Skip Ribbon Commands
Skip to main content
Dr. Haider Abbas
Assistant Professor
Department of Information Security

MCS
National University of Sciences and Technology (NUST)
Military College of Signals, Humayun Road, Rawalpindi.
Tel : +92-51-5564048

Specialization
Cyber Security

Education
Ph.D in Information Security (KTH- Sweden) 2010, PostDoc

Haider Abbas is a Cyber Security professional, academician, researcher and industry consultant who took professional trainings and certifications from Massachusetts Institute of Technology (MIT), United States; Stockholm University, Sweden; Stockholm School of Entrepreneurship, Sweden; IBM, USA and EC-Council. He received his MS in Engineering and Management of Information Systems (2006) and PhD in Information Security (2010) from KTH- Royal Institute of Technology, Stockholm, Sweden. His professional career consists of activities ranging from R&D and Industry Consultations (Government & Private), through multi-national research projects, research fellowships, doctoral studies advisory services, International Journal Editorships, Conferences/Workshops Chair, Invited/Keynote Speaker, Technical Program Committee Member and reviewer for several international journals and conferences. He is also an adjunct faculty and doctoral studies advisor at Florida Institute of Technology, USA.

In recognition of Dr. Abbas services to the international research community and excellence in professional standing, he has been awarded one of the youngest Fellows of The Institution of Engineering and Technology (IET) UK; Fellow of The British Computer Society (BCS), UK and Fellow of The Institute of Science and Technology, UK. He has also been elected to the grade of Senior Member of Institute of Electrical and Electronics Engineers (IEEE), USA.

A brief profile of Dr. Abbas is as follows:

Professional Certifications, Trainings & Fellowships

  • Cyber/Critical Infrastructure Security –  Massachusetts Institute of Technology (MIT), United States, 2015
  • Cyber Security Specialist Training– IBM, USA 2014
  • Certified Ethical Hacker (CEH), EC-Council, 2012
  • Information Technology Management, Stockholm School of Entrepreneurship, Stockholm, Sweden 2009
  • Wireless and Mobile Systems Security, Royal Institute of Technology, Stockholm, Sweden 2006
  • Satellite Communication, Stockholm University, 2006

Journals Editorship

  • Associate Editor, IEEE Transactions on Information Technology in Biomedicine / IEEE Journal of Biomedical and Health Informatics (IEEE) (ISI-Indexed, IF 3.4)
  • Regional Editor (Pakistan), Neural Computing and Applications (Springer) (ISI-Indexed, IF 2.5)
  • Associate Editor, Journal of Network and Computer Applications (Elsevier) (ISI-Indexed, IF 2.3)
  • Associate Editor, Cluster Computing (Springer) (ISI-Indexed, IF 2.0)
  • Associate Editor, Electronic Commerce Research (Springer) (ISI-Indexed, IF 1.7)
  • Associate Editor, IEEE Access (ISI-Indexed, IF 3.2)
  • Associate Editor, Ad Hoc & Sensor Wireless Networks (ISI-Indexed, IF 1.0)
  • Associate Editor, KSII Transactions on Internet and Information Systems (ISI-Indexed, IF 0.4)Associate Editor, Springer Plus (Springer) (ISI-Indexed, IF 0.9) (Till January 2016) 
  • Member Editorial Board, International Journal of Information Security and Privacy 
  • Lead Guest Editor, Special Issue on Security and Privacy issues in Cloud Computing, Springer- Annals of Telecommunications (ISI-Indexed, IF 1.4)
  • Lead Guest Editor, Special Issue on Secure Cloud Computing for Mobile Health Services in Springer Peer to Peer Networking and Applications (ISI-Indexed, IF 1.2)
  • Section Editor, Security Analytics and Intelligence for Cyber Physical Systems, IEEE Access (ISI-Indexed, IF 3.2) 
  • Guest Editor, Special Issue "Smart e-Commerce Integration with Recommender Systems", Electronic Markets (ISI-Indexed, IF 1.8) 

Professional Memberships

  • Fellow of the Institution of Engineering and Technology (FIET), UK
  • Fellow of the British Computer Society (FBCS), UK
  • Fellow of the Institute of Science & Technology (FIsT), UK
    • Senior Member, Institute of Electrical and Electronics Engineers (SMIEEE), USA
    • Member, Association for Information Systems Special Interest Group on ICT and Global Development, USA

