Associate Professor

Post Doc  Graduate School of Management and Technology, University of
                   Maryland, University College (UMUC), Baltimore, Maryland, USA.
Ph.D.         Department of Computer Sciences, The University of Reading,
                   Reading, United Kingdom, UK.
B. Eng.     Department of Electrical and Electronic Engineering, The University of
                  Wales, Swansea, Swansea, South Wales, UK


Dr. Huwida Said is an Associate Professor in the College of Technological Innovation at Zayed University, Dubai. She received her Bachelor of Engineering (B.Eng.) in Electrical and Electronics Engineering from the University of Wales Swansea, UK, and a Ph.D. in Computer Sciences from the University of Reading, UK, in 1999.  In 2008 she also received a fellowship from NSF to conduct a Post Doc certificate in Information Assurance from the Graduate school of Management and Technology at the UMUC, Baltimore, MD. Dr. Said’s research interests include Computer Information Security, Computer Networking, Internet Security, Teaching Information Security and Curriculum and previously, Image processing and pattern Recognition, Database systems. Her teaching interests are Computer Information Security, Database Security, Information Security Fundamentals, Network Security, Internet and Web Security, Wireless Security, Information Systems Management, Operating Systems, Cryptography and Data Protection, Digital Computer Forensics, Introduction to Computer Programming.


Dubai Academic City, (Wing E-L1-007)


+9714 402 1475

Teaching Areas

Information Security, Operating Systems, Digital Forensics, Database Security, Computer Networking

Research and Professional Activities

Sample of Recent Publications:

1. Al Barghuthi, N., Said, H. E. and Pavithran, D, (2018, Nov), “Highlighting the Future of Autonomous Vehicle Technology in 2020-2050”, Proceeding of the f Current Trends in Information Technology (CTIT18), Nov 28-29, Dubai, UAE, 2018.

2. Al Barghuthi, N., Juma, H., and Said, H. E, (2018, Nov). Blockchain in Supply Chain Trading”, Proceeding of the f Current Trends in Information Technology (CTIT18), Nov 28-29, Dubai, UAE, 2018.

3. Al Taei, M., Al Barghuthi, N. B., Mahmoud, Q. H., Al Barghuthi, S., Said, H. E., (2018, Nov), “Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges”, the proceeding of the 2018 International Conference on Innovations in Information Technology (IIT18), Nov 18-19, Al Ain, UAE, 2018.

4. Said,  H. E. , N.B. Al Barghuthi, S. Al Marri, Q.H. Mahmoud, M. Al Taei, (2018, July), “Fun Video Games For Learning Information Security”, Proceeding of the 10th annual International Conference on Education and New Learning Technologies (EDULEARN18), ISBN: 978-84-09-02709-5, ISSN: 2340-1117, p.g. 10406-10416, 2 - 4 July, Palma de Mallorca, Spain, 2018.

5. Mohamed, S. S., Al Barghuthi, N. B., Said, E. H., (2017, Dec), “An Analytical Study Towards the UAE Universities Smart Education Innovated Approaches”,  Proceeding of the IEEE 15th International Conference on Smart City”, Dec 18-20, Bangkok, Thailand, p.g. 200-207, 2017.

6. Jabir. R.M., Khanji.  S.I.R., Ahmad, L.A., Alfandi, O., Said, H. E. , (2016, Jan),  “Analysis of cloud computing attacks and countermeasures”,   18th International Conference on Advanced Communication Technology, (ICACT2016), Jan 31-Feb 3, PyeongChang Busan Gwang'yeogsi,  South Korea, p.g. 117-123, 2016.

7. Khanji, S., Jabir R., Ahmad L., Alfandi, O., Said, H. E., (2016, Apr),  “Evaluation of Linux SMTP server security aspects—A case study”, proceeding of the 7th IEEE Conference on  Information and Communication Systems (ICICS2016), April 5- 7,  Irbid, Jordan, p.g. 252-257,  2016.

8. Marir, F., Said, H.E., Al-Obeidat, F, (2016, May), “Mining the Web and Literature to Discover New Knowledge about Diabetes”, The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016) / The 6th International Conference on Sustainable Energy Information Technology (SEIT-2016) / Affiliated Workshops, May 23-26, 2016, Madrid, Spain, p.g. 1256-1261, 2016

9. Said, H. E., Alfandi, O., Iqbal, F., Omar, A., Matter, K., Zuhair L. (2015, Mar), “Investigating Malware Behavior Using Passive DNS Data”, Graduate Students Research Conference (GSRC 2015), Mar 24-25, Abu Dhabi, UAE, 2015.

10. Marir F., Said, H. E., and Al Alami, U., (2014, Dec), “Mining the Web and Medline Medical Records to Discover New Facts on Diabetes”, The 4th International Conference on Hybrid Intelligent Systems (HIS 2014), Dec 14th-16th, Kuwait 2014.

