51ºÚÁÏÉçÇø

Dr Abdulghani A. Ahmed

Job: Senior Lecturer in Digital Forensics, Course Leader for MSc Cybersecurity

Faculty: Computing, Engineering and Media

School/department: School of Computer Science and Informatics

Address: 51ºÚÁÏÉçÇø, The Gateway, Leicester, LE1 9BH

T: N/A

E: aa.ahmed@dmu.ac.uk

 

Personal profile

Abdulghani Ali Ahmed (Senior Member, IEEE) received the B.Sc. degree in computer science in 2002, M.Sc., and Ph.D. in cybersecurity and forensic investigation in 2006, and 2014 respectively. Currently, Ahmed serves as a Course Leader for MSc Cybersecurity at the School of Computer Science and Informatics, 51ºÚÁÏÉçÇø, UK.

Prior to this, Ahmed was as senior lecturer at the Department of Computer Systems and Networking Department, Faculty of Computer Systems & Software Engineering, University Malaysia Pahang, Malaysia. His current research interests include big data, big data privacy, IoT authentication, network security, cloud computing security, malware analysis, incident response, digital forensic, and cybercrime investigation. Ahmed has excellent achievements in terms of innovation as he has awarded many Gold, Silver, and Bronze medals from local, national, and international exhibitions. Ahmed has managed to obtain several local and international grants to fund cybersecurity studies and research. He has published several researches and scientific articles in well-known international journals and conferences.

Ahmed has a long experience in working with higher education as a lecturer, and senior lecturer since 2004 until now. Ahmed currently serves as the main supervisor for many postgraduate (Master and Ph.D.) students who are studying and conducting researches in the area of IoT security, big data privacy, cloud computing security, and cybercrime investigation. He’s a senior member of IEEE (93540925) and International Association of Engineers (IAENG) (164016).

Research group affiliations

Cyber Technology Institute (CTI)