    International Conference Chair/ Invited Speaker

    • Track Chair, SSTM, The 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (2018), Paris, France
    • Track Chair, IEEE Consumer Communications and Networking Conference (IEEE CCNC 2015), Las Vegas, USA
    • Track Chair, 17th International Conference on E-health Networking, Application & Services (HealthCom 2016), Munich, Germany
    • Track Chair, International Conference on Information Technology- New Generations, 2015 Las Vegas, USA
    • Co Chair, IEEE International Workshop on Bigdata Analytics for Smart and connected Health, 2016, Washington DC, USA 
    • Track Chair, The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) Belfort, France
    • Co –Chair, IEEE Eastern European Regional Conference on the Engineering of Computer Based Systems (2012), Serbia
    • Track Chair, The 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (2017), Poland
    • Invited Speaker/ Academic Expert, 6th International Workshop on 'Internet Security: Enhancing Information Exchange Safeguards' (2016), Rabat, Morocco
    • Invited Speaker/ Academic Expert, 5th International Workshop on 'Internet Security: Enhancing Information Exchange Safeguards' (2015), Ankara, Turkey
    • Expert Panelist 6th Cyber Security Summit, (2015), Riyadh, Saudi Arabia 
    • Invited Speaker/ Academic Expert, 4th International Workshop on 'Internet Security: Enhancing Information Exchange Safeguards' successfully concluded in Dar-es-Salaam, Tanzania
    • Invited Speaker at Microsoft Trusting Cloud Workshop (2015), Riyadh, KSA 
    • Key Note Speaker at 3rd International Workshop on 'Internet Security: Enhancing Information Exchange Safeguards' (2014), Nabeul, Tunisia
    • Key Note Speaker AT  2nd COMSATS-ISESCO International Workshop on Internet Security: Enhancing Information Exchange Safeguards, (2012) Jordan
    • Invited Speaker at Workshop on Internet Security: Enhancing Information Exchange Safeguards, (2011) Damascus, Syria 
    • Invited Speaker at IPID Annual workshop (2009), Orebro, Sweden
    • Invited Speaker at 4th Annual IPID Symposium (2009), London, UK
     

    Honors and Awards

    • Graduate Faculty/ Member Advisory Board for Doctoral and Graduate Studies, Florida Institute of Technology (FIT), USA
    • Senior Member, Institute of Electrical and Electronics Engineers (SMIEEE), USA
    • Best Poster Award, Empowering Security Evaluation of IT Products with Options Theory, 30th IEEE Symposium on Security & Privacy (IEEE S&P), 2009, California, USA
    • Plaque of Appreciation from CyberPatriot, National Youth Cyber Education Program, 2015, USA
    • NUST Faculty Development Program Scholarship for Doctoral Studies at KTH, Sweden
    • Member, Association for Information Systems Special Interest Group on ICT and Global Development, USA
    • Plaque of Appreciation for Organizational Security Training from Royal Scientific Society (RSS), 2012, Amman, Jordan
    • Won many research grants from both government sector and private industry
    • HEC Approved Supervisor for Doctoral Studies, Pakistan
    • Plaque of Appreciation for Cyber Security Training from Higher Institute for Applied Sciences and Technology (HIAST), 2011, Damascus, Syria
    • Plaque of Appreciation for Information Security Training from Tanzania Commission for Science & Technology (COSTECH), 2014, Tanzania
    • Certificate of Appreciation for Cyber Security Training from Islamic Educational, Scientific and Cultural Organization (ISESCO), 2016, Rabat, Morocco 
    • Certificate of Appreciation for Cyber Security Training from the Training Centre for Islamic Countries (SESRIC), 2015, Ankara, Turkey
    • Certificate of Appreciation for Academic Expert/Resource person from Inter-Islamic Network on Information Technology (INIT), Pakistan
    • Graduate & Doctoral Thesis Examiner for various universities in Pakistan, EU and United States 
    • Certificate of Appreciation for Academic Expert/Resource person from Commission on Science and Technology for Sustainable Development is south (COMSATS)
    • ISMS Team Lead & Manager RnD, Center of Excellence in Information Assurance, KSA
    • Certificate of Appreciation for Cyber Security Training from Higher Institute of Technological Studies (ISET) ,2013, Nabeul, Tunisia
    • Subject Specialist for various selection committees/panelist for various Government and Private Organizations

    ​Areas of Interests

    Information Assurance and Governance, Cloud Computing Security, Healthcare Data Security, Cyber Crimes & Digital Forensics, E-Commerce Security

    Graduate/Doctoral Research Supervision (Advisor/Co-Advisor)

    • Florida Institute of Technology, United States
    • Center of Excellence in Information Assurance, King Saud University, KSA
    • National University of Science & Technology, Pakistan (HEC Approved Supervisor)
    • KTH- Royal Institute of Technology, Stockholm, Sweden
    • Beijing Normal University, China 