Samples of pervious Publications- Inserting some paper web sites
11. AlBarghuthi, Nedaa B., and Said, E. H, (2014, Nov), “Ethics behind Cyber Warfare: A study of Arab Citizens Awareness”, The IEEE International Symposium on Ethics in Engineering, Science, and Technology (Ethics’ 2014),  May 23rd-24th, Chicago, IL, USA, pp. 1-7.
Text: Ethics behind Cyber Warfare: A study of Arab Citizens Awareness
Link:“Ethics behind Cyber Warfare: A study of Arab Citizens Awareness

12. AlBarghuthi, N. B.,and Said, H. E., (2013, Nov) "Social Networks IM Forensics: Encryption Analysis," Journal of Communications, vol. 8, no. 11, pp. 708-715, 2013. doi: 10.12720/jcm.8.11.708-715.ISSN:1796-2021.
Text: Social Networks IM Forensics: Encryption Analysis

13. Iqbal, A., Guimaraes, M., Obaidli, H., Said, H. E., (2013, Oct),” The Study of the Interrelation between Law Programs and Digital Forensics in UAE”, Information Security Curriculum Development Conference (InfoSecCD'13), Oct 12th, Atlanta, Georgia, USA, pp. TBD.
Text: The Study of the Interrelation between Law Programs and Digital Forensics in UAE

14. Guimaraes, M., Said, H. E., (2013, Mar),” A Multi-level Video Game for Teaching Security”, the Proceeding of the 44th ACM Technical Symposium on Computer Science Education (SIGCSE’13), March 6th-9th, Denver, Colorado, USA, pp. 739-739.
Text: A Multi-level Video Game for Teaching Security

15. Yousif, A., Humaid, H., & Said, H. E. (2012, Dec), “Smart Phone Forensics and Social Network”, the IEEE Multidisciplinary Engineering Education Magazine (MEEM), Vol. 6, No. 4, IEEE, pg. 7-13.
Text: Smart Phone Forensics and Social Network

16. Guimaraes, M. & Said, H. E. (2012, May), “Constructing video games to teach security using GameMaker, Flash and Unity”, Journal of Computing Sciences in Colleges, Vol. 27, No. 5, pp. 6-6.
Text: Constructing video games to teach security using GameMaker, Flash and Unity

17. Guimaraes, M., Said, H. E., & Austin, R. (2012, Jan), “Experience with Video Game for Security”. The Journal of the 27th Annual Consortium for Computing Sciences in Colleges (CCSC), Vol. 27, No. 3, pp.95-104.
Text: Experience with Video Game for Security

18. Said, H. E., Guimaraes, M., Al Mutawa, N., & Al Awadhi, I. (2011, Dec), “Forensics and War-Driving on Unsecured Wireless Network”, The proceedings of the 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Dec 11-14, Yas Island, Abu Dhabi, United Arab Emirates, pp.19-24.
Text: Forensics and War-Driving on Unsecured Wireless Network

19. Guimaraes, M., Austin, R., & Said, H. E. (2010, Oct),” Database Forensics”, Information Security     Curriculum Development Conference, (InfoSecCD'10), Oct 1st-2nd, Atlanta, Georgia, USA, 62-65.
Text: Database Forensics

20. Said, H. E., Guimaraes, M., Maamar, Z., & Jololian, L. (2009, July). “Database and Database Application Security”, Innovation and Technology in Computer Science Education (ITiCSE2009), Associate for Computing Machinery (ACM), July 6th -9th, Paris, France, pp.90-93.
Text: Database and Database Application Security

21. Said, H.E.S., Tan, Dr. Tienu N., & Baker, Prof. Keith D. (2000). “Personal Identification Based on Handwriting”, Journal of Pattern Recognition, Vol. 33, No. 1, pp. 149-160.
Text: Personal Identification Based on Handwriting

22. Said, H.E.S., Peake, Dr. Gill S., Tan, Dr. Tienu N. , & Baker, Prof. Keith D. (1998), “Personal Identification Based on Handwriting”,  IEEE International Conference on Pattern Recognition (ICPR'98), Vol. (III), August 16th -20th,Brisbane, Queensland, Australia,  1761-1764.
Test: Personal Identification Based on Handwriting

23. Said, H.E., Tan, Dr. Tienu N. (1997), “Identification Based on Handwriting”, IEEE International Conference on Image Processing (ICIP'97), Vol. (II), October 26th -29th, Santa Barbara, CA, USA, 449-452.

Research Grants:



 Project Title


Time Frame

Principle Investigator



Malware analysis and Social Media mining for detecting social and economic crimes using data analytic techniques




Principle Investigator



Video Games to Improve Teaching Digital Forensics






PI: Dr. Omar Alfandi


Characterizing Cyber-threat infrastructure for predicting Cyber-attacks in the UAE





 PI: Dr. Farhi Marri


Text Mining Approaches for developing an integrated diabetic knowledge repository (ontology)





PI: Dr. Mario


Videogames  to  Improve  Teaching  Security