Publications and outputs

  • Anil Tatiparthi, Abdulghani Ali Ahmed, Mehmet Kiraz, (2025), Retrieving and Discovering Digital Traces of Cybercrime on Mobile Devices, IEEE Access. (Accepted Paper).
  • Fahim Nasir, Abdulghani Ali Ahmed, Mehmet Kiraz, Iryna Yevseyeva, (2025), Predictive Analysis of Marketing Campaigns Using Ensemble and Deep Learning, IEEE Access. (Revised paper).
  • Abdulghani Ali Ahmed, Khalid Farhan, Izuan Hafez and Ghadir Alselwi, (2024), Retrieving and Identifying Remnants of Artifacts on Cloud Storage, Sensors Journal.
  • Abdulghani Ali Ahmed, Khalid Farhan, Machine Learning-Based Cybercrime Detection: A Comprehensive Review, CMC-Computers, Materials & Continua. (Under Review).
  • Fahim Nasir, Abdulghani Ali Ahmed, Mehmet Kiraz, Iryna Yevseyeva, (2024), Data-Driven Decision-Making for Bank Target Marketing Using Supervised Learning Classifiers on Imbalanced Big Data, CMC-Computers, Materials & Continua.
  • Abdulghani Ali Ahmed, Khalid Farhan, WA Jabbar, A Al-Othmani, AG Abdulrahman, (2024), IoT Forensics: Current Perspectives and Future Directions, Sensors Journal.
  • Abdulghani Ali Ahmed, (2023), Ali H Al-Bayatti, A Honeybee Inspired Framework for Smart City Free of Internet Scams, Sensors Journal.
  • M. BinJubier, Abdulghani Ali Ahmed, M. Bin Ismail, Slicing-based enhanced method for privacy-preserving in publishing big data, CMC-Computers, Materials & Continua Journal (2022).
  • Abdulghani Ali Ahmed, Wendy Kwan, Mohammed Noman Kabir, Ali Safaa Sadiq, (2020), Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing, IEEE Systems Journal.
  • W. Al-khater, Somaya Al-Maadeed, Abdulghani Ali Ahmed, Sadiq, A.S, M. Khan, (2020). Comprehensive Survey on Cybercrime Detection Techniques, IEEE Access.
  • Abdulghani Ali Ahmed, Waheb A. Jabbar, Sadiq. A.S. (2020), A Deep-Learning based Classification Model for Botnet Attack Detection, Journal of Ambient Intelligence and Humanized Computing.
  • M. BinJubier, Abdulghani Ali Ahmed, M. Bin Ismail, Sadiq, A.S, M. Khan, (2019). Comprehensive Survey on Big Data Privacy Protection. IEEE Access.
  • Sadiq, A.S., Tahir, M.A., Ahmed, A.A. et al. Normal parameter reduction algorithm in soft set based on hybrid binary particle swarm and biogeography optimizer. Neural Computing and Applications (2019). .
  • Abdulghani Ali Ahmed, (2019). Malware Detection Using a Feed-forward Backpropagation Artificial Neural Network. Computational Intelligence in Information System (CIIS 2018), Advances in Intelligent Systems and Computing, 888(1), 24-35. Springer, Cham (Book Chapter, ISI).
  • Muhammad Rizwan Ghori, Abdulghani Ali Ahmed, (2018). Review of Access Control Mechanisms in Cloud Computing. Journal of Physics 1049 (1), 012092.
  • Abdulghani Ali Ahmed, Yee Wai Kit, Amer A Sallam, (2018), Raspberry Pi-Based Investigating Model for Identifying Intrusion Evidence, Journal of Forensic Science & Criminal Investigation. 7(3), 1-9: 555715. DOI: 10.19080/JFSCI.2018.07.555715.
  • Abdulghani Ali Ahmed, Nik Quosthoni Sunaidi, (2018), Malicious Website Detection: A Review, Journal of Forensic Science & Criminal Investigation. 7(3), 1-4: 555715. DOI: 10.19080/JFSCI.2018.07.555715.
  • Nik Quosthoni Sunaidi, Abdulghani Ali Ahmed, (2018) Back Propagation Algorithm-Based Intelligent Model for Botnet Detection. Advanced Science Letters, 24(10),7348-7354 (7): DOI: .
  • Mohamed Montaser, Abdulghani Ali Ahmed, (2018), RED-based model for detecting and avoiding anomaly network congestion. Advanced Science Letters, 24(10), 7388-7394(7): DOI: .
