Dr Nader Sohrabi Safa

Dr Nader Sohrabi Safa

Senior Lecturer in Cyber Security

  • Email address N.SohrabiSafa@wlv.ac.uk
  • Phone number 01902 321000
  • Location School of Mathematics and Computer Science
  • Faculty Faculty of Science and Engineering
  • Institute School of Mathematics and Computer Science
  • Areas of expertise

    Information Security and Privacy Protection

Dr Nader Sohrabi Safa is a Senior Lecturer in Cyber Security in the School of Mathematics and Computer Science, Faculty of Engineering, University of Wolverhampton; he is member of Cyber Security Research Institute. Nader has five years Postdoctoral experience in cyber security in Nelson Mandela Metropolitan University in South Africa, and Cyber Security Centre, WMG, University of Warwick. He was a lecturer in Coventry University before joining University of Wolverhampton. His academic experience and 15 years industry experience in the field of Computer Science and cyber security have provided a strong background for his work. He has participated in several large scale projects such as PETRAS, Data Protection in Industry, Human Aspects of Information Security, and so on.  He is member of editorial board and reviewer in several well-known journals in the domain of cyber security. He also is PC member and organizer of several international conferences every year.

I am teaching:

  • Internet of Thing Security
  • Malware Analysis
  • Cyber Threats Intelligent
  • Incident Management and Response
  • Cybersecurity Architecture and Operations
  • Information Assurance
  • Ethical Hacking

I am interested in research that mitigate risks on information assets, and protect privacy. My research interests have been formed during last several years when I engaged with different projects such as PETRAS, Data Protection in Industry, Human Aspects of Cyber Security, and so on. PETRAS is about privacy, security, and trust in the Internet of Things (IoT) in both technical and human aspects. In another project in South Africa I worked on human aspects of cyber security which covers “insider threats in organizations”, “complying with organizational information security policies and procedures”, “conscious care behaviour in organizations to mitigate the risk of information security breaches”, and so on. In summary, I am interested in these subjects:

Security by Design

Security as a Service

Privacy Enhancing Technologies (PETs)

Bring Your Own Key (BYOK)

Malware Analysis and Detection by Deep Learning and Reinforcement Learning

Ransomware, Spyware, and Botnet Detection and Prevention

Bots Detection in Social Networks

Detection of Fake Profiles in Social Networks / on the Internet

Detection of Fake Reviews in e-Commerce Websites (Amazon, eBay, and so on)

Cyber Terrorism Detection

Cyber Crime Detection

Cyber Bulling

Network Security

Human Aspects of Cyber Security

Trust Protection on the Internet

Senior Fellow of Higher Education Academy (SFHEA)

Member of IFIP TC 11 Working Group 12



PhD in Information Sytems

Postdoctoral in Information Security and Privacy Protection (5 years)

Postgraduate in Academic Practice in higher Education

  1. Chatrabgoun, O., Daneshkhah, A., Safa, N. S., Esmaeilbeigi, M., Alenezi, A. H., & Rahman, A. (2022). Predicting Primary Sequence-Based Protein-Protein Interactions Using a Mercer Series Representation of Nonlinear Support Vector Machine. IEEE Access, 10, 124345-124354. doi:10.1109/ACCESS.2022.3223994

