Default profile
+ 0User Rating

Zeeshan Siddiqui, Ph. D.

Primary Affiliation
University Technology Malaysia (UTM), Malaysia
Skudai - Johor


Paper Endorsements
Review Endorsements

Dr. Zeeshan Siddiqui

(Specialized in: Cyber Security & Software Engineering)

) :

* :

. :

+92. 333 2143 118
[email protected]
14th April, 1979 (D.O.B)



PhD in Computer Sciences, University Technology Malaysia (UTM), Malaysia

[2010 – 2014]


M.Sc. in Computer Sciences, Preston University (PU), United States Affiliation

[1999 – 2001]


Postgraduate Certificates & Specialization:

PGC in Database Development using .NET, NED University, Pakistan

[12/2005 – 04/2006]


PGC in Oracle 9i DBA, Oracle University, Pakistan

[07/2004 – 11/2004]


Professional Certifications (on-campus/online):

IBM Cyber Security Specialist, IBM Academic Certification Track, IBM MEA University(on-campus)


[Scheduled in May ‘14]


Cryptography by Dan Boneh, Stanford University, UK (online)



VR-Forces, by VT-MAK (on-campus)




Arena Process Modeler, Defense Process Modeling (on-campus)




The Basics of LMS (on-campus)




Microsoft Academic Program Certificate, Cloud Computing Boot Camp, Microsoft (on-campus)




IBM DB2 V. 9.7 (on-campus)




IBM Jazz & Rational Team Concert (on-campus)




IBM Quality Driven Software Delivery (on-campus)




IBM Requirements Definition & Management (on-campus)





Database Development using .Net, NED University, Pakistan (on-campus)




Oracle 9i Database Master [Fundamental – I/II, Performance Tuning, SQL], Oracle University, Pakistan (on-campus)



Teaching Areas:

Software & Web Engineering, Database Management Systems, Information & Cyber Security, Logic of Authentication, Information Systems, Military & Defense Middleware Solutions, Semantic Web, Service Oriented Architecture, Enterprise Architectures


Taught Subjects/Courses (BS/MS):

Web Application Development (SWE-381), Advanced Web Application Development (SWE-481), Introduction to Software Engineering (SWE-211), Human Computer Interaction (SWE-482), Information System Analysis & Design (IS-240), Database Designing (CSC-306), Selected Topics in Information Systems (IS-591)


Industrial Trainings (Employee/Partner Training Program (C4ICAS)):

Information & Cyber Security Challenges, Remote User Authentication & Security (Logic of Authentication), Digital Cyber Security, Military & Defense Middle-ware Solutions


Graduation Project Supervision (BS/MS):

C2 Video Surveillance

[MS Thesis]

[Spring 2014]


Multifactor Smartphone Vehicle Authentication

[BS Thesis] – Bahria University (External Student)



[Spring/Fall 2014]


Event Management System 

[MS Thesis]


[Fall 2013]














Curriculum Development:

Advanced Web Application (SWE-418), advance course content development



Logic of Authentication (industrial training course)



Semantics of Middleware Architectures (industrial training course)




Research Areas:

Information & Cyber Security – Remote User Authentication – Three Factor Authentication Schemes/Protocols/Security Framework/Architectures – Military & Defense C4I/C2 Middleware Architectures – Smartcard and Smartphone Digital Authentication Protocols – Healthcare Information Systems Security and Authentication – Cloud Computing Security


Research Grants & Projects:

“Command & Control (C2) Three Factor Event Management System for e-Government”, 01 year funded project: C4ICAS, April ’14 – Feb ’15, role: Principal Investigator.

[Pending Approval]


[Pending Approval]


“Smart Environment as a Service: Three Factor Clud Based Remote User Authentication for TMIS”,  Dec ’13 – Oct ’14, role: Principal Investigator

[2013 –2014]


“Digital Multimedia Forensics”, 02 years funded project, funded body: National Plan for Science & Technology (NPST), [Highly Recommended Project AAAS (US)], Jan ’14 – Dec ’15, role: Scientific Researcher


[2014 – 2015]


“A Secure e-Qur’an Certification System Integration Audio, Image and Text Watermarking Technologies for Verification of Integrity and Content-Authenticity”, 02 years funded project,, 2014 – 2016, role: Scientific Researcher


[2014 – 2016]


“Framework & Mechanisms for Authentication of Electronic Format of Digital Qur’an”, 01 year funded project, , Jul ’12 – Jun ’13, role: Scientific Researcher


[2012 - 2013]


“Environmental Detection for Digital Audio Forensics”, 06 months  funded project,, Feb ’10 – Aug ’10, role: Researcher




“Online CMS Modules for Research Grants”, 01 year funded project, Oct ’07 – Sep ’08, role: Researcher


[2007 – 2008] 

Research Patents:

Zeeshan Siddiqui, M.K. Khan, “Smart Environment: Systems & Methods for Multi-cloud Three Factor Remote User Authentication using a Smart Phone”, USPTO, Invention Disclosure.


