University of East London Homepage


Dr Al-Nemrat, Ameer

Contact details

Position: Lecturer and Programme Leader

Location: Room EBG.22

Telephone: +44 (0) 20 8223 2802

Email: a.al-nemrat@uel.ac.uk

Contact address:

School of Architecture, Computing and Engineering (ACE)
University of East London
4-6 University Way
Beckton
London E16 2RD

Brief biography

Ameer got his PhD from the University of East London in Cybercrime Profiling. He is a research active in the area of cybercrime and digital forensics where he has published research papers in peer-reviewed conferences, internationally reputed journals, and book chapters. Ameer has led a Cybercrime Programme Project which won the “Good Practice Award” from The European Commission under the Leonardo da Vinci scheme which focuses on the teaching and training needs of those involved in vocational education and training.”  

Return to top

Areas of Interest/Summary of Expertise

 

•Cyber Criminal network analysis using data mining techniques
•Cybercrime prevention and detection
•Profiling Cybercrime victims
•Digital Forensics and Stegnography techniques
 

 

Return to top

Teaching: Programmes

MSc Information Security and Computer Forensics

MSc Cyber Crime

Return to top

Teaching: Modules

 SDM026 Seizure and Examination of Computer Forensics (MSc)

SDM025 Computer Security (MSc)

SD3030 Digital Forensics (BSc)

SD3059 InformationSecurity Audit and Assurance (BSc) 

Return to top

Research archive

2012

Edit Books:

Global Security, Safety, and Sustainability & e-Democracy, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, LNICST 99, Springer-Verlag New York Inc. Publish date: August 2012.

“Issues in Cybercrime, Security and Digital Forensics”, Edited by George S Weir & A. Al-Nemrat, University of Strathclyde Publishing, Glasgow  2012. ISBN: 978-0-947649-85-2.

 Conference Papers

C. Benziad; S. Medjadba;  A. Al-Nemrat;  and N. Badache,  “Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks”,  in Proceeding of IEEE  10th International Conference on Embedded and Ubiquitous Computing CSE/EUC 2012, Nicosia, Cyprus.

 F. Amuchie; A. Al-Nemrat; M. Alazab; R. Layton , “Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs”, in proceeding of IEEE 3rd Cybercrime & Trustworthy Computing Workshop, CTC 2012, Sydney, Australia.

 M. Alazab; M. Al Kadiri; S. Venkatraman, and A. Al-Nemrat  “Malicious Code Detection Using Penalized Splines on OPcode Frequency “,  in proceeding of IEEE 3rd Cybercrime & Trustworthy Computing Workshop, CTC 2012, Sydney, Australia.

 M. Aiash; G. Mapp; A. Lasebae; and A. Al-Nemrat,  “Supporting LTE Networks in Heterogeneous Environment using the Y-Comm Framework”, in proceeding of of 4th  International Conference on Networks & Communications (NETCOM-2012), Chennai, India, 2012.

 U. Naeem, A. Tawil, R. Bashroush and A. Al-Nemrat, “Achieving Model Completeness for Hierarchally Structured Activities of Daily Life”, in proceedings of the 2nd International Conference on Pervasive and Embedded Computing and Communication Systems PECCS 2012, Rome, Italy, February 2012.

 N. Ibrahim, A. Al-Nemrat, H. Jahankhani and R. Bashroush, “Sufficiency of Windows Event log as Evidence in Digital Forensics”, in Proceedings of the 7th International Conference on Global Security, Safety & Sustainability (ICGS3), Greece, August 2011.

 D. Gabi and A. Al-Nemrat, “Password Guessing attacks: Analysis and Discovery of Evidence in Computer Forensic Investigation”, in proceedings of the 2nd International Conference on Cybercrime, Security and Digital Forensics”  CYFOR-12 London, UK, May 2012.

 F. Amuchie and A. Al-Nemrat, “Statistical Analysis on Cybercrime Detection: The application of Authorship Attribution Techniques to Chat log from Forensics Perspective”, in proceedings of the 2nd International Conference on Cybercrime, Security and Digital Forensics” CYFOR-12 London, UK, May 2012.

