RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS
|
|
- Janis Phillips
- 6 years ago
- Views:
Transcription
1 RESUME WEI LI Graduate School of Computer and Information Sciences Nova Southeastern University 3301 College Avenue, Fort Lauderdale-Davie, FL Office: (954) Fax: (954) URL: EDUCATION Ph.D. in Computer Science, Mississippi State University, Starkville, Mississippi, 12/2005 M.S. in Computer Science, Mississippi State University, Starkville, Mississippi, 12/2002 M.E. in Computer Science, Shandong University, Jinan, China, 07/1999 B.E. in Computer Engineering, Shandong University, Jinan, China, 07/1994 EMPLOYMENT Associate Professor, Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, FL, 08/2009 present. Assistant Professor, Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, FL, 08/ /2009. Research Assistant, Center for Computer Security Research (CCSR), Mississippi State University, Starkville, MS, 05/ /2005. Teaching Assistant, Department of Computer Science and Engineering, Mississippi State University, Starkville, MS, 08/ /2001. Software Engineer, Shandong Academy of Sciences, Jinan, China, 07/ /2000 Software Developer, Shandong CVIC Software Company, Jinan, China, 07/ /1996 RESEARCH INTERESTS Attack modeling and simulation, intrusion prevention and detection, network security, information assurance, security engineering, machine learning HONORS AND AWARDS Marquis Who s Who in America, 2010 External Funding Award, Nova Southeastern University, 2009, 2010 Registration Scholarship, IEEE Information Assurance Workshop (IEEE IAW), 2005 Best Student Paper Award, US Department of Energy Cyber Security Group Training Conference, 2004 Cisco Systems Information Assurance Scholarship, Cisco Systems Inc., 2004 Barrier Scholarship, Mississippi State University, Certificate of Appreciation for the Data Warehouse project, Naval Oceanographic Office, 2002 Research Assistant of the Year Nominee, Mississippi State University, 2001 Top student scholarships, Shandong University, China,
2 PUBLICATIONS Books Li., W. (Ed.) (2011). Proceedings of the ISCA 26th International Conference on Computers and Their Applications (CATA 2011). March 23-25, New Orleans, Louisiana. Cary, NC: International Society for Computers and their Applications. ISBN: Li., W. (Ed.) (2009). Proceedings of the ISCA 24th International Conference on Computers and Their Applications (CATA 2009). April 8-10, New Orleans, Louisiana. Cary, NC: International Society for Computers and their Applications. ISBN: Li, W., Vaughn, R., & Saiedian, H. (2002). Pre-Requirements Traceability. In J. Marciniak (Ed.), Encyclopedia of Software Engineering (Vol. 1, pp ). New York: John Wiley & Sons Inc. ISBN: Journals Li, W., Vaughn, R., & Dandass, Y. (2006). An Approach to Model Network Exploitations Using Exploitation Graphs. Simulation: Transactions of the Society for Modeling and Simulation International, 82(8), Conference Proceedings Li, W., Wan, H., Ren, X., & Li, S. (2012). A Refined RBAC Model for Cloud Computing. Proceedings of the 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012). May 30 June 1, Shanghai, China (pp ). Piscataway, NJ: IEEE. Li, W., Li, S., & Wan, H. (2011). An Access Control Mechanism in Cloud Computing Environments. Proceedings of the 2011 National Annual High Performance Computing of China (HPC China 