Research Areas

Interdisciplinary Research Areas

● Network Security

● Software Security

● Mobile Security

● Data Mining/Data Analytics

● Computational Intelligence

Specialized Research Areas

● Wireless Sensor Networks (WSN) Security and Routing

● Android Security

● Intrusion Detection Systems

● Secure Multimedia protocols in Mobile Ad hoc NETwork (MANET)

Current Projects

Latest Products Image

Malware/Ransomware Detection Systems for Android Devices

We propose smart detection systems and risk scoring systems for Android malwares in general and Ransomwares in specific.

Latest Products Image

Broadcast Authentication in IoT systems

We propose efficient authentication techniques/protocols to secure the broadcast communications in Internet of Things (IoT) – based systems.

Latest Products Image

Secure/lightweight routing in WSN

We introduce lightweight security solutions to protect the routing services in Wireless sensor networks (WSN) from different types of security attacks.

Latest Products Image

Intrusion Detection Systems in WSN

We conduct research to find the best match of data mining techniques to detect intrusion is Wirelss Sensor Networks (WSN).

Latest Products Image

Secure SIP services in MANET

We adapt the SIP services in the distributed environment of wireless Mobile Ad hoc network Net (MANET) in a secure, efficient way.

Publications

Journals:

Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS

Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan

IEEE Access, Volume 7, pp. 153936 - 153951 November 2019


A source code perspective framework to produce secure web applications

Alka Agrawal, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan

Computer Fraud & Security, Volume 2019, Issue 10, pp. 11 - 18 October 2019


Security assessment of four open source software systems

Faraz Idris Khan, Yasir Javed, and Mamdouh Alenezi

Indonesian Journal of Electrical Engineering and Computer Science, Volume 16, Number 2, pp. 860 - 881 November 2019


Open Source Web-Based Software: Security Challenges and Assessment Methodologies

Faraz Idris Khan, and Mamdouh Alenezi

i-manager's Journal on Software Engineering (JSE), Volume 14, Issue 1, pp. 34 - 40 October 2019


Dev Ops Development Process Awareness and Adoption -The Case of Saudi Arabia

Mamdouh Alenezi, Mohammad Zarour, and Sultan Alsulis

i-manager's Journal on Software Engineering (JSE), Volume 14, Issue 1, pp. 19 - 27 October 2019


Security Risks in the Software Development Lifecycle

Mamdouh Alenezi and Sadiq Almuairfi

International Journal of Recent Technology and Engineering (IJRTE), Volume 8, Issue 3, pp. 7048 - 7055 September 2019


A Research on DevOps Maturity Models

Mohammad Zarour, Norah Alhammad, Mamdouh Alenezi, and Khalid Alsarayrah

International Journal of Recent Technology and Engineering (IJRTE), Volume 8, Issue 3, pp. 4854 - 4862 September 2019


Security assessment framework for educational ERP systems

Hafsa Ashraf, Mamdouh Alenezi, Muhammad Nadeem, and Yasir Javed

International Journal of Electrical and Computer Engineering (IJECE), Volume 9, Number 6, pp. 5570 - 5585 December 2019


Security durability assessment through fuzzy analytic hierarchy process

Alka Agrawal, Mohammad Zarour, Mamdouh Alenezi, Rajeev Kumar, and Raees Ahmad Khan

PeerJ Computer Science, 5:e215 September 2019


Usable-Security Assessment Through A Decision Making Procedure

Alka Agrawal, Mamdouh Alenezi, Dhirendra Pandey, Rajeev Kumar, and Raees Ahmad Khan

ICIC Express Letters, Part B: Applications, Volume 10, Number 8, pp. 665 - 672 July 2019


Measuring Security Durability of Software through Fuzzy-Based Decision-Making Process

Rajeev Kumar, Mohammad Zarour, Mamdouh Alenezi, Alka Agrawal, and Raees Ahmad Khan

International Journal of Computational Intelligence Systems, Volume 12, Number 2, pp. 627 - 642 June 2019


Using Public Vulnerabilities Data to Self-Heal Security Issues in Software Systems

Attiq ur Rehman Jaffar, Muhammad Nadeem, Mamdouh Alenezi, and Yasir Javed

ICIC Express Letters, Volume 13, Number 7, pp. 557 - 567 July 2019


Multi-level Fuzzy System for Usable-Security Assessment

Alka Agrawal, Mamdouh Alenezi, Suhel Ahmad Khan, Rajeev Kumar, and Raees Ahmad Khan