Journal Papers:

R. Mukhtar, A. Al-Nemrat, M.  Alazab, S. Venkatraman and H. Jahankhani “Analysis of Firewall Log Based Detection Scenarios for Evidence in Digital Forensics“. (In press) International Journal of Electronic Security and Digital Forensics, 2012.

R. Alavi,  S. Islam, H. Jahankhani, A. Al-Nemrat, “Analyzing Human Factors for an Effective Information Security Management System”, International Journal of Secure Software Engineering (IJSSE), Special Issue on Cyber security, IGI Global publication.

 2011

Jahankhani H.; Al-Nemrat A., “Cybercrime Profiling and Trends Analysis”, in Babak A.; Yates S. (Ed.) “Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime". PP 181-195, 1st Edition, Springer, 2011 London.

 Al-Nemrat A.; Jahankhani H.; & Bashroush R., “The Impact of awareness of cybercrime Law in reducing cybercrime”, 1st International Conference on Cybercrime, Security and Digital Forensics (CSDF). Glasgow 2011.

 R. Bashroush, A. Al-Nemrat, M. Bachrouch and H. Jahankhani, “Visualizing Variability Models Using Hyperbolic Trees”, 23rd International Conference on Advanced Information Systems Engineering (CAiSE 2011), London, June 2011.

 Al-Nemrat A.; Jahankhani H.; & Bashroush R., “The Impact of awareness of cybercrime Law in reducing cybercrime”, in Weir G. (Ed.)”cyberforensics: issues and Perspectives”. PP 223-228, 1st Edition, University of Strathclyde Publishing. Glasgow, 2011

 Al-Nemrat A.; Jahankhani, H.; Mukhtar R.; Alazab M.; Venkatraman S. (2011),  “Analysis of firewall log based detection models for evidence in digital forensics”, In the proceeding of the “International Journal of Electronic Security and Digital Forensics (IJESDF), London, Sep 2011

 R. Bashroush, A. Al-Nemrat and M. Bachrouch, “Case Study: Using ADLARS to Design and Develop a Real-Time Network Emulator”, International Conference on Information and Communication Systems (ICICS 2011), Jordan, May 2011. http://www.just.edu.jo/~myradaideh/icics.pdf

 Askerniya I.;Jahankhani H.; Sin wee Lee & Al-Nemrat A. “Education, Training and Awareness (ETA) Four Dimensional cybercrime prevention model”, Kaspersky: ”International student conference on computer security issues “IT security for the new generation””. Erfurt, Germany. Jan 2011. http://www.kaspersky.com/view.html?id=72

 2010

 Journal paper:

 Jahankhani H. &  Al-Nemrat A.  (2010) ‘Examination of Cybercriminal Behaviour’, International Journal of Information science and Management. Special Issue ,PP 41-48.

 Book Chapter:

 Jahankhani H.  & Al-Nemrat A. (2010) ‘ Cybercrime’, In Jahankhani H. et al (ed.) ‘Handbook of Electronic Security and Digital Forensics’ World Scientific, London.

 Conference Paper:

 Al-Nemrat A.; Jahankhani H. & Preston D.  (2010) ‘Cybercrime Victimisation/Criminalisation and Punishment’, Communications in Computer and Information Science, 1, Volume 92, Global Security, Safety, and Sustainability, Pages 55-62

 Jahankhani H. &  Al-Nemrat A.  (2010) ‘Examination of Cybercriminal Behaviour’, 4th International Conference on E-Commerce with focus on Developing Countries, Kuala Lumpur, Malaysia

 Jahankhani H. &  Al-Nemrat A. (2008) “ Global E-Security”, Communications in Computer and Information Science, 1, Volume 12, Part 1, Pages 3-9

Return to top

Other scholarly activities

Guest editor of the special issue of the International Journal of Electronic Security and Digital Forensics (IJESDF).

 

Return to top

Navigation menus:

Site-wide menu


Information for screenreader users:

For a general description of these pages and an explanation of how they should work with screenreading equipment please follow this link: Link to general description

For further information on this web site’s accessibility features please follow this link: Link to accessibility information