Muhamad Felemban

Assistant Professer
Computer Engineering Department
KFUPM, Saudi Arabia
Office # 22-214
Phone# (013) 860 - 2940
Personal page

Publications [scholar] [dblp]

  1. Muhamad Felemban, Emad Felemban, Jason Kobes, Arif Ghafoor, "Threat Management in Data-Centric IoT-Based Collaborative Systems". To appear in ACM Transactions on Internet Technology (ACM ToIT). [Q2, IF=1.727]
  2. A. Elgabli, Muhamad Felemban and V. Aggarwal, "GiantClient: Video HotSpot for Multi-User Streaming". To appear in IEEE Transactions on Circuits and Systems for Video Technology (IEEE TCSVT). [Q1, IF=3.558]
  3. Arshad, M.U., Muhamad Felemban, , Pervaiz, Z., Ghafoor, A. and Aref, W.G. "A Privacy Mechanism for Access Controlled Graph Data". To appear IEEE Transactions on Dependable and Secure Computing (IEEE TDSC). [Q1, IF=4.410]
  4. Muhamad Felemban, Saleh Basalamah, and Arif Ghafoor. " A distributed cloud architecture for mobile multimedia services" IEEE Network, 2013. [Q1, IF=7.197]
  5. Mukhtar Ghaleb, Emad  Felemban, Adil Sheikh, Muhamad Felemban. "Design and Performance Analysis of Underwater Acoustic Sensor Networks"Journal of Computational and Theoretical Nanoscience, 2017.


  1. Muhamad Felemban, Basem Shihada, and Kamran Jamshaid. "Optimal node placement in underwater wireless sensor networksAdvanced Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on
  2. Muhamad Felemban, and Emad Felemban. "Energy-delay tradeoffs for underwater acoustic sensor networksCommunications and Networking (BlackSeaCom), 2013 First International Black Sea Conference on. IEEE, 2013.
  3. Sheikh, Adil A., Emad Felemban, Muhamad Felemban, and Saad B. Qaisar. "Challenges and opportunities for underwater sensor networks." In Innovations in Information Technology (IIT), 2016 12th International Conference on.


  1. Muhamad Felemban. "Design and Evaluation of Adaptive Intrusion Management Systems for Database Systems". PhD Thesis, August 2018
  2. Muhamad Felemban. "Optimal Node Placement in Underwater Acoustic Sensor Network". MS Thesis, 2011

Technical Reports/arXiv Papers (Non-peer reviewed):

  1. Muhamad Felemban, Yahya Javeed, Jason Kobes, Thamir Qadah, Arif Ghafoor, Walid Aref.  "Design and Evaluation of a Data Partitioning-Based Intrusion Management Architecture for Database Systems", arXiv:1809.10998v1.
  2. Anis Elgabli, Muhamad Felemban, Vaneet Aggarwal.  "GroupCast: Preference-Aware Cooperative Video Streaming with Scalable Video Coding", arXiv:1809.10998v1.
  3. Abdulrahman Almutairi, Muhammad Felmban and Arif Ghafoor. "Risk-Aware Sensitive Properties Driven Resource Management in Cloud Datacenter". CERIAS Tech. Report, 2015.


  1. Adaptive Intrusion Management System (AIMS I): Towards Attack-Resilient DBMS. [T1,N1]
  2. Adaptive Intrusion Management System (AIMS II): Developing Benchmarking for Malicious Transaction Workload. [T1,N1]
  3. Adaptive Threat Management (ATM) for Cyber-Physical Systems. [T1]
  4. Optimized Robust Video Streaming in Cellular Network [J1,N2].
  5. ​Risk-Resilient Resource Management in Cloud Computing. [J2]
  6. ​Security and Privacy Preserving Data Mining and Management for Distributed Domains. [J1,N3]
  7. CoralSense: Underwater Acoustic Network. [T2,J3,C1,C2,C3]


"Data Protection and Data Science", October 2018, Sharqiya Data Geeks

"Machie Learning for Cyber Security", October 2018, Invited talk Wasla Tach @ Saudi Aramco EXPEC

"Adaptive Intrusion Management for Database Management Systems", Novemebr 2018 and February 2019, Invited talk for COE Graduate Seminar Course, KFUPM

"Data Driven Security", December 2018, Invited talk, IEEE Saudi Arabia Section, Khobar Saudi Arabia.


COE 445: Internet Information Services Spring2019
ISE361: Fundemental of Database Systems Fall2018 Spring2019
ICS103: Computer Programming Spring2011


Yousef Ali, MS Thesis Committee member.

Mohammed Al-Bejadi, Undergradaute student.