    Research Fundings

    • Performance Enhancement for the Crab Linux router simulation package using XEN, Funded by:  KTH, Royal Institute of Technology, Sweden 2005
    • PhD Scholarship from National University of Sciences & Technology, Pakistan, 2006
    • Security Evaluation of ESAM architecture Using ATAM, Funded by:  VERVA (Swedish Administrative Development Agency) Stockholm, Sweden   2007
    • Cloud Security Mechanisms for Saudi Organizations, Funded by:  National Plan for Science and Technology, Saudi Arabia, 2013
    • Challenges and Opportunities in Next Generation Data Security and Information Assurance, Funded by:   Deanship of Scientific Research, King Saud University, Saudi Arabia 2013
    • Information Security Mechanisms for Real Wireless Mesh Network Scenario, Funded by:  National Plan for Science and Technology, Saudi Arabia, 2013
    • Evaluating the Impact and Significance of Recent Advances in Data Privacy and Applications Security, Funded by:   Deanship of Scientific Research, King Saud University, Saudi Arabia 2014
    • ROA-Based Cloud Computing SLA Model to Address Dynamically Changing Requirements, Funded by:   Research Center, College of Computer Science, King Saud University, Saudi Arabia 2014

    Graduate/ Doctoral Students

    PhD
    • Rabia Latif, Topic:  Framework to Counter DDoS SYN Flooding Attack in Cloud Assisted WBAN, National University of Sciences & Technology, Pakistan (Graduated January 2016)
    • Waseem Iqbal, Topic: Cloud Assisted Internet of Things (LoT) Security Challenges for the Connected Enterprise National University of Sciences & Technology, Pakistan
    • Bilal Rauf, Topic: Access Control and Devices Authentication for Classified IoT Nodes, National University of Sciences & Technology, Pakistan
    • Adeela Abbas, Topic: Dynamic reconstruction of users’ authentication data for achieving anonymous access control in public clouds/secure data mining of sensor networks’ data for multiple cloud user application , National University of Sciences & Technology, Pakistan
    • Anam Javeed, Topic: Cellular Systems Security Solutions,  National University of Sciences & Technology, Pakistan
    • Moteeb Al Moteri, Topic: Privacy preservation management in community cloud environment, Florida Institute of Technology, United States
    • Qasim Ali, Topic: Cloud User’s Data and Connection Anonymization Architecture, National University of Sciences & Technology, Pakistan
    MS
    • Asad Raza, MS (Information Security), KTH- Sweden, Topic: Security Evaluation of ESAM Software Architecture using ATAM, 2008
    • Faraz Hameed, MS (ICT) , KTH- Sweden, Topic: Feasibility Analysis for Deploying a Centralized Information Exchange Infrastructure in Pakistan, 2010
    • Saneeha Khalid, MS (Information Security), NUST , Pakistan, Topic: Forensic Analysis of IIS FTP Publishing Service (Version 7.5),2012
    • Muhammad Junaid Khan, MS (Information Security), NUST, Pakistan, Topic: Location Privacy of Wireless Local Area Network Users, 2012
    • Moeen Qaemi Mahmoodza, MS (Information Security), NUST, Pakistan, Topic: A Control Framework for Openid, 2012
    • Adeela Waqar, MS (Information Security), NUST, Pakistan, Topic: Preservation of Users Data Privacy In A Eucalyptus Supported Private Cloud Environment, 2012
    • Natasha Arjumand, MS (Information Security), NUST, Pakistan, Topic: Zero-day Attack detection using Security Information & Event Management (SIEM), 2013
    • Muzammil Noor, MS (Information Security), NUST, Pakistan, Topic: Automated Analysis of Malware –Semantics Based Approach, 2015
    • Bandar S. Alhajri, MS (Computer Sciences), COEIA, KSA, Topic : Forensic Analysis of Windows 8 Dump File, 2015
    • Muhammad Irfan, MS (Information Security), Topic: A Framework for Cloud Forensics Analysis using Security Information and Event Management, 2016
    • Naveeda Ashraf, MS (Information Security), Topic: Hardware rooted security for Mobile Devices, 2017
    • Faiza Mir Irfan, MS (Information Security), Topic: Security and Privacy challenges National Healthcare Information Systems for Pakistan, 2017
    • Tehreem Yaqoob, MS (Information Security), Topic: Security and Privacy challenges National Healthcare Information Systems for Pakistan, 2017
    • Hina Batool, MS (Information Security), Topic: Intrusion detection system classification and challenges, 2017
    • Syed Adeel Shah, MS (Information Security), Topic: Healthcare Data Privacy Framework Mechanism 2017

