About Us

Dr. Nachaat Abdelatif Ali Mohamed

Assistant Professor and Associate Researcher

Dr. Nachaat is a distinguished leader at the forefront of cybersecurity and artificial intelligence, with over two decades of expertise that have significantly influenced the industry. Recognized among the World’s Top 2% Scientists by Stanford University, he holds a Ph.D. in Cyber Security Management from Universiti Sains Malaysia (USM) and is a Fellow of Advance HE UK. Dr. Nachaat is also a senior member of IEEE, with active affiliations in IEEE CS, ISACA, and IAENG.

Throughout his illustrious career, Dr. Nachaat has served as a research scientist, innovator, and strategist, advancing fields such as threat intelligence, cyber defense, AI, machine learning, neural networks, NLP, and governance risk and compliance. His contributions have earned him numerous accolades, including a prestigious award from Universiti Sains Malaysia and multiple publications in top-tier Scopus and ISI journals.

Recently, Dr. Nachaat achieved accreditation as a Global Trainer for ISACA’s prestigious certifications: CISM, CRISC, CISA, and CGEIT by APMG International. This recognition emphasizes his commitment to empowering professionals worldwide through top-tier training in information security, risk management, IT governance, and auditing.

Currently serving as an Assistant Professor and Associate Researcher at Rabdan Academy and Zayed Military University, Dr. Nachaat spearheads initiatives that integrate AI into cybersecurity frameworks. His previous role as Assistant Manager for Emerging Technology Risk and Cyber at KPMG Malaysia involved leading critical projects in vulnerability assessments, penetration testing, and red teaming operations.

Renowned for his expertise in threat modeling, MITRE ATT&CK, TTPs, CVEs, IoCs, Cyber Kill Chain, STIX, TAXII, OSINT, Anomali, SQL, Python, and the dark web, Dr. Nachaat is also adept at providing cybersecurity awareness training, ethical hacking, and risk assistance to military and police units worldwide.

Dr. Nachaat’s recognition among the world’s best scientists, combined with his visionary leadership and technical excellence, positions him as a pivotal figure in cybersecurity and AI. His dedication to advancing these fields makes him an exemplary leader ready to drive innovation and deliver impactful results.

Dr. Nachaat holds many prestigious certifications, including:

  • CISM (Certified Information Security Manager)
  • CRISC (Certified in Risk and Information Systems Control)
  • CISA (Certified Information Systems Auditor)
  • CGEIT (Certified in the Governance of Enterprise IT)
  • CDPSE (Certified Data Privacy Solutions Engineer)
  • CCISO (Certified Chief Information Security Officer)
  • CPENT (Certified Penetration Testing Professional)
  • LPT (Licensed Penetration Tester)
  • CEH (Certified Ethical Hacker)
  • CHFI (Computer Hacking Forensic Investigator)
  • ECSA (EC-Council Certified Security Analyst)
  • CTIA (Certified Threat Intelligence Analyst)

These certifications demonstrate Dr. Nachaat's commitment to excellence in information security management, risk management, auditing, IT governance, ethical hacking, threat intelligence, and penetration testing, making him a distinguished expert in cybersecurity.

Qualification

    Doctor of Philosophy (PhD) in Cyber Security Management

    Universiti Sains Malaysia (USM)

