Hossein teaches and conducts research in the areas of cybersecurity, cyberpsychology and artificial intelligence. He is the Course Director for MSc Cyber Security and the Director of the Cyber Security, Networking, and Applications Research Group (CNA).
Hossein has over 25 years of professional and academic experience across diverse industries and universities. He has held various roles, including lecturer, researcher, Chief Information Security Officer (CISO), Chief Technical Officer (CTO), and cybersecurity expert in sectors such as academia, research, banking, telecom, and manufacturing. His expertise extends to participating in technical work packages for EU-funded projects, including Horizon 2020, and serving in key research groups such as the RDA-Group of European Data Experts (GEDE), the EUDAT work group on sensitive data, and the DDI Alliance. With a strong presence in the European research community, he has contributed to advancing cybersecurity and AI knowledge and practice.
Hossein has secured multiple internal and external funding awards, including CyberASAP and CyBOK, enabling him to lead pioneering cybersecurity research. His work focuses on human factors in cybersecurity, particularly their impact on users' susceptibility to phishing scams. He holds multiple certifications, such as certified information security manager (CISM) and ISO27001 lead auditor. Hossein has implemented and managed IT and OT security programs for various organisations, leveraging frameworks such as ISO/IEC 27001, NIST CSF, and ISA/IEC 62443. Beyond research, he has actively organised successful events fostering collaboration with research groups, centres, and industry partners in the UK and internationally, strengthening interdisciplinary engagement and driving innovation in cybersecurity.
Hossein manages ARU's CNA research group, aiming to improve the university's cybersecurity, networking, and applications research and build strong internal and external collaborations and partnerships. He is also leading the MSc Cyber Security course, focusing on improving the quality of the course and increasing the student's satisfaction.
Hossein is interested in supervising PhD students in the abovementioned areas under research interests, especially interdisciplinary research.
Onumadu, P., & Abroshan, H. (2024). Near-Field Communication (NFC) Cyber Threats and Mitigation Solutions in Payment Transactions: A Review. Sensors, 24(23), 7423.
Adeyeri, A., & Abroshan, H. (2024). Geopolitical Ramifications of Cybersecurity Threats: State Responses and International Cooperations in the Digital Warfare Era. Information, 15(11), 682.
Mersico, L., Abroshan, H. Sanchez-Velazquez, E., Saheer, L. B., Simandjuntak, S., Dhar-Bhattacharjee, S., ... & Saxena, A. (2024). Challenges and Solutions for Sustainable ICT: The Role of File Storage. Sustainability, 16(18), 8043.
Coates, S. K., Abroshan, H. (2023). Guideline for the Production of Digital Rights Management (DRM). International Journal of Security, Privacy and Trust Management (IJSPTM), 12(3/4).
Abroshan, H., Devos, J., Poels, G., & Laermans, E. (2021a). COVID-19 and Phishing: Effects of Human Emotions, Behaviour, and Demographics on the Success of Phishing Attempts during the Pandemic. IEEE Access, vol. 9, pp. 121916-121929, 2021, doi: 10.1109/ACCESS.2021.3109091.
Abroshan, H., Devos, J., Poels, G., & Laermans, E. (2021, June). A phishing mitigation solution using human behaviour and emotions that influence the success of phishing attacks. In Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization (pp. 345-350).
Abroshan, H. (2021). A Hybrid Encryption Solution to Improve Cloud Computing Security Using Symmetric and Asymmetric Cryptography Algorithms. International Journal of Advanced Computer Science and Applications, 12(6).
Abroshan, H., Devos, J., Poels, G., & Laermans, E. (2021). Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process. IEEE Access, 9, 44928-44949.
Abroshan, H., Devos, J., Poels, G., & Laermans, E. (2017). Phishing Attacks Root Causes. In Lecture Notes in Computer Science (Vol. 10694, pp. 187-202): Springer.
Wittenburg, P., Hellström, M., Zwölf, C. M., Abroshan, H., Asmi, A., Di Bernardo, G., ... & Weigel, T. (2017). Persistent identifiers: Consolidated assertions. Standard, Research Data Alliance; Zenodo: Geneva, Switzerland.