Writtle University College and ARU have merged. Writtle’s full range of college, degree, postgraduate and short courses will still be delivered on the Writtle campus. See our guide to finding Writtle information on this site.

Muhammad Ali

Lecturer

Faculty:
Faculty of Science and Engineering
School:
Computing and Information Science
Location:
Cambridge
Research Supervision:
Yes

Muhammad teaches Computer Networks and Cyber Security, with specialist areas in Malware analysis, Network security, ethical hacking, IoT, and blockchain. His research interests lie at the intersection of AI and cybersecurity, with a particular focus on developing techniques to automatically protect systems from vulnerabilities and malicious behaviors.

[email protected]

Connect with Muhammad on LinkedIn

View Muhammad's ResearchGate profile

Background

Muhammad graduated with a BSc degree in Computer Engineering, and MS in Information Security Management. Being interested in cybersecurity, he pursued his Ph.D. in Cybersecurity (Waiting for final viva).

Muhammad has accumulated over 12 years of professional and academic experience in diverse industries and universities. He has worked as a lecturer, researcher, Network Administrator, Head of the IT department, Manager in Cybersecurity, and Cybersecurity expert in the public and private sectors.

Spoken Languages

  • English
  • Urdu

Research interests

  • Malware detection and digital forensics
  • Threat Intelligence
  • Vulnerability Assessment
  • The intersection of AI and cybersecurity
  • IoT Security
  • Network and system security
  • Blockchain

Muhammad is a member of our Cyber Security and Networking Research Group

Muhammad is a member Fellow of the UCL Blockchain research group

Areas of Expertise

  • Malware analysis
  • Cybersecurity
  • Network Security
  • Blockchain

Areas of research supervision

  • Developing techniques to automatically protect systems from vulnerabilities and malicious behaviors
  • Blockchain-based malware detection method
  • Developing an advanced malware detection system based on Machine Learning
  • Developing an advanced malware detection system based on Deep learning
  • Blockchain-Based Malware detection method

Teaching

Module leader and tutor for several modules

  • Network R&S
  • Advance Network Security Principals
  • Network Security
  • Ethical Hacking, Network Security, and Incident Response
  • Networking Technologies
  • Web Application Security
  • Digital Forensics and Malware Science

Qualifications

PhD. in Cybersecurity (Scholarship winner) (Waiting for Viva,) Plymouth University, www.plymouth.ac.uk.

  • Study focus: Developing an advanced malware detection system based on Machine Learning

MS in Information Security Management, SZABIST, Islamabad, http://www.szabist-isb.edu.pk ISM focus:

  • Studies focused on Security management systems, Information security technologies, Network Security, Application Security, Security auditing, Mobile and Wireless Networks, Information Security protocols, and Cryptography & Security mechanisms.

BCE Computer Engineering, COMSATS Institute of Information Technology, Islamabad https://www.comsats.edu.pk.

  • Engineering focus: studies focused on Computer architecture, Databases, System programming, Data structure, Algorithms, Microprocessor system & interfacing, Digital Logic & design, Electric & electronic circuit, electronic devices, Numerical analysis, Calculus, Linear algebra, Discrete mathematics, etc.

Memberships, editorial boards

  • IEEE Access
  • IEEE Transactions on Engineering Management

Research grants, consultancy, knowledge exchange

Worked as CO-I in the project funded by the kingdom of Saudi Arabia ministry of education Umm Al-Qura university deanship of scientific research.

Selected recent publications

“MALGRA: Machine Learning and N-Gram Malware Feature Extraction and Detection System”, Electronics 2020, 9(11), 1777; https://doi.org/10.3390/electronics9111777,  Published: 26 October 2020 In Special Issue Prevention, Detection, Reaction, and Mitigation of Physical and Cyber Threats, MDPI.

“A Proactive Malicious Software Identification Approach for Digital Forensics Examiners”. Journal: Journal of Information Security and Applications; Accepted for publication, https://doi.org/10.1016/j.jisa.2019.04.013

“QoS and security in VOIP Networks through Admission Control Mechanism”. Fahan Ul Arifeen, Muhammad Ali, Sajjad Ashraf. Published in IEEE http://ieeexplore.ieee.org/document/7429905

“Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis”, submitted a paper in The 2018 Global Information Infrastructure and Networking Symposium (GIIS) - Special Session 3: Security, Privacy, and Trust in the Internet of Things October 23-25 2018, Thessaloniki, Greece. https://ieeexplore.ieee.org/abstract/document/8635598

Certifications

  • Microsoft Certified Professional, 410- Installing and Configuring Windows Server 2012
  • Microsoft® Certified Technology Specialist,680 -TS: Windows 7, Configuring
  • Penetration Testing certification, NUST