Mohd Anwar

Associate Professor

Mohd Anwar
College of Engineering

Computer Science

Cherry Hall 304
B.S.Computer Science / Winona State University
M.S.Computer Science / North Dakota State University
Ph.D.Computer Science / University of Saskatchewan


Dr. Anwar is an Associate Professor of Computer Science at North Carolina A&T State University. Dr. Anwar’s expertise and research interests are in Human-Centered Artificial Intelligence as applies to cybersecurity and healthcare. His contributions to cybersecurity include intrusion detection, continuous authentication, mobile malware detection, cybersecurity analytics, human factors and behavioral aspect of cybersecurity. He maintains a strong second research stream in smart and connected health, exploring areas of health behavior monitoring, digital epidemiology, and health risk assessment. His research has been funded by NSF, Air Force, DoD, NIH, NSA, and EPA.

Research Interests

Cybersecurity, mHealth, Social Computing, Human Factors, Machine Learning, Cognitive Psychology

Recent Publications

  • Doss, C., Anwar, M., & Manjaro, N. (2016). A Context-Aware Remote Health Monitoring Service for Improved Patient Care. In Contemporary Consumer Health Informatics (pp. 153-167). Springer, Cham.
  • Mohd Anwar, Jeffrey McDonald, Imano Williams, Xiaohong Yuan (A Method for Developing Abuse Cases and Its Evaluation). ). Journal of Software.
  • Brown, J., Anwar, M., & Dozier, G. (2017). An artificial immunity approach to malware detection in a mobile platform. EURASIP Journal on Information Security, 2017(1), 7.
  • Anwar, M., Joshi, J., & Tan, J. (2015). Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges. Health Policy and Technology, 4(4), 299-311.
  • Pelechrinis, K., Zadorozhny, V., Kounev, V., Oleshchuk, V., Anwar, M., & Lin, Y. (2015). Automatic evaluation of information provider reliability and expertise. World Wide Web, 18(1), 33-72.
  • Brown, J., & Anwar, M. (2021). Blacksite: human-in-the-loop artificial immune system for intrusion detection in internet of things. Human-Intelligent Systems Integration, 1-13.
  • Elhoone, H., Zhang, T., Anwar, M., & Desai, S. (2020). Cyber-based design for additive manufacturing using artificial neural networks for Industry 4.0. International Journal of Production Research, 58(9), 2841-2861.
  • Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior69, 437-443.
  • He, W., Ash, I., Anwar, M., Li, L., Yuan, X., Xu, L., & Tian, X. (2019). Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training. Journal of Intellectual Capital.
  • Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management45, 13-24.
  • Anwar, M., & Doss, C. (2015). Lighting the mobile information FHIR. Journal of AHIMA, 86(9), 30.
  • Jin, L., Joshi, J. B., & Anwar, M. (2013). Mutual-friend based attacks in social network systems. Computers & security, 37, 15-30.
  • Anwar, M., Masoumzadeh, A., & Joshi, J. (2013). Security and Privacy in Location-Based Services. Advanced Location-based Technologies and Services, 235, Taylor & Francis.
  • Anwar, M., & Brusilovsky, P. (2017). Privacy and Territoriality Issues in an Online Social Learning Portal. International Journal of Information Security and Privacy (IJISP), 11(1), 1-17.
  • Anwar, M., & Brusilovsky, P. (2019). Privacy and territoriality issues in an online social learning portal. In Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications (pp. 675-693). IGI Global.
  • Anwar, M. (2020). Supporting Privacy, Trust, and Personalization in Online Learning. International Journal of Artificial Intelligence in Education, 1-15.
  • Anwar, M., Khoury, D., Aldridge, A. P., Parker, S. J., & Conway, K. P. (2020). Using Twitter to Surveil the Opioid Epidemic in North Carolina: An Exploratory Study. JMIR Public Health and Surveillance6(2), e17574.
  • Davis, B. D., Mason, J. C., & Anwar, M. (2020). Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study. IEEE Internet of Things Journal.