Writtle University College and ARU have merged. Writtle’s full range of college, degree, postgraduate and short courses will still be delivered on the Writtle campus. See our guide to finding Writtle information on this site.

Dr Shareeful Islam

Associate Professor
Faculty of Science and Engineering
Computing and Information Science
Areas of Expertise:
Cybersecurity and Networking
Research Supervision:

Shareeful's research focuses on the leading edge relating to cyber security, risk management, threat modelling, healthcare informatics and AI enabled security solutions. He was recently awarded an EU HORIZON-CL3-2022-CS-01 (Increased cybersecurity 2022) bid, with 14 other member consortium from both industry and academic institutions.

[email protected]

View Shareeful's Google Scholar profile

Connect with Shareeful on LinkedIn


Shareeful is currently Associate Professor in Cyber Security in our School of Computing and Information Science. He was previously visiting professor at the National Institute of Informatics (NII), Japan and visiting researcher SBA research, Austria.

Shareeful's research interests lie in the area of cyber security, risk management, healthcare sector cyber security. He has pioneered work in developing risk assessment and treatment method using business and technical goals for software intensive system. The works are implemented in various application domains including cloud migration, critical infrastructure, and healthcare sector.

He has published more than 85 papers (h-index 27) and he has led and/or participated in projects funded by the European Union (FP7), Innovate UK, FwF, and DAAD. He has experience of acting as evaluator for national and international funding bodies including the EPSRC, FwF, and CHIST-ERA.

Shareeful has successfully completed PRINCE 2 and Management of Risks (MoR) practitioner certifications. He is a fellow of Higher Education Academy and a member of the Cyber Security and Networking Research Group.

Spoken Languages
  • Bengali
  • German
Research interests
  • Cyber Security Risk Management
  • Threat Intelligence
  • Vulnerability Assessment
  • AI enabled Cyber Security
  • Incident Response and Business Continuity
  • Information Security Audit and Assurance
  • Cyber Insurance
Areas of research supervision
  • Looking for potential PhD student. Please look at my publications and research areas before contacting with me
  • Supervised to Timely completion: 8 PhDs and 2 MPhils
  • External PhD Examination: 3
  • Cloud Security Audit and Transparency Framework For Building Enterprise Trust (DoS)
  • Analysis of access provisioning process in an Investment Bank with a view to construct an conceptual IAM model (2nd Supervisor)
  • An Integrated Cyber-Security Risk Management Framework for Critical Infrastructure Protection (DoS)
  • A framework for Sustainability in Information System Audit(2nd Supervisor)
  • A sustainability-driven e-government maturity model from the perspectives of developing countries (DoS)
  • Cyber Security Threat Analysis for the Cyber Supply Chain Organizational Environment (DoS)
  • Modelling And Reasoning About Trust Relationships In The Development Of Trustworthy Information Systems (DoS)
  • Human and Organisational Elements of Information Security Management in British Financial Institutions: a socio-technical approach(DoS)
  • A Migration Framework for Electronic Healthcare Record System into Cloud Computing
  • A Framework for Forensics Enabled Cloud Investigation
Under Supervision
  • A framework for cyber incident analysis to determine the optimized investment for cyber security controls, improving insurability through effective cyber insurance
  • Data-driven Threat Model for Cybersecurity Assurance

Course(s) or module(s) taught at ARU, eg:,

  • Computing Research Methodology
  • Security Management and Operation
  • Penetration Testing
  • Computer Security
  • Post Graduate Certificate Learning and Teaching in Higher Education(PGCert) University of East London(UEL), UK
  • PhD.(Software Development Risk Management Model-a goal-driven approach) Technische Universität München (TUM), Germany
  • MSc. Information Communication System Security Royal Institute of Technology (KTH), Sweden
  • M.Sc. (1st class, 1st position) Computer Science University of Dhaka, Bangladesh
  • B.Sc. (Hon’s) Applied Physics & Electronics University of Dhaka, Bangladesh
Memberships, editorial boards
  • Fellow, Higher Education Academy
  • Member, British Computer Society
  • Guest editor, Security and Privacy in Cloud Computing Environment, Sensor, MDPI, 2023
  • Workshop Chair, RCIS 2023
  • PC member/reviewer: ER2023, AI2023, IEEE Access, Computer and Security, REJ, etc
  • Reviewer, Engineering and Physical Sciences Research Council (EPSRC): 2016, 2018, 2020, 2021, 2022
  • Reviewer, UKRI Future Leaders Fellowships, Innovate UK, 2021
  • Reviewer, Austrian Science Fund (FwF), 2000
  • Reviewer, CHIST-ERA Call 2015 and 2016 (User-Centric Security, Privacy and Trust in the IoT)
Research grants, consultancy, knowledge exchange
  • An advanced Virtual Reality based intrusion detection, incident investigation and response approach for enhancing the resilience, security and privacy of complex and heterogeneous digital infrastructures(CyberSecDome) (2023-26). EU HORIZON-CL3-2022-CS-01 - Increased cybersecurity-IA, 101120779
  • A Dynamic and Self-Organized Artificial Swarm Intelligence Solution for Security and Privacy Threats in Healthcare ICT Infrastructures (AI4HEALTHSEC) (2020-23). EU H2020- research and innovation
  • An Intelligence Vulnerability Management (i-VulMan) Platform(2022) Innovate UK, CyberASAP 6
  • An Intelligence Cyber Security Incident Handling(i-CSIH)(2021), Innovate UK, CyberASAP 5
  • A secure intelligence IS using digital technologies and advanced data analytics (2018-2020) Innovative UK , Knowledge Transfer Project(KTP) 010960
  • Decision Framework Model in Cloud Computing with Secure Business Austria (D-Cloud) (2014-16) FWF Austrian Science Fund with www.sba-research.org
Selected recent publications

