Personal profile
Personal profile
As an academician and researcher, I bring a unique fusion of industry experience, academic rigor, and cutting-edge research to the world of information security. My expertise spans malware analysis, AI-driven cybersecurity, digital forensics, web security, security governance and penetration testing. Armed with top-tier certifications like CISSP, CEH, CHFI, ECIH, and CSCU, I am committed to advancing cybersecurity frontiers and safeguarding digital landscapes.
Education/Academic qualification
Information Security, PhD, Thwarting and Analyzing Web Application Attacks through Cyber Deception, National University of Sciences and Technology
Award Date: 31 Aug 2022
External positions
Post Doctoral Research Fellow, Birmingham City University
Nov 2023 → Jun 2024
Assistant Professor, National University of Sciences and Technology
Dec 2017 → Nov 2023
Lecturer, National University of Sciences and Technology
Dec 2013 → Dec 2017
Keywords
- Artificial intelligence
- Information systems
Expertise related to UN Sustainable Development Goals
In 2015, UN member states agreed to 17 global Sustainable Development Goals (SDGs) to end poverty, protect the planet and ensure prosperity for all. This person’s work contributes towards the following SDG(s):
-
SDG 3 Good Health and Well-being
-
SDG 9 Industry, Innovation, and Infrastructure
-
SDG 10 Reduced Inequalities
Collaborations and top research areas from the last five years
-
LLMPathy: A Multi-Agent LLM Approach for Eliciting Inclusive Security Requirements
Shahid, W., Naqvi, B. & Afzal, H., 13 Oct 2025, p. 243-248. 6 p.Research output: Contribution to conference › Paper › peer-review
Open AccessFile4 Downloads (Pure) -
Real-Time Detection and Multi-Class Classification of DGAs With HybridBERT
Mahmood, A., Abbas, H., Amjad, M. F., Shahid, W. & Shah, S. Q. A., 10 Sept 2025, In: IEEE Access. 13, p. 160393-160410 18 p.Research output: Contribution to journal › Article › peer-review
Open Access -
Security Assessment and Evaluation of VPNs: A Comprehensive Survey
Abbas, H., Emmanuel, N., Amjad, M. F., Yaqoob, T., Atiquzzaman, M., Iqbal, Z., Shafqat, N., Shahid, W. B., Tanveer, A. & Ashfaq, U., 13 Jul 2023, In: ACM Computing Surveys. 55, 13s, p. 1-47 47 p., 273.Research output: Contribution to journal › Review article › peer-review
-
A deep learning assisted personalized deception system for countering web application attacks
Shahid, W. B., Aslam, B., Abbas, H., Afzal, H. & Khalid, S. B., Jun 2022, In: Journal of Information Security and Applications. 67, 17 p., 103169.Research output: Contribution to journal › Article › peer-review
-
A Framework to Optimize Deep Learning based Web Attack Detection Using Attacker Categorization
Shahid, W. B., Abbas, H., Aslam, B., Afzal, H. & Khalid, S. B., 30 Mar 2022, p. 95-101. 7 p.Research output: Contribution to conference › Paper › peer-review
Projects
- 1 Active
-
CyberBridge: A UK-Bangladesh TNE Partnership for Centre of Excellence in Cybersecurity Education
Idrees, F. (PI), Shahid, W. (CoI) & Sharyar, R. (CoI)
17/07/25 → …
Project: Other
Activities
- 1 Invited talk
-
How to Implement an Information Security Management System in your Organization
Shahid, W. (Speaker)
5 Jul 2024Activity: Talk, presentation or media contribution › Invited talk
Datasets
-
Experimental Dataset for Evaluating Security and Inclusivity in LLM-Generated Code
Naqvi, B. (Contributor), Parkkila, J. (Owner), Shahid, W. B. (Creator) & Afzal, H. (Contributor), Zenodo, 3 Feb 2026
DOI: 10.5281/zenodo.18472957, https://zenodo.org/records/18472958
Dataset