SACC-CCSIT-IAU is a digital newsletter provides an effective electronic communication channel for cybersecurity experts and the public. It raises awareness about cyberattacks and how to stay safe in the cyber world. It also publishes current news about cybersecurity, the achievements of cybersecurity students at the College of Computer Science and Information Technology, and recent research publications for faculty and students.

Latest Events on Saudi Aramco Cybersecurity Chair

I'm an image

Maintaining level of operational effectiveness of a CSOC under adverse conditions

 

Presented by: Prof. Sushil Jajodia

 

Professor, BDM International Professor, and Director, Computing, George Mason University, USA .

watch now >

The Art and Science of Fuzzing

 

Presented by: Prof. Thorsten Holz

 

CISPA Helmholtz Center for Information Security, Germany. 

watch now > 

I'm an image

 

Recent Research Publications

One of the most prominent objectives that have been focused on since the establishment of the scientific chair is to obtain outstanding scientific outputs that enrich the field of cybersecurity.
Several research in the field of cybersecurity funded by the scientific chair were published in prestigious scientific journals with Q1 and Q2 classification. 

Homoglyph Attack Detection Model Using Machine Learning and Hash Function

Authors: Abdullah M. Almuhaideb ,Nida Aslam ,Almaha Alabdullatif ,Sarah Altamimi ,Shooq Alothman ,Amnah Alhussain ,Waad Aldosari ,Shikah J. Alsunaidi and Khalid A. Alissa.

Find Out More

A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine

Authors: Yasir Iqbal, Shahzaib Tahir, Hasan Tahir, Fawad Khan 1ORCID,Saqib Saeed, Abdullah M. Almuhaideb  andAdeel M. Syed.

Find Out More

Planet Optimization with Deep Convolutional Neural Network for Lightweight Intrusion Detection in Resource-Constrained IoT Networks.

Authors: Khalid A. Alissa,Fatma S. Alrayes,Khaled Tarmissi,Ayman Yafoz,Raed Alsini,Omar Alghushairy, Mahmoud Othman  and Abdelwahed Motwakel.

Find Out More

A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network.

Authors: Attique Ur Rehman, Muhammad Sajid Mahmood, Shoaib Zafar, Muhammad Ahsan Raza,Fahad Qaswar, Sumayh S. Aljameel, Irfan Ullah Khan  and Nida Aslam.

Find Out More

Applications of Artificial Intelligence to Detect Android Botnets: A Survey

Authors: Abdullah M. Almuhaideb and Dalal Y. Alynanbaawi.

Find Out More

Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions

Authors: Malak Aljabri, Hanan S. Altamimi, Shahd A. Albelali, Maimunah Al-Harbi, Haya T. Alhuraib, Najd K. Alotaibi, Amal A. Alahmadi, Fahd Alhaidari, Rami Mustafa A. Mohammad and Khaled Salah.

Find Out More

 

 

Top Cybersecurity News from Around the world 

Story Image

Cybersecurity negligence from workers putting firms at risk in ME, survey finds.

 
Story Image

Uber investigating ‘cybersecurity incident’ after report of breach

 
Story Image

Saudi cybersecurity authority holds awareness campaign amid cyberthreats

 
Story Image

73% of Saudi Arabia respondents are worried about their connected devices being hacked or attacked

 

 

Articles Written by IAU Students

1

By Asalah Saleh and Afrah Shaahid 

The Ransomware Threat and Ways to Combat

At this point of time in history, Ransomware is growing to be the major financial artery of the cybercriminal world and the biggest threat to both private and public enterprises, producing millions of dollars for the cybercriminal community. 

I'm an image
 

2

By Jana Mohammed Al wgdany

How to intelligently deal with the risks of the digital world?

Do you think that your information is stored safely in your phone? Now in this era, all our information is stored in the phone for easy access, viewing, etc. 

I'm an image
 

3

By Elaf Abutaki and Mohammed Alqarni 

Cyberstalking: the practice of good cyber hygiene

In the digital age we live in, having access to digital technologies makes finding information easier. Unfortunately, this connectivity and convenience has made it unintentionally easier for cyber-stalkers to target their victims. As the name implies, a cyber-stalker monitors people's activities through technology such as mobile phones and the internet. There is a chance that a cyber-stalker could be targeting old friends, ex-partners, or co-workers. 

I'm an image
 

 

 

 

 

 
Twitter YouTube LinkedIn

Copyright © 2022  Saudi Aramco Cybersecurity Chair at IAU, All rights reserved.

Dammam 31451
Kingdom of Saudi Arabia

Tel: + 966 13 333-2003