  • Abdulghani Ali Ahmed, Chua Xue Li, (2018). Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment. Journal of Forensic Sciences, (ISI). 63(1), 112-121. doi: 10.1111/1556-4029.13506.
  • Abdulghani Ali Ahmed, Mohammed Falah Mohammed, (2018). SCIRF: A Similarity Approach for Cybercrime Intention Recognition Using Fuzzy Min-Max Neural Network. Journal of Computational Science, (Elsevier ISI), 25 (2018): 467-473.: DOI:10.1016/j.jocs.2017.09.007.
  • Adebanjo Adekiigbe, Abdulghani Ali Ahmed, Ali Safa Sadiq, Kayhan Z. Ghafoor, Kamalrulnizam Abu Bakar, (2017). An Efficient Cluster Head Election Algorithm for Client Mesh Networks using Fuzzy Logic Control. Journal of Internet Technology, 18(5), 1057 - 1067 (ISI).
  • Abdulghani Ali Ahmed, (2017). Investigation Approach for Network Attack Intention Recognition. International Journal of Digital Crime and Forensics (IJDCF). 9(1), 17-38 (SCOPUS).
  • Yee Wai Kit, Abdulghani Ali Ahmed, (2017). Raspberry Pi-Based Honeypot Investigating Model for Identifying Intrusions Evidences. Journal of Theoretical and Applied Information Technology. (SCOPUS).
  • Abdulghani Ali Ahmed, Noorul Ahlami Kamarul Zaman, (2017). Network Attack Intention Recognition: A Review. International Journal of Network Security. 19(2), 244-250 (SCOPUS with SJR 0.51).
  • Abdulghani. A. Ahmed, Aman Jantan, & Wan, T. C, (2016). Filtration model for the detection of malicious traffic in large-scale networks. Computer Communications, Elsevier. (82), 59–70, (Top 20% of Q1 ISI Journal).
  • Abdulghani. A. Ahmed, Ali Safa & Mohd Fadli, (2016). "Traceback Model for identifying Sources of Distributed Attacks at Real-Time, Security and Communication Networks, Wiley, (ISI Journal).
  • Abdulghani. A. Ahmed, (2015). Investigation Model for DDoS Attack Detection at Real-Time. International Journal of Software Engineering and Computer Systems (IJSECS), ISSN: 2289- 8522, v (1), 95-108.
  • Aman Jantan, Abdulghani A. Ahmed, (2014). Honeybee Protection System for Detecting and Preventing Network Attacks. Journal of Theoretical and Applied Information Technology (JATIT), 64(1), 38-37. Published Article, (SCOPUS).
  • Aman Jantan, Abdulghani A. Ahmed, (2014). Honey bee intelligent model FOR NETWORK zero day attack DETECTION. International Journal of Digital Content Technology and its Applications (JDCTA), Published Article, (SCOPUS).
  • Aman Jantan, Omer Aleijlah, Abdulghani A. Ahmed, (2014). Three layers approach for network scanning detection. Journal of Theoretical and Applied Information Technology (JATIT), 64(1), 38-37. Published Article, (SCOPUS).
  • Abdulghani. A. Ahmed, Aman Jantan, & Wan, T. C., (2013). "Real-Time Detection of Intrusive Traffic in QoS Network Domains, Security & Privacy, IEEE , vol.(99), .45-53. doi: 10.1109/MSP.2013.52. Published in IEEE, (ISI).
  • Abdulghani. A. Ahmed, Aman Jantan, & Rasmi, M. (2013). Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse. Journal of Network and Systems Management, 21(2), 218-237. Published in Springer, (ISI).
  • Abdulghani. A. Ahmed, Aman Jantan & Wan, T. C. (2011). SLA-based complementary approach for network intrusion detection. Computer Communications, 34(14), 1738-1749. Published in Elseivier, (ISI).
  • Abdulghani. A. Ahmed, A. Jantan, G. A. Ali (2010). A Potent Model for Unwanted Traffic Detection in QoS Network Domain. International Journal of Digital Content Technology and its Applications (JDCTA), 4(2), 122 – 130. (SCOPUS).
  • Ali, G., Aman Jantan, A., & Abdulghani A. Ahmed (2009). Honeybee-based model to detect intrusion. In Advances in Information Security and Assurance (pp. 598-607). Springer Berlin Heidelberg. (ISI).