Journal of King Saud University-Computer and Information Sciences (2019)


Usable-Security Attribute Evaluation Using Fuzzy Analytic Hierarchy Process

Mamdouh Alenezi, Rajeev Kumar, Alka Agrawal, and Raees Ahmad Khan

ICIC Express Letters, Volume 13, Number 6, pp. 453 - 460 June 2019


An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments

Mamdouh Alenezi, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, and Tanveer Khan

International Journal of Information Security and Privacy (IJISP), Volume 13, Issue 2, pp. 14 - 31 (2019)


Predicting the Popularity of Saudi Multinational Enterprises Using a Data Mining Technique

Park Youngeun and Mamdouh Alenezi

Journal of Management Information and Decision Sciences, Volume 21, Issue 1, (2018)


STORE: Security Threat Oriented Requirements Engineering Methodology

Md Tarique Jamal Ansari, Dhirendra Pandey, and Mamdouh Alenezi

Journal of King Saud University - Computer and Information Sciences (2018)


Are Open Source Web Applications Secure? Static Analysis Findings

Mamdouh Alenezi, Mohammad Zarour, and Khawlah Alomar

International Journal of System and Software Engineering, Vol. 6, No. 2, pp. 1 - 9 (2018)


An Empirical Study of Bad Smells during Software Evolution Using Designite Tool

Mamdouh Alenezi, and Mohammad Zarour

Journal of Theoretical and Applied Informtion Technology, Vol. 96, No. 14, pp. 4690 - 4699 (2018)


Discovering the Relationship Between Software Complexity and Software Vulnerabilities

Yasir Javed, Mamdouh Alenezi, Mohammed Akour and Ahmad Alzyod

i-manager's Journal on Software Engineering, 12(4), 12-27 (2018)


CLUBA: A Clustering-Based Approach for Bug Assignment

Mamdouh Alenezi, Shadi Banitaan, and Mohammad Zarour

International Journal of System and Software Engineering, Vol. 6, Issue 1, pp. 1 - 9 (2018)


Application Centric Virtual Machine Placements to Minimize Bandwidth Utilization in Datacenters

Muhammad Abdullah, Saad Khan, Mamdouh Alenezi, Khaled Almustafa, and Waheed Iqbal

Intelligent Automation and Soft Computing, 114


Efficient Denial of Service Attacks Detection in Wireless Sensor Networks

Iman Almomani and Mamdouh Alenez

Journal of Information Science and Engineering Vol. 34, No. 4 (2018), pp. 977 - 1000


Security Testing Framework for Web Applications

Layla Alrawais, Mamdouh Alenezi, and Mohammad Akour

International Journal of Software Innovation (IJSI) Vol. 6, No. 3 (2018), pp. 93 - 117


Software Architecture Understandability in Object-Oriented Systems

Turki Alshammary and Mamdouh Alenezi

i-managers Journal on Software Engineering Vol. 12, No. 2 (2018), pp. 1 - 14


ERP Implementation Failures in Saudi Arabia: Key Findings

Mohannad Alsayat and Mamdouh Alenezi

International Business Management Vol. 12, No. 1 (2018), pp. 10 - 2


Cloud based SDN and NFV architectures for IoT infrastructure

Mamdouh Alenezi, Khaled Almustafa and Khalim Amjad Meerja

Egyptian Informatics Journal (2018)


Using Categorical Features in Mining Bug Tracking Systems to Assign Bug Reports

Mamdouh Alenezi, Shadi Banitaan and Mohammad Zarour

International Journal of Software Engineering & Applications (IJSEA) Vol. 9, No. 2 (2018), pp. 29 - 39


A Cloud-Based Cross - Enterprise Imaging Framework

Abdulrahman Asiri, Qasem Obiedat and Mamdouh Alenezi

i-managers Journal on Software Engineering Vol. 12, No. 1 (2018), pp. 6 - 25


On Virtualization and Security-Awareness Performance Analysis in 5G Cellular Networks

Mamdouh Alenezi, Khaled Almustafa and Mohamed Hussein

Journal of Engineering Science and Technology Review Vol. 11, No. 1 (2018), pp. 199 - 207


Software vulnerabilities detection based on security metrics at the design and code levels: empirical findings

Mamdouh Alenezi and Mohammad Zarour

Journal of Engineering Technology Vol. 6, No. 1 (2018), pp. 570-583


Ransomware Detection System for Android Applications

Samah Alsoghyer, Iman Almomani

Electronics, Vol. 8, No. 8, pp.1-36, August 2019.


