Skip to main content
logo
اللغة
  • عربي
  • English
Login الرؤية الليلية
  • Top Management
    • Rector Office
    • The Emergence Of The University
    • Vision, Mission and Objectives
    • The Administrative Structure
  • Vice Rectories
    • Vice-Rectorate
    • Vice Rectorate of Academic and Educational Affairs
    • Vice-Rectorate for Development and Quality
    • Vice-Rectorate of Graduate Studies and Scientific Research
    • Vice-Rectorate of Branches
    • Vice-Rectorate of Female Students Affairs
  • Deanships
    • Deanship of Admission and Registration
    • Deanship of Preparatory Year
    • Deanship of Scientific Research
    • Deanship of Development and Quality
    • Deanship of Postgraduate Studies
    • Deanship of Human Resources
    • Deanship of IT and Distance Learning
    • Deanship of Library Affairs
    • Deanship of Community Service and Continuing Education
    • Deanship of Student Affairs
    • Institute of Research and Consulting Services
  • Media Center
    • News Center
    • Press Kit
    • Publications
    • University Newspaper
    • Photo Albums
    • Videos Album
    • Events
  • Initiatives and centers
    • Statistical Information Center
    • Business Incubator
    • Documents and Archive Center
    • University Education Development Center
    • Scientific Council
    • Marefa
  • The Library
    • University Libraries
    • Saudi Digital Library
  • Admission and Registration
اللغة
  • عربي
  • English

Social

  •  
  •  
  •  
  •  
  •  
  •  
  •  
Official government website of the Government of the Kingdom of Saudi Arabia
How to verify
Links to official Saudi websites end with edu.sa

All links to official websites of government agencies in the Kingdom of Saudi Arabia end with gov.sa.

Government websites use the HTTPS protocol for encryption and security.

Secure websites in the Kingdom of Saudi Arabia use the HTTPS protocol for encryption.

Registered with the Digital Government Authority under number :

20250731655
Home

Faculty Members

  • Main Portal
  • Faculty Members
  • E-Services
    • Students Services
    • Faculty Members Services
    • Employees Members Services
    • Visitors Services
    • E-Services Portal
  • Contacts
    • Contact Form
    • Important Numbers
    • Maps

مواقع أعضاء هيئة التدريس

كل ما تحتاجه من أستاذك… في مكان واحد

Breadcrumb

    You are here:
  1. Home /
  2. Faculty Members /

Dr.Mozamel Musa Saeed Musa

Associate Professor College of Sciences In Aflaj
  • Aflaj
  • 011-588-7480
  • m.musa@psau.edu.sa
  • Curriculum Vitae
  • Publications

Education

  • Ph.D. degree in information technology M.Sc. in Information Technology B.Sc. in Information Technology

Research Interests

  • Cyber security,

Experience

  • 2001 - 2006 - Teatching Ass. - Neelain University
  • 2016 - until now - Asso. Prof.. - PSAU
  • 2012 - 2016 - Assi. Prof. - PSAU
  • 2010 - 2012 - Assi. Prof. - NU
  • 2006 - 2010 - Lecturer - NU

Responsibilities

  • Chairman of computer science Department, since 2012 to 2016
  • Chairman of computer science Department, since 2017 to 2018
  • Coordinator of the Computer Science Department in Al Aflaj, since Oct. 2023 up to date