[Submitted: 01/2014]


“Systems & Methods for Battle Field Identification using 3FA on Smart Phones”, USPTO, Inventions Disclosure



“Systems and Methods for Digital Quran Certification Authority”, USPTO, Invention Disclosure





Zeeshan Siddiqui, S.S. Amanullah, “WMW: Web Middleware for C4I Applications Interoperability”, accepted to be published in IEEE CPS Proceedings of International Conference on Computational Science & Computational Intelligence (CSCI ’14), Las Vegas, United States


[Accepted: 2014]


Zeeshan Siddiqui, Muhammad Khurram Khan, “Implementation of ‘Smart Environment as a Service: Three Factor Cloud based User Authentication for Telecare Medical Information System’ ”, pending approval, Journal of Medical Internet Research


[Submitted: 2014]


Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, Abdullah S. Alghamdi, “Smart Environment as a Service: Three Factor Cloud based User Authentication for Telecare Medical Information System”, Journal of Medical Systems, 38 (1): 1-14





Zeeshan Siddiqui, Abdullah S. Alghamdi, “SOA Based C4I Common View Interoperability Model”, Science International Journal, Vol. 26(1), pp. 175-180





Zeeshan Siddiqui, Abdullah S. Alghamdi, “Universal View SOA Architecture Framework, SOA Approach”, Science International Journal, Vol. 26(1), pp. 97-100





Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan & Khalid Alghatbar, “Analysis of Enterprise Service Buses based on Information Security, Interoperability & High-availability using Analytical Hierarchy Process (AHP) method”, International Journal of Physical Sciences, Vol. 6, pp. 35-42





Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan & Abdullah Alghamdi, “Node level Information Security on Common Information Exchange Model (CIEM)”, Science International Journal, Vol. 22(4), pp. 251-258





Zeeshan Siddiqui, Abdul Hanan Abdullah & Muhammad Khurram Khan, “Qualified Analysis b/w ESB(s) using Analytical Hierarchy Process (AHP)”, Second International Conference on Intelligent Systems, Modeling and Simulations (ISMS 2011), Malaysia

[IEEE Computer Society]




Abdullah Alghamdi, Zeeshan Siddiqui, “A Common Interoperability Framework for Defense Architectures, a Semantic Web Approach”. 16th International Conference on Distributed Multimedia System, USA, pp. 149-152






Abdullah Alghamdi, Zeeshan Siddiqui & S.S Amanullah Quadri, “A Common Information Exchange Model for Multiple C4I Architectures”, 12th International Conference on Computer Modeling and Simulations (UKSIM 2010), UK, pp. 538-542

[IEEE Computer Society]




Scientific & Professional Society Memberships:

Technical Committee,International Association of Science and Technology For Development (IASTED) Calgary Alberta, Canada.


Reviewer, Journal of Enterprise Information System (EIS), ISI Impact Factor: 9.25


Reviewer, Journal of Software Engineering & Knowledge Engineering (IJSEKE), ISI Impact Factor: 0.64


Reviewer, Defence Science Journal (DSJ), ISI Impact Factor: 0.34


Reviewer, Journal of Security and Communication Network, ISI Impact Factor: 0.31


Reviewer, Journal of Computers & Electrical Engineering, ISI Impact Factor: 0.97


Honors & Awards:

Research grant awarded by National Plan for Science & Technology (NPST) 




Research grant awarded (KACST)






International Doctoral Fellowship (IDF) Award, UTM, Malaysia – Skudai/Johor Malaysia




Best MS intense thesis award, Preston University, Pakistan




Seminar & Conferences Attended/Participated:

International Conference on Computational Science & Computational Intelligence (CSCI ’14), March 10-13, Las Vegas




Cloud-CON: Integration & Web APIs, online conference, Integration Developer News, Tiburon, CA 12th December



Second International Conference on Intelligent Systems, Modeling & Simulation (ISMS 2011), Kuala Lumpur Malaysia





16th International Conference on Distributed Multimedia Systems, Hyatt Lodge, Oak Brook, Illinois, USA




12th International Conference on Computer Modeling and Simulation (UKSIM 2010), Cambridge University, England








Previous Projects Developed/Supervised: [1999 – 2006]

Student & Staff Web Portal, CMS Website & Portal, Realestate Portal, ERP Solutions, Linguistics Modules, Billing Modules, Accounting Modules, Leave Management System, Utility Management System, Pre-paid Card System, Online Export/Import Management System, Personal Information System, Online Time Table Management System, Online Job Bank


Skills & Expertise:

Oracle 10G/9i/8i Database & Application Server, IBM DB2, MySQL, MS-SQL Server, Analytical Hierarchy Process (AHP), VR-Forces, Arena Process Simulator, Semantic Web, HTML, DHTML, Java-Script, ASP 3.0, PHP, ER-Win, Adobe Photoshop, Adobe Dreamweaver, Adobe Flash, E-Draw 5.0, Microsoft Share Point Server, Joomla CMS, Drupal CMS, Freehand 10.0, Vecta 3D, Ulead Packages, Adobe Dimensions, Swift 3D, Swish 3D, Microsoft Office Suit



      • Normal 97aad6ca2149426f8c3bb84e2e10c59c
        The International Journal of Computer Security is a peer-reviewed, open access journal that publishes original research papers, review articles, and essays related to computer and information system security. Subjects within the scope of the IJCS include analysis of potential vulnerabilities and exploits to hardware and software in local and cloud scenarios, hacking and DOS attack mitigation, preventative strategies, and risk management.