SACC-CCSIT-IAU is a digital newsletter provides an effective electronic communication channel for cybersecurity experts and the public. It raises awareness about cyberattacks and how to stay safe in the cyber world. It also publishes current news about cybersecurity, the achievements of cybersecurity students at the College of Computer Science and Information Technology, and recent research publications for faculty and students.
|
|
|
Latest Events on Saudi Aramco Cybersecurity Chair
|
|
|
|
Maintaining level of operational effectiveness of a CSOC under adverse conditions
|
Presented by: Prof. Sushil Jajodia
Professor, BDM International Professor, and Director, Computing, George Mason University, USA .
watch now >
|
|
|
The Art and Science of Fuzzing
|
Presented by: Prof. Thorsten Holz
CISPA Helmholtz Center for Information Security, Germany.
watch now >
|
|
|
|
Recent Research Publications
|
One of the most prominent objectives that have been focused on since the establishment of the scientific chair is to obtain outstanding scientific outputs that enrich the field of cybersecurity. Several research in the field of cybersecurity funded by the scientific chair were published in prestigious scientific journals with Q1 and Q2 classification.
|
|
|
Homoglyph Attack Detection Model Using Machine Learning and Hash Function
|
Authors: Abdullah M. Almuhaideb ,Nida Aslam ,Almaha Alabdullatif ,Sarah Altamimi ,Shooq Alothman ,Amnah Alhussain ,Waad Aldosari ,Shikah J. Alsunaidi and Khalid A. Alissa.
|
|
A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine
|
Authors: Yasir Iqbal, Shahzaib Tahir, Hasan Tahir, Fawad Khan 1ORCID,Saqib Saeed, Abdullah M. Almuhaideb andAdeel M. Syed.
|
|
|
Planet Optimization with Deep Convolutional Neural Network for Lightweight Intrusion Detection in Resource-Constrained IoT Networks.
|
Authors: Khalid A. Alissa,Fatma S. Alrayes,Khaled Tarmissi,Ayman Yafoz,Raed Alsini,Omar Alghushairy, Mahmoud Othman and Abdelwahed Motwakel.
|
|
A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network.
|
Authors: Attique Ur Rehman, Muhammad Sajid Mahmood, Shoaib Zafar, Muhammad Ahsan Raza,Fahad Qaswar, Sumayh S. Aljameel, Irfan Ullah Khan and Nida Aslam.
|
|
|
Applications of Artificial Intelligence to Detect Android Botnets: A Survey
|
Authors: Abdullah M. Almuhaideb and Dalal Y. Alynanbaawi.
|
|
Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions
|
Authors: Malak Aljabri, Hanan S. Altamimi, Shahd A. Albelali, Maimunah Al-Harbi, Haya T. Alhuraib, Najd K. Alotaibi, Amal A. Alahmadi, Fahd Alhaidari, Rami Mustafa A. Mohammad and Khaled Salah.
|
|
|
Top Cybersecurity News from Around the world
|
|
|
Cybersecurity negligence from workers putting firms at risk in ME, survey finds.
|
|
Uber investigating ‘cybersecurity incident’ after report of breach
|
|
|
Saudi cybersecurity authority holds awareness campaign amid cyberthreats
|
|
73% of Saudi Arabia respondents are worried about their connected devices being hacked or attacked
|
|
|
Articles Written by IAU Students
|
|
|
|
By Asalah Saleh and Afrah Shaahid
|
The Ransomware Threat and Ways to Combat
|
At this point of time in history, Ransomware is growing to be the major financial artery of the cybercriminal world and the biggest threat to both private and public enterprises, producing millions of dollars for the cybercriminal community.
|
|
|
|
|
By Jana Mohammed Al wgdany
|
How to intelligently deal with the risks of the digital world?
|
Do you think that your information is stored safely in your phone? Now in this era, all our information is stored in the phone for easy access, viewing, etc.
|
|
|
|
|
By Elaf Abutaki and Mohammed Alqarni
|
Cyberstalking: the practice of good cyber hygiene
|
In the digital age we live in, having access to digital technologies makes finding information easier. Unfortunately, this connectivity and convenience has made it unintentionally easier for cyber-stalkers to target their victims. As the name implies, a cyber-stalker monitors people's activities through technology such as mobile phones and the internet. There is a chance that a cyber-stalker could be targeting old friends, ex-partners, or co-workers.
|
|
|
|
Copyright © 2022 Saudi Aramco Cybersecurity Chair at IAU, All rights reserved.
Dammam 31451 Kingdom of Saudi Arabia
Tel: + 966 13 333-2003
|
|
|
|