Wesam Almobaideen Headshot

Wesam Almobaideen

Professor of Electrical Engineering and Computing

RIT Dubai

Office Location
D-205
Office Mailing Address
RIT Dubai, Dubai Silicon Oasis - UAE

Wesam Almobaideen

Professor of Electrical Engineering and Computing

RIT Dubai

Education

Ph.D. from Bologna University, Bologna, Italy; M.Sc. from The University of Jordan, Amman; B.Sc. in computer science from The Muta'h University, Karak, Jordan

Bio

Wesam Almobaideen is a full professor specializing in computer networks and security at Rochester Institute of Technology (RIT) in Dubai. His academic journey includes earning a B.Sc. in computer science, Muta’h University, Karak, Jordan, followed by an M.Sc. degree in computer science, The University of Jordan, Amman, Jordan. Dr. Almobaideen furthered his education by obtaining a Ph.D. from the University of Bologna, Bologna, Italy. Before joining RIT-Dubai, Dr. Almobaideen held various leadership roles at the University of Jordan. He served as the Chairperson of the Department of Computer Science for five years, Director of the Computer Center for three years, Assistant Dean of the Faculty of Graduate Studies, and Director of the Accreditation and Quality Assurance Office.

 Dr. Almobaideen's research interests span a broad spectrum of cutting-edge areas, including Computer Networking, Blockchain, Cybersecurity, Internet of Things (IoT), Cloud Computing, and Machine Learning. His contributions to academia are reflected in the publication of more than 60 research papers in reputable conferences and journals. Additionally, Dr. Almobaideen has played a significant role in mentoring and supervising over 60 graduate master's and doctorate students, showcasing his commitment to advancing knowledge and fostering the next generation of scholars in his field.


Areas of Expertise

Select Scholarship

In Journals:

  1. Orieb AbuAlghanam, Hadeel Alazzam, Wesam Almobaideen, Maha Saadeh, Heba Saadeh, A Novel Key Distribution for Mobile Patient Authentication Inspired by the Federated Learning Concept and Based on the Diffie–Hellman Elliptic Curve, Journal: Sensors, Volume 25, Issue 8, Pages: 2357, 2025.
  2. Almobaideen, W., Abu Alghanam, O., Abdullah, M. et al. Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices. Int. J. Inf. Secur. 24, 110 (2025). https://doi.org/10.1007/s10207-025-01027-x
  3. Ola Malkawi, Nadim Obaid, Wesam Almobaideen, Intrusion Detection System for 5G Device-to-Device Communication Technology in Internet of Things, Journal Informatica, Volume 48, Issue 15, 2024.
  4. C Alex, G Creado, W Almobaideen, OA Alghanam, M Saadeh, A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms, Computer and Security, Vol. 132, 2023. https://doi.org/10.1016/j.cose.2023.103283
  5. kkOA Alghanam, W Almobaideen, M Saadeh, O Adwan, An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning, Expert Systems with Applications, Vol. 213 Part A, 2023. https://doi.org/10.1016/j.eswa.2022.118745.
  6. O Malkawi, N Obaid, W Almobaideen, Toward an Ontological Cyberattack Framework to Secure Smart Cities with Machine Learning Support, International Journal of Advanced Computer Science and Applications, Vol. 13, Iss. 11, (2022). DOI:10.14569/IJACSA.2022.0131145 2022.
  7. O AbuAlghanam, M Qatawneh, W Almobaideen, A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities, Journal of Information Security and Applications, Vol. 67, 2022. https://doi.org/10.1016/j.jisa.2022.103173.

In conferences:

  1. Wesam Almobaideen, Rashed Alnuman, Tayyab Sajid, Qusai Hasan, SVM Machine Learning Model for Detection of Etherlock Vulnerability in Solidity Smart Contract , 6th International Conference on Blockchain Computing and Applications (BCCA), Pages 434-440, IEEE, 2024.
  2. Ola Malkawi, Nadim Obeid, Wesam Alomabaideen, and  Qais Al-Na’amneh, Recent Security Trends and Methods to Secure IoT based Smart City: A Survey, nternational Conference on Technology for Innovation Management (ICTIM2024), April 2024.
  3. W. Almobaideen, M. Mohammed, Vaxina: Decentralized Vaccination Tracking System, 2023 9th International Conference on Information Technology Trends (ITT), IEEE 2023. DOI: 10.1109/ITT59889.2023.10184231
  4. M. Praveen; W. Almobaideen, The Current State of Research on Malware Written in the Rust Programming Language, 2023 International Conference on Information Technology (ICIT), IEEE 2023. DOI: 10.1109/ICIT58056.2023.10226157