  2. Safa, et al., Privacy Enhancing Technologies (PETs) for Connected Vehicles in Smart Cities. Transactions on Emerging Telecommunications Technologies, 2021 (impact factor: 1.59)
  3. Sookhak, M., Jabbarpour, M. R., Safa, N. S., & Richard Yu, F. (2021). Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues. Journal of Network and Computer Applications, 102950. doi:https://doi.org/10.1016/j.jnca.2020.102950 (impact factor:5.57)
  4. Safa, et al., A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities. Computers & Security, 2021. 100: p. 102078. (impact factor: 3.57)
  5. Safa, N. S., Maple, C., Furnell, S., Azad, M. A., Perera, C., Dabbagh, M., & Sookhak, M. (2019). Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems, 97, 587-597. doi:https://doi.org/10.1016/j.future.2019.03.024 (impact factor: 6.12)
  6. Dabbagh, M., Sookhak, M. & Safa, N. S. 2019. The Evolution of Blockchain: A Bibliometric Study. IEEE Access, 7, 19212-19221024 (impact factor: 4.9).
  7. Aqra, I., Abdul Ghani, N., Maple, C., Machado, J., & Sohrabi Safa, N. (2019). Incremental Algorithm for Association Rule Mining under Dynamic Threshold. Applied Sciences, 9(24), 5398. (impact factor: 2.21)
  8. Butt, S. A., Jamal, T., Azad, M. A., Ali, A., & Safa, N. S. (2019). A multivariant secure framework for smart mobile health application. Transactions on Emerging Telecommunications Technologies, 0(0), e3684. doi:10.1002/ett.3684 (impact factor: 1.59)
  9. Safa, N. S., Maple, C., Haghparast, M., Watson, T., Dianati, M. (2018). An Opportunistic Resource Management Model to Overcome Resource-Constraint in the Internet of Things, Concurrency and Computation: Practice and Experience (impact factor: 1.44)
  10. Safa, N.S., Maple, c., Watson, T., (2018), Motivation and opportunity based model to reduce information security insider threats in organisations, Journal of Information Security and Applications (IF:2.32)
  11. Safa, N.S., Maple, c., Watson, T., Furnell, S. (2018), Information Security Collaboration Formation in Organisations, IET Information Security (impact factor: 1.06)
  12. Sookhak, F. Richard Yu, Safa N.S. , Ying He, (2017). Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing. IEEE Vehicular Technology Magazine (impact factor: 7.9)
  13. Kamarudin, M. H., Maple, C., Watson, T., & Safa, N. S. (2017). A LogitBoost-based Algorithm for Detecting Known and Unknown Web Attacks. IEEE Access, PP(99). doi:10.1109/ACCESS.2017.2766844 (impact factor: 4.9)
  14. Kamarudin, M.H., Maple, C., Watson, T., et al., 'A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks', Security and Communication Networks, 2017, 2017, p. 18 (impact factor: 1.06)
  15. Safa, N. S., Von Solms, R., (2016). Information Security knowledge sharing formation in Organizations. Computers in Human behavior (impact factor: 5.03)
  16. Safa, Nader Sohrabi, Solms, Rossouw Von, & Furnell, Steven (2016). Information security policy compliance model in organizations. Computers & Security. (impact factor: 3.57)
  17. Safa, N. S., Solms, R. v., & Futcher, L. (2016). Human aspects of information security in organisations. Computer Fraud & Security, 2016(2), 15-18. doi: http://dx.doi.org/10.1016/S1361-3723(16)30017-3
  18. Safa, Nader Sohrabi, Sookhak, Mehdi, Von Solms, Rossouw, Furnell, Steven, Ghani, Norjihan Abdul, & Herawan, Tutut. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53(0), 65-78. doi: http://dx.doi.org/10.1016/j.cose.2015.05.012. (impact factor: 3.57)
  19. Chiroma, Haruna, Kereem, Sameem Abdul, Safa, Nader Sohrabi, & Herawan, Tutut. (2016). A Review on Artificial Intelligence Methodologies for the Forecasting of Crude Oil Price. Intelligent Automation and Soft Computing. (impact factor: 1.27)
  20. Safa, N. S, Norjihan Abdul Ghani and Ismail, M.A (2014), An Artificial Neural Network Classification Approach For Improving Accuracy Of Customer Identification In E-Commerce, Malaysian Journal of Computer Science, 27(3), 171-185 (impact factor: 0.7)
  21. Safa, N. S. and M. A. Ismail (2013). "A customer loyalty formation model in electronic commerce." Economic Modelling 35(0): 559-564. (impact factor: 1.69)
  22. Safa, N. S. and M. A. Ismail (2013). "Investigation on E-trust and E-satisfaction of customers for E-loyalty: The case of Iranian E-commerce." Actual Problems of Economics 139: 492-502
  23. Safa, N. S. and M. A. Ismail (2016). "Customer repurchase intention model in Electronic Commerce." South African Journal of Information Management.

I have worked 15 years in Computer Department of a company and I developed many systems for the organization. I wrote my first system 22 years ago with COBOL lenguage, and then Fox Pro, C++, Borland C; I developed many systems for the company with Visual C, Dot Net, and SQL. The security by design, encryption of important data, access control in the system, security of the data bases, monitoring of log files were important parts of my work.