Wesam Almobaideen Headshot

Wesam Almobaideen

Computing Sciences Coordinator, Professor of Electrical Engineering and Computing

RIT Dubai

Office Mailing Address
RIT Dubai, Dubai Silicon Oasis - UAE

Wesam Almobaideen

Computing Sciences Coordinator, Professor of Electrical Engineering and Computing

RIT Dubai

Education

Ph.D. from Bologna University, Bologna, Italy; M.Sc. from The University of Jordan, Amman; B.Sc. in computer science from The Muta'h University, Karak, Jordan

Bio

Dr. Wesam Almobaideen is professor of computer networks and security at RIT Dubai. He holds the B.Sc. in computer science from Muta’h University, Karak, Jordan, the M.Sc. degree from The University of Jordan, Amman, Jordan, and the Ph.D. from Bologna University, Bologna, Italy. Before joining RIT Dubai, Dr. Almobaideen was the chairperson of the Department of Computer Science at the University of Jordan for five years. He has also served as the Director of the Computer Center for three years, dean assistant of the Faculty of Graduate Studies, and the Director of the Accreditation and Quality Assurance Office. Dr. Almobaideen research interests include Wireless Networks, Computer security and Cybersecurity, Internet of Things and cloud Computing. He has published more than 50 research papers in reputable conferences and journals and has supervised the theses and dissertations of more than 44 graduate master and doctorate level students.


Areas of Expertise

Select Scholarship

  1. “Enhancing The Lifetime of Wireless Sensor Network using Genetic Algorithm”, Hadeel Alazzam, Wesam Almobaideen, 2019 10th International Conference on Information and Communication Systems (ICICS), pages: 25-29, IEEE, 2019.
  2. “Hybrid SDN-ICN Architecture Design for the Internet of Things”, Huda Saadeh, Wesam Almobaideen, Khair Eddin Sabri, Maha Saadeh, 2019 Sixth International Conference on Software Defined Systems (SDS), pages: 96-101, IEEE, 2019.
  3. “Hybrid Neural Network to Impute Missing Data for IoT Applications”, Nabeel Al-Milli, Wesam Almobaideen, pages: 121-125, IEEE, 2019.
  4. “Virtual Node Schedule for Supporting QoS in Wireless Sensor Network”, Wesam Almobaideen, Mohammad Qatawneh, Orieb AbuAlghanam, 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pages: 281- 285, IEEE, 2019.
  5. “Lightweight Authentication for Mobile Users in The Context of Fog Computing”, Wesam Almobaideen, Maha Saadeh, International Journal of Advanced Computational Engineering and Networking, Volume 6, Issue: 12, Pages: 2321-206, 2018.
  6. “A Survey of Various Frameworks and Solutions in all Branches of Digital Forensics with a Focus on Cloud Forensics”, Mohammad Khanafseh, Mohammad Qatawneh, Wesam Almobaideen, International Journal of Advanced Computer Science and Applications (IJACSA, volume 10, issue 8, 2019.
  7. “Fog Computing: Survey on Decoy Information Technology”, Wesam Almobaideen, Muhyidean Altarawneh, accepted in the International Journal of Security and Networks, 2019.
  8. “A Survey of Key Distribution In Internet of Things”, Oraib AboElghanam, Mohamad Qatawneh, Wesam Almobaideen,, Accepted in the Journal of Theoretical and Applied Information Technology, 2019.
  9. Huda Saadeh, Wesam Almobaideen, Khair Eddin Sabri, Maha Saadeh, 2019, Hybrid SDN-ICN Architecture Design for the Internet of Things, Accepted in the 4th IEEE International Conference on Fog and Edge Mobile Computing (FMEC 2019).
  10. Hadeel Alazzam, Wesam Almobaideen, (2019). Enhancing The Lifetime of Wireless Sensor Network using Genetic Algorithm, Accepted in The 10th International Conference on Information and Communication Systems.
  11. Mais Haj Qasem, Wesam Almobaideen, (2019), “Heterogeneity in IoT-based Smart City Designs: A review”, Accepted in the International Journal of Interactive Mobile Technologies (iJIM).

