SACC-CCSIT-IAU is a digital newsletter provides an effective electronic communication channel for cybersecurity experts and the public. It raises awareness about cyberattacks and how to stay safe in the cyber world. It also publishes current news about cybersecurity, the achievements of cybersecurity students at the College of Computer Science and Information Technology, and recent research publications for faculty and students.

Latest Events on Saudi Aramco Cybersecurity Chair

Social Engineering

The Art Of Manipulating Humans

Dr. Khalid Alissa

Dean of Communications and Information Technology IAU,  Assistant Professor in Information Security, Information Security Consultant, Founding member and Deputy General Supervisor of Aramco Cybersecurity Chair.

I'm an image

Within the cooperation programs between Dammam airports and Imam Abdulrahman bin Faisal University, Dr. Khaled Al-Issa presented a workshop entitled "Social Engineering, The Art Of Manipulating Humans" to raise awareness of cybersecurity.

I'm an image
I'm an image
I'm an image
I'm an image

Machine Learning in Cybersecurity

I'm an image

Dr. Mohammad Dahman Alshehri

Assisting Professor of Computer Science, Taif University, KSA. Ambassador of the Future Technologies, Stanford University, USA. Delivered training courses  in ML and Cybersecurity. 

On 21 March, Saudi Aramco Cybersecurity Chair organized a training course entitled Machine Learning in Cybersecurity in total of 12 training hours. It was presented by Dr. Mohammad Dahman Alshehri. This course aims to increase and advance the practical knowledge of the trainees in the critical and emerging areas of Artificial Intelligence and Cyber Security. Where the number of trainees was about 11 trainees. This course addressed several theoretical and practical aspects, namely, understanding the concepts of ML and cybersecurity, recognizing dealing with data and data sources, identifying ML algorithms, practicing different cyber-attacks and tackling them using ML techniques, detecting cyber vulnerabilities and IDS by ML, and practicing the ML enjoinments with cybersecurity solution.

Power and Limits of Learnable Encryption

Presented by: Prof. Srini Devadas

 

Webster Professor of EECS at Massachusetts Institute of Technology (MIT), USA Received the IEEE Cybersecuritv Award in 2021, and the ACM SIGSAC Award for Outstanding Innovation.

watch now >

Demystifying Zero Trust

Presented by: Dr. Scott Rose

 

DistinguishedProfessor, National Institute Standards and Technology (NIST), USA. 

watch now > 

I'm an image
I'm an image

 

Recent Research Publications

One of the most prominent objectives that have been focused on since the establishment of the scientific chair is to obtain outstanding scientific outputs that enrich the field of cybersecurity.
Several research in the field of cybersecurity funded by the scientific chair were published in prestigious scientific journals with Q1 and Q2 classification. 

Classification of Firewall Log Data Using Multiclass Machine Learning Models.

Authors: Malak Aljabri, Rami Mustafa A. Mohammad, Amal Alahmadi, Mennah H. Aboulnour, Dorieh M. Alomari, and Sultan H. AlmotirI.

Find Out More

AT-BOD: An Adversarial Attack on Fool DNN-Based Blackbox Object Detection Model.

Authors: Ilham Elaalami, Sunday Olatunji, Rachid Zagrouba.

Find Out More

Towards a Hybrid Machine Learning Model for Intelligent Cyber Threat Identification in Smart City Environments.

Authors: Najla Al-Taleb and Nazar Abbas Saqib.

Find Out More

ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques

Authors: Fahd A. Alhaidari, Nouran S. Abu Shaib, Maram A. Alsafi, Haneen A. Alharbi, Majd R. Alawami, Reem M. Aljindan, Rachid Zagrouba, and Atta-ur-Rahman.

Find Out More

 

Top Cybersecurity News from Around the world 

Story Image

Hackers Use Smart Building Access Control Systems to Launch DDoS Attacks

 
Story Image

Saudi NCA Launches National Portal for Cybersecurity Services, "HASEEN"

 
Story Image

What Is Cybersecurity Mesh and Why Is It Important?

 
Story Image

Digital Danger And Cybersecurity Safeguards

 

 

Articles Written by IAU Students

1

By Basil Abdulrahman and Rana Aboulsamh 

AI- POWERED CYBERSECURITY

The chilling growth of Artificial Intelligence does not stop at autonomous cars, natural language processing, and AI-driven algorithms. In fact, the potential of Artificial Intelligence is theoretically endless. Due to that boundless capacity, it’s not peculiar to see AI crossing the boundaries of its field over to other subsets of computer science, such as cybersecurity.

I'm an image
 

2

By Aminah Albuainain, Jana Alansari,

Jana Alshaya, Samiyah Alrashidi, Wasmiyah Alqahtani 

SHOR'S QUANTUM ALGORITHMS AGAINST RSA

This study explores the possibility of breaking RSA which is widely used in banking and digital signature using Shor's algorithm implemented upon quantum computers. Considering that RSA is one of the most commonly used encryption algorithms in traditional systems. But, due to continuous quantum computing improvements, the current security system may be threatening.

I'm an image
 

 

 

 

 
Twitter YouTube LinkedIn

Copyright © 2022  Saudi Aramco Cybersecurity Chair at IAU, All rights reserved.

Dammam 31451
Kingdom of Saudi Arabia

Tel: + 966 13 333-2003