Associate Professor
Post Doc Graduate School of Management and Technology, University of
Maryland, University College (UMUC), Baltimore, Maryland, USA.
Ph.D. Department of Computer Sciences, The University of Reading,
Reading, United Kingdom, UK.
B. Eng. Department of Electrical and Electronic Engineering, The University of
Wales, Swansea, Swansea, South Wales, UK
Bio
Dr. Huwida Said is an Associate Professor in the College of Technological Innovation at Zayed University, Dubai. She received her Bachelor of Engineering (B.Eng.) in Electrical and Electronics Engineering from the University of Wales Swansea, UK, and a Ph.D. in Computer Sciences from the University of Reading, UK, in 1999. In 2008 she also received a fellowship from NSF to conduct a Post Doc certificate in Information Assurance from the Graduate school of Management and Technology at the UMUC, Baltimore, MD. Dr. Said’s research interests include Computer Information Security, Computer Networking, Internet Security, Teaching Information Security and Curriculum and previously, Image processing and pattern Recognition, Database systems. Her teaching interests are Computer Information Security, Database Security, Information Security Fundamentals, Network Security, Internet and Web Security, Wireless Security, Information Systems Management, Operating Systems, Cryptography and Data Protection, Digital Computer Forensics, Introduction to Computer Programming.
Office
Dubai Academic City, (Wing E-L1-007)
Phone:
+9714 402 1475
Email:
Huwida.Said@zu.ac.aeTeaching Areas
Information Security, Operating Systems, Digital Forensics, Database Security, Computer Networking
Research and Professional Activities
Sample of Recent Publications:
1. Al Barghuthi, N., Said, H. E. and Pavithran, D, (2018, Nov), “Highlighting the Future of Autonomous Vehicle Technology in 2020-2050”, Proceeding of the f Current Trends in Information Technology (CTIT18), Nov 28-29, Dubai, UAE, 2018.
2. Al Barghuthi, N., Juma, H., and Said, H. E, (2018, Nov). Blockchain in Supply Chain Trading”, Proceeding of the f Current Trends in Information Technology (CTIT18), Nov 28-29, Dubai, UAE, 2018.
3. Al Taei, M., Al Barghuthi, N. B., Mahmoud, Q. H., Al Barghuthi, S., Said, H. E., (2018, Nov), “Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges”, the proceeding of the 2018 International Conference on Innovations in Information Technology (IIT18), Nov 18-19, Al Ain, UAE, 2018.
4. Said, H. E. , N.B. Al Barghuthi, S. Al Marri, Q.H. Mahmoud, M. Al Taei, (2018, July), “Fun Video Games For Learning Information Security”, Proceeding of the 10th annual International Conference on Education and New Learning Technologies (EDULEARN18), ISBN: 978-84-09-02709-5, ISSN: 2340-1117, p.g. 10406-10416, 2 - 4 July, Palma de Mallorca, Spain, 2018.
5. Mohamed, S. S., Al Barghuthi, N. B., Said, E. H., (2017, Dec), “An Analytical Study Towards the UAE Universities Smart Education Innovated Approaches”, Proceeding of the IEEE 15th International Conference on Smart City”, Dec 18-20, Bangkok, Thailand, p.g. 200-207, 2017.
6. Jabir. R.M., Khanji. S.I.R., Ahmad, L.A., Alfandi, O., Said, H. E. , (2016, Jan), “Analysis of cloud computing attacks and countermeasures”, 18th International Conference on Advanced Communication Technology, (ICACT2016), Jan 31-Feb 3, PyeongChang Busan Gwang'yeogsi, South Korea, p.g. 117-123, 2016.
7. Khanji, S., Jabir R., Ahmad L., Alfandi, O., Said, H. E., (2016, Apr), “Evaluation of Linux SMTP server security aspects—A case study”, proceeding of the 7th IEEE Conference on Information and Communication Systems (ICICS2016), April 5- 7, Irbid, Jordan, p.g. 252-257, 2016.