2011). Oct 26 29, Jinan, China. Beijing, China: China Computer Federation. (In Chinese) Li, W., & Liu, P. (2011). Teaching Computer Networks for Distance Computer Science Students: An Instructor s Perspective. Proceedings of the 15 th Global Chinese Conference on Computers in Education (GCCCE-2011). May 29 31, Hangzhou, China (pp ). Taoyuan, Taiwan: Global Chinese Society for Computers in Education (GCSCE). Li, W. (2010). A Tree-Based Model for Firewall Policy Management. Proceedings of the ISCA First International Conference on Advanced Computing and Communications (ACC-2010). September 15-17, Orlando, FL. Cary, NC: International Society for Computers and their Applications. Li, W. (2009). A Space-Efficient Approach to Consistency Check of Firewall Rules. Proceedings of the ISCA 22th International Conference on Computer Applications in Industry
3 and Engineering (CAINE 09). November 4-6, San Francisco, CA (pp ). Cary, NC: International Society for Computers and their Applications. Li, W. (2008). Using Exploit Similarities for Concise Representation of Attack Scenarios. Proceedings of the ISCA 21th International Conference on Computer Applications in Industry and Engineering (CAINE 08). November 12-14, Honolulu, HI (pp ). Cary, NC: International Society for Computers and their Applications. Li, W. & Vaughn, R. (2007). Efficient Update on Exploitation Graphs for Vulnerability Analysis. Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering (CAINE 07). November 7-9, San Francisco, CA (pp ). Cary, NC: International Society for Computers and their Applications. Li, W. (2006). A Security Engineering Process for Vulnerability Assessment. Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering (CAINE 06). November 13-15, Las Vegas, NV (pp ). Cary, NC: International Society for Computers and their Applications. Li, W. & Vaughn, R. (2006). Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. Proceedings of the Second International Workshop on Cluster Security, May 17, Singapore (p. 26). Piscataway, NJ: IEEE. Li, W. & Vaughn, R. (2006). Modeling and Simulating Network Exploitations Using Simplified Exploitation Graphs. Symposium for Simulation Software Security: Proceedings of the 2006 Spring Simulation Multiconference (SpringSim'06), April 2-6, Huntsville, AL (pp ). San Diego, CA: The Society for Modeling and Simulation International. Li, W. & Vaughn, R. (2006). Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering. Proceedings of the 39th Hawaii International Conference on System Sciences (HICSS 06), January 4-7, Kauai, HI (p. 225). Piscataway, NJ: IEEE. Li, W. & Vaughn, R. (2005). Using Exploitation Graphs to Model Network Exploitations. Proceedings of the 2005 Symposium on Risk Management and Cyber-Informatics. July 11-13, Orlando, FL (pp. X404-X409). Li, W. & Vaughn, R. (2005). Building Compact Exploitation Graphs for a Cluster Computing Environment. Proceedings of the 6th IEEE Information Assurance Workshop, June 15-17, West Point, NY (pp ). Piscataway, NJ: IEEE. Li, W. & Vaughn, R. (2005). An Approach to Model Network Exploitations Using Exploitation Graphs. Military, Government, and Aerospace Simulation Symposium: Proceedings of the 2005 Spring Simulation Multiconference (SpringSim 05), April 3-7, San Diego, CA (pp ). San Diego, CA: The Society for Modeling and Simulation International.
