Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Muhammad Khurram Khan

Founder & CEO at Global Foundation for Cyber Studies and Research

Washington DC, United States

Muhammad Khurram Khan is currently working as a Professor of Cybersecurity at the Center of Excellence in Information Assurance (CoEIA), King Saud University, Kingdom of Saudi Arabia. He is one of the founding members of CoEIA and has served as Manager R&D from March 2009 until March 2012. He, along with his team, developed and successfully managed Cybersecurity research program at CoEIA, which turned the center as one of the best centers of excellence in Saudi Arabia and in the region. He is founder and CEO of the ‘Global Foundation for Cyber Studies and Research’ (http://www.gfcyber.org), an independent, non-profit, and non-partisan cybersecurity think-tank registered in Washington D.C.

Prof. Khurram is the Editor-in-Chief of a well-reputed International journal ‘Telecommunication Systems’ published by Springer-Nature for over 26 years with its recent impact factor of 1.707 (JCR 2019). He is the Founding Editor of ‘Bahria University Journal of Information & Communication Technology (BUJICT)’. Furthermore, he is the editor of several international journals, including, IEEE Communications Surveys & Tutorials, IEEE Communications Magazine, IEEE Internet of Things Journal, IEEE Transactions on Consumer Electronics, Journal of Network & Computer Applications (Elsevier), IEEE Access, IEEE Consumer Electronics Magazine, PLOS ONE, Electronic Commerce Research, IET Wireless Sensor Systems, Journal of Information Hiding and Multimedia Signal Processing, and International Journal of Biometrics, etc. He has also played role of the guest editor of several international journals of IEEE, Springer, Wiley, Elsevier Science, and Hindawi. Moreover, he is one of the organizing chairs of more than 5 dozen international conferences and member of technical committees of more than 10 dozen international conferences. In addition, he is an active reviewer of many international journals as well as research foundations of Switzerland, Italy, Saudi Arabia and Czech Republic.

Prof. Khurram is an honorary Professor at IIIRC, Shenzhen Graduate School, China and an adjunct professor at Fujian University of Technology, China. He has secured an outstanding leadership award at IEEE international conference on Networks and Systems Security 2009, Australia. He has been included in the Marquis Who’s Who in the World 2010 edition. Besides, he has received certificate of appreciation for outstanding contributions in ‘Biometrics & Information Security Research’ at AIT international Conference, June 2010 at Japan. He has been awarded a Gold Medal for the ‘Best Invention & Innovation Award’ at 10th Malaysian Technology Expo 2011, Malaysia. Moreover, in April 2013, his invention has got a Bronze Medal at '41st International Exhibition of Inventions' at Geneva, Switzerland. In addition, he was awarded best paper award from the Journal of Network & Computer Applications (Elsevier) in Dec. 2015. Prof. Khurram is the recipient of King Saud University Award for Scientific Excellence (Research Productivity) in May 2015. He is also a recipient of King Saud University Award for Scientific Excellence (Inventions, Innovations, and Technology Licensing) in May 2016.

He has published more than 360 papers in the journals and conferences of international repute. In addition, he is an inventor of 10 US/PCT patents. He has edited 9 books/proceedings published by Springer-Verlag, Taylor & Francis and IEEE. He has secured several national and international competitive research grants with an amount of over USD 3 Million in the domain of Cybersecurity. Prof. Khurram has played a leading role in developing 'BS Cybersecurity Degree Program' and 'Higher Diploma in Cybersecurity' at King Saud University. In 2019, he has played an instrumental role as a cybersecurity subject expert for a USD 6 Million series B investment in a South Korean startup ‘SecuLetter’, which has received a corporate valuation of USD 38 Million.

His research areas of interest are Cybersecurity, digital authentication, IoT security, biometrics, multimedia security, cloud computing security, cyber policy, and technological innovation management. He is a fellow of the IET (UK), fellow of the BCS (UK), fellow of the FTRA (Korea), senior member of the IEEE (USA), senior member of the IACSIT (Singapore), member of the IEEE Consumer Electronics Society, member of the IEEE Communications Society, member of the IEEE Computers Society, member of the IEEE Technical Committee on Security & Privacy, member of the IEEE IoT Community, member of the IEEE Smart Cities Community, and member of the IEEE Cybersecurity Community. He is also the Vice Chair of IEEE Communications Society Saudi Chapter. He is a distinguished Lecturer of the IEEE (CESoC). His research has been cited over 11,500 times with h-index 60 (Google Scholar).