Control Plane Packet-In Arrival Rate Analysis for Denial-of-Service Saturation Attacks Detection and Mitigation in Software-Defined Networks

Fakhry Khellah

Arabian Journal for Science and Engineering, Springer Berlin Heidelberg, pp. 1-14, July, 2019.


Measuring Security-Durability of Software through Fuzzy Based Decision Making Process,

Rajeev Kumar, Mohammad Zarour, Mamdouh Alenezi, Alka Agrawal, Raees Ahmad Khan

International Journal of Computational Intelligence Systems Vol. 12, issue 2, 2019.


Using Public Vulnerabilities Data to Self-Heal Security Issues in Software Systems

Attiq ur Rehman Jaffar, Muhammad Nadeem, Mamdouh Alenezi, and Yasir Javed

ICIC Express Letters, Volume 13, Number 7, pp. 557 - 567 July, 2019.


Multi-level Fuzzy System for Usable-Security Assessment

Alka Agrawal, Mamdouh Alenezi, Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan

Journal of King Saud University-Computer and Information Sciences, 2019.


Usable-Security Attribute Evaluation Using Fuzzy Analytic Hierarchy Process

Mamdouh Alenezi, Rajeev Kumar, Alka Agrawal, and Raees Ahmad Khan

ICIC Express Letters, Volume 13, Number 6, pp. 453 - 460 June 2019.


An Efficient, Secure, and Queryable Encryption for NoSQL-Based Databases Hosted on Untrusted Cloud Environments

Mamdouh Alenezi, Muhammad Usama, Khaled Almustafa, Waheed Iqbal, Muhammad Ali Raza, and Tanveer Khan

International Journal of Information Security and Privacy (IJISP), 2-5 Volume 13, Issue 2, pp. 14 – 31, 2019.


Complexity and Nesting Evolution in Open Source Software Systems: Experimental Study

Mamdouh Alenezi, Mohammad Zarour, Mohammed Akour

Recent Patents on Computer Science, May 2019.


Efficient Denial of Service Attacks Detection in Wireless Sensor Networks

Iman Almomani, Mamdouh Alenezi

Journal of Information Science and Engineering, Vol. 34, No.4, July, 2018 [ISI]


S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

Iman Almomani, Maha Saadeh

KSII Transactions on Internet and Information Systems, vol. 12, no. 4, April 30, 2018 [ISI]


Discovering the Relationship Between Software Complexity and Software Vulnerabilities

Yasir Javed, Mamdouh Alenezi, Mohammed Akour and Ahmad Alzyod

Journal of Theoretical and Applied Information Technology, Vol. 96, No. 14, (2018)


Security Testing Framework for Web Applications

Layla Alrawais, Mamdouh Alenezi, and Mohammad Akour

International Journal of Software Innovation (IJSI) Vol. 6, No. 3 (2018)


Predicting the Popularity of Saudi Multinational Enterprises Using a Data Mining Technique

Park Youngeun and Mamdouh Alenezi

Journal of Management Information and Decision Sciences, Volume 21, Issue 1, (2018).


STORE: Security Threat Oriented Requirements Engineering Methodology

Md Tarique Jamal Ansari, Dhirendra Pandey, and Mamdouh Alenezi

Journal of King Saud University - Computer and Information Sciences (2018).


Are Open Source Web Applications Secure? Static Analysis Findings

Mamdouh Alenezi, Mohammad Zarour, and Khawlah Alomar

International Journal of System and Software Engineering, Vol. 6, No. 2, pp. 1 - 9 (2018).


An Empirical Study of Bad Smells during Software Evolution Using Designite Tool

Mamdouh Alenezi and Mohammad Zarour

i-manager's Journal on Software Engineering, 12(4), 12-27 (2018)


CLUBA: A Clustering-Based Approach for Bug Assignment.