    2018

    • Dawei Jin, Xiao Ma, Yin Zhang, Haider Abbas, Han Yu, Information Diffusion Model based on Social Big Data, Mobile Networks and Applications {Impact factor: 3.2, ISI-EI Indexed} (Accepted- In Press
    • Amman Durrani, Rabia Latif, Seemab Latif, Haider Abbas, Detection of Distributed Denial of Service (DDoS) Attack in Vehicular adhoc networks: A Systematic Literature Review, Ad Hoc & Sensor Wireless Networks (Accepted -In Press) {Impact factor: 1.0, ISI-EI Indexed}
    • Ghada Almashaqbeh, Jamal N. Al-Karaki, Mohammad Al-Rousan, Asad Raza, Haider Abbas, Maruf Pasha, Geo-Energy Aware Routing Protocol for Static and Mobile Wireless Sensor Networks, Ad Hoc & Sensor Wireless Networks (Accepted -In press)  {Impact factor: 1.0, ISI-EI Indexed}
    • Jiafu Wan, Haider Abbas, Vasilakos, Athanasios V. , Di Li, Michael Sheng , Charith Perera "Industrial Big Data Analytics for Prediction of Remaining Useful Life Based on Deep Learning" , IEEE Transactions on Industrial Informatics (Revision submitted) {Impact factor: 6.7, ISI-EI Indexed}
    • Afsheen Ahmed, Rabia Latif,  Seemab Latif,  Haider Abbas, Narmeen Shafqat, Farrukh Aslam Khan,  Malicious Insiders Attack in IoT based Cloud e-Healthcare environment: A Systematic Literature Review, Multimedia Tools and Applications (Revision submitted) {Impact Factor: 1.5, ISI-EI Indexed}
    • Yin Zhang, Haider Abbas, CrossRec: Cross-domain Recommender Systems based on Multi-source Social Big Data" IEEE Transactions on Transactions on Big Data (Under Review) {Impact factor: 4.7, ISI-EI Indexed}
    • Kazmi, Asif  Raza; Afzal, Mehreen; Amjad, Muhammad Faisal; Abbas, Haider ; yang, Xiaodong; Xidian, “Algebraic Side Channel Attack on Trivium & Grain”, IEEE Access (IEEE)  (Under Review) {Impact factor: 3.2, ISI-EI Indexed }
    • Saim Bin Abdul Khaliq; Muhammad Faisal Amjad, PhD; Haider Abbas, PhD; Narmeen Shafqat, "Defence Against PUE Attacks in Ad hoc Cognitive Radio Networks: A Mean Field Game Approach",  Telecommunication Systems (Springer) (Under Review) {Impact factor: 1.5, ISI-EI Indexed}
    • Rashid Masood, Mian Muhammad Waseem Iqbal, Muhammad Faisal Amjad, Haider Abbas, “Forensic Analysis of IP Based Security Surveillance Cameras for a Smart City Environment”  , Future Generation Computer Systems  (Elsevier), (Under Review) {Impact factor: 3.9, ISI-EI Indexed}