Available For: Authoring, Consulting, Influencing, Speaking
Travels From: Saudi Arabia and USA
Speaking Topics: Cybersecurity, Cyber Policy, Security and Privacy, IoT Cybersecurity, 5G Cybersecurity, Leadership

Muhammad Khurram KhanPoints
Academic110
Author63
Influencer36
Speaker43
Entrepreneur305
Total557

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Business Unit: Cyber
Media Experience: 20
Last Media Interview: 05/16/2020

Areas of Expertise

5G 31.87
Blockchain 39.38
Cloud 30.27
Cybersecurity 79.74
Entrepreneurship 34.61
Health and Safety 30.56
Innovation 34.74
IoT 83.08
Leadership
Privacy 97.45
Startups 39.13

Industry Experience

Federal & Public Sector
Higher Education & Research
Other

Please signin or signup to view publication section.

Publications

2 Academic Awards
King Saud University Award for Scientific Excellence (Inventions, Innovations, and Technology Licensing Prize)
King Saud University Award for Scientific Excellence (Inventions, Innovations, and Technology Licensing Prize)
May 16, 2016
King Saud University Award for Scientific Excellence (Inventions, Innovations, and Technology Licensing Prize), 16 May 2016

See publication

Tags: Cybersecurity, IoT, Privacy

King Saud University Award for Scientific Excellence (Research Productivity)
King Saud University Award for Scientific Excellence (Research Productivity), 19 May 2015
May 19, 2015
King Saud University Award for Scientific Excellence (Research Productivity), 19 May 2015

See publication

Tags: Cybersecurity, IoT, Privacy

3 Academic Fellow / Scholars
Fellow of the Institution of the Engineering and Technology
IET
May 15, 2014

See publication

Tags: Cybersecurity, IoT, Privacy

Fellow of the British Computer Society
British Computer Society UK
May 15, 2014

See publication

Tags: Cybersecurity, IoT, Privacy

Fellow of the FTRA (Korea)
Fellow of the FTRA (Korea)
May 15, 2014

See publication

Tags: Cybersecurity, IoT, Privacy

3 Article/Blogs
Proof of X-Repute Blockchain Consensus Protocol for IoT Systems
Computers and Security
August 01, 2020

See publication

Tags: Blockchain, Cybersecurity, Privacy

Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC
IEEE Systems Journal
April 30, 2020

See publication

Tags: Cloud, Cybersecurity, Privacy

DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain
IEEE Transactions on Information Forensics & Security
January 01, 2020

See publication

Tags: Cloud, Cybersecurity, Privacy

1 Book
Research, Innovation and Entrepreneurship in Saudi Arabia: Vision 2030
Taylor and Francis UK
April 24, 2020

See publication

Tags: Entrepreneurship, Innovation, Startups

1 Founder
Global Foundation for Cyber Studies and Research
www.gfcyber.org
January 25, 2019
‘Global Foundation for Cyber Studies and Research’ (http://www.gfcyber.org), an independent, non-profit, and non-partisan cybersecurity think-tank in Washington D.C USA. GFCyber conducts world-class research, consults cybersecurity organizations (public and private sector), and helps cybersecurity startups/companies in their strategic mission of R&D and growth.

See publication

Tags: Blockchain, Cybersecurity, Privacy

5 Industry Awards
Awarded Bronze Medal at 41st International Exhibition of Inventions Geneva, Switzerland
Awarded Bronze Medal at 41st International Exhibition of Inventions at Geneva, for the invention "Detecting Counterfeit Money using RFID-enabled Smart
April 10, 2013
Awarded Bronze Medal at 41st International Exhibition of Inventions at Geneva, for the invention "Detecting Counterfeit Money using RFID-enabled Smart Phone", Geneva, Switzerland, 10-14 April 2013

See publication

Tags: Cybersecurity, IoT, Privacy

Awarded Bronze Medal at 41st International Exhibition of Inventions at Geneva, for the invention, Geneva, Switzerland, 10-14 April 2013
Awarded Bronze Medal at 41st International Exhibition of Inventions at Geneva, for the invention "Detecting Counterfeit Money using RFID-enabled Smart
April 10, 2013
Awarded Bronze Medal at 41st International Exhibition of Inventions at Geneva, for the invention "Detecting Counterfeit Money using RFID-enabled Smart Phone", Geneva, Switzerland, 10-14 April 2013

See publication

Tags: Cybersecurity, IoT, Privacy

Awarded Gold Medal at 10th Malaysia Technology Expo 2011, Kuala Lumpur, Malaysia
Awarded Gold Medal at 10th Malaysia Technology Expo 2011, Kuala Lumpur, Malaysia
February 15, 2011
Awarded Gold Medal at 10th Malaysia Technology Expo 2011, Feb. 2011, Kuala Lumpur, Malaysia, for the best invention & innovation award