Research interests/expertise

  • IoT authentication,
  • Big data privacy,
  • Network security,
  • Cloud computing security,
  • Malware Detection,
  • Incident response,
  • Digital forensic, and cybercrime investigation.

Areas of teaching

Cyber Security and Digital Forensics

Qualifications

2010 – 2014 Universiti Sains Malaysia, Penang –Malaysia
• PhD in Network security, Intrusion Detection Systems.
2004 – 2006 Al-Neelain University – Khartoum
• M.S.c in Network Forensics, Identity Spoofing Investigation.
1998 – 2002 Sudan University for science and technology – Khartoum
• B.S.c(honor) in computer science.

Courses taught

  • Malware Analysis (MSc)
  • Digital Forensics Principles & Practice (MSc)
  • Host and Network Security (MSc)
  • Malware Analysis (BSc)
  • Network Forensics (BSc)
  • Windows forensics (BSc)
  • Linux Security (BSc)
  • Software and Security Management (BSc)
  • Computer Networks (BSc)
  • End-Point Security (BSc)
  • Secure Scripting & Business Applications (BSc)
  • Ethical Hacking

Honours and awards

  • Gold medal, SafeCyber System for The Safety of Financial Transactions and Users' Credentials against Online Frauds and Cybercrimes, MTE2018.
  • Gold Medal, SAFEWARE System for The Safety of Online Financial Services Against Frauds and Cybercrimes, Citrex 2018 Universiti Malaysia Pahang (UMP).
  • CENDEKIA BITARA AWARD 2016 (Journal Publication Category), Research Product entitled “Filtration Model for the Detection of Malicious Traffic in Large-Scale Networks”, 28 Apr 2017 at Zenith Hotel, Kuantan. Malaysia.
  • Gold Medal, SafeCyber: Bee Inspired System for Sustaining Safety of Users' Credentials against Financial Fraud and Cybercrimes, CITREX 2017 Universiti Malaysia Pahang (UMP).
  • Gold Medal, Intrusion Detection and Traceback Plus (iDAT+), The 2016 International Invention Innovation Competition in Canada, iCAN 2016. North York, On, Canada, (Preliminary Evaluation).
  • Silver Medal, an Intelligent N-IDS Security Box Based on Hybrid ANN with Whale Optimization, CITREX 2017 Universiti Malaysia Pahang (UMP).
  • Silver Medal, an Efficient Intrusion Detection Security System Based on Magnetic Optimization Algorithm (MOA), CITREX 2017 Universiti Malaysia Pahang (UMP).
  • Silver Medal, A Model for Mobile Malware Identification using Hypervisor in Cloud, CITREX 2017 Universiti Malaysia Pahang (UMP).
  • Silver Medal, Intelligent Intrusion Detection and Traceback System (i2DAT), I-RIA 2016 Universiti UTARA Malaysia (UUM).
  • Silver Medal, PhishSys: A Honey Bee Inspired System for Phishing Websites Detection, ICE-CINNO 2016, Universiti Malaysia Pahang (UMP).
  • Bronze Medal, Cybercrime Intention Recognition System (CyberSys), CITREX 2016 Universiti Malaysia Pahang (UMP).
  • Bronze Medal, Rootkit Detection System based on Memory Dump Analysis, CITREX 2016 Universiti Malaysia Pahang (UMP).
  • Bronze Medal, IudSys: Illegal User Detection System, ICE-CINNO 2016, Universiti Malaysia Pahang (UMP).
  • Bronze Medal, An Adaptive Channel Estimation Technique for Mitigating Road Accidents Using Inter-Vehicular Communication, CITREX 2016 Universiti Malaysia Pahang (UMP).
  • Silver Medal, Intrusion Detection and Traceback System (iDAT), PECIPTA 2015 Universiti Sains Malaysia (USM).
  • Silver Medal, Intelligent Intrusion Detection and Traceback System (i2DAT), CITREX 2015 Universiti Malaysia Pahang (UMP).
  • Nominating PhD thesis for best thesis (2015) award in USM.
  • High impact publication award, Computer science postgraduate colloquium 2013, USM, Penang, Malaysia.
  • High impact publication award, Computer science postgraduate colloquium 2012, USM, Penang, Malaysia.
  • High impact publication award, Computer science postgraduate colloquium 2011, Naza Talyya Hotel, Penang, Malaysia. 

Membership of professional associations and societies

  • Senior member of IEEE (93540925) since 2015.
  • Member of International Association of Engineers (IAENG) (164016) since 2015.

