SACC-CCSIT-IAU is a digital newsletter provides an effective electronic communication channel for cybersecurity experts and the public. It raises awareness about cyberattacks and how to stay safe in the cyber world. It also publishes current news about cybersecurity, the achievements of cybersecurity students at the College of Computer Science and Information Technology, and recent research publications for faculty and students.
|
|
|
Latest Events on Saudi Aramco Cybersecurity Chair
|
|
|
Social Engineering
The Art Of Manipulating Humans
|
|
|
Dr. Khalid Alissa
Dean of Communications and Information Technology IAU, Assistant Professor in Information Security, Information Security Consultant, Founding member and Deputy General Supervisor of Aramco Cybersecurity Chair.
|
|
|
|
Within the cooperation programs between Dammam airports and Imam Abdulrahman bin Faisal University, Dr. Khaled Al-Issa presented a workshop entitled "Social Engineering, The Art Of Manipulating Humans" to raise awareness of cybersecurity.
|
|
|
Machine Learning in Cybersecurity
|
|
|
|
Dr. Mohammad Dahman Alshehri
|
Assisting Professor of Computer Science, Taif University, KSA. Ambassador of the Future Technologies, Stanford University, USA. Delivered training courses in ML and Cybersecurity.
|
|
|
On 21 March, Saudi Aramco Cybersecurity Chair organized a training course entitled Machine Learning in Cybersecurity in total of 12 training hours. It was presented by Dr. Mohammad Dahman Alshehri. This course aims to increase and advance the practical knowledge of the trainees in the critical and emerging areas of Artificial Intelligence and Cyber Security. Where the number of trainees was about 11 trainees. This course addressed several theoretical and practical aspects, namely, understanding the concepts of ML and cybersecurity, recognizing dealing with data and data sources, identifying ML algorithms, practicing different cyber-attacks and tackling them using ML techniques, detecting cyber vulnerabilities and IDS by ML, and practicing the ML enjoinments with cybersecurity solution.
|
|
|
Power and Limits of Learnable Encryption
|
Presented by: Prof. Srini Devadas
Webster Professor of EECS at Massachusetts Institute of Technology (MIT), USA Received the IEEE Cybersecuritv Award in 2021, and the ACM SIGSAC Award for Outstanding Innovation.
watch now >
|
|
Presented by: Dr. Scott Rose
DistinguishedProfessor, National Institute Standards and Technology (NIST), USA.
watch now >
|
|
|
Recent Research Publications
|
One of the most prominent objectives that have been focused on since the establishment of the scientific chair is to obtain outstanding scientific outputs that enrich the field of cybersecurity. Several research in the field of cybersecurity funded by the scientific chair were published in prestigious scientific journals with Q1 and Q2 classification.
|
|
|
Classification of Firewall Log Data Using Multiclass Machine Learning Models.
|
Authors: Malak Aljabri, Rami Mustafa A. Mohammad, Amal Alahmadi, Mennah H. Aboulnour, Dorieh M. Alomari, and Sultan H. AlmotirI.
|
|
AT-BOD: An Adversarial Attack on Fool DNN-Based Blackbox Object Detection Model.
|
Authors: Ilham Elaalami, Sunday Olatunji, Rachid Zagrouba.
|
|
|
Towards a Hybrid Machine Learning Model for Intelligent Cyber Threat Identification in Smart City Environments.
|
Authors: Najla Al-Taleb and Nazar Abbas Saqib.
|
|
ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques
|
Authors: Fahd A. Alhaidari, Nouran S. Abu Shaib, Maram A. Alsafi, Haneen A. Alharbi, Majd R. Alawami, Reem M. Aljindan, Rachid Zagrouba, and Atta-ur-Rahman.
|
|
|
Top Cybersecurity News from Around the world
|
|
|
Hackers Use Smart Building Access Control Systems to Launch DDoS Attacks
|
|
Saudi NCA Launches National Portal for Cybersecurity Services, "HASEEN"
|
|
|
What Is Cybersecurity Mesh and Why Is It Important?
|
|
Digital Danger And Cybersecurity Safeguards
|
|
|
Articles Written by IAU Students
|
|
|
|
By Basil Abdulrahman and Rana Aboulsamh
|
AI- POWERED CYBERSECURITY
|
The chilling growth of Artificial Intelligence does not stop at autonomous cars, natural language processing, and AI-driven algorithms. In fact, the potential of Artificial Intelligence is theoretically endless. Due to that boundless capacity, it’s not peculiar to see AI crossing the boundaries of its field over to other subsets of computer science, such as cybersecurity.
|
|
|
|
|
By Aminah Albuainain, Jana Alansari,
Jana Alshaya, Samiyah Alrashidi, Wasmiyah Alqahtani
|
SHOR'S QUANTUM ALGORITHMS AGAINST RSA
|
This study explores the possibility of breaking RSA which is widely used in banking and digital signature using Shor's algorithm implemented upon quantum computers. Considering that RSA is one of the most commonly used encryption algorithms in traditional systems. But, due to continuous quantum computing improvements, the current security system may be threatening.
|
|
|
|
Copyright © 2022 Saudi Aramco Cybersecurity Chair at IAU, All rights reserved.
Dammam 31451 Kingdom of Saudi Arabia
Tel: + 966 13 333-2003
|
|
|
|