Staff profile

Dr Hany Atlam


Lecturer of Cyber Security and Digital Forensics

Subject

Computing

College

College of Science and Engineering

Department

School of Computing and Engineering

ORCiD ID

0000-0003-4142-6377

Campus

Markeaton Street, Derby Campus

Email

h.atlam@derby.ac.uk

About

I am a Lecturer in Cyber Security and Digital Forensics in the Department of Computing and Mathematics at the University of Derby. I completed my PhD at the University of Southampton, UK in 2020. I completed my Bachelor of Computer Science and Engineering (BEng) at Menoufia University, Egypt, in 2011, then completed my MSc in Computer Science and Engineering from the same university in 2014.

I am a committed lecturer with considerable experience in teaching and lecturing students from various social and cultural backgrounds. I possess excellent administrative, verbal communication and writing skills along with constructive and effective teaching methods that promote a stimulating learning environment. I have several industry certifications as I am a Cisco Certified Network Associate (CCNA), Cisco Certified Academy Instructor (CCAI), and Certified Cloud Infrastructure and Services.

I have authored and co-authored more than 35 publications in high-ranked international journals and conferences and served as a reviewer and guest editor in several international journals.

My current research interests include but are not limited to Security and Privacy in the Internet of Things (IoT), Cloud Security, Investigating convergence of AI (artificial intelligence) with security, Security-related Multimedia Content Analysis, Digital Forensics, Blockchain, and Big Data Security.

Teaching responsibilities

I am the module leader of the following modules:

Research interests

My current research aims to provide a reliable, dynamic, and context-aware access control that facilitates information sharing and can adapt to unexpected situations of various IoT applications. My current research interests include but are not limited to Security and Privacy in the Internet of Things (IoT), Cloud Security, Investigating convergence of AI with security, Security-related Multimedia Content Analysis, Digital Forensics, Blockchain, and Big Data Security.

Membership of professional bodies

Qualifications

Recent conferences

  1. Mwangi, E., Atlam, H. F., Fadhel, N. F. (2021). Malicious Activity Detection using Smart Contracts in IoT. In Proceedings of the 6th International Conference on Internet of Things, Big Data and Security, pp. 286 – 295
  2. Alzahrani, A. G., Alenezi, A ., Atlam, H. F. & Wills, G. B. (2020). A Framework for Data Sharing between Healthcare Providers using Blockchain. In Proceedings of the 5th  International Conference on Internet of Things, Big Data and Security (IoTBDS 2018), pp. 349 - 358
  3.  Alenezi, A, Atlam, H. F.,  Alsagri, R.,  Alassafi, M. O. & Wills, G. B. (2019).  IoT Forensics: A State-of-the-Art Review, Challenges and Future Directions. In 4th International Conference on Complexity, Future Information Systems and Risk (COMPLEXIS 2019), pp. 106-115
  4. Atlam, H. F., Walters, R. J., & Wills, G. B. (2018). Internet of Nano Things: Security Issues and Applications.  2nd International Conference on Cloud and Big Data Computing (ICCBDC 2018), pp 71–77
  5. Atlam, H. F., Walters, R. J., & Wills, G. B. (2018). Intelligence of Things: Opportunities & Challenges. 3rd Cloudification of the Internet of Things (CIoT 2018), pp 1-6
  6. Atlam, H. F., Alassafi, M. O., Alenezi, A., Walters, R. J., & Wills, G. B. (2018). XACML for Building Access Control Policies in Internet of Things. In Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security (IoTBDS 2018) (pp. 253–260)
  7. Atlam, H. F., Alenezi, A., Walters, R. J., Wills, G. B., & Daniel, J. (2017). Developing an Adaptive Risk-based Access Control Model for the Internet of Things. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 655–661).
  8. Atlam, H. F., Alenezi, A., Alharthi, A., Walters, R., & Wills, G. (2017). Integration of Cloud Computing with Internet of things: Challenges and Open Issues. In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 670–675)
  9. Atlam, H. F., Alenezi, A., Walters, R. J., & Wills, G. B. (2017). An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things. In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017) (pp. 254–260)
  10. Alenezi, A., Zulkipli, N. H. N., Atlam, H. F., Walters, R. J., & Wills, G. B. (2017). The Impact of Cloud Forensic Readiness on Security. In Proceedings of the 7th International Conference on Cloud Computing and Services Science (CLOSER 2017) (pp. 511–517)
  11. Zinopoulou, M., Atlam, H. F., N.H, N. Z., A., R., & Wills, G. B. (2016). Building on a Secure Foundation for the Internet of Things. In IoT Security Foundation