4 Li, W. & Allen, E. (2005). An Access Control Model for Secure Cluster-Computing Environments. Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS 05), January 3-6, Big Island, HI (p. 309). Piscataway, NJ: IEEE. Li, W. (2004). Using Genetic Algorithm for Network Intrusion Detection. Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference, May 24-27, Kansas City, KS. (Best Student Paper) Li, W. & Vaughn, R. (2001). Towards Requirements Traceability. Proceedings of the 5th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2001) and the 7th International Conference on Information Systems Analysis and Synthesis (ISAS 2001), July 22-25, Orlando, Florida. Other Publications Li., W. (2005). An Approach to Graph-Based Modeling on Network Explorations. PhD Dissertation. Department of Computer Science and Enigneering, Mississippi State University. Li., W. (2004). Graph Based Network Vulnerability Analysis and Alert Correlation. Southeastern Software Engineering (SESE) Conference Doctoral Symposium. March 29-31, Huntsville, AL. Li., W. (2002). The Integration of Security Sensors into the Intelligent Intrusion Detection System (IIDS) in a Cluster Environment. Masters Project Report. Department of Computer Science and Enigneering, Mississippi State University. Li., W. (2002). The Integration of Security Sensors into Intelligent Intrusion Detection System in a Cluster Environment. Southeastern Software Engineering (SESE) Conference Doctoral Symposium. April 9-11, Huntsville, AL. Li., W. (1999). Research and Development of a Business Decision Support System. Masters Thesis. Department of Computer Science, Shandong University. (In Chinese) GRANTS National Security Agency (NSA) Information Assurance Scholarship Program (IASP), September 2008 September 2009, PI, $51, National Security Agency (NSA) Information Assurance Scholarship Program (IASP), September 2009 December 2010, PI, $18, UNIVERSITY SERVICES University Institutional Review Board (IRB), alternate representative for GSCIS, 05/2007- present
5 University Internal Review Committee (IRC) for MCIS program (2007), MSIS program (2008), and MSCS program (2011) SCHOOL SERVICES GSCIS Booth, RSA Conference, San Francisco, CA, April 2007 GSCIS On-Campus Open Houses, 2008, 2010 GSCIS PhD Admissions Committee for CISD, DCIS programs GSCIS Curriculum Review Committee for CISC, MCIS, CISD, and DCIS programs SCHOLARLY SERVICES Conference Program Chair ISCA 26 th International Conference on Computers and Their Applications (CATA 2011), March 2011, New Orleans, LA ISCA 24 th International Conference on Computers and Their Applications (CATA 2009), April 2009, New Orleans, LA Conference Session Chair 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012). May 30 June 1, Shanghai, China 2005 Symposium on Risk Management and Cyber-Informatics (RMCI '05), July 2005, Orlando, FL ISCA 22 nd International Conference on Computer Applications in Industry and Engineering (CAINE-09), November 2009, San Francisco, CA ISCA 20 th International Conference on Computer Applications in Industry and Engineering (CAINE-07), November 2007, San Francisco, CA Conference Program Committee Member IADIS International Conference on Internet Technologies & Society (ITS 2011), December 2011, Shanghai, China ISCA 24 th International Conference on Computer Applications in Industry and Engineering (CAINE-11), November 2011, Honolulu, Hawaii Fourth International Conference on Internet Technologies and Applications (ITA11), September 2011, North Wales, UK IADIS International Conference on Internet Technologies & Society (ITS 2010), November 2010, Perth, Australia ISCA 23 rd International Conference on Computer Applications in Industry and Engineering (CAINE-10), November, 2010, Las Vegas, Nevada ISCA 18 th International Conference on Software Engineering and Data Engineering (SEDE-09), June 22-24, 2009, Las Vegas, Nevada ISCA 22 nd International Conference on Computer Applications in Industry and Engineering (CAINE-09), November 2009, San Francisco, CA Third International Conference on Internet Technologies & Applications (ITA09), September 2009, Wrexham, North Wales, UK