See publication

Tags: Cybersecurity, IoT, Privacy

 Awarded Certificate for Outstanding Contributions in Biometrics & Information Security Research, AIT Conference 2010, June 2010, Japan
 Awarded Certificate for Outstanding Contributions in Biometrics & Information Security Research, AIT Conference
June 02, 2010
Awarded Certificate for Outstanding Contributions in Biometrics & Information Security Research, AIT Conference 2010, June 2010, Japan

See publication

Tags: Cybersecurity, IoT, Privacy

Outstanding Leadership Award, IEEE 3rd NSS Conference, Australia
Outstanding Leadership Award, IEEE 3rd NSS Conference, October, 2009, Australia
October 08, 2009
Outstanding Leadership Award, IEEE 3rd NSS Conference, October, 2009, Australia

See publication

Tags: Cybersecurity, IoT, Privacy

8 Journal Publications
A lightweight Remote User Authentication Scheme for IoT Communication using Elliptic Curve Cryptography
Journal of Supercomputing, Springer
May 07, 2020
“A lightweight Remote User Authentication Scheme for IoT Communication using Elliptic Curve Cryptography”, Journal of Supercomputing, Springer, 2020

See publication

Tags: Cybersecurity, IoT, Privacy

Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC
IEEE Systems Journal
May 04, 2020


See publication

Tags: Cybersecurity, IoT, Privacy

EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System
ACM Transactions on Internet Technology
April 30, 2020

See publication

Tags: Cybersecurity, IoT, Privacy

EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System
ACM Transactions on Internet Technology
April 01, 2020


See publication

Tags: Cybersecurity, IoT, Privacy

Efficient Certificateless Aggregate Signature with Conditional Privacy-preserving in IoV
IEEE Systems Journal
February 25, 2020
"Efficient Certificateless Aggregate Signature with Conditional Privacy-preserving in IoV”, IEEE Systems Journal, Jan. 2020

See publication

Tags: Cybersecurity, IoT, Privacy

A Novel Authentication and Key-Agreement Scheme for Satellite Communication Network
Transactions on Emerging Telecommunications Technologies, Wiley
February 18, 2020
“A Novel Authentication and Key-Agreement Scheme for Satellite Communication Network”, Transactions on Emerging Telecommunications Technologies, Wiley, Jan. 2020

See publication

Tags: Cybersecurity, IoT, Privacy

DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain
IEEE Trans on Information Forensics and Security
January 27, 2020


See publication

Tags: Cybersecurity, IoT, Privacy

Comprehensive Survey on Big Data Privacy Protection
IEEE Access
December 25, 2019
“Comprehensive Survey on Big Data Privacy Protection", IEEE Acces

See publication

Tags: Cybersecurity, IoT, Privacy

5 Keynotes
Smart Cities: Cyber Threats, Vulnerabilities and Solutions
IEEE Computer Society Saudi Chapter
May 13, 2020

See publication

Tags: Cybersecurity, IoT, Privacy

Cybersecurity in 5G-enabled Vulnerable IoT World
International Conference on Big Data and Security (ICBDS), Nanjing, China
December 21, 2019
International Conference on Big Data and Security (ICBDS), Nanjing, China

See publication

Tags: 5G, Cybersecurity, IoT

Cybersecurity Challenges and Solutions in Hyper-Connected 5G-based IoT Ecosystem
International Conference on Computing (ICC 2019), CCIS Springer, Riyadh, Saudi Arabia
December 10, 2019
International Conference on Computing (ICC 2019), CCIS Springer, Riyadh, Saudi Arabia

See publication

Tags: 5G, Cybersecurity, IoT

Combating Cybersecurity Challenges in Smart Cities
Technical Seminar, IEP Saudi Arabian Center, Al-Khobar
November 21, 2019
Keynote Speech on "Combating Cybersecurity Challenges in Smart Cities", Technical Seminar, IEP Saudi Arabian Center, Al-Khobar, 21 November 2019

See publication

Tags: Cybersecurity, IoT, Privacy

Cybersecurity in the 5G-connected IoT World: Recent Developments and Future Trends
12th International Symposium on Information Processing (ISIP), Shanghai, China
October 26, 2019
“Cybersecurity in the 5G-connected IoT World: Recent Developments and Future Trends”, 12th International Symposium on Information Processing (ISIP), Shanghai, China, 26-27 October 2019

See publication

Tags: Cybersecurity, IoT, Privacy

10 Media Interviews
Employees lack cyber protection amid working from home boom
Arab News
May 16, 2020

See publication

Tags: Cybersecurity, IoT, Privacy

Experts warn against vulnerabilities of apps, videoconferencing platforms
Arab News
April 12, 2020