Mamdouh Alenezi, Shadi Banitaan, and Mohammad Zarour

International Journal of System and Software Engineering, Vol. 6, No. 1, pp. 1 - 9 (2018).


Security Testing Framework for Web Applications." International Journal of Software Innovation

Layla Alrawais, Mamdouh Alenezi, and Mohammad Akour

International Journal of Software Innovation (IJSI) Vol. 6, No. 3 (2018), pp. 93 - 117.


On Virtualization and Security-Awareness Performance Analysis in 5G Cellular Networks

Mamdouh Alenezi, Khaled Almustafa and Mohamed Hussein

Journal of Engineering Science and Technology Review, Vol. 11, No. 1 (2018)


Software vulnerabilities detection based on security metrics at the design and code levels: empirical findings

Mamdouh Alenezi and Mohammad Zarour

Journal of Engineering Technology Vol. 6, No. 1 (2018)


Measuring Software Architecture Stability Evolution in Object-Oriented Open Source Systems

Hassan Almousa and Mamdouh Alenezi

Journal of Engineering and Applied Sciences Vol. 12, No. 2 (2017), pp. 353-362


A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems

A. Ara, M. Al-Rodhaan, Y. Tian and A. Al-Dhelaan

in IEEE Access, vol. 5, no. , pp. 12601-12617, 2017. (ISI Indexed)


Enhancing outpatient clinics management software by reducing patients’ waiting time

Iman Almomani, Ahlam Alsarheed

Journal of Infection and Public Health, Volume 9, Issue 6, November–December 2016 [ISI]


Investigating the Use of Encryption Techniques and Different Speech Coders with Multimedia Streaming

Iman Almomani

IJCSIS, Volume 14, No. 9, September 2016 [WoS]


WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

Iman Almomani, Bassam Kassasbeh

Journal of Sensors, Vol. 2016, Article ID 4731953, 16 pages, 2016 [ISI]


An Empirical Investigation of Security Vulnerabilities within Web Applications

Ibrahim Abunadi and Mamdouh Alenezi

Journal of Universal Computer Science, 2016 [ISI]


Developer Companion: A Framework to Produce Secure Web Applications.

Mamdouh Alenezi and Yasir Javed

International Journal of Computer Science and Information Security Vol.14, No.7 (2016), pp.12-16.


Evaluating Software Metrics as Predictors of Software Vulnerabilities

Mamdouh Alenezi and Ibrahim Abunadi

International Journal of Security and Its Applications, 2015 [WoS]


Evolution impact on architecture stability in open-source projects

Mamdouh Alenezi, Fakhry Khellah

International Journal of Cloud Applications and Computing (IJCAC), 2015 [WoS]


A Secure Service Provisioning Framework for Cyber Physical Cloud Computing Systems

Anees Ara, Mznah Al-Rodhaan, Yuan Tian, and Abdullah Al-Dhelaan.

International Journal of Parallel Emergent and Distributed Systems 01/2015; 6(1). DOI:10.5121/ijdps.2015.6101.


Textured image denoising using dominant neighborhood structure

Fakhry Khellah

Arabian Journal for Science and Engineering, 2014 [ISI]


Anonymous proximity mobile payment (APMP)

Almuairfi, S., Veeraraghavan, P., Chilamkurti, N., Park, D-S.

Peer-to-peer Networking and Applications, vol. 7/4, pp. 620-627.


A comparative study of Authentication schemes with security and usability of IPAS

Sadiq Almuairfi, Prakash Veeraraghavan, Naveen Chilamkurti

Journal of Internet Technology, No. 4, vol. 15, pp. 615-624 (2014)


Conferences:

Context-Sensitive Case-Based Software Security Management System

Mamdouh Alenezi,Faraz Idris Khan

Proceedings of the Computational Methods in Systems and Software, Intelligent Systems Applications in Software Engineering, pp 135-141


Mobility Effect on the Authenticity of Wireless Sensor Networks [Best Paper Award]

Katrina Sundus, Iman Almomani

IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), 9-11 April, 2019, Amman, Jordan.


Mobility Effect on the Authenticity of Wireless Sensor Networks

Katrina Sundus, Iman Almomani

IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), 9-11 April, 2019, Amman, Jordan.


Android Applications Scanning: The Guide

Iman Almomani, Aala Khayer

IEEE International Conference on Computer and Information Sciences, 3-4 April, 2019, Aljouf, Saudi Arabia.


