His research interest is focused on Computer Security with an emphasis on program analysis and trusted computing (particularly trusted execution environment), and their applications to (1) vulnerability discovery in (IoT) firmware or software; (2) malware reverse engineering, and binary code; (3) Cybersecurity for education.
This section contains a selected publication. The symbol * indicates the co-author is my student.
Enhancing Federated Feature Selection through Synthetic Data and Zero Trust Integration
Madathil, Nisha Thorakkattu*, Saed Alrabaee, and Abdelkader Nasreddine Belkacem
IEEE Journal on Selected Areas in Communications
2025
Journal
Detection of Tor network obfuscated traffic using Bidirectional Generative Adversarial Network
Alomar, Ban, Zouheir Trabelsi, and Saed Alrabaee
Computer Networks
2025
Journal
Revolutionizing healthcare data analytics with federated learning: A comprehensive survey of applications, systems, and future directions
Madathil, Nisha Thorakkattu*, Fida K. Dankar, Marton Gergely, Abdelkader Nasreddine Belkacem, and Saed Alrabaee
Computational and Structural Biotechnology Journal
2025
Journal
ViTs as backbones: Leveraging vision transformers for feature extraction
Elharrouss, Omar, Yassine Himeur, Yasir Mahmood, Saed Alrabaee, Abdelmalik Ouamane, Faycal Bensaali, Yassine Bechqito, and Ammar Chouchane
Information Fusion 118
2025
Journal
Navigating ethical dimensions in the metaverse: Challenges, frameworks, and solutions
Al-Kfairy, Mousa, Saed Alrabaee, Omar Alfandi, Amr Taha Mohamed, and Souheil Khaddaj
IEEE Access.13
2025
Journal
Intrinsic motivation, future orientation, and financial stress: a student-centered model of metaverse classroom adoption in low-income contexts
Al-Kfairy, Mousa, Omar Alfandi, Saed Alrabaee
Cogent Education
2025
Journal
Compiler-provenance identification in obfuscated binaries using vision transformers
Khan, Wasif, Saed Alrabaee, Mousa Al-kfairy, Jie Tang, and Kim-Kwang Raymond Choo
Forensic Science International: Digital Investigation 49
2024
Journal
Strategic cybersecurity
AlDaajeh, Saleh*, and Saed Alrabaee
Computers & Security 141
2024
Journal
Cybersecurity activities for education and curriculum design: A survey
Ismail, Muhusina*, Nisha Thorakkattu Madathil*, Meera Alalawi*, Saed Alrabaee,Mohammad Al Bataineh, Suhib Melhem, and Djedjiga Mouheb
Computers in Human Behavior Reports 16
2024
Journal
A comprehensive evaluation of machine learning algorithms for web application attack detection with knowledge graph integration
Ismail, Muhusina*, Saed Alrabaee, Kim-Kwang Raymond Choo, Luqman Ali, and Saad Harous
Mobile Networks and Applications 29, no. 3
2024
Journal
Network traffic classification: Techniques, datasets, and challenges
Azab, Ahmad, Mahmoud Khasawneh, Saed Alrabaee, Kim-Kwang Raymond Choo, and Maysa Sarsour
Digital Communications and Networks 10, no. 3
2024
Journal
Understanding trust drivers of S-commerce
Al-Kfairy, Mousa, Ahmed Shuhaiber, Ayman Wael Al-Khatib, Saed Alrabaee, and Souheil Khaddaj
Heliyon 10,no. 1
2024
Journal
A deep learning approach to discover router firmware vulnerabilities
Abu-Mahfouz, Amjad*, Saed Alrabaee, Mahmoud Khasawneh, Marton Gergely, and Kim-Kwang Raymond Choo
IEEE Transactions on Industrial Informatics 20, no. 1
2023
Journal
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities
Saleous, Heba*, Muhusina Ismail*, Saleh H. AlDaajeh*, Nisha Madathil*, Saed Alrabaee, Kim-Kwang Raymond Choo, and Nabeel Al-Qirim
Digital communications and networks 9, no. 1
2023
Journal
Efficient resource management of micro-services in VANETs
Taha, Mohammad Bany, Saed Alrabaee, and Kim-Kwang Raymond Choo
IEEE Transactions on Intelligent Transportation Systems 24, no. 7
2023
Journal
Social commerce adoption model based on usability, perceived risks, and institutional trust
Al-Kfairy, Mousa, Ahmed Shuhaiber, Ayman W. Al-Khatib, and Saed Alrabaee
IEEE Transactions on Engineering Management 71
2023
Journal
A proposed artificial intelligence model for android-malware detection
Taher, Fatma, Omar Al Fandi, Mousa Al Kfairy, Hussam Al Hamadi, and Saed Alrabaee
In Informatics, vol. 10, no. 3, p. 67
2023
Journal
Convergence of IoT and cognitive radio networks: a survey of applications, techniques, and challenges