Professional licences and certificates

  • Senior Fellowship of the Higher Education Academy (SFHEA), UK, 2024.
  • Cellebrite Certified Operator (CCO), Cellebrite, 4th February 2022.
  • Cellebrite Mobile Forensics Fundamentals (CMFF), Cellebrite, 9th February 2022.
  • FTK Imager 100, AccessData Certified Technician (ACT), 15th September 2021.
  • The Dynamic Duo in Fighting Cyber Security Risks, Sakra Academy (M) Sdn Bhd, Kuala Lumpur, Malaysia, 7 May 2018.
  • Encase Essential and Mobile Forensic, Universiti Teknologi MARA, Malaysia, 24 April, 2016.
  • Digital Forensic Investigation, AccessData Certified Examiner (ACE), Certification Date: August 27, 2015.
  • INFORISK 360 Network Security Specialists, Condition Zebra – Malaysia, Certification Date: October 2, 2015. Verification No: CZIR360-1000051.
  • INFORISK 360 Information Security Specialists, Condition Zebra – Malaysia, Certification Date: October 8, 2015. Verification No: CZIR360-1000052.
  • General Information Security Certificate, Security and Forensic Research Group, School of Computer Sciences, USM, Certified at 2012.
  • CCNA Routing and Switching Introduction to Network, Cisco Network Academy, Universiti Teknologi MARA, Malaysia, July 12, 2018.
  • Cisco Certified Network Associate, Cisco Networking Academy: July 16, 2018.
  • Cisco Networking Academy Orientation course, Cisco Networking Academy: July 9, 2018.
  • Open CourseWare (OCW) Development, An innovation in teaching and learning, Centre of Instructional Resources & e-Learning (CIRel), Universiti Malaysia Pahang. 

Projects

  • Fuzzy Rules-based Investigation Model for the Detection of Cybercrimes and Financial Frauds.
  • Bee Inspired System for the Safety of Online Financial Transactions against Fraud and Cybercrimes
  • Distributed System for Tracing and Identifying Sources of Network Attacks at Real-Time. (Main Leader)
  • Proactive Digital Forensic Model for Identifying Sources of Cybercrimes in High Critical Networks. (Main Leader)
  • Proactive Model for Locating and Collecting Cybercrimes Evidences on the Cloud Computing.
  • Honeybee Intelligent Approach for Detecting Unknown Network Intrusions. (Main Leader)
  • Raspberry Pi-based Digital Investigation System for Analysing Security Events and Patterns.
  • Proactive forensic system for collecting and reporting evidence of illegal activities. (Main Leader)
  • Deep Learning- Based System for Botnet Detection. (Main Leader)
  • An intelligent System for Web-Spoofing Attacks Recognition. (Main Leader)
  • A secure Model for Resources Access Control on Cloud Computing. (Main Leader)
  • A Model for Securing Voip-Hybrid Cloud Computing. (Member).
  • Electric Power Load Forecasting Algorithm for Decision Making based on Evolutionary Neural Network and Dragonfly Optimizer. (Member).