8. Marir, F., Said, H.E., Al-Obeidat, F, (2016, May), “Mining the Web and Literature to Discover New Knowledge about Diabetes”, The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016) / The 6th International Conference on Sustainable Energy Information Technology (SEIT-2016) / Affiliated Workshops, May 23-26, 2016, Madrid, Spain, p.g. 1256-1261, 2016
9. Said, H. E., Alfandi, O., Iqbal, F., Omar, A., Matter, K., Zuhair L. (2015, Mar), “Investigating Malware Behavior Using Passive DNS Data”, Graduate Students Research Conference (GSRC 2015), Mar 24-25, Abu Dhabi, UAE, 2015.
10. Marir F., Said, H. E., and Al Alami, U., (2014, Dec), “Mining the Web and Medline Medical Records to Discover New Facts on Diabetes”, The 4th International Conference on Hybrid Intelligent Systems (HIS 2014), Dec 14th-16th, Kuwait 2014.
Samples of pervious Publications- Inserting some paper web sites
11. AlBarghuthi, Nedaa B., and Said, E. H, (2014, Nov), “Ethics behind Cyber Warfare: A study of Arab Citizens Awareness”, The IEEE International Symposium on Ethics in Engineering, Science, and Technology (Ethics’ 2014), May 23rd-24th, Chicago, IL, USA, pp. 1-7.
Text: Ethics behind Cyber Warfare: A study of Arab Citizens Awareness
Link: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6893402&newsearch=true&queryText=“Ethics behind Cyber Warfare: A study of Arab Citizens Awareness
12. AlBarghuthi, N. B.,and Said, H. E., (2013, Nov) "Social Networks IM Forensics: Encryption Analysis," Journal of Communications, vol. 8, no. 11, pp. 708-715, 2013. doi: 10.12720/jcm.8.11.708-715.ISSN:1796-2021.
Text: Social Networks IM Forensics: Encryption Analysis
Link: http://www.jocm.us/index.php?m=content&c=index&a=show&catid=124&id=594
13. Iqbal, A., Guimaraes, M., Obaidli, H., Said, H. E., (2013, Oct),” The Study of the Interrelation between Law Programs and Digital Forensics in UAE”, Information Security Curriculum Development Conference (InfoSecCD'13), Oct 12th, Atlanta, Georgia, USA, pp. TBD.
Text: The Study of the Interrelation between Law Programs and Digital Forensics in UAE
Link: http://dl.acm.org/citation.cfm?id=2528926&CFID=726016118&CFTOKEN=16839829
14. Guimaraes, M., Said, H. E., (2013, Mar),” A Multi-level Video Game for Teaching Security”, the Proceeding of the 44th ACM Technical Symposium on Computer Science Education (SIGCSE’13), March 6th-9th, Denver, Colorado, USA, pp. 739-739.
Text: A Multi-level Video Game for Teaching Security
Link: http://dl.acm.org/citation.cfm?id=2445196.2445441&coll=DL&dl=GUIDE&CFID=726016118&CFTOKEN=16839829
15. Yousif, A., Humaid, H., & Said, H. E. (2012, Dec), “Smart Phone Forensics and Social Network”, the IEEE Multidisciplinary Engineering Education Magazine (MEEM), Vol. 6, No. 4, IEEE, pg. 7-13.
Text: Smart Phone Forensics and Social Network
Link: https://ieeexplore.ieee.org/document/6107946
16. Guimaraes, M. & Said, H. E. (2012, May), “Constructing video games to teach security using GameMaker, Flash and Unity”, Journal of Computing Sciences in Colleges, Vol. 27, No. 5, pp. 6-6.
