Wesam Almobaideen Headshot

Wesam Almobaideen

Professor of Electrical Engineering and Computing

RIT Dubai

Office Location
D-205
Office Mailing Address
RIT Dubai, Dubai Silicon Oasis - UAE

Wesam Almobaideen

Professor of Electrical Engineering and Computing

RIT Dubai

Education

Ph.D. from Bologna University, Bologna, Italy; M.Sc. from The University of Jordan, Amman; B.Sc. in computer science from The Muta'h University, Karak, Jordan

Bio

Wesam Almobaideen is a full professor specializing in computer networks and security at Rochester Institute of Technology (RIT) in Dubai. His academic journey includes earning a B.Sc. in computer science, Muta’h University, Karak, Jordan, followed by an M.Sc. degree in computer science, The University of Jordan, Amman, Jordan. Dr. Almobaideen furthered his education by obtaining a Ph.D. from the University of Bologna, Bologna, Italy. Before joining RIT-Dubai, Dr. Almobaideen held various leadership roles at the University of Jordan. He served as the Chairperson of the Department of Computer Science for five years, Director of the Computer Center for three years, Assistant Dean of the Faculty of Graduate Studies, and Director of the Accreditation and Quality Assurance Office.

 Dr. Almobaideen's research interests span a broad spectrum of cutting-edge areas, including Computer Networking, Blockchain, Cybersecurity, Internet of Things (IoT), Cloud Computing, and Machine Learning. His contributions to academia are reflected in the publication of more than 60 research papers in reputable conferences and journals. Additionally, Dr. Almobaideen has played a significant role in mentoring and supervising over 60 graduate master's and doctorate students, showcasing his commitment to advancing knowledge and fostering the next generation of scholars in his field.


Areas of Expertise

Select Scholarship

In Journals:

  1. Orieb AbuAlghanam, Hadeel Alazzam, Wesam Almobaideen, Maha Saadeh, Heba Saadeh, A Novel Key Distribution for Mobile Patient Authentication Inspired by the Federated Learning Concept and Based on the Diffie–Hellman Elliptic Curve, Journal: Sensors, Volume 25, Issue 8, Pages: 2357, 2025.
  2. Almobaideen, W., Abu Alghanam, O., Abdullah, M. et al. Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices. Int. J. Inf. Secur. 24, 110 (2025). https://doi.org/10.1007/s10207-025-01027-x
  3. Ola Malkawi, Nadim Obaid, Wesam Almobaideen, Intrusion Detection System for 5G Device-to-Device Communication Technology in Internet of Things, Journal Informatica, Volume 48, Issue 15, 2024.
  4. C Alex, G Creado, W Almobaideen, OA Alghanam, M Saadeh, A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms, Computer and Security, Vol. 132, 2023. https://doi.org/10.1016/j.cose.2023.103283
  5. kkOA Alghanam, W Almobaideen, M Saadeh, O Adwan, An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning, Expert Systems with Applications, Vol. 213 Part A, 2023. https://doi.org/10.1016/j.eswa.2022.118745.
  6. O Malkawi, N Obaid, W Almobaideen, Toward an Ontological Cyberattack Framework to Secure Smart Cities with Machine Learning Support, International Journal of Advanced Computer Science and Applications, Vol. 13, Iss. 11, (2022). DOI:10.14569/IJACSA.2022.0131145 2022.
  7. O AbuAlghanam, M Qatawneh, W Almobaideen, A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities, Journal of Information Security and Applications, Vol. 67, 2022. https://doi.org/10.1016/j.jisa.2022.103173.

In conferences:

  1. Wesam Almobaideen, Rashed Alnuman, Tayyab Sajid, Qusai Hasan, SVM Machine Learning Model for Detection of Etherlock Vulnerability in Solidity Smart Contract , 6th International Conference on Blockchain Computing and Applications (BCCA), Pages 434-440, IEEE, 2024.
  2. Ola Malkawi, Nadim Obeid, Wesam Alomabaideen, and  Qais Al-Na’amneh, Recent Security Trends and Methods to Secure IoT based Smart City: A Survey, nternational Conference on Technology for Innovation Management (ICTIM2024), April 2024.
  3. W. Almobaideen, M. Mohammed, Vaxina: Decentralized Vaccination Tracking System, 2023 9th International Conference on Information Technology Trends (ITT), IEEE 2023. DOI: 10.1109/ITT59889.2023.10184231
  4. M. Praveen; W. Almobaideen, The Current State of Research on Malware Written in the Rust Programming Language, 2023 International Conference on Information Technology (ICIT), IEEE 2023. DOI: 10.1109/ICIT58056.2023.10226157