6 ISCA 21 st International Conference on Computer Applications in Industry and Engineering (CAINE-08), November 2008, Honolulu, HI IEEE First International Workshop on War & Peace Driving: Wireless Security and Public Uptake WPD(WSPU), in conjunction with 4 th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2008 ), October 2008, Avignon, France ISCA 23 rd International Conference on Computers and Their Applications (CATA 2008), April 2008, Cancun, Mexico Second International Conference on Internet Technologies & Applications (ITA07), September 2007, Wrexham, North Wales, UK ISCA 20 th International Conference on Computer Applications in Industry and Engineering (CAINE-07), November 2007, San Francisco, CA ISCA 19 th International Conference on Computer Applications in Industry and Engineering (CAINE-06), November 2006, Las Vegas, NV REVIEWERSHIPS Journals Journal of Computer (JCP) International Journal of Computers and Applications International Journal of Computer and Information Science (IJCIS) ISCA International Journal of Computers and Their Applications International Conference on Information Systems 2009 (ICIS 2009), Phoenix, Arizona EURASIP Journal on Wireless Communications and Networking Textbooks Stallings, W., & Brown, L. (2007). Computer Security: Principles and Practice. Prentice Hall. Conery, J. S. (2010). Exploration in Computing: An Introduction to Computer Science. CRC Press. AFFILIATIONS Association of Computer Machinery (ACM) ACM Special Interest Group on Security, Audit and Control (SIGSAC) Institute of Electrical and Electronics Engineers (IEEE) Upsilon Pi Epsilon (UPE) International Society for Computers and Their Applications (ISCA) CERTIFICATES SANS GIAC Security Essentials Certified (GSEC), COURSES TAUGHT Masters Courses
7 CISC615 - Design and Analysis of Algorithm CISC650 - Computer Networks CISC654/ MCIS652 - Information Security CISC663 - Object Oriented Database Systems CISC670 - Artificial Intelligence MCIS661/MMIS661 - Object Oriented Applications MCIS665 - Client Server Computing MCIS683 - Secure Computer Systems MCIS684 - Applied Cryptography Doctoral Courses CISD760 - Artificial Intelligence CISD765 Cryptography CISD775 Network Security
North Dakota State University Fargo, ND Ph.D. in Software Engineering Emphasis area: Security Requirements Engineering
Josh Pauli, Ph.D. EDUCATION North Dakota State University Fargo, ND Ph.D. in Software Engineering 2003-2006 Emphasis area: Security Requirements Engineering Dakota State University Madison, SD M.S. in
More informationRobert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA
Summary Rob began his technical career with Automatic Data Processing (ADP), in their Dealer Service Division. His position at ADP laid the foundation for his passion for finding solutions to business
More informationJun Li, Ph.D. School of Computing and Information Sciences Phone:
Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/
More informationWireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.
Mustafa El-Halabi Contact Information Fleifel Building Cell Phone: + (979) 422 4585 Mathaf E-mail: mhalabi@aust.edu.lb Beirut, Lebanon Webpage: https://mustafa-halabi.appspot.com/ Research Interests Education
More informationMAGNO QUEIROZ Curriculum Vitae
MAGNO QUEIROZ Curriculum Vitae Office Management Information Systems Jon M. Huntsman School of Business Utah State University 3515 Old Main Hill Logan, UT 84322-3515 Location: Eccles Business Building
More informationHAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h)
HAI ZHOU Electrical and Computer Engineering Northwestern University 2535 Happy Hollow Rd. Evanston, IL 60208-3118 Glenview, IL 60025 haizhou@ece.nwu.edu www.ece.nwu.edu/~haizhou (847) 491-4155 (o) (847)
More informationDr. Ahmed K. Sadek 2. Experience
Dr. Ahmed K. Sadek Education University of Maryland, College Park Ph.D. in Electrical and Computer Engineering, GPA = 4.0/4.0, May 2007 Thesis title: Cross-Layer Design for Cooperative Communications and
More informationThuan Luong Nguyen. Dissertation Title: Assessing Knowledge Management Values by Using Intellectual Capital to Measure Organizational Performance
Thuan Luong Nguyen Advanced Data Analytics Graduate School The University of North Texas 1155 Union Circle, Denton TX 76203 Email: Thuan.Nguyen@unt.edu Education Doctor of Philosophy (Ph.D.) in Information
More informationCURRICULUM VITA. Richard E. Biehl, Ph.D.