    2017

    • J. Wan; S. Tang; D. Li; S. Wang; C. Liu; H. Abbas; A. V. Vasilakos, "A Manufacturing Big Data Solution for Active Preventive Maintenance," in IEEE Transactions on Industrial Informatics , vol.PP, no.99, pp.1-1doi: 10.1109/TII.2017.2670505 {Impact Factor: 6.7, ISI-EI Indexed}
    • Rana Aamir Raza  Ashfaq,  Xizhao Wang, Joshua Zhexue  HUANG, Haider  Abbas, Yulin HE, “Fuzziness based semi-supervised learning approach for Intrusion Detection System (IDS)” Information Sciences (Elsevier), {Impact factor: 4.8 , ISI-EI Indexed}
    • Muhammad Imran, Farrukh Aslam Khan, Haider Abbas, “A Detection and Prevention System against Collaborative Attacks in Mobile Ad hoc Networks” Future Generation Computer Systems  (Elsevier), {Impact factor: 3.9, ISI-EI Indexed}
    • Nur Al Hasan Haldar, Farrukh Aslam Khan, Aftab Ali, Haider Abbas, “Arrhythmia Classification using Mahalanobis Distance based Improved Fuzzy C-Means Clustering for Mobile Health Monitoring Systems”(2016) Neurocomputing (Elsevier), { Impact factor: 3.3, ISI-EI Indexed}
    • Shah Fahad,  Mehreen Afzal, Waseem Iqbal, Haider Abbas, Correlation Power Analysis of Modes of Encryption in AES and its Countermeasures, Future Generation Computer Systems (Elsevier), {Impact factor: 3.9, ISI-EI Indexed }
    • Muzammil Noor , Haider Abbas, Waleed Bin Shahid,  Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis, Journal of Network and Computer Applications (Elsevier) {Impact factor: 3.5, ISI-EI Indexed}
    • Muhammad Yaseen, Abdelouahid Derhab, Mehmet Orgun, Haider Abbas, Imran Rashid, Waseem Iqbal , Secure Sensors Data Acquisition and Communication Protection in eHealthcare: Review on State of the Art, Telematics and Informatics (Elsevier) {Impact factor: 3.3, ISI-EI Indexed}
    • Muhammad Umair Aslam, Abdelouahid Derhab, Kashif Saleem, Haider Abbas, Mehmet Orgun, Waseem Iqbal, Baber Aslam,  A Survey of Authentication Schemes in Telecare Medicine Information Systems, Journal of Medical System (Springer) {Impact factor: 2.4, ISI-EI Indexed}
    • Yang, Xiaodong, Abbas, Haider. 2017. "Adaptive Interference Cancellation of ECG Signals." Sensors 17, no. 5: 942. {Impact factor: 2.6, ISI-EI Indexed}
    • Bilal Javeed, Waseem Iqbal & Haider Abbas, Internet of Things (IoT) Design Considerations for Developer and Manufacturers, IEEE International Conference on Communications (IEEE ICC) 21-25 May 2017, Paris, France
    • Ayesha Arshad, Waseem Iqbal, H. Abbas, USB Devices Forensic in Windows  10 – Digging Insertion and  Removal Timestamps , Journal of Forensic Sciences (Wiley) , {Impact factor: 1.3, ISI-EI Indexed} Ren, Aifeng; Du, Zhenxing; Li, Juan; Hu, Fangming;
    • Ijaz Ahmad, Haider Abbas, Asad Raza, Kim-Kwang Raymond Choo, Anam Sajid, Maruf Pasha, Farrukh Aslam Khan, “Electronic Crime Investigations in a Virtualized Environment: A Forensic Process and Prototype for Evidence Collection and Analysis” Australian Journal of Forensics Sciences (Taylor & Francis) {Impact factor: 0.7, ISI-EI Indexed }
    • Farrukh Aslam Khan,Umar Manzoor,Azhar Khan,Aftab Ali,Haider Abbas, Maruf Pasha, Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android, Journal of Information Science and Engineering {Impact factor: 0.85, ISI-EI Indexed}
    • Haider Abbas, Olaf Maennel, Saïd Assar: Security and privacy issues in cloud computing. Annales des Télécommunications( Springer) (72(5-6): 233-235 (2017) {Impact factor: 1.4, ISI-EI Indexed}
    • Nazish Yaqoob,Seemab Latif,Rabia Latif,Haider Abbas,Asif Yaseen  , An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes, Journal of Information Science and Engineering {Impact factor: 0.85, ISI-EI Indexed}
    • Tahreem Yaqoob, Faiza Mir, Haider abbas, Waleed bin Shahid, Narmean Shafqat and Muhammad Faisal Amjad, Feasibility Analysis for Deploying National Healthcare Information System (NHIS) for Pakistan,  19th Inernational Conference of E-health Networking, Application & Services, IEEE HEalthcom17, Dalian, China
    • Muneeb Ahmed Sahi, Haider Abbas, Kashif Saleem, Yang, Xiaodong , Abdelouahid Derhab, Mehmet Orgun, Waseem Iqbal, Imran Rashid, Asif Yaseen “A Survey on Privacy Preservation in e-Healthcare Environment” (2017) IEEE Access (IEEE) {Impact factor: 3.2, ISI-EI Indexed }