See publication

Tags: Cybersecurity, IoT, Privacy

Criminals exploit COVID-19 fears to launch ‘unprecedented wave’ of global cyberattacks
Arab News
March 28, 2020

See publication

Tags: Cybersecurity, IoT, Privacy

Cyber experts advise users to be cautious while using mobile apps
Arab News
February 17, 2020

See publication

Tags: Cybersecurity, IoT, Privacy

The Fourth Industrial Revolution is coming to the Middle East
Arab News
February 09, 2020

See publication

Tags: Cybersecurity, IoT, Privacy

Saudi Arabia ‘a prime target for hackers,’ cyber experts warn
Arab News
September 08, 2019

See publication

Tags: Cybersecurity, IoT, Privacy

Saudis warned against using FaceApp
Arab News
July 18, 2019

See publication

Tags: Cybersecurity, IoT, Privacy

Saudi Arabia’s war against hackers
Arab News
April 17, 2019

See publication

Tags: Cybersecurity, IoT, Privacy

Saudi Arabia in the crosshairs as cyber-raids target Gulf
Arab News
February 15, 2019

See publication

Tags: Cybersecurity, IoT, Privacy

Saudi university to establish biometric security research laboratory
Arab News
January 19, 2018

See publication

Tags: Cybersecurity, IoT, Privacy

1 Panel
Fostering a Safer Cyberspace for Children
T20 Webinar on COVID-19 Disruption, Digital Transformation & Digital Divide: The Educational & Vocational Challenges & Opportunities, G20 Presidency
May 20, 2020
T20 Webinar on COVID-19 Disruption, Digital Transformation & Digital Divide: The Educational & Vocational Challenges & Opportunities, G20 Presidency

See publication

Tags: Cybersecurity, Health and Safety, Privacy

6 Patents
Systems and Methods Improving Cryptosystems with Biometrics
US Patent Office USPTO
November 21, 2017

See publication

Tags: Cybersecurity, Privacy

Face Recognition Using Multilayered Discriminant Analysis
US Patent Office USPTO
May 31, 2016

See publication

Tags: Cybersecurity, Privacy

System and Method for Currency Validation
US Patent Office USPTO
January 13, 2015

See publication

Tags: Cybersecurity, IoT, Privacy

Systems and Methods for Three Factors Authentication
US Patent Office USPTO
October 14, 2014

See publication

Tags: Cybersecurity, IoT, Privacy

One-Time Password Authentication with Infinite Nested Hash Claims
US Patent Office USPTO
March 25, 2014

See publication

Tags: Cybersecurity, IoT, Privacy

Passive Continuous Authentication Method
US Patent Office USPTO
February 25, 2014

See publication

Tags: Cybersecurity, IoT, Privacy

3 Speaking Engagements
Cyber Insecurity: A Stumbling Block for Digital Transformation of SMEs
National Forum on Business Transformation: Opportunities and Challenges, IAU, Dammam, Kingdom of Saudi Arabia
November 30, 2019
"Cyber Insecurity: A Stumbling Block for Digital Transformation of SMEs”, National Forum on Business Transformation: Opportunities and Challenges, IAU, Dammam, Kingdom of Saudi Arabia, 30 November 2019

See publication

Tags: Cybersecurity, IoT, Privacy

Addressing Cybercrime Challenges: Strategies for Capacity & Capability Building
Naif Arab University for Security Sciences, Riyadh, Saudi Arabia
November 19, 2019
"Addressing Cybercrime Challenges: Strategies for Capacity & Capability Building", Cybercrimes and Digital Forensics Forum, Naif Arab University for Security Sciences, Riyadh, Saudi Arabia, 19-21 November 2019

See publication

Tags: Cybersecurity, IoT, Privacy

Combating the Impact of New-age Cybercrime Ecosystem
Taiwan Western Asia Forum on Regional Security and Transnational Crime, Taipei, Taiwan
November 11, 2019
"Combating the Impact of New-age Cybercrime Ecosystem", Taiwan Western Asia Forum on Regional Security and Transnational Crime, Taipei, Taiwan, 11-15 November 2019

See publication

Tags: Cybersecurity, IoT, Privacy

1 Webinar
Cybersecurity in the 5G-connected IoT World: Recent Developments & Future Trends
IEEE Distinguish Lecture
April 18, 2020
IEEE Consumer Electronics Society

See publication

Tags: 5G, Cybersecurity, IoT

Blog

Opportunities

Contact Muhammad Khurram Khan

Media Kit

Share Profile

Contact Info

  Profile

Muhammad Khurram Khan