Total 79 publication (39 journals) with citation 2004 and h-index 26: scholar.google.com/citations?user=IAxS1lsAAAAJ&hl=en.

  • Mouratidis, S. Islam, A. Santos-Olmo, L. E. Sanchez, U. Ismail. Modelling language for cyber security incident handling for critical infrastructures, Computers & Security,  Vol 128,  2023, Elsevier, https://doi.org/10.1016/j.cose.2023.103139, (Impact factor 5.1)
  • S Silvestri , S Islam, S. Papastergiou, C. Tzagkarakis, and M. Ciampi. A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem,  23(2) Sensors 2023, MDPI, (Impact factor 3.84)
  • Islam, A. Abba , u. Ismail, S.  Papastergiou , H. Mouratidis, S. Papastergiou , Vulnerability Prediction for Secure Healthcare Supply Chain Service Delivery, Integrated Computer-Aided Engineering, DOI: 10.3233/ICA-220689, August 2022, (Impact factor 6.13)
  • H. Kure , S. Islam, H. Mouratidis, An integrated cyber security risk management framework and risk predication for the critical infrastructure protection, Neural Computing and Applications,(impact Factor 4.6) doi.org/10.1007/s00521-022-06959-2, 2022
  • MKS Alwaheidi, S Islam, Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems, Sensors 22 (15), 5726, MDPI , https://doi.org/10.3390/s22155726, (Impact factor 3.84)
  • H. Kure , S. Islam, M. Ghazanfar, A. Raza, M.Pasha, Asset Criticality and Risk Prediction for an Effective Cyber Security Risk Management of Cyber Physical System, Neural Computing and Applications, (Impact factor 4.627), Springer, 2021
  • A.Yeboah-Ofori, , S. Islam, S.W. Lee, Z. Sahamzaman, K. Muhammad, M. Altaf, M. Al-Rakhami Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security, IEEE Access, 2021 (Impact factor 3.74)
  • UM Ismail, S Islam , A unified framework for cloud security transparency and audit, Journal of Information Security and Applications, Elsevier, Volume 54, October 2020. (Impact factor 2.327)
  • M. Uddin, S. Islam, A dynamic access control model using authorising workflow and task-role based access control, IEEE Access, 2019 (Impact factor 3.74)
  • H. I. Kure, S. Islam, Cyber threat intelligence for improving cybersecurity and risk management in the critical infrastructure organisation, Journal of Universal Computer Science (J.UC Special Issue on Cyberattack Detection and Response. 2019 (Impact factor 0.91)
  • H. I. Kure, S. Islam, M.A. Razzaque, An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System, SI: Security and Privacy for Cyber Physical Systems, Journal of Applied Science, 2018, 8(6), (Impact factor 1.67)
  • P. R. Joshi, S. Islam, E-Government Maturity Model for Sustainable E-Government Services from the Perspective of Developing Countries, Special Issue Information and Communications Technologies (ICT) for Sustainability) Sustainability 2018, 10(6), (impact factor 1.789)
  • S.Islam, M . Ouedraogo , C. Kalloniatis, H. Mouratidis, S. Gritzalis, Assurance of Security and Privacy Requirements for Cloud Deployment Model, SI: security and privacy protection on cloud, IEEE transaction on cloud computing, Vol 6, Issue 2, 2018(impact factor 7.92)
Recent presentations and conferences
  • Ai4HealthSec Platform for cyber security in healthcare. Second Annual Cyber Security in Healthcare Event 2022, https://igpp.org.uk/event/cyber-security-in-healthcare-event-2022.
  • Swarm Intelligence Model for Securing Healthcare Ecosystem. In: Inter. Conf. on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2022), Elsevier, 2022.
  • Evidence-based Cyber Security Risk Management for the Healthcare Eco System. Cyber Security in Healthcare 2021, Institute of Government and Public Policy (IGPP).
  • Cyber Security - Do We Really Need to Care? 4 August 2019, Military Institute of Science and Technology (MIST), Bangladesh.