Empirical Analysis of Static Code Metrics for Predicting Risk Scores in Android Applications

Iman Almomani, Mamdouh Alenezi

Journal of Information Science and Engineering, Vol. 34, No.4, July, 2018 [ISI]


Abusing Android Permissions: Security Perspective

Mamdouh Alenezi, Iman Almomani

IEEE Jordan Conference on Applied Electrical Engineering and Computer Technologies, 11-13 October, 2017, Amman, Jordan


Open Source Web Application Security: A Static Analysis Approach

Mamdouh Alenezi and Yasir Javed

International Conference on Engineering & MIS (ICEMIS’16), Agadir, Morocco, 2016


Defectiveness Evolution in Open Source Software Systems.

Yasir Javed and Mamdouh Alenezi

4th Symposium on Data Mining Applications (SDMA 2016), Riyadh, Saudi Arabia.


Performance Analysis of LEACH protocol under Denial of Service Attacks

Iman Almomani, Bassam Al-Kasasbeh

IEEE International Conference on Information and Communication Systems (ICICS 2015), 7-9 April, 2015, Amman, Jordan


Dynamic Evolution of Source Code Topics.

Khaled Almustafa and Mamdouh Alenezi

The Tenth International Conference on Software Engineering Advances (ICSEA 2015), Barcelona, Spain.


Towards Cross Project Vulnerability Prediction in Open Source Web Applications.

Ibrahim Abunadi and Mamdouh Alenezi

International Conference on Engineering & MIS 2015 (ICEMIS’15), Istanbul, Turkey.


Thesis:

Comparative Analysis of Android Ransomware Detection Techniques

Samah Alsoghyer and Iman Almomani

Department of Computer Science, Prince Sultan University, 2018.


Data Flow Security Analysis for Android Applications

Shahd Abdulrahman Attar and Iman Almomani

Department of Computer Science, Prince Sultan University, 2017


An Enhanced Hierarchical Energy Efficient Intrusion Detection System for Malicious Packet Dropping Attacks in Wireless Sensor Network

Afnan Al-Romi and Iman Almomani

Department of Computer Science, Prince Sultan University, 2015


Performance Comparison of Linear Regression and Artificial Neural Networks in Developing Credit Risk Models

Haneeh F. Al-Anize and Iman Almomani

Department of Computer Science, Prince Sultan University, 2014.


A Mechanism for Detecting and Classifying Denial of Service Attacks in Wireless Sensor Networks Sensor Networks using Artificial Neural Networks

Bassam Kasasbeh and Iman Almomani

Department of Computer Science, The University of Jordan, 2014.


Internet of Things - Architecture of Multiple Sources Data Acquisition Sensors

Hussain Alshehri and Mamdouh Alenezi


Framework for Security Testing of Web Applications

Laila Al-Rowais and Mamdouh Alenezi


Static Analysis of Open-Source Web Applications

Khawlah AlOmar and Mamdouh Alenezi


Books:

Android Application Security Scanning Process

Iman Almomani and Mamdouh Alenezi

[Online First], IntechOpen, DOI: 10.5772/intechopen.86661. Available from: https://www.intechopen.com/online-first/android-application-security-scanning-process, 11th June, 2019.


Datasets:

● WSN-DS:


Specialized dataset for intrusion detection in Wireless Sensor Networks (WSNs). It contains 374661 records that represent different types of Denial of Service (DoS) attacks including Blackhole, Grayhole, Flooding, and Scheduling attacks.

[Published in “WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks http://dx.doi.org/10.1155/2016/4731953]

To get access contact: imomani@psu.edu.sa


● Ransomware Datasets:


○ RansDS-API This dataset provides the API-packages calls (belong to Android API 27) occurrences in 500 benign and 500 ransomware apps.
○ RansApp-DS: This dataset contains the hashes of 2959 ransomware applications.
○ BenignApp-DS: This dataset includes samples of more than 672 recent benign applications downloaded from different categories in Google play store.
○ RansDS-API-Duplicate This dataset provides the API-packages calls in 1785 ransomware apps including the duplicates.

[Published in “Ransomware Detection System for Android Applications https://doi.org/10.3390/electronics8080868]

To get access contact: imomani@psu.edu.sa


Top