    http://www.usm.my

Teaching Areas

    Cyber Security Management

    Research methodology

Research Interests

    • Artificial Intelligence and Cybersecurity: Exploring the integration of AI, ML, and NLP techniques to enhance threat detection, predictive analysis, and automated response strategies for advanced cybersecurity frameworks.
    • Drones: Exploring the use of drones in cybersecurity operations, including threat detection, security surveillance, and vulnerability testing in critical infrastructure. Studying the security challenges associated with protecting wireless systems and remote control of drones from cyberattacks.
    •  Threat Intelligence and Cyber Defense: Investigating threat modeling methodologies, MITRE ATT&CK framework, Cyber Kill Chain, and OSINT to improve detection of tactics, techniques, and procedures (TTPs), Indicators of Compromise (IoCs), and vulnerabilities in diverse environments.
    • Risk Management and Governance in Emerging Technologies: Developing frameworks for effective risk assessment and management in the context of blockchain, IoT, and cloud computing, with a focus on compliance, governance, and regulatory requirements.
    • Ethical Hacking and Red Teaming: Advancing methodologies for vulnerability assessments, penetration testing, and ethical hacking practices, including red teaming operations to test and improve the security posture of organizations.
    • Digital Forensics and Incident Response: Studying approaches to cyber incident management, digital forensics, and malware analysis to enhance investigation procedures and response capabilities.
    • Future Paradigms in Cybersecurity and AI: Exploring cutting-edge technologies, including quantum computing, adversarial machine learning, and autonomous systems, and their implications for the future of cybersecurity.
    • Human Factors in Cybersecurity: Examining the role of cybersecurity awareness, training, and education in enhancing the human component of cybersecurity defense for military, law enforcement, and critical infrastructure.