Publications

  • - ".Cloud Security and Authentication Vulnerabilities in SOAP Protocol Addressing XML-Based Attacks, Frontiers in Computer Science, Volume 7-2025, doi: 10.3389/fcomp.2025.1595624
  • _ An AI-Driven Cybersecurity Framework for IoT: Integrating LSTM-Based Anomaly Detection, Reinforcement Learning, and Post-Quantum Encryption," in IEEE Access, vol. 13, pp. 104027-104036, 2025, doi: 10.1109/ACCESS.2025.3576506
  • Comparing the influence of cybersecurity knowledge on attack detection: insights from experts and novice cybersecurity professionals, Open Computer Science, vol. 14, no. 1, 2024, . 20240016. https://doi.org/10.1515/comp-2024-0016
  • . Security, privacy, and robustness for trustworthy AI systems: A review, Computers and Electrical Engineering(CAEE), VOLUME 119 November 2024, 109643,
  • https://doi.org/10.1016/j.compeleceng.2024.109643
  • . . Forecasting the Academic Performance by Leveraging Educational Data Mining", Intelligent Automation & Soft Computing(IASC), Volume 39 Issue 02, May 2024 ,PP 213 - 231 ,https://doi.org/10.32604/iasc.2024.043020
  • • Survey on Deep Learning Approaches for Detection of Email Security Threat, Computers, Materials & Continua(CMC), Volume 77 issue 1, October 2023, pp. 325–348. ( https://doi.org/10.32604/cmc.2023.036894)
  • • Designing scenarios for an in-organization training using the CyberCIEGE game, The computer journal- oxford, Volume 65(11) , December 2022, (https://doi.org/10.1093/comjnl/bxac177)
  • ARTC: feature selection using association rules for text classification, Neural Computing and Applications, Volume 34 - Issue 18,
  • September 2022, https://doi.org/10.1007/s00521-022-07669-5
  • - A real-time adaptive network intrusion detection for streaming data: a hybrid approach, Neural Computing and Applications, Volume 34
  • - Issue 1, January 2022 , https://link.springer.com/article/10.1007/s00521-021-06786-x
  • Enhancing the quality of communication of cellular networks using big data applications, Journal of Big Data, 8, Article number: 143 (2021) ,
  • https://journalofbigdata.springeropen.com/articles/10.1186/s40537-021-00533-8
  • Leveraging Association Rules in Feature Selection to Classify Text, 4th International conference on Computer Networks and Inventive Communication Technologies - ICCNCT 2021, Springer Conference.
  • Designing a smart system for building student’s schedule-An application at Neelain University, International Journal of Advanced and Applied Sciences, Volume 8, Issue - (January 2021, pp. 82- 94
  • Big data clustering techniques based on Spark: a literature review, PeerJ Computer Science, November 2020
  • The Impact of WAF on Web Application Performance, Journal of Advanced Research in Dynamical & Control Systems((JARDCS), Vol. 12, 08-Special Issue, 2020, pp. 620- 624
  • Ensuring Security on the Cloud Depending on Network Virtualization and Centralized Controller Architecture, International Journal of Advanced Science and Technology. Vol. 29, No. 08, (2020), pp. 2467- 2481, )http://sersc.org/journals/index.php/IJAST/article/view/23415/12108(
  • Designing and Implementation of a Flexible Institution System According to New Standards to Ensure the Quality of Educational Process in Higher Education Institutions, International Journal of Computer Science and Technology(IJCST), Volume No.9, Issue No.3, July - September 2018,
  • (http://www.ijcst.com/vol9/issue3/9-dr-mozamel-m-saeed.pdf)
  • The Use of Data Mining Techniques in Analysing Traffic Accidents ( An application on Khartoum State), International Journal of Computer Trends and Technology(IJCTT), Volume No.62, Issue No.1, August 2018, (http://www.ijcttjournal.org/archives/ijctt-v62p110)
  • The Effectiveness and Efficiency of Medical Images after Special Filtration from the View of Medical Specialists )An Application on Khartoum Hospital-Sudan(", International Journal of Computer Applications Technology and Research (IJCATR), Volume No.7, Issue No.6, June 2018, (http://ijcat.com/archieve/volume7/issue6/ijcatr07061002.pdf)
  • Designing Vertical Model to Cope Urban Sprawl in Khartoum State Using GIS software, International Journal of Advance Research in Computer Science and Management Studies(IJARCSMS), Volume-6, Issue-2, February 2018 , (http://www.ijarcsms.com/docs/paper/volume6/issue2/V6I2-0008.pdf)
  • Recent Trends in Education in Sudan: Mobile-Learning Model, International Journal of Emerging Research in Management &Technology (IJERMT), Volume-6, Issue-11, November 2017, (https://www.ermt.net/docs/papers/Volume_6/11_November2017/V6N11-103.pdf).
  • E-Government in Sudan: Challenges and Future Prospects, International Journal of Computer Science Trends and Technology (IJCST) – Volume 5 Issue 1, Jan – Feb 2017, (http://www.ijcstjournal.org/volume-5/issue-1/IJCST-V5I1P6.pdf)
  • Risks and Threats Facing Information Security in the Age of Knowledge Society, International Journal of Computer Science and Telecommunications (IJCST) Volume 7 No 7, Oct 2016, (http://www.ijcst.org/Volume7/Issue7/p1_7_7.pdf)
  • Big Data and Challenges of the Century, International Journal of Research Studies in Computer Science and Engineering (IJRSCSE), Volume No 3 Issue No 4, 2016, (http://dx.doi.org/10.20431/2349-4859.0304003)
  • Measuring sensitivity secure login information systems by using SPSS software(An application on Neelain University - Sudan), International Journal of Computer Systems (IJCS), Volume No.3, Issue No.2, Feb 2016, (http://www.ijcsonline.com/IJCS/IJCS_2016_0302013.pdf)
