تسجيل الدخول
  • E
  • ع+
  • ع
  • ع-
  • E
  • ع+
  • ع
  • ع-
د.سهيل عباس الرتبة الأكاديميةأستاذ مساعد

الاهتمامات البحثية

  • Cooperation Enforcement in Ad hoc Networks, Reputation and Trust based schemes, detection of identity based Attacks (Sybil, masquerading and replication), selfish or misbehavior node detection in routing and in IEEE MAC 802.11 protocols in static and mobile ad hoc networks, as well as in Internet of Things (IoT) environments.

إتصل

-Ph.D. Computer Science, Liverpool John Moores University, Liverpool UK, 2011. - B.S. Computer Science, University of Peshawar, Pakistan, 2003.
2016 – : Assistant Professor, University of Sharjah, Sharjah, UAE. 2012 – 2016: Assistant Professor, Department of CS & IT, University of Malakand, KPK, Pakistan. 2005 – 2012: Lecturer, Department of CS & IT, University of Malakand, KPK, Pakistan.
1. A collaborative project in “An Artificial Immune System Based General Intrusion Detection System”, under National ICT Research Outreach Program (NIROP) Pakistan, 2012. Worth Rs.500,000/- 2. Sybil Attack Detection in Internet of Things Environment using Machine Learning, Funding amount: AED 20,000/-, Sponsored by University of Sharjah, UAE. 2017.
JOURNALS 1. Manar Abu Talib, Sohail Abbas, Qassim Nasir, Mohamad Fouzi, “Systematic Literature Review on Internet-of-Vehicles Communication Security”, Accepted in International Journal of Distributed Sensor Networks, 2018. (IF: 1.787) 2. Sohail Abbas, Muhammad Faisal, Haseeb Ur Rahman, M. Zahid Khan, Madjid Merabti, Atta ur Rehman Khan, “Masquerading Attacks Detection in Mobile Ad Hoc Networks”, IEEE Access, Vol. 6, No. 1, 2018. (IF: 3.557) 3. Gulzar Mehmood, M. Zahid Khan, Haseeb Ur Rahman, Sohail Abbas, “An Efficient and Secure Session Key Establishment Scheme for Health-Care Applications in Wireless Body Area Networks”, Published online in Journal of Engineering and Applied Sciences, Vol. 37, No. 1, 2018. (Scopus indexed) 4. Sohail Abbas, Muhammad Haqdad, Salma Begum, and Muhammad Zahid Khan, “Detecting Sybil Attacks using Heterogeneous Topologies in Static Wireless Sensor Network”, Journal of Theoretical and Applied Information Technology, Vol. 96, No. 15, 2018. (Scopus indexed) 5. Djedjiga Mouheb, Sohail Abbas, Madjid Merabti, “Cybersecurity Curriculum Design: A Survey”, Accepted in Springer LNCS Transactions on Edutainment, 2018. 6. Muhammad Faisal, Sohail Abbas, Haseeb Ur Rahman, “Identity attack detection system for 802.11-based ad hoc networks”, EURASIP Journal on Wireless Communications and Networking, Vol. 2018, No. 5, 2018. (IF: 2.407) 7. Saeed Ullah Jan, Fawad Qayum, Sohail Abbas, Gulam Murtaza Khan, Ajab Khan, Siffat Ullah Khan, “An improved lightweight privacy preserving authentication scheme for SIP-based-VOIP using smart card”, Journal of Software Engineering & Intelligent Systems, Vol. 2, No. 3, 2017. 8. Ikram Ali, Muhammad Faisal, Sohail Abbas, “A Survey on Lightweight Authentication Schemes in Vertical Handover”, International Journal of Cooperative Information System, Vol. 26, No. 1, November 2016. (IF: 0.2) [most read article in 2017] 9. Mohsin Ur Rahman, Sohail Abbas, Aftab Alam “Investigating the Effects of Mobility Metrics in Mobile Ad Hoc Networks”, Asian Journal of Engineering, Sciences & Technology, p81-87, August 2016. 10. Muhammad Faheem, Sohail Abbas, and Samiullah Khan “An Efficient and Reliable Core-Assisted Multicast Routing Protocol in Mobile Ad-Hoc Network”, International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 7, No. 5, 2016. 