    2016 & Before

    • Haider Abbas, Rabia Latif, Seemab Latif, Ashraf Masood, “Performance Evaluation of Enhanced Very Fast Decision Tree (EVFDT) Mechanism for Distributed Denial of Service Attack Detection in Healthcare Systems” (2016) Annals of Telecommunications (Springer) 
      {Impact factor: 1.4 , ISI-EI Indexed}
    • Haider Abbas, Sana Ullah, Sudip Misra, Yuh-Shyan Chen, “Guest editorial: Secure cloud computing for mobile health services” (2016) Peer-to-Peer Networking and Applications (Springer) 
      {Impact factor: 1.2, ISI-EI Indexed}
    • Muhammad Irfan, Haider Abbas, Yunchuan Sun, Maruf Pasha, “A Framework for Cloud Forensics Analysis using Security Information and Event Management” (2016) Security and Communication Networks (Wiley)
      {Impact factor: 1.0 , ISI-EI Indexed}
    • Rabia Latif, Haider Abbas, Seemab latif, Ashraf Masood “DDOS Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment” (2016) Journal of Medical System (Springer)
      {Impact factor: 2.4, ISI-EI Indexed} (In Press)
    • Haider Abbas,  Sana Ullah,  Sudip Misra,  Yuh-Shyan Chen, “Guest editorial: Secure cloud computing for mobile health services” (2016) Peer-to-Peer Networking and Applications (Springer)
      {Impact factor: 1.2, ISI-EI Indexed}
    • Anam Sajid, Haider Abbas, Kashif Saleem, “Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges” (2016) IEEE Access
      {ISI-EI Indexed, IF 3.2} 
    • Haider Abbas, Muhammad Yasin, Fahad Ahmed, Anam Sajid, Farrukh Aslam Khan, Rana Aamir Raza Ashfaq, Nur Al Hasan Haldar: Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms. Journal of Intelligent and Fuzzy Systems (IoS Press) 31(5): 2645-2658 (2016)
      {Impact factor: 1.8, ISI-EI Indexed}
    • Anam Sajid, Haider Abbas, “Data Privacy in Cloud-assisted Healthcare Systems: State of the art and Future Challenges”(2016)  Journal of Medical System (Springer)
      {Impact factor: 2.4, ISI-EI Indexed} 
    • Kashif Saleem , Mehmet Orgun, Guanglou Zheng and Rajan Shankaran , Haider Abbas and Jalal Al Muhtadi , Empirical Studies of ECG Multiple Fiducial-points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform, The 41st IEEE Conference on Local Computer Networks (LCN), November 7-10, 2016, Dubai, UAE
    • Waleed Halboob, Haider Abbas, Muhammad Khurram Khan, Farrukh Aslam Khan, Maruf Pasha, “A Framework To Address Inconstant User Requirements In Cloud SLAs Management “ (2015) Springer Cluster Computing
      {Impact factor: 2.0, ISI-EI Indexed}
    • Ramsha Rizwan, Farrukh Aslam Khan, Haider Abbas, Sajjad Hussain Chauhdary, “Anomaly Detection in Wireless Sensor Networks Using Immune-based Bio-inspired Mechanism” (2015) International Journal of Distributed Sensor Networks
      {Impact factor: 1.4, ISI-EI Indexed}
    • Rabia Latif, Haider Abbas, Seemab Latif, Ashraf Masood, “EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud- Assisted Wireless Body Area Networks” (2015) Mobile Information Systems
      {Impact factor: 2.2, ISI-EI Indexed}
    • Muhammad Irfan, Haider Abbas, Waseem Iqbal, “Feasibility Analysis for Incorporating/Deploying SIEM for Forensics Evidence Collection in Cloud Environment” 14th IEEE/ACIS International Conference on Computer and Information Science 2015, Las Vegas, U.S.A
    • Waleed Halboob, Ramlan Mahmod, Muhammad Abulaish, Haider Abbas, Kashif Saleem , “Data Warehousing Based Computer Forensics Investigation Framework” 2015 12th International Conference on Information Technology : New Generations, Las Vegas, Nevada, USA
    • Rabia Latif, Haider Abbas, Said Assar, “Distributed Denial of Service (DDoS) Attack in Cloud- Assisted Wireless Body Area Networks: A Systematic Literature Review”(2014) Journal of Medical System (Springer)  
      {Impact factor: 2.4 , ISI-EI Indexed }
    • Moeen Qaemi, Haider Abbas, Farrukh Aslam Khan, Maruf Pasha, “Identifying Security Mechanism for Anti-Phishing Scheme for OpenID Systems” (2014) Security and Communication Networks (Wiley)
      {Impact factor: 1.0, ISI-EI Indexed}
    • Saifullah Khalid, Ashraf Masood, Faisal Bashir Hussain, Haider Abbas and Abdul Ghafoor, "Load Balanced Routing for Lifetime Maximization in Mobile Wireless Sensor Networks" (2014) International Journal of Distributed Sensor Networks
      {Impact factor: 1.4, ISI-EI Indexed}
    • Rabia Latif, Haider Abbas, Seemab Latif, “Location Based DDoS Attack Detection Using Data Mining Approach in Cloud-Assisted WBAN” (2014) International Journal of Ad Hoc and Ubiquitous Computing 
      {Impact factor: 0.7, ISI-EI Indexed}
    • Waleed Halboob, Haider Abbas, Kamel Haouam, Asif Yaseen, "Dynamic Service Level Agreement (SLA) Management for Cloud Computing" (2014) Advanced Intelligent Computing Technology and Applications, Lecture Notes in Artificial Intelligence – Springer
    • Muhammad Imran, Farrukh Aslam Khan, Haider Abbas, Mohsin Iftikhar, "Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks" (2014) Springer - Lecture Notes in Computer Science 
    • Rabia Latif, Haider Abbas, Saïd Assar, Seemab Latif, "Analyzing Feasibility for Deploying Very Fast Decision Tree for DDoS Attack Detection in Cloud Assisted WBAN" (2014) Intelligent Computing Methodologies - Lecture Notes in Computer Science - Springer 
    • Natasha Shoaib, Haider Abbas, Farrukh Aslam Khan, Jalal Al Muhtadi, "Anticipating Advanced Persistent Threat (APT) Countermeasures using Security Information and Event Management" (2014) IEEE International Symposium on Biometric and Security Technologies (ISBAST14) , August 26-27, 2014, Kuala Lumpur, Malaysia
    • Farrukh Aslam Khan, Aftab Ali, Haider Abbas, Nur Al hasan, "A Cloud-based Healthcare Framework for Security and Patients' Data Privacy using Wireless Body Area Networks" (2014) 9th International Conference on Future Networks and Communications (FNC-2014), August 17-20, 2014, Niagara Falls, Ontario, Canada 