Recent publications

  1. Azad, M. A., Riaz, F., Aftab, A., Rizvi,  S. K., Arshad, J. & Atlam, H. F. (2021). DEEPSEL: A novel feature selection for early identification of malware in mobile applications. Future Generation Computer Systems (FGCS)
  2. Atlam, H. F., Azad, M. A., Alassafi, M. O, Alshdadi, A. A & Alenezi, A. (2020). Risk-Based Access Control Model: A Systematic Literature Review. Future Internet, 12(6), 103
  3. Atlam, H. F., Azad, M. A., Alzahrani, A. G & Wills, G. B (2020). A Review of Blockchain in Internet of Things and AI. Big Data Cognitive Computing, 4, 28
  4. Atlam, H. F., Hemdan, E. E., Alenezi, A. & Wills G. B (2020). Internet of Things Forensics: A review. Internet of Things, Elsevier, pp.1-19.  
  5. Atlam, H. F., Wills, G. B (2019). An efficient security risk estimation technique for Risk-based access control model for IoT. Internet of Things, Elsevier, pp.1-20
  6. Atlam, H. F., Walters, R. J., Wills, G. B., & Daniel, J. (2019). Fuzzy Logic with Expert judgment to Implement an Adaptive Risk-based Access Control Model for IoT. Mobile Networks and Applications, Springer, pp.1-13
  7. Alassafi, M. O., Atlam, H. F., Alshdadi, A. A., Alzahrani, A. I, AlGhamdi, R. A, Buhari, S.M. (2019). A validation of security determinants model for cloud adoption in Saudi organisations’ context. International Journal of Information Technology, Springer, pp. 1-11
  8. Alenezi, A., Atlam, H. F. & Wills, G. B. (2019). Experts Reviews on Cloud Forensic Readiness Framework for Organizations. Journal of Cloud Computing, Springer, pp. 1-14
  9. Atlam, H. F., Walters, R. J., & Wills, G. B. (2018). Internet of Things: State-of-the-art, Challenges, Applications, and Open Issues. International Journal of Intelligent Computing Research, 9(3), 928–938
  10. Atlam, H. F., Alenezi, A., Alassafi, M. O., & Wills, G. B. (2018). Blockchain with Internet of Things: Benefits, challenges, and future directions. International Journal of Intelligent Systems and Applications, 10(6)                         
  11. Atlam, H.F., Robert J.Walters, & Gary B. Wills. (2018). Fog Computing and the Internet of Things: A Review. Big Data and Cognitive Computing, 2(10), 1–18
  12. Atlam, H. F., Alenezi, A., Hussein, R. K., & Wills, G. B. (2018). Validation of an Adaptive Risk-based Access Control Model for the Internet of Things. International Journal of Computer Network and Information Security, Jan, 26–35
  13. Hussein, R. K., Alenezi, A., Atlam, H. F., Mohammed, M. Q., Walters, R. J., & Wills, G. B. (2017). Toward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing. Advances in Science, Technology and Engineering Systems, 2(4), 44–50
  14. Atlam, H. F., Attiya, G., & El-Fishawy, N. (2017). Integration of Color and Texture Features in CBIR System. International Journal of Computer Applications, 164(April), 23–28
  15. Atlam, H. F., Attiya, G., & El-Fishawy, N. (2013). Comparative Study on CBIR based on Color Feature. International Journal of Computer Applications, 78(16), 975–8887

Book chapters

  1.  Atlam, H. F, Alenezi, A, Alassafi, M. O, Alharthi, A, Wills, G. B. (2020). Security, Cybercrime and Digital Forensics for IoT. In Principles of Internet of Things (IoT) Ecosystems: Insight Paradigm, Springer, pp. 551-577
  2. Atlam, H. F., & Wills, G. B. (2019). Intersections Between IoT and Distributed Ledger. In: Role of Blockchain Technology in IoT Applications. Advances in Computers. Elsevier 
  3. Atlam, H. F., & Wills, G. B. (2019). IoT Security, Privacy, Safety and Ethics. In Digital Twin Technologies and Smart Cities, Springer, pp. 1-27. 
  4. Atlam, H. F., & Wills, G. B. (2018). Technical Aspects of Blockchain and IoT. In: Role of Blockchain Technology in IoT Applications. Advances in Computers, Elsevier, pp. 1-35