Currently Teaching

CSCI-462
3 Credits
This course provides an introduction to cryptography, its mathematical foundations, and its relation to security. It covers classical cryptosystems, private-key cryptosystems (including DES and AES), hashing and public-key cryptosystems (including RSA). The course also provides an introduction to data integrity and authentication. Students cannot take and receive credit for this course if they have credit for CSCI-662.
CSEC-380
3 Credits
This course is designed to give students a foundation in the theories and practice relating to web application security. The course will introduce students to the concepts associated with deploying and securing a typical HTTP environment as well as defensive techniques they may employ.
CSEC-472
3 Credits
Access control and authentication systems are some of the most critical components of cybersecurity ecosystems. This course covers the theory, design, and implementation of systems used in identification, authentication, authorization, and accountability processes with a focus on trust at each layer. Students will examine formal models of access control systems and approaches to system accreditation, the application of cryptography to authentication systems, and the implementation of IAAA principles in modern operating systems. A special focus will be placed on preparing students to research and write about future topics in this area.
CSEC-499
0 Credits
Students will gain experience and a better understanding of the application of technologies discussed in classes by working in the field of computing security. Students will be evaluated by their employer. If a transfer student, they must have completed one term in residence at RIT and be carrying a full academic load.
CSEC-520
3 Credits
The course provides students an opportunity to explore methods and applications in cyber analytics with advanced machine learning algorithms including deep learning. Students will learn how to use machine learning methods to solve cybersecurity problems such as network security, anomaly detection, malware analysis, etc. Students will also learn basic concepts and algorithms in machine learning such as clustering, neural networks, adversarial machine learning, etc. Students taking this course should have the 4th year status and completed MATH-190 Discrete Math, MATH-251 Probability and Statistics I, and MATH-241 Linear Algebra.
CSEC-620
3 Credits
The course provides students an opportunity to explore methods and applications in cyber analytics with advanced machine learning algorithms including deep learning. Students will learn how to use machine learning methods to solve cybersecurity problems such as network security, anomaly detection, malware analysis, etc. Students will also learn basic concepts and algorithms in machine learning such as clustering, neural networks, adversarial machine learning, etc. A key component of the course will be an independent exploratory project to solve a security program with machine learning algorithms. Students taking this course should have knowledge in Discrete Math, Probability and Statistics, and Linear Algebra. Students should also be able to program in Python.
CSEC-741
3 Credits
As the world becomes more and more connected as ever before via various kinds of devices and systems on the Internet, called the Internet of Things (IoT), the associated security and privacy-related issues also become increasingly challenging. This course is designed for students who wish to advance their knowledge in the Internet of Things security. It provides students opportunities to explore security and privacy-related issues manifested by various kinds of IoT devices and systems such as sensors, sensor networks, SCADA systems, vehicular systems, consumer IoT devices, etc.
CSEC-751
3 Credits
This course explores Information Security Policy development and deployment as well as laws (US and International) that impact information security. Students in this class will develop policies and analyze how policy impacts an organization. Students will also determine how federal, state, and international laws impact the information security policies of an organization.
CSEC-790
1 - 6 Credits
This course is one of the capstone options in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic and make an original contribution which extends knowledge within the computing security domain. Students must submit an acceptable proposal to a thesis committee (chair, reader, and observer) before they may be registered by the department for the MS Thesis. Students must defend their work in an open thesis defense and complete a written report of their work before a pass/fail grade is awarded. As part of their original work, students are expected to write and submit an article for publication in a peer reviewed journal or conference.
ISTE-499
0 Credits
Students perform paid, professional work related to their program of study. Students work full-time during the term they are registered for co-op. Students must complete a student co-op work report for each term they are registered; students also are evaluated each term by their employer. A satisfactory grade is given for co-op when both a completed student co-op report and a corresponding employer report that indicates satisfactory student performance are received.
PUBL-363
3 Credits
Why are we still so bad at protecting computer systems? Is it because we don’t have good enough technology? Or because we lack sufficient economic incentives to implement that technology? Or because we implement technologies but then fail to use them correctly? Or because the laws governing computer security are so outdated? Or because our legal frameworks are ill-equipped to deal with an international threat landscape? All these reasons—and others— have been offered to explain why we seem to see more and more large-scale cybersecurity incidents and show no signs of getting better at preventing them. This course will examine the non-technical dimensions of this problem—the laws and other policy measures that govern computer security threats and incidents. We will focus primarily on U.S. policy but will also discuss relevant policies in the E.U. and China, as well as international tensions and norms. The central themes of the course will be the ways in which technical challenges in security can be influenced by the social, political, economic, and legal landscapes, and what it means to protect against cybersecurity threats not just by writing better code but also by writing better policies and laws.

Website last updated: December 5, 2024