Publications

    • Mohamed, N., & Belaton, B. (2021). SBI model for the detection of advanced persistent threat based on strange behavior of using credential dumping technique. IEEE Access, 9, 42919-42932.
    • Mohamed, N. (2023). Current trends in AI and ML for cybersecurity: A state-of-the-art survey. Cogent Engineering, 10(2), 2272358.
    • Mohamed, N. (2024). Securing transportation web applications: An AI-driven approach to detect and mitigate SQL injection attacks. Journal of Transportation Security, 17(1), 2.
    • Mohamed, N., Ninoria, S., Krishnan, C., Rajasekaran, S. B., Alfurhood, B. S., & Singh, D. P. (2023, May). Development of Smart Chabot in the Field of Trading using Smart Artificial Intelligence Informal Technology. In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 862-865). IEEE.
    • Sharma, S. D., Sharma, S., Pathak, A. K., & Mohamed, N. (2023, February). Real-time Skin Disease Prediction System using Deep Learning Approach. In 2023 2nd Edition of IEEE Delhi Section Flagship Conference (DELCON) (pp. 1-6). IEEE.
    • Mohamed, N., & Nachaat, M. (2023, December). The Convergence of Computational and CellularTherapies in Cancer Treatment: An AcademicReview. In 2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG) (pp. 1-6). IEEE.
    • Mohamed, N. (2024). Eye-gesture control of computer systems via artificial intelligence. F1000Research, 13, 109.
    • Moosavi, N., Taherdoost, H., Mohamed, N., Madanchian, M., Farhaoui, Y., & Khan, I. U. (2024). Blockchain Technology, Structure, and Applications: A Survey. Procedia Computer Science, 237, 645-658.
    • Moosavi, N., Taherdoost, H., Mohamed, N., Madanchian, M., Farhaoui, Y., & Khan, I. U. (2024). Blockchain Technology, Structure, and Applications: A Survey. Procedia Computer Science, 237, 645-658.
    • Mohamed, N., Oubelaid, A., Ghosh, A., Mohit, B., & Barik, R. K. (2023, November). Leveraging CPU Utilization Metrics and Zero Trust Architecture for APT Detection. In 2023 IEEE 3rd International Conference on Applied Electromagnetics, Signal Processing, & Communication (AESPC) (pp. 1-6). IEEE.
    • Mohamed, N., Solanki, M. S., Praveena, H. D., Princy, A., Das, S., & Verma, D. (2023, May). Artificial Intelligence Integrated Biomedical Implants System Developments in Healthcare. In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 588-591). IEEE.
    • Mohamed, N., Ahmed, A. A., Alsharif, A., & ElKhozondar, H. J. (2023, November). Employing AI-Driven Drones and Advanced Cyber Penetration Tools for Breakthrough Criminal Network Surveillance. In 2023 IEEE 9th International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE) (pp. 1-6). IEEE.
    • Taherdoost, H., Moosavi, N., Mohamed, N., & Khan, I. U. (2024). Applying Blockchain Technology into Big Data: Advantages and Challenges. Procedia Computer Science, 237, 827-832.
    • Mohamed, N., Oubelaid, A., Bajaj, M., Kandpal, M., & Mahmoud, M. M. (2023, October). Using AI and Kinetic Energy to Charge Mobile Devices with Human Movement. In 2023 4th IEEE Global Conference for Advancement in Technology (GCAT) (pp. 1-6). IEEE.
    • Mohamed, N., Upadhyay, R., Jakka, G., Rambabu, P. V., Alfurhood, B. S., & Singh, D. P. (2023, May). Framework for the Deployment of Intelligent Smart Cities (ISC) using Artificial Intelligence and Software Networking Technologies. In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 667-671). IEEE.
    • Madanchian, M., Taherdoost, H., & Mohamed, N. (2023). AI-Based Human Resource Management Tools and Techniques; A Systematic Literature Review. Procedia Computer Science, 229, 367-377.
    • Madanchian, M., Taherdoost, H., & Mohamed, N. (2023, November). Comparative Review: Leadership Styles in the Context of Smart Environments. In The International Conference on Artificial Intelligence and Smart Environment (pp. 531-536). Cham: Springer Nature Switzerland.
    • Mohamed, N. A., Jantan, A., & Omolara, A. E. (2018). Mitigation of cyber terrorism at ATMs, and using DNA, fingerprint, mobile banking app to withdraw cash (connected with IoT). International Journal of Engineering Research and Technology, 11, 845-852.
    • Madancian, M., Taherdoost, H., Mohamed, N., & Kalantari, A. (2023, November). Leading with Intelligence: Harnessing Machine Learning for Effective Leadership. In The International Conference on Artificial Intelligence and Smart Environment (pp. 537-542). Cham: Springer Nature Switzerland.
    • Mohamed, N. (2022). Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework [version 1; peer review.
    • Mohamed, N. A., Jantan, A., & Abiodun, O. I. (2018). An improved behaviour specification to stop advanced persistent threat on governments and organizations network. In proceedings of the International MultiConference of Engineers and Computer Scientists (Vol. 1, pp. 14-16).
    • Mohamed, N. A., Jantan, A., & Abiodun, O. I. (2018). Protect governments, and organizations infrastructure against cyber terrorism (mitigation and stop of server message block (SMB) remote code execution attack). International Journal of Engineering, 11(2), 261-272.