11. Muhammad Fayaz, Zia Ur Rahman, Mohsin Ur Rahman, and Sohail Abbas, “Effect of Terrain Size and Pause Time on the Performance of Reactive Routing Protocols," Jurnal Teknologi, Vol. 78, No. 4-3, pp. 89-94, 2016. (Scopus indexed) 12. Sohail Abbas, Madjid Merabti, and David Llewellyn-Jones, “On the Evaluation of Reputation and Trust based Schemes in Mobile Ad hoc Networks” Security and Communication Networks, Wiley publishers, Vol. 8, No. 18, pp. 4041-4052, 2015. (IF: 0.904) 13. Sohail Abbas, Madjid Merabti, and David Llewellyn-Jones, “A Lightweight Sybil Attack Detection in MANETs” IEEE Systems Journal, Vol. 7, No. 2, pp. 236-248, 2013. (IF: 4.337) 14. Kashif Kifayat, Madjid Merabti, Qi Shi, and Sohail Abbas, “COMponent Based SECurity System (COMSEC) with QoS for Wireless Sensor Networks” Security and Communication Networks, Wiley publishers, Vol. 6, No. 4, pp. 461-472, 2013. (IF: 0.904) CONFERENCE PAPERS 15. Muhammad Faisal, Sohail Abbas, and Haseeb Ur Rehman, “Multi-dimensional Comprehensive Survey on Denial of Service Attacks with Countermeasures,” accepted and presented in World Congress on Internet Security (WorldCIS), IEEE. Cambridge, UK, 2017. 16. Muhammad Faisal, Ikram Ali, Haseeb Ur Rehman, and Sohail Abbas, "Localized Re-Authentication Scheme for Vertical Handover," accepted in Future of Information and Communications Conference (FICC), IEEE, Singapore, 2018. 17. Mohsin Ur Rahman, Sohail Abbas, and Seemab Latif, "Lightweight Detection of Malicious Nodes in Mobile Ad hoc Networks," in International Conference on Communication Technologies, IEEE, Pakistan, 2017. 18. Sohail Abbas and Mohsin Ur Rahman, "Simulation-based analysis of MANET routing protocols using group mobility model," in International Conference on Inventive Computation Technologies (ICICT). vol. 1: IEEE, India, 2016. 19. Mohsin Ur Rahman, Zia Ur Rahman, Muhammad Fayaz, Sohail Abbas, and Raees Khan ShahSani, "Performance analysis of TCP/AQM under Low-Rate Denial-of-Service Attacks," in International Conference on Inventive Computation Technologies (ICICT), vol. 3: IEEE, India, 2016. 20. Mohsin Ur Rahman, Aftab Alam, and Sohail Abbas, "Investigating the Impacts of Entity and Group Mobility Models in MANETs," in The International conference on Computing, Electronic and Electrical Engineering (ICE Cube), IEEE, Pakistan, 2016. 21. Sohail Abbas, Madjid Merabti, and David Llewellyn-Jones, "The Effect of Direct Interactions on Reputation Based Schemes in Mobile Ad hoc Networks," in The 5th IEEE PerNets workshop, in conjunction with IEEE CCNC conference, Nevada USA, 2011. 22. Sohail Abbas, Madjid Merabti, and David Llewellyn-Jones, "Identity-based Attacks against Reputation-based Systems in MANETs," in The 12th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet). Liverpool, UK, 2011. 23. Sohail Abbas, Madjid Merabti, and David Llewellyn-Jones, "A Survey of Reputation Based Schemes for MANET," in The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010), Liverpool, UK, 2010. 24. Sohail Abbas, Madjid Merabti, and David Llewellyn-Jones, "Deterring Whitewashing Attacks in Reputation Based Schemes for Mobile Ad hoc Networks," in The 3rd IFIP/IEEE Wireless Days, Venice Italy, 2010. 25. Sohail Abbas, Madjid Merabti, and David Llewellyn-Jones, "A Reputation Based Scheme to Deter Identity Based Attacks for Clustered MANETs," in The 10th Annual Conference on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, 2009, pp. 243-248. 26. Sohail Abbas, Madjid Merabti, and David Llewellyn-Jones, "Signal Strength Based Sybil Attack Detection in Wireless Ad Hoc Networks," in Second International Conference on Developments in e-Systems Engineering (DESE), 2009, pp. 190-195.
I do not consider my way of teaching as final. I incrementally develop my method of teaching by taking into account the students’ feedback and suggestions. I consider students to be the judges of my teaching. My focus is always on the techniques that make the students grasp a concept easily.
عودة إلى القائمة