    • Amna Saeed, Asad Raza, Haider Abbas, "A Survey on Network Layer Attacks and AODV Defense in Mobile Ad-hoc Networks" (2014) 8th IEEE International Conference on Software Security and Reliability, San Francisco , USA
    • Adeela Waqar, Asad Raza, Haider Abbas, “Preservation of Cloud Users’ Data Privacy in a Eucalyptus Supported Private Cloud Environment through Database Schema Redesign” (2013)  Journal of Network and Computer Applications - Elsevier
      {Impact factor: 3.5, ISI-EI Indexed}
    • Sarah Irum, Farrukh Aslam Khan, Aftab Ali, Haider Abbas, "A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communication" (2013) International Journal of Distributed Sensor Networks
      {Impact factor: 1.4, ISI-EI Indexed}
    • Rabia Latif, Saïd Assar, Haider Abbas, Qasim Ali, "Cloud Computing Risk Assessment: A Systematic Literature Review" (2013) Springer Lecture Notes in Electrical Engineering 
    • Rida Naveed, Haider Abbas, "Security Requirement Specification Framework for Cloud Users" (2013) Springer, Lecture Notes in Computer Science
    • Shoohira Aftab, Amna Khalid, Asad Raza, Haider Abbas, "Secure SMS Based Automatic Device Pairing Approach for Mobile Phones" (2013) Springer- Lecture Notes in Artificial Intelligence 
    • Zeshan Aslam Khan, Edison Pignaton de Freitas, Tony Larsson, Haider Abbas, "A Multi-agent Model for Fire Detection in Coal Mines using Wireless Sensor Networks" (2013) 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications , Melbourne, Australia
    • Muzzamil Noor, Haider Abbas, "Anticipating Dormant Functionality in Malware A Semantics based Approach" (2013) The 2013 International Symposium on Biometrics and Security Technologies, Chengdu, Sichuan China, July 2-5, 2013 
    • Muhammad Junaid Khan, Haider Abbas, "WLAN Location Privacy: A Client Server Based Architecture" (2013) 10th IEEE International Conference on Information Technology - New Generations , April 15-17, 2013, Las Vegas, Nevada, USA
    • Moeen Qaemi Mahmoodzadeh, Haider Abbas, “Password-Less Authentication Framework for OpenID Systems to Counter Phishing Attacks”, 7Th IEEE Asia-Pacific Services Computing Conference 2012, December 6-8, 2012, Guilin, China
    • Saneeha Khalid, Haider Abbas, Maruf Pasha, Asad Raza, “Securing Internet Information Services (IIS) Configuration Files” , 7th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2012), December 10-12, 2012, London, UK
    • Faraz Hameed, Haider Abbas, Maruf Pasha, Louise Yngström, “Feasibility Analysis for Deploying a Centralized Information Exchange Infrastructure in Pakistan”, 5th Annual SIG GlobDev Workshop :ICT Innovation in Developing Regions, December 16, 2012, Orlando, United States
    • Abbas Haider, Christer Magnusson, Louise Yngström, Ahmed Hemani, “Addressing Dynamic Issues in Information Security Management” (2011)  Journal of Information & Computer Security (IMCS), Emerald Group Publishing Limited, UK 
    • Adeela Waqar, Asad Raza, Haider Abbas “User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment”, IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications ,2011
    • Abbas Haider, Christer Magnusson, Louise Yngström, Ahmed Hemani, “A Structured Approach for Internalizing Externalities Caused by IT Security Mechanisms”, In Proceedings of IEEE International Workshop on Education Technology and Computer Science (ETCS 2010), March 6-7, 2010, Wuhan, China, pages 149-153
    • Faraz Hameed, Abbas Haider, Louise Yngström, “Analyzing Opportunities and Constraints for Deploying a Centralized Information Exchange Infrastructure in Pakistan, Submitted to IEEE International Computer Symposium (ICS2010), Tainan, Taiwan
    • Asad Raza, Abbas Haider, Louise Yngström, Ahmed Hemani, “Security Evaluation of ESAM Architecture using ATAM”, in Proceedings of 3rd Annual ICT4D Postgraduate Symposium, September 8-9 2008, Joensuu, Finland
    • Abbas Haider, Louise Yngström, Ahmed Hemani, “Security Evaluation of IT Products: Bridging the Gap between Common Criteria (CC) and Real Option Thinking”, In Proceedings of the World Congress on Engineering and Computer Science 2008, October 22-24, 2008, San Francisco, USA, pages 530- 533
    • Asad Raza, Abbas Haider, Louise Yngström, Ahmed Hemani, “Security Characterization for Evaluation of Software Architectures using A T AM”, In Proceedings of Third  IEEE International Conference on Information & Communication Technologies (ICICT2009), August 15-16 2009, Karachi, Pakistan, pages 241-246
    • Abbas Haider, Louise Yngström, Ahmed Hemani, “Empowering Security Evaluation of IT Products by Real Options Theory”, 30th IEEE Symposium on Security & Privacy, May 17- 20, 2009, Oakland, California, USA
    • Abbas, Haider, Louise Yngström, Ahmed Hemani, “Adaptability infrastructure for bridging IT security evaluation and options theory”, In Proceedings of 2nd IEEE/ACM International Conference on Security of Information and Networks (SIN 2009) October 6-10, 2009, North Cyprus, pages 39-45
    • Abbas Haider, Louise Yngström, Ahmed Hemani, “Option Based Evaluation: Security Evaluation of IT Products Based on Options Theory”, In Proceedings of IEEE Eastern European Regional Conference on the Engineering of Computer Based Systems, September 7th-8th 2009, Novi Sad, Serbia, pages 134-141
    • Abbas Haider, Louise Yngström, Ahmed Hemani, “Analyzing IT Security Evaluation Methodologies for Developing Countries”, 2009 IPID Annual workshop, Orebro, Sweden
    • Abbas Haider, Christer Magnusson, Louise Yngström, Ahmed Hemani, “ROA Based Agile Security Evaluation of IT Products for Developing Countries”, 4th Annual IPID Symposium 2009, September 11th & 12th, London, UK
    • Abbas Haider, Stefan Sundqvist, “Increasing the Performance of Crab Linux Router Simulation Package using XEN”, In Proceedings of IEEE conference on industrial and information systems, August 8-11 2006, Kandy, Sri Lanka, pages 459-46