Currently Teaching

CSCI-462
3 Credits
This course provides an introduction to cryptography, its mathematical foundations, and its relation to security. It covers classical cryptosystems, private-key cryptosystems (including DES and AES), hashing and public-key cryptosystems (including RSA). The course also provides an introduction to data integrity and authentication. Students cannot take and receive credit for this course if they have credit for CSCI-662.
CSEC-380
3 Credits
This course is designed to give students a foundation in the theories and practice relating to web application security. The course will introduce students to the concepts associated with deploying and securing a typical HTTP environment as well as defensive techniques they may employ.
CSEC-468
3 Credits
The three key elements of risk management will be introduced and explored. These are risk analysis, risk assessment, and vulnerability assessment. Both quantitative and qualitative methodologies will be discussed as well as how security metrics can be modeled, monitored, and controlled. Several case studies will be used to demonstrate the risk management principles featured throughout the course. Students will work in teams to conduct risk assessments on the selected case study scenarios. They will develop mitigation plans and present the results of their analysis both in written reports and oral presentations.
CSEC-472
3 Credits
Access control and authentication systems are some of the most critical components of cybersecurity ecosystems. This course covers the theory, design, and implementation of systems used in identification, authentication, authorization, and accountability processes with a focus on trust at each layer. Students will examine formal models of access control systems and approaches to system accreditation, the application of cryptography to authentication systems, and the implementation of IAAA principles in modern operating systems. A special focus will be placed on preparing students to research and write about future topics in this area.
CSEC-499
0 Credits
Students will gain experience and a better understanding of the application of technologies discussed in classes by working in the field of computing security. Students will be evaluated by their employer. If a transfer student, they must have completed one term in residence at RIT and be carrying a full academic load.
CSEC-559
0 - 3 Credits
This course explores current topics in computing security. It is intended as a place holder course for faculty to experiment new course offerings in Computing Security undergraduate program. Course specific details change with respect to each specific focal area proposed by faculty.
CSEC-599
1 - 6 Credits
Students will work with a supervising faculty member on a project of mutual interest. Project design and evaluation will be determined through discussion with the supervising faculty member and documented through completion of an independent study form to be filed with the department of computing security.
CSEC-604
3 Credits
In this course, students will gain in depth knowledge of cryptography and authentication. Students will explore various cryptographic algorithms and authentication protocols, focusing on their design and implementation. Students will also work on a research or implementation project, based on cryptographic algorithms and/or authentication protocols. The applications of cryptography and authentication in the areas of computer networks and systems will also be investigated. This course requires prior knowledge in Discrete Mathematics.
CSEC-659
3 Credits
This course offers an opportunity to learn about a specific seminar topic in more depth. The course description will be replaced by the specific instance of the seminar, as it is proposed by faculty.
CSEC-741
3 Credits
As the world becomes more and more connected as ever before via various kinds of devices and systems on the Internet, called the Internet of Things (IoT), the associated security and privacy-related issues also become increasingly challenging. This course is designed for students who wish to advance their knowledge in the Internet of Things security. It provides students opportunities to explore security and privacy-related issues manifested by various kinds of IoT devices and systems such as sensors, sensor networks, SCADA systems, vehicular systems, consumer IoT devices, etc.
CSEC-790
1 - 6 Credits
This course is one of the capstone options in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic and make an original contribution which extends knowledge within the computing security domain. Students must submit an acceptable proposal to a thesis committee (chair, reader, and observer) before they may be registered by the department for the MS Thesis. Students must defend their work in an open thesis defense and complete a written report of their work before a pass/fail grade is awarded. As part of their original work, students are expected to write and submit an article for publication in a peer reviewed journal or conference.
NSSA-242
3 Credits
This course is designed to provide the student with an understanding of the protocols, principles and concepts of radio communication as they apply to wireless data networking (802.11) for local area networks and peripherals. As its basis it uses the fundamental concepts and technologies learned in Introduction to Routing and Switching, and expands upon them to include other contemporary and emerging technologies. Topics including WLANs, wireless network operation, network integration, construction and network design will be discussed. Modulation techniques, measurement standards, nomenclature, equipment and theory behind transmissions in this portion of the electromagnetic spectrum will be examined.

Featured Work

Website last updated: December 4, 2025