Dr. Abdullah M.Almuhaideb Supervisor at Saudi Aramco Cybersecurity Chair, Vice President for Academic Affairs at IAU, Associate Professor in Information Security
ABDULLAH M. ALMUHAIDEB received the B.S. degree (Hons.) in computer information system from King Faisal University, Saudi Arabia, in 2003, and the M.S. (Hons.) and Ph.D. degrees in network security from Monash University, Melbourne, Australia, in 2007 and 2013, respectively. He is currently an Assistant Professor of Information Security and the Dean of the College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Saudi Arabia. He has published more than 30 scientific articles in journals and premier ACM/IEEE/Springer conferences, such as TrustCom, NCA, MobiQuitous, ICICS, and AINA. His research interests include mobile security, ubiquitous wireless access, authentication and identification.
publications
| # | Research Title | Publisher and Date of Publication |
|---|---|---|
| 1 |
Authentication in Wireless Body Area
Network: Taxonomy and Open Challenges. |
Journal on Internet of Things, Vol.3, No.4, 2021, pp.159-182. DOI: 10.32604/jiot.2021.018088 |
| 2 | Sustainable Program Assessment
Practices: A Review of the ABET and NCAAA Computer Information Systems Accreditation Process |
International Journal of Environmental Research and Public Health, 18, no. 23 (2021): p 12691. (Q2, IF: 3.39, CiteScore: 3.4) DOI: 10.3390/ijerph182312691 |
| 3 | Comorbidities and Risk Factors for
Severe Outcomes in COVID-19
Patients in Saudi Arabia: A Retrospective Cohort Study |
Journal of Multidisciplinary Healthcare Volume14, 2021 (Q1, IF: 2.404, CiteScore: 3.5) |
| 4 | Cough Sound Detection and Diagnosis
Using Artificial Intelligence
Techniques: Challenges and Opportunities |
IEEE Access, Volume 9, 2021. (Q1, IF: 3.745, CiteScore: 4.8) DOI: 10.1109/ACCESS.2021.3097559 |
| 5 | E-Triage Systems for COVID-19
Outbreak: Review and Recommendations |
Sensors 21, no. 8 (2021): p 2845. (Q1, IF: 3.576, CiteScore: 5.8) DOI: 10.3390/s21082845 |
| 6 | Applications of Big Data Analytics to Control COVID-19 Pandemic | Sensors 21, no. 7 (2021): p 2282. (Q1, IF: 3.576, CiteScore: 5.8) DOI: 10.3390/s21072282 |
| 7 | Re-AuTh: Lightweight Reauthentication with Practical Key Management for Wireless Body Area Networks | Arabian Journal for Science and Engineering, 2021. (Q1, IF: 2.334, CiteScore: 2.7) DOI: 10.1007/s13369-021-05442-9 |
| 8 | A Strong Smartphone Authentication Model to Control Cellular Network Access using Blockchain | Wireless Networks, 2021. (Q1, IF: 2.659, CiteScore: 4.1) DOI: 10.1007/s11276-021-02542-0 |
| 9 | Authenblue: A New Authentication Protocol for the Industrial Internet of Things | Computers, Materials & Continua, vol. 67, no.1, pp. 1103–1119, 2021. (Q1, IF: 4.89, CiteScore: 3.8) DOI:10.32604/cmc.2021.014035 |
| 10 | A Process-based Approach to ABET
Accreditation: A Case Study of Cybersecurity and Digital Forensics Program |
Journal of Information Systems Education, 2021. 32(2), 119-133. (Q2 IF: 1.7, CiteScore: 2.3) |
| 11 | A Lightweight Three-Factor Authentication Scheme for WHSN Architecture | Sensors, 20, 6860, 2020. (Q1, IF: 3.576, CiteScore: 5) DOI: 10.3390/s20236860 |
| 12 | A Lightweight and Secure Anonymity Preserving Protocol for WBAN | IEEE Access, Volume 8, 2020. (Q1, IF: 3.745, CiteScore: 4.8) DOI: 10.1109/ACCESS.2020.3025733 |
| 13 | Fostering Sustainable Quality Assurance Practices in OutcomeBased Education: Lessons Learned from ABET Accreditation Process of Computing Programs | Sustainability, Volume 12, Issue 20, 2020. (Q1, IF: 3.251, CiteScore: 3.2) DOI: 10.3390/su12208380 |
| 14 | Investigation of the Optimal Method for Generating and Verifying the Smartphone's Fingerprint: A Review | Journal of King Saud University-Computer and Information Sciences, 2020. (Q1, IF: 13.473 CS: 8) DOI: 10.1016/j.jksuci.2020.06.007 |
| 15 | Authentication in Ubiquitous Networking | International Journal of Information Security and Privacy (IJISP) 9.3, pp.57-83, 2015. (Q4, CS: 0.9) DOI: 10.4018/LTTSR2015070104 |
| 16 | Secure Mobile Authentication in Ubiquitous Networking Environments. | Doctoral Dissertation. MONASH University, 2013. |
| 17 | Flexible Authentication Technique for Ubiquitous Wireless Communication using Passport and Visa Tokens | Journal of Telecommunications, Volume 1, Issue 2, pp1-10, March 2010. |
| 18 | Holistic Approach for Critical System
Security: Flooding Prevention and Malicious Packet Stopping |
Journal of Telecommunications, Volume 1, Issue 1, pp14-24, February 2010. |
contact details
+966-13-3332000