    Graduate/Doctoral Courses

    • ​Computer Security
    • Information Security Management
    • Digital Forensics
    • Secure Application Development
    • Information Security Evaluation and Auditing

    International Trainings Delivered/Workshops

    • Organizational Security Training (5 days) at Royal Scientific Society (RSS), 2012, Amman, Jordan
    • Cyber Security Training (5 days) at Higher Institute for Applied Sciences and Technology (HIAST), 2011, Damascus, Syria
    • Cloud Commuting Security workshop (5 days) at Tanzania Commission for Science & Technology (COSTECH), 2014, Tanzania
    • Cyber Security Training (5 days) at Islamic Educational, Scientific and Cultural Organization (ISESCO), 2016, Rabat, Morocco 
    • Critical Infrastructure Security Training (5 days) at Training Centre for Islamic Countries (SESRIC), 2015, Ankara, Turkey
    • ISMS Deployment and Auditing Training (5 days) at Higher Institute of Technological Studies (ISET) ,2013, Nabeul, Tunisia
    • Security Requirements Specifications Framework at IPID Annual workshop (2009), Orebro, Sweden

    ​Dr. Abbas has been collaborating with various industrial partners as member advisory board, academic expert, cyber security consultant, Technical Chair or Trainer. Some of these organizations are listed below.

    • CyberPatriot , National Youth Cyber Education Program, United States
    • Association for Information Systems Special Interest Group on ICT and Global Development, United States
    • Institute of Electrical and Electronics Engineers (IEEE), USA
    • VERVA (Verker for forvaltnings-utveckling Swedish Administrative Development Agency), Sweden
    • The Swedish Program for ICT in Developing Regions (Spider), Sweden
    • Security Masons (SM) International, Sweden
    • Higher Institute for Applied Sciences and Technology (HIAST), Syria
    • Islamic Educational, Scientific and Cultural Organization (ISESCO), Morocco
    • Inter-Islamic Network on Information Technology (INIT), Pakistan
    • KS Global Research, Kuala Lumpur, Malaysia
    • Royal Scientific Society (RSS), Jordan
    • Center for Studies and Media Affairs at the Saudi Royal Court (CSMARC), KSA
    • Training Centre for Islamic Countries (SESRIC) Ankara, Turkey
    • Institute of Public Administration (IPA), Riyadh, Saudi Arabia
    • Commission on Science and Technology for Sustainable Development is south (COMSATS)
    • Higher Institute of Technological Studies (ISET), Nabeul, Tunisia
    • Tanzania Commission for Science & Technology (COSTECH), Tanzania