kek
Qais Saif Qassim
Senior lecturer

s.qais@iitu.edu.kz

EDUCATION:

2009-2016

Doctor of Philosophy (Ph.D) in Information Science, Universiti Kebangsaan Malaysia (UKM), FTSM, Malaysia.

2004-2008

Master of Science (M.Sc) in Computer Engineering, Al Nahrain University, College of Engineering, Iraq.

2001-2004

Bachelor of Science (B.Sc) in Computer Engineering, Al Nahrain University, College of Engineering, Iraq.

RESEARCH GRANTS

  • From The Research Council (TRC) Oman under Research Grand Block Funding Scheme as Co-Principal Investigator (Co-PI), project title "Toward an Adaptive MOOC Based on Omani Learners Learning Preferences" – Funding year 2021.
  • From The Research Council (TRC) Oman under Research Grand Block Funding Scheme as Principal Investigator (PI), project title "An Intelligent Intrusion Detection System for SCADA Networks" – Funding year 2020.
  • From Tenaga Nasional Berhad, Malaysia, under Seed Fund Scheme as a research assistant (Post Doctorate), project title "A Micro Cryptographic Engine for Protecting Data in SCADA Link" – Funding year 2016.
  • From Cyber Security Malaysia as research assistance, project title "SCADA Security Simulation Testbed" – Funding year 2015.
  • From UKM, Malaysia, as research assistance, project title "The Development of Block-Based Mashup Tool" – Funding year 2010.

ASSOCIATION MEMBERSHIPS

  • Association for Computing Machinery (ACM)
  • International Association of Engineers (IAENG)

PUBLICATIONS

Qassim, Q. S., Ali, M. A. M., & Tahir, N. M. (2023). Security Analysis of DNP3 Protocol in SCADA System. In 2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE) (pp. 314–319).

Mahdi, M. N., Ahmad, A. R., Qassim, Q. S., Subhi, M. A., & Bakare, T. A. (2022). A Survey on the Use of Personalized Model-Based Search Engine. In International Conference on Emerging Technologies and Intelligent Systems (pp. 88–98).

Mahdi, M. N., Ahmad, A. R., Qassim, Q. S., & Ismail, R. (2022). Improving the usability of faceted exploratory search tools. TELKOMNIKA (Telecommunication Computing Electronics and Control), 20(1), 70–80.

Qassim, Q. S., Jamil, N., Mahdi, M. N., Zawawi, M. N. A., Jamaludin, M. Z., Jidin, R., & Rusli, M. E. (2022). Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway. In Journal of Physics: Conference Series (Vol. 2261, p. 12019).

Qassim, Q. S., Jamil, N., Mahdi, M. N., Cob, Z. C., Rahim, F. A., & Sidek, L. M. (2021). A Short Review: Issues and Threats Pertaining the Security of SCADA Systems. In International Conference on Advances in Cyber Security (pp. 230–247).

Mahdi, M. N., Ahmad, A. R., Natiq, H., Subhi, M. A., & Qassim, Q. S. (2021). Comprehensive review and future research directions on dynamic faceted search. Applied Sciences, 11(17), 8113.

Qassim, Q. S., Jamil, N., Daud, M., Ja’affar, N., Kamarulzaman, W. A. W., & Mahdi, M. N. (2021). Compromising the data integrity of an electrical power grid SCADA system. In International Conference on Advances in Cyber Security (pp. 604–626).

Jamil, N., Qassim, Q. S., Bohani, F. A., Mansor, M., & Ramachandaramurthy, V. K. (2021). Cybersecurity of Microgrid: State-of-the-Art Review and Possible Directions of Future Research. Applied Sciences, 11(21), 9812.

Mahdi, M. N., Ahmad, A. R., Qassim, Q. S., Natiq, H., Subhi, M. A., & Mahmoud, M. (2021). From 5G to 6G technology: meets energy, internet-of-things and machine learning: a survey. Applied Sciences, 11(17), 8117.

Qassim, Q. S., Jamil, N., & Mahdi, M. N. (2021). Symptoms-Based Network Intrusion Detection System. In International Visual Informatics Conference (pp. 482–494).

Qassim, Q. S., Jamil, N., Mahdi, M. N., Abd Rahim, F., Cob, Z. C., & Sidek, L. M. (2021). Threat Assessment Model in Electrical Power Grid Environment. In Journal of Physics: Conference Series (Vol. 1962, p. 12014).

Mahdi, M. N., Ahmad, A. R., Qassim, Q. S., & Subhi, M. A. (2021). Use of Faceted Search: The Effect on Researchers. In International Visual Informatics Conference (pp. 276–286).

Qassim, Q. S., Jamil, N., Z’aba, M. R., & Kamarulzaman, W. A. W. (2020). Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system. International Journal of Critical Infrastructures, 16(2), 91–106.

Mahdi, M. N., Ahmad, A. R., Ismail, R., Subhi, M. A., Abdulrazzaq, M. M., & Qassim, Q. S. (2020). Information overload: the effects of large amounts of information. In 2020 1st. Information Technology To Enhance e-learning and Other Application (IT-ELA (pp. 154–159).

Qassim, Q. S., Jamil, N., Mahdi, M. N., & Rahim, A. A. A. (2020). Towards scada threat intelligence based on intrusion detection systems-a short review. In 2020 8th International Conference on Information Technology and Multimedia (ICIMU) (pp. 144–149).

Mahdi, M. N., Ahmad, A. R., Subhi, M. A., Ismail, R., & Qassim, Q. S. (2020). Visualization in Faceted Search Engine-A Review. In 2020 IEEE Conference on Big Data and Analytics (ICBDA) (pp. 84–89).

Qassim, Q. S., Jamil, N., Daud, M., Patel, A., & Ja’affar, N. (2019). A review of security assessment methodologies in industrial control systems. Information \& Computer Security, 27(1), 47–61.

Qassim, Q. S., Ahmad, A. R., Ismail, R., Bakar, A. A., Rahim, F. A., Mokhtar, M. Z., … Mahdi, M. N. (2019). An anomaly detection technique for deception attacks in industrial control systems. In 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) (pp. 267–272).

Qassim, Q. S., Jamil, N., Daud, M., & Hasan, H. C. (2019). Towards implementing scalable and reconfigurable SCADA security testbed in power system environment. International Journal of Critical Infrastructures, 15(2), 91–120.

Jidin, R., Tukijan, S. N., Al-Bahadly, I., Jamil, N., & Qassim, Q. S. (2018). Prototyping a lightweight encryption on a field programmable gate array for securing tele-control data. In 2018 8th IEEE International Conference on Control System, Computing and Engineering (ICCSCE) (pp. 180–185).

Courses taught:

Linux Systems Administration, Network OS Administrations and Security, Cryptography, Web Application Security, Ethical Hacking, Fundamentals of Information Security, Advnced Information Security, Cisco Network Essentials, Cisco Routing and Switching, Network Security Assessment, Digital Forensics, and Database Security.

Research interests: Network Security, Digital Forensics, and Machine Learning

Версия сайта для слабовидящих