    • Abiodun, O. I., Jantan, A., Omolara, A. E., Dada, K. V., Mohamed, N. A., & Arshad, H. (2018). State-of-the-art in artificial neural network applications: A survey. Heliyon, 4(11).
    • Mohamed, N. (2022). Study of bypassing Microsoft Windows Security using the MITRE CALDERA framework. F1000Research, 11.
    • Mohamed, N., Almazrouei, S. K., Oubelaid, A., Bajaj, M., Jurado, F., & Kamel, S. (2023, June). Artificial intelligence (AI) and machine learning (ML)-based Information security in electric vehicles: A review. In 2023 5th Global Power, Energy and Communication Conference (GPECOM) (pp. 108-113). IEEE.
    • Oubelaid, A., Mohamed, N., Taib, N., Rekioua, T., Bajaj, M., Parashar, D., & Blazek, V. (2022, December). Robust controllers design and performance investigation of a vector controlled electric vehicle. In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) (pp. 1-6). IEEE.
    • Mohamed, N., Almazrouei, S. K., Oubelaid, A., Elsisi, M., ElHalawany, B. M., & Ghoneim, S. S. (2022). Air‐Gapped Networks: Exfiltration without Privilege Escalation for Military and Police Units. Wireless Communications and Mobile Computing, 2022(1), 4697494.
    • Mohamed, N. (2022). State-of-the-Art in Chinese APT Attack and Using Threat Intelligence for Detection. A Survey. Journal of Positive School Psychology, 4419-4443.
    • Mohamed, N., Josphineleela, R., Madkar, S. R., Sena, J. V., Alfurhood, B. S., & Pant, B. (2023, May). The Smart Handwritten Digits Recognition Using Machine Learning Algorithm. In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 340-344). IEEE.
    • Mohamed, N., Singh, V. K., Islam, A. U., Saraswat, P., Sivashankar, D., & Pant, K. (2022, December). Role of Machine Learning In Health Care System for The Prediction of Different Diseases. In 2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT) (pp. 1-4). IEEE.
    • Mohamed, N. (2022, December). Importance of Artificial Intelligence in Neural Network through using MediaPipe. In 2022 6th International Conference on Electronics, Communication and Aerospace Technology (pp. 1207-1215). IEEE.
    • Mohamed, Nachaat, Edris Alam, and Gareth Lee Stubbs. "Multi-layer protection approach MLPA for the detection of advanced persistent threat." Journal of Positive School Psychology (2022): 4496-4518.
    • Mohamed, N., Baskaran, N. K., Patil, P. P., Alatba, S. R., & Aich, S. C. (2023, May). Thermal Images Captured and Classifier-based Fault Detection System for Electric Motors Through ML Based Model. In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 649-654). IEEE.
    • Mohamed, N., & Nachaat, M. (2023, December). Revolutionizing Oncology: A Critical Review of Artificial Intelligence and Stem Cells in Cancer Treatment. In 2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG) (pp. 1-6). IEEE.
    • Oubelaid, A., Mohamed, N., Rathore, R. S., Bajaj, M., & Rekioua, T. (2024). Artificial Neural Networks-Based Torque Distribution for Riding Comfort Improvement of Hybrid Electric Vehicles. Procedia Computer Science, 235, 1300-1309.
    • Omolara, A. E., Jantan, A., Abiodun, O. I., Arshad, H., & Mohamed, N. A. (2019). Fingereye: improvising security and optimizing ATM transaction time based on iris-scan authentication. International Journal of Electrical & Computer Engineering (2088-8708), 9(3).
    • Mohamed, N., Almazrouei, S. K., Oubelaid, A., Ahmed, A. A., Jomah, O. S., & Aghnaiya, A. (2023, May). Understanding the threat posed by Chinese cyber warfare units. In 2023 IEEE 3rd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA) (pp. 359-364). IEEE.
    • Mohamed, N., Taherdoost, H., & Madanchian, M. (2024). Comprehensive Review of Advanced Machine Learning Techniques for Detecting and Mitigating Zero-Day Exploits. EAI Endorsed Transactions on Scalable Information Systems, 11(6).
    • Mohamed, N., Rao, L. S., Sharma, M., & Shukla, S. K. (2023, May). In-depth review of integration of AI in cloud computing. In 2023 3rd international conference on advance computing and innovative technologies in engineering (ICACITE) (pp. 1431-1434). IEEE.
    • Mohamed, N., Oubelaid, A., & Almazrouei, S. (2023). Staying ahead of threats: a review of ai and cyber security in power generation and distribution. International Journal of Electrical and Electronics Research, 11(1), 143-147.
    • Mohamed, N., Awasthi, M. A., Kulkarni, N., Thota, S., Singh, M., & Dhole, S. V. INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING.
    • Jomah, O. S., Mohamed, N., Ahmed, A. A., Alsharif, A., Khaleel, M. M., & Nassar, Y. F. (2024, May). Simulating photovoltaic emulator systems for renewable energy analysis. In 2024 IEEE 4th International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA) (pp. 296-299). IEEE.
    • Taherdoost, H., Mohamed, N., & Madanchian, M. (2024). Navigating Technology Adoption/Acceptance Models. Procedia Computer Science, 237, 833-840.
Dr. Nachaat Abdelatif Ali Mohamed
An error has occurred. This application may no longer respond until reloaded. Reload 🗙