Khasawneh, Mahmoud, Ahmad Azab, Saed Alrabaee, Heba Sakkal, and Hossameldein Hussein Bakhit
IEEE Access 11
2023
Journal
DroidDetectMW: a hybrid intelligent model for android malware detection
Taher, Fatma, Omar AlFandi, Mousa Al-kfairy, Hussam Al Hamadi, and Saed Alrabaee
Applied Sciences 13, no. 13
2023
Journal
A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features
Saed Alrabaee, Mourad Debbabi, and Lingyu Wang
ACM Computing Surveys (CSUR) 55, no. 1
2022
Journal
A stratified approach to function fingerprinting in program binaries using diverse features
Saed Alrabaee
Expert Systems with Applications 193
2022
Journal
The role of national cybersecurity strategies on the improvement of cybersecurity education
AlDaajeh, Saleh*, Heba Saleous*, Saed Alrabaee, Ezedin Barka, Frank Breitinger, and Kim-Kwang Raymond Choo
Computers & Security 119
2022
Journal
A multi-objective approach based on differential evolution and deep learning algorithms for VANETs
Taha, Mohammad Bany, Chamseddine Talhi, Hakima Ould-Slimane, Saed Alrabaee, and Kim-Kwang Raymond Choo
IEEE Transactions on Vehicular Technology 72, no. 3
2022
Journal
The good, the bad, and the ugly about insta shopping: a qualitative study
Shuhaiber, Ahmed, Mousa Al-Kfairy, and Saed Alrabaee
IEEE Transactions on Computational Social Systems 10, no. 5
2022
Journal
TD‐PSO: task distribution approach based on particle swarm optimization for vehicular ad hoc network
Bany Taha, Mohammad, Chamseddine Talhi, Hakima Ould‐Slimane, and Saed Alrabaee
Transactions on emerging telecommunications technologies 33, no. 3
2022
Journal
CPA: Accurate crossplatform binary authorship characterization using LDA
Saed Alrabaee, Mourad Debbabi, and Lingyu Wang
IEEE Transactions on Information Forensics and Security 15
2020
Journal
Decoupling coding habits from functionality for effective binary authorship attribution
Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, and Aiman Hanna
Journal of Computer Security 27, no. 6
2019
Journal
On the feasibility of binary authorship characterization
Saed Alrabaee, Mourad Debbabi, and Lingyu Wang
Digital Investigation 28
2019
Journal
Fossil: a resilient and efficient system for identifying foss functions in malware binaries
Saed Alrabaee, Paria Shirani, Lingyu Wang, and Mourad Debbab
ACM Transactions on Privacy and Security (TOPS) 21, no. 2
2019
Journal
Navigating Ethical Dilemmas in the Implementation of AI-Driven Educational Technologies
Ismail, Muhusina*, Nisha Thorakkattu Madathil*, Meera Alalawi*, Shamma Alalawi*, and Saed Alrabaee
IEEE Global Engineering Education Conference (EDUCON), pp. 1-5
2025
Conference
Digital Transformation of Education: An Integrated Framework for Metaverse, Blockchain, and AI-Driven Learning
Al-Kfairy, Mousa, Omar Alfandi, Ravi S. Sharma, and Saed Alrabaee
17th International Conference on Computer Supported Education, CSEDU, pp. 865-873
2025
Conference
Using AI to Detect Android Malware Families
Saed Alrabaee, Mousa Al-Kfairy, Mohammad Bany Taha, Omar Alfandi, Fatma Taher, and Ahmed Hashem El Fiky
20th International Conference on the Design of Reliable Communication Networks (DRCN), pp. 1-8. IEEE
2024
Conference
Revisiting Binary Code Authorship Analysis
Saed Alrabaee, Mousa Al-kfairy, Mohammad Bany Taha, Omar Alfandi, Fatma Taher, and Jie Tang
International Conference on Network and System Security (NSS), pp. 428-449
2024
Conference
A Comparative Study on Source Code Attribution Using AI: Datasets, Features, and Techniques
Alalawi, Shamma*, Saed Alrabaee, Khan, Wasif, Al-Azzoni, Issam, Mohan Ambali Parambil, Medha
EAI SecureComm 2024. Accepted
2024
Conference
Harnessing the Power of Quantum Computing for URL Classification: A Comprehensive Study
Qayyum, Tariq, Tariq, Asadullah, Saed Alrabaee, Trabelsi, Zouheir , Farag, Farag; Serhani, Mohamed Adel
EAI SecureComm 2024. Accepted
2024
Conference
Ethical pathways in VR and the Metaverse: Frameworks for responsible innovation
Al-Kfairy, Mousa, Saed Alrabaee, and Omar Alfandi
2nd International Conference on Intelligent Metaverse Technologies & Applications (iMETA), pp. 009-017. IEEE
2024
Conference
From challenges to future directions: A metaverse analysis
