Skip navigation

Dr Biju Issac

Associate Professor

Department: Computer and Information Sciences

Dr Biju Issac joined Northumbria as an academic staff in September 2018. He is an Associate Professor and the Programme Leader of BSc (Computer Networks and Cyber Security) and BSc (Computer and Digital Forensics). He is the deputy leader of CyberNets (Cybersecurity and Networks) Research Group. He founded Northumbria Cyber Clinic in 2018 that works with NEBRC (led by the police), to secure businesses against cyber attacks.

He had worked as a Computer Science academic staff at Teesside University since July 2012 where he was part of the Machine Intelligence research group and had taught Network and System Administration modules. Prior to that, he worked as a Computer Science academic staff at an Australian University (Swinburne University of Technology) in Malaysia and at Madras Christian College under Madras University in India. He started his job as a project assistant at Indian Institute of Science (IISc), Bangalore in India where he worked on a funded Tomography project. He has done PhD in Networking and Mobile Communications, Master of Computer Applications (MCA) with honours and Bachelor of Engineering (BE) in Electronics and Communication Engineering with first class. He has authored 100+ publications as conference papers, journal papers, book chapters and edited books. He is the Editor in Chief (EiC) of International Journal of Information and Computer Security. 

His personal profile: https://www.bijuissac.com/
University research profile: https://researchportal.northumbria.ac.uk/en/persons/biju-issac

Campus Address:                             
Room ELB120, Ellison Building
Northumbria University
Newcastle upon Tyne
NE1 8ST

Tel: 0191 227 3365
Email Biju

Biju Issac

Campus Address

Room ELB120, Ellison Building
Northumbria University
Newcastle upon Tyne
NE1 8ST

0191 227 3365

Research Themes and Scholarly Interests

His research interests are in networks (wired and wireless), cybersecurity, machine learning applications of text mining, image processing etc., cloud computing optimizations and technology enabled learning.

Key Publications

  • Please visit the Pure Research Information Portal for further information
  • Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms, Pye, J., Issac, B., Aslam, N., Rafiq, H. Dec 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, Piscataway, IEEE
  • Detecting Spam Email With Machine Learning Optimized With Bio-Inspired Metaheuristic Algorithms, Gibson, S., Issac, B., Zhang, L., Jacob, S. 26 Oct 2020, In: IEEE Access
  • Detection of Hate Tweets using Machine Learning and Deep Learning, Ketsbaia, L., Issac, B., Chen, X. Dec 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Piscataway, NJ, IEEE
  • Phishing Web Page Detection using Optimised Machine Learning, Stobbs, J., Issac, B., Jacob, S. Dec 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Piscataway, NJ, IEEE
  • A Semi-Supervised Learning Approach for Tackling Twitter Spam Drift, Imam, N., Issac, B., Jacob, S. Jun 2019, In: International Journal of Computational Intelligence and Applications
  • Intrusion Detection and Response System Inspired by the Defense Mechanism of Plants, Sharma, R., Issac, B., Kalita, H. 2019, In: IEEE Access
  • Are machine learning based intrusion detection system always secure? An insight into tampered learning, Sharma, R., Kalita, H., Issac, B. 1 Oct 2018, In: Journal of Intelligent and Fuzzy Systems
  • A Survey on Biometrics and Cancelable Biometrics Systems, Choudhury, B., Then, P., Issac, B., Raman, V., Haldar, M. 25 Jan 2018, In: International Journal of Image and Graphics
  • Developing an innovation ecosystem: Policy, skills and operations, Fernandes, K., Goumagias, N., Shukla, M., Oxley, G., Purvis, K., Cabras, I., Xiong, Y., Seddighi, H., Watson, D., Coleman, P., Matthew, S., Issac, B., Mary Jacob, S. 31 May 2018
  • Enhanced cuckoo search algorithm for virtual machine placement in cloud data centres, Barlaskar, E., Singh, Y., Issac, B. 28 Feb 2018, In: International Journal of Grid and Utility Computing

Professional Activity

  • Please visit the Pure Research Information Portal for further information
  • Editorial work: International Journal of Information and Computer Security (Journal) 2020
  • Publication Peer-review: Journal of Systems and Information Technology (Journal) 2018
  • Publication Peer-review: IET Wireless Sensor Systems (Journal) 2017
  • Publication Peer-review: IEEE Access (Journal) 2017

PGR Supervision

  • Rahul Yumlembam Malware Detection Framework using Optimized Adversary Resistant Deep Learning Networks Start Date: 18/01/2021
  • Yousuf Al Kindi Start Date: 01/10/2019 End Date: 01/04/2020
  • Lida Ketsbaia Digital Forensics Investigation of Text Documents using Optimised Deep Learning Techniques. Start Date: 01/10/2019

Qualifications

  • PhD
  • Computer Science MEng
  • Communications Engineering BEng
  • CCNA Cisco Academy Instructor
  • Chartered Engineer
  • Member of IET
  • Senior Member of IEEE

Key Publications

  • Please visit the Pure Research Information Portal for further information
  • Multi-Population Differential Evolution for Retinal Blood Vessel Segmentation. Publication Status: Published 2018
  • Performance Comparison of Intrusion Detection Machine Learning Classifiers on Benchmark and New Datasets. Publication Status: Published 2018
  • Are machine learning based intrusion detection system always secure? An insight into tampered learning. Publication Status: Published 2018
  • Extended LBP based Facial Expression Recognition System for Adaptive AI Agent Behaviour. Publication Status: Published 2018
  • Intelligent Intrusion Detection System Through Combined and Optimized Machine Learning. Publication Status: Published 2018
  • Performance comparison of intrusion detection systems and application of machine learning to Snort system. Publication Status: Published 2018
  • Enhanced cuckoo search algorithm for virtual machine placement in cloud data centres. Publication Status: E-pub ahead of print 2018
  • A Survey on Biometrics and Cancelable Biometrics Systems. Publication Status: Published 2018
  • Online voting system based on image steganography and visual cryptography. Publication Status: Published 2017

Qualifications

Philosophy PhD September 03 2018


a sign in front of a crowd
+

Northumbria Open Days

Open Days are a great way for you to get a feel of the University, the city of Newcastle upon Tyne and the course(s) you are interested in.

Research at Northumbria
+

Research at Northumbria

Research is the life blood of a University and at Northumbria University we pride ourselves on research that makes a difference; research that has application and affects people's lives.

a person sitting at a table
+

Order your prospectus

If you would like to know more about our courses, or life in general as a student at Northumbria, then we can help you.

Latest News and Features

More news

Back to top