Skip navigation

Dr Biju Issac

Associate Professor

Department: Computer and Information Sciences

Dr Biju Issac joined Northumbria as an academic staff in September 2018. He is an Associate Professor and the Programme Leader of BSc (Computer Networks and Cyber Security) and BSc (Computer and Digital Forensics). He is the deputy leader of CyberNets (Cybersecurity and Networks) Research Group. He founded Northumbria Cyber Clinic in 2018 that works with NEBRC (led by the police), to secure businesses against cyber attacks.

He had worked as a Computer Science academic staff at Teesside University since July 2012 where he was part of the Machine Intelligence research group and had taught Network and System Administration modules. Prior to that, he worked as a Computer Science academic staff at an Australian University (Swinburne University of Technology) in Malaysia and at Madras Christian College under Madras University in India. He started his job as a project assistant at Indian Institute of Science (IISc), Bangalore in India where he worked on a funded Tomography project. He has done PhD in Networking and Mobile Communications, Master of Computer Applications (MCA) with honours and Bachelor of Engineering (BE) in Electronics and Communication Engineering with first class. He has authored 100+ publications as conference papers, journal papers, book chapters and edited books. He is the Editor in Chief (EiC) of International Journal of Information and Computer Security. 

His personal profile: https://www.bijuissac.com/
University research profile: https://researchportal.northumbria.ac.uk/en/persons/biju-issac

Campus Address:                             
Room ELB120, Ellison Building
Northumbria University
Newcastle upon Tyne
NE1 8ST

Tel: 0191 227 3365
Email Biju

Biju Issac

Campus Address

Room ELB120, Ellison Building
Northumbria University
Newcastle upon Tyne
NE1 8ST

0191 227 3365

His research interests are in networks (wired and wireless), cybersecurity, machine learning applications of text mining, image processing etc., cloud computing optimizations and technology enabled learning.

  • Please visit the Pure Research Information Portal for further information
  • A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization, Neera, J., Chen, X., Aslam, N., Issac, B., O'Brien, E. 1 May 2022, Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022), Setúbal, Portugal, Scitepress
  • An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection, Rafiq, H., Aslam, N., Issac, B., Randhawa, R. 7 Feb 2022, The Sixth IEEE International Workshop on the Security, Privacy, and Digital Forensics of Mobile Systems and Networks (MobiSec 2022)
  • Evaluation of Cyberbullying using Optimized Multi-Stage ML Framework and NLP, Ketsbaia, L., Issac, B., Chen, X. 11 Dec 2021, Defence and Security Doctoral Symposium 2021
  • Preface, Abraham, A., Ohsawa, Y., McLoone, S., Haqiq, A., Issac, B., Jesus, I., Jabbar, M., Gagneja, K., Herrero, Á. 2021, Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), Cham, Switzerland, Springer
  • Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms, Pye, J., Issac, B., Aslam, N., Rafiq, H. Dec 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, Piscataway, IEEE
  • Detecting Spam Email With Machine Learning Optimized With Bio-Inspired Metaheuristic Algorithms, Gibson, S., Issac, B., Zhang, L., Jacob, S. 26 Oct 2020, In: IEEE Access
  • Detection of Hate Tweets using Machine Learning and Deep Learning, Ketsbaia, L., Issac, B., Chen, X. Dec 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Piscataway, NJ, IEEE
  • Phishing Web Page Detection using Optimised Machine Learning, Stobbs, J., Issac, B., Jacob, S. Dec 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Piscataway, NJ, IEEE
  • A Semi-Supervised Learning Approach for Tackling Twitter Spam Drift, Imam, N., Issac, B., Jacob, S. Jun 2019, In: International Journal of Computational Intelligence and Applications
  • Intrusion Detection and Response System Inspired by the Defense Mechanism of Plants, Sharma, R., Issac, B., Kalita, H. 2019, In: IEEE Access

  • Please visit the Pure Research Information Portal for further information
  • Editorial work: International Journal of Information and Computer Security (Journal) 2020
  • Publication Peer-review: Journal of Systems and Information Technology (Journal) 2018
  • Publication Peer-review: IET Wireless Sensor Systems (Journal) 2017
  • Publication Peer-review: IEEE Access (Journal) 2017

  • Rahul Yumlembam Malware Detection Framework using Optimized Adversary Resistant Deep Learning Networks Start Date: 18/01/2021
  • Yousuf Al Kindi Start Date: 01/10/2019 End Date: 01/04/2020
  • Lida Ketsbaia Digital Forensics Investigation of Text Documents using Optimised Deep Learning Techniques. Start Date: 01/10/2019

  • PhD
  • Computer Science MEng
  • Communications Engineering BEng
  • CCNA Cisco Academy Instructor
  • Chartered Engineer
  • Member of IET
  • Senior Member of IEEE

  • Please visit the Pure Research Information Portal for further information
  • Multi-Population Differential Evolution for Retinal Blood Vessel Segmentation. Publication Status: Published 2018
  • Performance Comparison of Intrusion Detection Machine Learning Classifiers on Benchmark and New Datasets. Publication Status: Published 2018
  • Are machine learning based intrusion detection system always secure? An insight into tampered learning. Publication Status: Published 2018
  • Extended LBP based Facial Expression Recognition System for Adaptive AI Agent Behaviour. Publication Status: Published 2018
  • Intelligent Intrusion Detection System Through Combined and Optimized Machine Learning. Publication Status: Published 2018
  • Performance comparison of intrusion detection systems and application of machine learning to Snort system. Publication Status: Published 2018
  • Enhanced cuckoo search algorithm for virtual machine placement in cloud data centres. Publication Status: E-pub ahead of print 2018
  • A Survey on Biometrics and Cancelable Biometrics Systems. Publication Status: Published 2018
  • Online voting system based on image steganography and visual cryptography. Publication Status: Published 2017

Philosophy PhD September 03 2018


a sign in front of a crowd
+

Northumbria Open Days

Open Days are a great way for you to get a feel of the University, the city of Newcastle upon Tyne and the course(s) you are interested in.

Research at Northumbria
+

Research at Northumbria

Research is the life blood of a University and at Northumbria University we pride ourselves on research that makes a difference; research that has application and affects people's lives.

a person sitting at a table
+

Order your prospectus

If you would like to know more about our courses, or life in general as a student at Northumbria, then we can help you.

Latest News and Features

a tall building
a tall building

The Baltic Sessions

Professor David Jones from Newcastle Business School discusses The Baltic Sessions – a series…

ITT
CIS thumbnail
Professor Mike Lim undertaking research in Canada’s Inuit Nunangat. Image credit Weronika Murray
Black-necked spitting cobra
More news

Back to top