Research Chat

Zahid Anwar, Ph.D.

Associate Professor of Cybersecurity


Zahid Anwar is a scholar at the Challey Institute for Global Innovation and Growth and an associate professor of cybersecurity in the Department of Computer Science at North Dakota State University. His research focuses on cybersecurity policy and innovative cyber defense. He has authored over 80 publications in peer-reviewed conferences and journals. He is a CompTIA Certified Penetration Tester, Network Vulnerability Assessment Professional, Security+ Professional, and an AWS Certified Cloud Solutions Architect. Prior to working in academia, Dr. Anwar was a software engineer and researcher at IBM T.J. Watson, Intel, Motorola, the National Center for Supercomputing Applications, xFlow research, and CERN. In 2015, he received a science of security research recognition from the National Security Agency. 

  • Ph.D., Computer Science, University of Illinois, Urbana-Champaign
  • M.S., Computer Science, University of Illinois, Urbana-Champaign
  • B.S., Computer Engineering, Ghulam Ishaq Khan Institute of Engineering, Science and Technology, Pakistan
  • Cybersecurity policy
  • Technology and privacy
  • Metaverse
  • Penetration testing
  • Artificial intelligence
  • Machine learning


Recent Research
Journal article | A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework
Journal article | A Machine Learning Approach to Predict the S&P 500 Absolute Percent Change
Journal article | Tackling Food Insecurity Using Remote Sensing and Machine Learning-Based Crop Yield Prediction
Journal article | Toward Clean Manufacturing: An Analysis and Validation of a Modified Johnson–Cook Material Model for Low and High-Speed Orthogonal Machining of Low-Carbon Aluminum Alloy 
Journal article | Numerical and Experimental Characterization of Melt Pool in Laser Powder Bed Fusion of SS316l​​​​​​​
Journal article | Airborne Computing: A Toolkit for UAV-Assisted Federated Computing for Sustainable Smart Cities
Journal article | Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
Journal article | Leveraging 6G, Extended Reality, and IoT Big Data Analytics for Healthcare: A Review
Journal article | Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things
Journal article | A Cybersecurity Risk Assessment of Electric Vehicle Mobile Applications: Findings and Recommendations
Journal article | An Enhanced Water Quality Monitoring Using Remote Sensing and Machine Learning
Journal article | Emerging Cybersecurity and Privacy Threats to Electric Vehicles and Their Impact on Human and Environmental Sustainability
Journal article | A Systemic Threat Analysis and Defense Strategies for the Metaverse and Extended Reality Systems
Journal article | Quantum Computing for Healthcare: A Review
Journal article | A Fog Computing Framework for Intrusion Detection of Energy-Based Attacks on UAV-Assisted Smart Farming
Journal article | A Novel Framework for Studying the Business Impact of Ransomware on Connected Vehicles
Journal article | An Analysis of Zero-Trust Architecture and Its Cost-Effectiveness for Organizational Security
Journal article | Do Charging Stations Benefit from Cryptojacking? A Novel Framework for Its Financial Impact Analysis on Electric Vehicles
Journal article | A Multi-Step Approach for Optically Active and Inactive Water Quality Parameter Estimation Using Deep Learning and Remote Sensing
Journal article | A Reliable Learning Based Task Offloading Framework for Vehicular Edge Computing
Journal article | Privacy Limits in Power-Lab Bipartite Networks Under Active Fingerprinting Attacks




Top of page