Al Falahi, Alanoud*, Hind Alnuaimi*, Mouza Alqaydi*, Nada Al Shateri*, Shamma Al Ameri*, Mohammad Qbea'h, and Saed Alrabaee
2nd International Conference on Intelligent Metaverse Technologies & Applications (iMETA), pp. 34-43. IEEE
2024
Conference
Empowering Future Cyber Defenders: Advancing Cybersecurity Education in Engineering and Computing with Experiential Learning
Ismail, Muhusina*, and Saed Alrabaee
IEEE Frontiers in Education Conference (FIE), pp.1-9
2024
Conference
Evaluating and boosting cybersecurity awareness with an AI-integrated mobile app
Alalawi, Meera*, Nisha Thorakkattu Madathil*, Simon Kebede Darota*, Winner Abula*, Saed Alrabaee, and Suhib Bani Melhem
IEEE frontiers in education conference (FIE), pp. 1-9
2024
Conference
AI Techniques for Software Vulnerability Detection and Mitigation
Khater, Heba M., Mohamad Khayat, Saed Alrabaee, Mohamed Adel Serhani, Ezedin Barka, and Farag Sallabi
IEEE Conference on Dependable and Secure Computing (DSC), pp. 1-10
2023
Conference
Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks
Ismail, Muhusina*, Saed Alrabaee, Saad Harous, and Kim-Kwang Raymond Choo
International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures, pp. 99-116. Cham: Springer NatureSwitzerland
2023
Conference
An efficient strategy for deploying deception technology
Alhosani, Noora*, Saed Alrabaee, and Ahmed Al Faresi
International Conference on Future AccessEnablers of Ubiquitous and Intelligent Infrastructures, pp. 177-194. Cham: Springer Nature Switzerland
2023
Conference
SES: Smart Education System
Alyammahi, Wadha*, and Saed Alrabaee
International Conference on Computer and Applications (ICCA), pp. 1-4.IEEE
2023
Conference
Investigating online searching behavior based on Google Trends in MENA Region before and after COVID-19
Belkacem, Abdelkader Nasreddine, Nuraini Jamil, and Saed Alrabaee
IEEE Frontiers in Education Conference (FIE), pp. 1-7
2023
Conference
Pess: Progress enhancing student support
Madathil, Nisha Thorakkattu*, Winner Abula*, Shooq Alaboolan*, Maryam Almadhaani*, and Saed Alrabaee
International Conference on Smart Applications, Communications andNetworking (SmartNets), pp. 1-6. IEEE
2023
Conference
AI in education: Improving quality for both centralized and decentralized frameworks
Madathil, Nisha Thorakkattu*, Saed Alrabaee, Mousa Al-Kfairy, Rafat Damseh, and Abdelkader N. Belkacem
IEEE Global Engineering Education Conference (EDUCON), pp. 1-6
2023
Conference
Efforts and suggestions for improving cybersecurity education
Saed Alrabaee, Mousa Al-Kfairy, and Ezedin Barka
IEEE Global Engineering Education Conference (EDUCON), pp. 1161-1168
2022
Conference
Diverse approaches have been presented to mitigate sql injection attack, but it is still alive: a review
Qbea'h, Mohammad, Saed Alrabaee, Mohammad Alshraideh, and Khair Eddin Sabri
International Conference on Computer and Applications (ICCA), pp. 1-5. IEEE
2022
Conference
Safe: cryptographic algorithms and security principles gamification
Al Kaabi, Latifa*, Wadha Al Ketbi*, Aysha Al Khoori*, Maitha Al Shamsi*, and Saed Alrabaee
IEEE Global Engineering Education Conference (EDUCON), pp. 1169-1178
2022
Conference
Bindeep: Binary to source code matching using deep learning
Saed Alrabaee, Kim-Kwang Raymond Choo, Mohammad Qbea'h, Mahmoud Khasawneh
IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),Pages: 1100-1107
2021
Conference
Boosting students and teachers cybersecurity awareness during COVID-19 pandemic
Saed Alrabaee, Raed Manna
IEEE Global Engineering Education Conference (EDUCON), Pages 726-731
2021
Conference
Applied comparative evaluation of the metasploit evasion module
Peter Casey, Mateusz Topor, Emily Hennessy, Saed Alrabaee, Moayad Aloqaily, Azzedine Boukerche
IEEE symposium on computers and communications (ISCC), Pages:1-6
2021
Conference
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning
Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi
24th European Symposium on Research in Computer Security, ESORICS, Pages: 47-67.
2021
Conference
On leveraging coding habits for effective binary authorship attribution
Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna
23rd European Symposium on Research in Computer Security, ESORICS Pages 26-47.
2021
Conference