IEEE Transactions on Services Computing, vol. 9, no. 1, pp. 123-137, 2016.
  • N. Werghi, C. Tortorici, S. Berretti, and A. Del Bimbo, “Boosting 3D LBP-Based Face Recognition by Fusing Shape and Texture Descriptors on the Mesh,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 5, pp. 964-979, 2016.
  • W. Van Der Aalst and E. Damiani, “Processes Meet Big Data: Connecting Data Science with Process Science,” IEEE Transactions on Services Computing, vol. 8, no. 6, pp. 810-819, 2015.
  • M. Alzaabi, K. Taha, and T. A. Martin, “CISRI: A Crime Investigation System Using the Relative Importance of Information Spreaders in Networks Depicting Criminals Communications,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2196-2211, 2015.
  • K. Salah, M. Hammoud, and S. Zeadally, “Teaching Cybersecurity Using the Cloud,” IEEE Transactions on Learning Technologies, vol. 8, no. 4, pp. 383-392, 2015.
  • Shoufan, Z. Lu, and S. A. Huss, “A web-based visualization and animation platform for digital logic design,” IEEE Transactions on Learning Technologies, vol. 8, no. 2, pp. 225-239, 2015.
  • J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, “A secure cloud computing based framework for big data information management of smart grid,” IEEE Transactions on Cloud Computing, vol. 3, no. 2, pp. 233-244, 2015.