Colleges of Information Technology

Dr. Abdul Kadhim Hayawi

Assistant Professor
  • PhD in  Electrical and Computer Engineering, University of Waterloo, Canada, 2018
  • MSc in Computer Science, Dalhousie University, Canada, 2004
  • MSc in Electronics and Communication Engineering, University of Baghdad, 1996
  • BSc in Electrical Engineering, University of Baghdad, 1991
Bio

Dr. Kadhim Hayawi is an assistant professor at the College of Technological Innovation at Zayed University, and a member of the Cybersecurity and Digital Forensics research group where he teaches a wide variety of courses and pursues his research endeavors. He received his M.Sc. degree in Computer Science from Dalhousie University, Canada in 2004, and a Ph.D. degree from University of Waterloo, Canada in 2018. He earned several prestigious industry certifications and has over 17 years of experience in academia, and industry. His research interests are in Information Security and Privacy challenges of Emerging Technologies such as IoT and IIoT, Cloud and Fog, Social Networks, Blockchain, Intrusion Detection, Firewalls, and Identity Management.

 
Office

Abu Dhabi Campus, MF2-0-018

Phone:

+9712 599 3545

Email:
Teaching Areas

Information Security and Privacy

Digital Forensics

Network Security

Ethical Hacking

Research and Professional Activities

Research Area(s)

Information Security and Privacy, IoT and IIoT Security, Fog and Cloud Security, Social Bots Detection, Blockchain, Firewalls, Intrusion Detection Systems, and Identity Management.

Books

Ongoing Research Projects:

  • Detection of Social Bots on Twitter Using Data Stream Mining
  • Fog and Blockchain-Based Solutions for IoT Security
  • Blockchain-Based Collaborative Intrusion Detection for Industrial IoT

Professional Certifications:

Cisco Certified Security Professional – CCSP, SANS Global Information Assurance Certification (GIAC), IBM Blockchain Developer Mastery Award, Cisco Information Security Specialist, Cisco Firewall Specialist, Cisco IPS Specialist, Cisco VPN Specialist, Cisco Certified Network Associate (CCNA®), CCIE Security written, CCIE Routing & Switching written

  1. Qayyum, T., Trabelsi, Z., Malik, A. W., & Hayawi, K., "Multi-Level Resource Sharing Framework Using Collaborative Fog Environment for Smart Cities." IEEE Access Journal, 2021. https://ieeexplore.ieee.org/abstract/document/9335598
  2. Alothali, E., Hayawi, K., & Alashwal, H., “Characteristics of Similar-Context Trending Hashtags in Twitter: A Case Study”. In International Conference on Web Services (pp. 150-163). Springer, Cham, 2020. https://link.springer.com/chapter/10.1007/978-3-030-59618-7_10
  3. Hayawi, K., Trabelsi, Z., Zeidan, S., & Masud, M. M., “Thwarting ICMP low-rate attacks against firewalls while minimizing legitimate traffic loss”. IEEE Access Journal, 2020. https://ieeexplore.ieee.org/abstract/document/9064541
  4. Masud, M., Cheratta, M. and Hayawi, K. “Medication Recommendation for Critical Care Patients Using Patient Similarity in Clinical Records”, International Journal of Bioscience, Biochemistry and Bioinformatics (IJBBB), 2020. https://pdfs.semanticscholar.org/2e6b/6f2bb05a2757ff3210ef628d95eb1b76a731.pdf
  5. Trabelsi, Z., Zeidan, S. and Hayawi, K. “Denial of Firewalling Attacks (DoF): The Case Study of the Emerging BlackNurse Attack” IEEE Access Journal, 2019. https://ieeexplore.ieee.org/abstract/document/8710298
  6. Masud, M., Hayawi, K., Mathew, S., Cheratta, M. and Dirir, A., “Effective Patient Similarity Computation for Clinical Decision Support using Time Series and Static Data”, 13th Australasian Conference on Health Informatics and Knowledge Management HIKM 2020, Melbourne, Australia, February 4-6, 2020. https://dl.acm.org/doi/abs/10.1145/3373017.3373050
  7. Hayawi, K. Ho, P-H. and Mathew S. “Securing the internet of things: a worst-case analysis of trade-off between query-anonymity and communication-cost” In Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, AINA'17, Taipei, Taiwan, March 27-29, 2017, IEEE. https://ieeexplore.ieee.org/abstract/document/7921008
  8. Hayawi, K. Mortezaei, A. and Tripunitara, M. V. “The limits of the trade-off between query-anonymity and communication-cost in wireless sensor networks” In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, pages 337-348, New York, NY, USA, 2015. ACM. https://dl.acm.org/doi/abs/10.1145/2699026.2699113

Kadhim.jpg