Currently Teaching

CSCI-462
3 Credits
This course provides an introduction to cryptography, its mathematical foundations, and its relation to security. It covers classical cryptosystems, private-key cryptosystems (including DES and AES), hashing and public-key cryptosystems (including RSA). The course also provides an introduction to data integrity and authentication. Students cannot take and receive credit for this course if they have credit for CSCI-662.
CSEC-380
3 Credits
This course is designed to give students a foundation in the theories and practice relating to web application security. The course will introduce students to the concepts associated with deploying and securing a typical HTTP environment as well as defensive techniques they may employ.
CSEC-468
3 Credits
The three key elements of risk management will be introduced and explored. These are risk analysis, risk assessment, and vulnerability assessment. Both quantitative and qualitative methodologies will be discussed as well as how security metrics can be modeled, monitored, and controlled. Several case studies will be used to demonstrate the risk management principles featured throughout the course. Students will work in teams to conduct risk assessments on the selected case study scenarios. They will develop mitigation plans and present the results of their analysis both in written reports and oral presentations.
CSEC-472
3 Credits
Access control and authentication systems are some of the most critical components of cybersecurity ecosystems. This course covers the theory, design, and implementation of systems used in identification, authentication, authorization, and accountability processes with a focus on trust at each layer. Students will examine formal models of access control systems and approaches to system accreditation, the application of cryptography to authentication systems, and the implementation of IAAA principles in modern operating systems. A special focus will be placed on preparing students to research and write about future topics in this area.
CSEC-499
0 Credits
Students will gain experience and a better understanding of the application of technologies discussed in classes by working in the field of computing security. Students will be evaluated by their employer. If a transfer student, they must have completed one term in residence at RIT and be carrying a full academic load.
CSEC-520
3 Credits
The course provides students an opportunity to explore methods and applications in cyber analytics with advanced machine learning algorithms including deep learning. Students will learn how to use machine learning methods to solve cybersecurity problems such as network security, anomaly detection, malware analysis, etc. Students will also learn basic concepts and algorithms in machine learning such as clustering, neural networks, adversarial machine learning, etc. Students taking this course should have the 4th year status and completed MATH-190 Discrete Math, MATH-251 Probability and Statistics I, and MATH-241 Linear Algebra.
CSEC-599
1 - 6 Credits
Students will work with a supervising faculty member on a project of mutual interest. Project design and evaluation will be determined through discussion with the supervising faculty member and documented through completion of an independent study form to be filed with the department of computing security.
CSEC-604
3 Credits
In this course, students will gain in depth knowledge of cryptography and authentication. Students will explore various cryptographic algorithms and authentication protocols, focusing on their design and implementation. Students will also work on a research or implementation project, based on cryptographic algorithms and/or authentication protocols. The applications of cryptography and authentication in the areas of computer networks and systems will also be investigated. This course requires prior knowledge in Discrete Mathematics.
CSEC-620
3 Credits
The course provides students an opportunity to explore methods and applications in cyber analytics with advanced machine learning algorithms including deep learning. Students will learn how to use machine learning methods to solve cybersecurity problems such as network security, anomaly detection, malware analysis, etc. Students will also learn basic concepts and algorithms in machine learning such as clustering, neural networks, adversarial machine learning, etc. A key component of the course will be an independent exploratory project to solve a security program with machine learning algorithms. Students taking this course should have knowledge in Discrete Math, Probability and Statistics, and Linear Algebra. Students should also be able to program in Python.
CSEC-733
3 Credits
This course will provide students with an introduction to the principle of risk management and its three key elements: risk analysis, risk assessment and vulnerability assessment. Students will also learn the differences between quantitative and qualitative risk assessment, and details of how security metrics can be modeled/monitored/controlled and how various types of qualitative risk assessment can be applied to the overall assessment process. Several industry case studies will be studied and discussed. Students will work together in teams to conduct risk assessments based on selected case studies or hypothetical scenarios. Finally, they will write and present their risk assessment reports and findings.
CSEC-741
3 Credits
As the world becomes more and more connected as ever before via various kinds of devices and systems on the Internet, called the Internet of Things (IoT), the associated security and privacy-related issues also become increasingly challenging. This course is designed for students who wish to advance their knowledge in the Internet of Things security. It provides students opportunities to explore security and privacy-related issues manifested by various kinds of IoT devices and systems such as sensors, sensor networks, SCADA systems, vehicular systems, consumer IoT devices, etc.
CSEC-790
1 - 6 Credits
This course is one of the capstone options in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic and make an original contribution which extends knowledge within the computing security domain. Students must submit an acceptable proposal to a thesis committee (chair, reader, and observer) before they may be registered by the department for the MS Thesis. Students must defend their work in an open thesis defense and complete a written report of their work before a pass/fail grade is awarded. As part of their original work, students are expected to write and submit an article for publication in a peer reviewed journal or conference.
NSSA-242
3 Credits
This course is designed to provide the student with an understanding of the protocols, principles and concepts of radio communication as they apply to wireless data networking (802.11) for local area networks and peripherals. As its basis it uses the fundamental concepts and technologies learned in Introduction to Routing and Switching, and expands upon them to include other contemporary and emerging technologies. Topics including WLANs, wireless network operation, network integration, construction and network design will be discussed. Modulation techniques, measurement standards, nomenclature, equipment and theory behind transmissions in this portion of the electromagnetic spectrum will be examined.
PUBL-363
3 Credits
Why are we still so bad at protecting computer systems? Is it because we don’t have good enough technology? Or because we lack sufficient economic incentives to implement that technology? Or because we implement technologies but then fail to use them correctly? Or because the laws governing computer security are so outdated? Or because our legal frameworks are ill-equipped to deal with an international threat landscape? All these reasons—and others— have been offered to explain why we seem to see more and more large-scale cybersecurity incidents and show no signs of getting better at preventing them. This course will examine the non-technical dimensions of this problem—the laws and other policy measures that govern computer security threats and incidents. We will focus primarily on U.S. policy but will also discuss relevant policies in the E.U. and China, as well as international tensions and norms. The central themes of the course will be the ways in which technical challenges in security can be influenced by the social, political, economic, and legal landscapes, and what it means to protect against cybersecurity threats not just by writing better code but also by writing better policies and laws.

Featured Work

Website last updated: July 17, 2025