Conference attendance

  • Abdulghani Ali Ahmed, A. H. Alghushami, M. Aldorani, (2019) "FishFilter: A Honey Bee Isnpired System for Phishing Website Filtration",. 2nd Interational Academic conference on Research in Science, Engineering and Technology (RSETCONF), 8-10 Nov, 2019. Oxford, UK.
  • Abdulghani Ali Ahmed, Y. W. Kit, (2019) "Collecting and Analyzing Digital Proof Material to Detect Cybercrimes”. 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, (DASC/PiCom/DataCom/CyberSciTech), 12-15 Aug, 2018. pp. 742-747, Athens, Greece.
  • Abdulghani Ali Ahmed, (2018) Detection and Avoidance Technique of Anomalous Congestion at the Network Gateways. 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing (DASC 2017), 6-10 November, 2017, Orlando, Florida, USA.
  • Abdulghani Ali Ahmed, Wendy Kwan, (2018) Diffie-Hellman Based One-Time Password to Secure Data Communication in Mobile Cloud Computing. 2017 IEEE Conference on Application, Information and Network Security (AINS), 13-14 November, 2017, Miri Marriott Resort & Spa, Miri, Sarawak, Malaysia.
  • Abdulghani Ali Ahmed, Mei Khay Lee, (2018) Passphrase Password Hashing to Secure User's Credentials in Web Browsers. IEEE Conference on Big Data and Analytics 2017, 16 – 17 November, 2017, Riverside Majestic Hotel, Kuching, Malaysia.
  • Manan W.N.W, Abdulghani Ali Ahmed, Kahar M.N.M. (2019) Characterizing Current Features of Malicious Threats on Websites. Intelligent Computing & Optimization. (ICO 2018). Advances in Intelligent Systems and Computing, 28 September 2018, vol 866, pp 210-218. Springer, Cham.
  • Ahmed Mohammed Fahad, Abdulghani Ali Ahmed, Mohd Nizam Mohmad Kahar. (2019) Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing. Intelligent Computing & Optimization. (ICO 2018). Advances in Intelligent Systems and Computing, 28 September 2018, vol 866, pp 210-218. Springer, Cham.
  • Ahmed Mohammed Fahad, Abdulghani Ali Ahmed, Mohd Nizam Mohmad Kahar, The Importance of Monitoring Cloud Computing: An Intensive Review. The 2017 IEEE Region 10 Conference (TENCON), 5 – 8 November, 2017, Penang, Malaysia.
  • Khalid Abdulrahman, Abdulghani Ali Ahmed, Muamer N Mohammed. (2019) Investigation Model for Locating Data Remnants on Cloud Storage. Intelligent Computing & Optimization. (ICO 2018). Advances in Intelligent Systems and Computing, 28 September 2018, vol 866, pp 210-218. Springer, Cham.
  • Amer A Sallam, Muhammad Nomani Kabir, Abdulghani Ali Ahmed, Khalid Farhan, Ethar Tarek. (2019) Epilepsy Detection from EEG Signals Using Artificial Neural Network. Intelligent Computing & Optimization. (ICO 2018). Advances in Intelligent Systems and Computing, 28 September 2018, vol 866, pp 210-218. Springer, Cham.
  • Ahmed Mohammed Fahad, Abdulghani Ali Ahmed, Abdullah H Alghushami, Sammer Alani. (2019) Detection of Black Hole Attacks in Mobile Ad Hoc Networks via HSA-CBDS Method. Intelligent Computing & Optimization. (ICO 2018). Advances in Intelligent Systems and Computing, 28 September 2018, vol 866, pp 210-218. Springer, Cham.
  • Nik Quosthoni Sunaidi, Abdulghani Ali Ahmed, Back Propagation Algorithm-Based Intelligent Model for Botnet Detection. The 5th International Conference on Software Engineering & Computer Systems (ICSECS’17), 22-24 November, 2017, Langkawi Island, Malaysia.
  • Mohamed Montaser, Abdulghani Ali Ahmed, RED-based model for detecting and avoiding anomaly network congestion. The 5th International Conference on Software Engineering & Computer Systems (ICSECS’17), 22-24 November, 2017, Langkawi Island, Malaysia.
  • Abdulghani Ali Ahmed, Nurul Amirah Abdullah, (2016). PhishFilter: A Honey Bee Inspired System for Phishing Websites Filtration. Progress in Computer Sciences and Information Technology International Conference (PROCSIT). 20 – 22 December 2016 | Langkawi Island, Kedah, Malaysia (Indexed by SCOPUS).
  • Abdulghani Ali Ahmed, Yee Wai Kit (2016). MICIE: A Model for Identifying and Collecting Intrusion Evidences. The 12th International Conference On Signal Image Technology & Internet Based Systems. 28 November to 1 December 2016, Naples, Italy. (Indexed by IEEE Xplore).
  • Abdulghani Ali Ahmed, Chua Xue Li, (2016). Forensic Analysis Technique for Locating Cybercrime Evidences in Cloud Storage. International Conference on Information Science and Security (ICISS2016) - DECEMBER 19 – 22, 2016 | PATTAYA, THAILAND. (Indexed by IEEE/SCOPUS).
  • Abdulghani Ali Ahmed, Noorul Ahlami Kamarul Zaman, (2016). AIRSE: An Approach for Attack Intention Recognition Based on Similarity of Evidences. International Conference on Computer Science and Engineering (COMPSE 2016) - NOVEMBER 11–12, 2016 | PENANG, MALAYSIA, (Indexed by ISI/SCOPUS).
  • Abdulghani Ali Ahmed, Nurul Amirah Abdullah, (2016). Real Time Detection of Phishing Websites. The 7th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEEE IEMCON 2016) - OCTOBER 13 – 15, 2016 | University of British Columbia, VANCOUVER, CANADA, (Indexed by IEEE/SCOPUS).
  • Mohammad Rasmi, Aman Jantan, Abdulghani A. Ahmed, (2012). Network Forensics Attack-Analysis Model Based on Similarity of Intention. In the 2011 International Conference on Computer Application and Education Technology (ICCAET 2011); Beijing, China.

