Saed Alrabaee
Scholar

Saed Alrabaee

Google Scholar ID: -NxLSnwAAAAJ
Associate Professor, Information Systems and Security, UAEU
Digital ForensicsMalware AnalysisBinary Code AnalysisCyber ForensicsCybersecurity Education
Citations & Impact
All-time
Citations
1,718
 
H-index
23
 
i10-index
38
 
Publications
20
 
Co-authors
41
list available
Resume (English only)
Academic Achievements
  • [07/2025] Paper on student-centered metaverse classroom adoption in low-income contexts accepted by Cogent Education
  • [07/2025] Paper on Tor obfuscated traffic detection using Bidirectional GAN accepted by Computer Networks Journal
  • [06/2025] Survey paper on federated learning in healthcare analytics accepted by Computational and Structural Biotechnology Journal
  • [06/2025] Received College Excellence in Scholarship Award
  • [05/2025] Received University Merit Allowance Award
  • [04/2025] Paper on ethical dilemmas in AI-driven educational technologies accepted by IEEE EDUCON 2025
  • [03/2025] Paper on enhanced federated feature selection accepted by IEEE Journal on Selected Areas in Communications
  • Keynote Speaker at ICSPIS 2024 (7th International Conference on Signal Processing & Information Security)
  • Invited talk at Technology Innovation Institute: 'Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting'
  • Panelist at multiple international conferences on AI in education and teaching innovation
Background
  • Associate Professor, Department of Information Systems and Security, UAE University
  • Director of the Center for Excellence in Teaching and Learning, UAE University
  • Permanent Research Scientist, Security Research Center, Concordia Institute for Information Systems Engineering, Concordia University
  • Former Assistant Professor, Department of Electrical and Computer Engineering and Department of Computer Science, University of New Haven, USA
  • Research focuses on Computer Security, particularly program analysis and trusted computing (especially Trusted Execution Environments)
  • Applications include: vulnerability discovery in IoT firmware/software, malware reverse engineering and binary code analysis, and cybersecurity for education