Text: Constructing video games to teach security using GameMaker, Flash and Unity
Link: http://dl.acm.org/citation.cfm?id=2168874.2168876&coll=DL&dl=GUIDE&CFID=726016118&CFTOKEN=16839829
17. Guimaraes, M., Said, H. E., & Austin, R. (2012, Jan), “Experience with Video Game for Security”. The Journal of the 27th Annual Consortium for Computing Sciences in Colleges (CCSC), Vol. 27, No. 3, pp.95-104.
Text: Experience with Video Game for Security
Link: http://dl.acm.org/citation.cfm?id=2038772.2038793&coll=DL&dl=GUIDE&CFID=726016118&CFTOKEN=16839829
18. Said, H. E., Guimaraes, M., Al Mutawa, N., & Al Awadhi, I. (2011, Dec), “Forensics and War-Driving on Unsecured Wireless Network”, The proceedings of the 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Dec 11-14, Yas Island, Abu Dhabi, United Arab Emirates, pp.19-24.
Text: Forensics and War-Driving on Unsecured Wireless Network
Link: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6148353&queryText=Forensics%20and%20War-Driving%20on%20Unsecured%20Wireless%20Network&newsearch=true
19. Guimaraes, M., Austin, R., & Said, H. E. (2010, Oct),” Database Forensics”, Information Security Curriculum Development Conference, (InfoSecCD'10), Oct 1st-2nd, Atlanta, Georgia, USA, 62-65.
Text: Database Forensics
Link: https://dl.acm.org/citation.cfm?id=1940958
20. Said, H. E., Guimaraes, M., Maamar, Z., & Jololian, L. (2009, July). “Database and Database Application Security”, Innovation and Technology in Computer Science Education (ITiCSE2009), Associate for Computing Machinery (ACM), July 6th -9th, Paris, France, pp.90-93.
Text: Database and Database Application Security
Link: http://dl.acm.org/citation.cfm?id=1562877.1562909&coll=DL&dl=GUIDE&CFID=726016118&CFTOKEN=16839829
21. Said, H.E.S., Tan, Dr. Tienu N., & Baker, Prof. Keith D. (2000). “Personal Identification Based on Handwriting”, Journal of Pattern Recognition, Vol. 33, No. 1, pp. 149-160.
Text: Personal Identification Based on Handwriting
Link: http://www.sciencedirect.com/science/article/pii/S0031320399000060
22. Said, H.E.S., Peake, Dr. Gill S., Tan, Dr. Tienu N. , & Baker, Prof. Keith D. (1998), “Personal Identification Based on Handwriting”, IEEE International Conference on Pattern Recognition (ICPR'98), Vol. (III), August 16th -20th,Brisbane, Queensland, Australia, 1761-1764.
Test: Personal Identification Based on Handwriting
Link: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=712068&newsearch=true&queryText=Personal%20Identification%20Based%20on%20Handwriting
23. Said, H.E., Tan, Dr. Tienu N. (1997), “Identification Based on Handwriting”, IEEE International Conference on Image Processing (ICIP'97), Vol. (II), October 26th -29th, Santa Barbara, CA, USA, 449-452.
Research Grants:
PI/CO-PI |
RIF/Cluster |
Project Title |
Budget |
Time Frame |
Principle Investigator PI |
Cluster |
Malware analysis and Social Media mining for detecting social and economic crimes using data analytic techniques |
494,500 |
2016-2019 (3yrs) |
Principle Investigator PI |
RIF |
Video Games to Improve Teaching Digital Forensics
|
89,800 |
2014-2016 (2yrs) |
Co-PI PI: Dr. Omar Alfandi |
RIF |
Characterizing Cyber-threat infrastructure for predicting Cyber-attacks in the UAE |
82,079 |
2014-2015 (1yr) |
Co-PI PI: Dr. Farhi Marri |
RIF |
Text Mining Approaches for developing an integrated diabetic knowledge repository (ontology) |
99,600 |
2013-2015 (2yrs) |
Co-PI PI: Dr. Mario |
RIF |
Videogames to Improve Teaching Security |
67,600 |
2011-2013 |