Consultancy work

February 2017 to 2020, SysArmy Sdn Bhd, Kuala Lumpur, Malaysia,
Consultant on:

  • Cybercrime Investigation.
  • Malware Analysis.
  • Risk Controller and Incident Response
  • Big Data Privacy.

March 2017 to August 2020, Golden Carousel Sdn. Bhd. Kuantan, Pahang
Malaysia, Consultant on:

  • Cyber-attack Investigation.
  • Risk Controller and Incident Response.

June 2017 to June 2019, IBM Centre of Excellence, UMP, Kuantan, Malaysia, Consultant on:

  • Cloud Computing Threats Analysis
  • Incident Response

Current research students

1. Fahim Naser, PhD student, (1st Supervisor).
2. Anil Tatiparthi, PhD student, (1st Supervisor).
3. Abdullahi Gara, PhD student, (2nd Supervisor).

Externally funded research grants information

I have managed to successfully attract several national and international grants to fund my research as below:

  • PrivacyEye: Controlling Harmful Multimedia Sharing Among Children, CyberASAP Yr 9, (No. 10158140), Innovate UK Grant approved on 01 April 2025), (Principal Investigator).
  • Distributed system for unsolicited traffic detection in large-scale networks, COMSTECH-TWAS, a joint research grants programme for young scientists in OIC countries, (No. 14-340 RG/ITC/AS_C, An International Grant approved on 15 June 2015), (Principal Investigator).
  • Proactive Digital Forensic Model for Identifying Sources of Cybercrimes in High Critical Networks, FRGS grant (Ref: FRGS/1/2016/ICT03/UMP/02/1), (July 2016 - July 2018), Ministry of Higher Education Grant – Malaysia, (Principal Investigator).
  • Fuzzy Rules-Based Investigation Model for The Detection of Cybercrimes and Financial Frauds, RDU Grant No. RDU180377, (April 2018 April 2020), Universiti Malaysia Pahang (UMP). (Principal Investigator).
  • Proactive Forensic Approach for Cybercrimes Intention Recognition, RDU Grant No. RDU160365, (May 2016 - May 2018), Universiti Malaysia Pahang (UMP), (Principal Investigator).
  • Distributed System for Tracing and Identifying Sources of Network Attacks at Real-Time, RDU Grant No. RDU1403162, (December 2014 - December 2016), Universiti Malaysia Pahang (UMP), (Principal Investigator).
  • An Efficient Flood Forecasting Approach Based on Whale Optimization Algorithm, RDU Grant No. RDU1603129, (July 2016 - July 2018), Universiti Malaysia Pahang (UMP), (Co-Investigator).
  • SafeCyber: Bee Inspired System for the Safety of Online Financial Transactions against Fraud and Cybercrimes (Pre-Commercialization Grant - Applied), 2017 to 2019, (Principal Investigator).
  • SLA Monitoring-based Complementary Approach for Intrusion Detection in DiffServ/MPLS Domain, Postgraduate Research Student (PRGS), Grant No. 1001/PKOMP/844118, (October 2011-30 March 2014), Universiti Sains Malaysia, (USM), (Principal Investigator).

ORCID number

0000-0001-9748-6067