  • The Effect of Implementing of Nonlinear Filters for Enhancing Medical Images Using MATLAB, International Journal of Computer Science and Information Technology (IJCSIT), Volume No.7, Issue No.6, December 2015, (http://aircconline.com/ijcsit/V7N6/7615ijcsit05.pdf)
  • Challenges Facing Quality Application in Higher Education Institutions in Sudan, (IJITR) INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND RESEARCH, Volume No.3, Issue No.6, October - November 2015, (http://www.ijitr.com/index.php/ojs/article/view/733/pdf)
  • Gaps of Cryptography and their Automatic Treatments
  • with Reference to classical Cryptographic Methods, International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) , Volume 2 No 1, Jan 2015. (http://www.arcjournals.org/pdfs/ijrscse/v2-i1/5.pdf).
  • Designing a Cache Memory Simulator using Pic microcontroller, International Journal of Computing And Technology (IJCAT), Volume 2 No 1, Jan 2015,
  • (http://ijcat.org/IJCAT-2015/2-1/Designing-a-Cache-Memory- Simulator-Using-Pic-Microcontroller.pdf)
  • Application of Medical Image Enhancement Using Computational Libraries”, International Journal of Computer Science and Telecommunications (IJCST), Volume 6 No 1, Jan 2015, ( http://www.ijcst.org/Volume6/Issue1/p2_6_1.pdf )
  • Security Defects in Identification Systems which depends on Biometrics and the Mechanisms of repairing, International Journal of Computer& Technology (IJCT), Volume 14 No 2, December 2014, (http://cirworld.com/journals/index.php/ijct/article/view/3347/pdf_552)
  • DESIGNING A SYSTEM FOR VERIFICATION PROCESS OF INDIVIDUAL IDENTIFICATION IN STUDENT PICK UP MANAGEMENT SYSTEM – APPLICATION ON ELEMENTARY SCHOOLS, International Journal of Advanced Computer Technology (IJACT), Volume 3 No 6, December 2014, (http://ijact.org/volume3issue6/IJ0360055.pdf )
  • Designing of a flexible Algorithm system for the statistical processing of students' grades, International Journal of Computing Science and Information Technology (IJCSIT), Volume 2 Issue 2, April2014, (http://ijcsit.org/Ijcsit_Vol2_Iss_2_pap_2.pdf)
  • The role of E-learning in facing the challenges of the century, International Journal of Engineering, Science and Innovative Technology (IJESIT), Volume 3 Issue 2, March2014, (http://www.ijesit.com/Volume%203/Issue%202/IJESIT201402_25.pdf )
  • Apparent causers for the academic declination of students in university level compared with secondary level
  • An application on Computer Science & Information Technology-Al Neelain University, International Journal of Electronics Communication and Computer Engineering (IJECCE), Feb 2014, Volume 5 Issue 1,
  • (http://ijecce.org/administrator/components/com_jresearch/files/publications/IJECCE_2425_Final.pdf)
  • General Characteristics of Software Development Companies in Sudan and its Impact on Production, International Journal of Engineering, Science and Innovative Technology (IJESIT),Volume 3 Issue 1, Jan2014, (http://www.ijesit.com/Volume%203/Issue%201/IJESIT201401_08.pdf).
  • The Use of GIS Technology in Identifying Chromite’s Ore in Ingassana Region (Sudan) – Nile Basin Researcher Journal – Issue No 9 - Al Neelain University – Khartoum, December 2008.
  • Spatial Interpolation using GIS& Google Earth application on Water management- Khartoum state, ", Nile Basin Researcher Journal – Issue No 11 - Al Neelain University – Khartoum, MAY 2010.
  • application the concepts of spatial interpolation using GIS and Google Earth in building a three-dimensional map - applied on the state of Khartoum ", Nile Basin Researcher Journal – Issue No 14 - Al Neelain University – Khartoum, OCT. 2012
  • The Use of GIS in knowing the effect of road traffic accidents - Nile Basin Researcher Journal – Issue No 16 - Al Neelain University – Khartoum May 2013.
  • The Use of GIS Technology in Urban expansion- Khartoum State , Federation of Arab Scientific - Journal of Computer Research, volume 11 – Issue No 1, JAN 2014.
  • Participated in the ministry of science and technology conference on remote sensing – Khartoum – JUL 2012.
  • Published books:
  • - Numerical Computation using Matlab language
  • Authorship:
  • Professor: Alsamani Abdul Muttalib Ahmed;
  • Professor: Awad Haj Ali;
  • Dr. : Mozamel Musa Saeed.
  • Jewel's publishing house, Cairo, 2015.

Contact the university leaders

Our male and female students, we are pleased to communicate with you and receive your inquiries through the communication system

Contact
  • Helpful Information
    • Phone Directory
    • Academic Calendar
    • Other Universities
    • Open Data
  • Portal Map
    • Jobs
    • Sitemap
    • Related Links
    • FAQs
    • Old portal version
  • Automation and Digital Transformation
    • Portal Team Member
    • Technical Support
    • Information Technology
  • Policies and Procedures
    • Policies
    • Tenders

Administration of Public Relations and Media

  • To call from inside the university 1200
  • To call from outside the university 011-588-1200
  • E-mail pr@psau.edu.sa
  • To request a service and open a fault report ithelp.psau.edu.sa

© Prince Sattam bin Abdulaziz University 2022

  •  
  •  
  •  
  •  
  •  

Designed and Developed by the Deanship of Information Technology and Distance Learning