CURRICULUM VITA Richard E. Biehl, Ph.D. Lecturer Department of Industrial Engineering and Management Systems College of Engineering & Computer Science University of Central Florida 12800 Pegasus Dr., Orlando,
More informationDr. Imran Khan University of Nebraska-Lincoln Marketing (402)
Dr. Imran Khan University of Nebraska-Lincoln Marketing (402) 472-4536 Email: ikhan3@unl.edu Education DBA, Kennesaw State University, 2014. Major: Marketing Dissertation Title: Vendor Firm Characteristics
More informationTEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor
TEXAS STATE VITA I. Academic/Professional Background A. Name: David L. Gibbs Title: Assistant Professor B. Educational Background Degree Year University Major Thesis/Dissertation PhD 2015 Texas State University
More informationInterested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationDukpa Kim FIELDS OF INTEREST. Econometrics, Time Series Econometrics ACADEMIC POSITIONS
Dukpa Kim Contact Information Department of Economics Phone: 82-2-3290-5131 Korea University Fax: 82-2-3290-2661 145 Anam-ro, Seongbuk-gu Email: dukpakim@korea.ac.kr Seoul, 02841 Korea FIELDS OF INTEREST
More informationInterested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationThis document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information.
December 2010 CDFM OVERVIEW The American Society of Military Comptrollers offers the Certified Defense Financial Manager (CDFM) program to those persons desiring to demonstrate proficiency in the core
More informationJ I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213
J I N G H A I R A O Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 Office: +1 412 268 1357 Fax: +1 412 268 7287 Mobile: +1 412
More informationDegree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR
FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and
More informationJianhua Yang Ph.D. Professor TSYS School of Computer Science, Columbus State University 4225 University Ave., Columbus, GA (office)
Jianhua Yang Ph.D. Professor TSYS School of Computer Science, Columbus State University 4225 University Ave., Columbus, GA 31907 706-507-8180(office) yang_jianhua@columbusstate.edu, jhayng302@gmail.com
More informationPAST PRESENTATIONS Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016
Past Presentations PAST PRESENTATIONS 2016 Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016 Current Healthcare Information Security Trends and Challenges,
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning
More informationInterested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationThe fast track to top skills and top jobs in cyber. Guaranteed.
The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women
More informationCURRICULUM VITAE. June, 2013
CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il
More informationA United States Cyber Academy Program
The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy
More informationCURRICULUM VITAE SHON L. HARRIS, CISSP
CURRICULUM VITAE SHON L. HARRIS, CISSP Logical Security, Inc. 9901 I-10 West, Suite 800 San Antonio, Texas 78230 210-566-0488 888-373-5116 888-373-5116 Fax ShonHarris@LogicalSecurity.com www.logicalsecurity.com
More informationSANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.
SANS Vendor Events SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS National Events over 1200 profession IT Security attendees and over 45 SANS classes
More informationNEC Labs America, Princeton, NJ
Jie XIONG School of Information Systems Singapore Management University Jie XIONG jxiong@smuedusg Office Phone: 6828 9094 Date of CV revision: Citizenship: Singaporean Education 2010-2015 PhD in Computer
More informationEDUCATION RESEARCH EXPERIENCE
PERSONAL Name: Mais Nijim Gender: Female Address: 901 walkway, apartment A1 Socorro, NM 87801 Email: mais@cs.nmt.edu Phone: (505)517-0150 (505)650-0400 RESEARCH INTEREST Computer Architecture Storage Systems
More informationOpportunities to Integrate Technology Into the Classroom. Presented by:
Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System Discussion Topics Internal Audit Textbook
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion
More informationCertification Program. CSCM and CMAA
Certification Program CSCM and CMAA 1 Business Management Institute History of BMI Development began in 1986 at Georgia State University with the support of the Georgia Chapter and the CMAA Board of Directors.
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning
More informationCURRICULUM VITA. Kristin M. Swartz
CURRICULUM VITA Kristin M. Swartz PERSONAL DATA Office Address: Email: Justice Administration University of Louisville Brigman Hall 210 Louisville, KY 40292 kristin.swartz@louisville.edu Office Phone Number:
More informationPersonal Profile. Allied Additional Subordinate Subject studied. Management Information System. Electronic Commerce. Image Processing.
Personal Profile (1) Name of the teacher (in full): Ms. Sarika Vijay Purao (2) Department: (3) Designation: Assistant Professor (4) Qualifications of the teacher:- Degree/ Post Graduate Degree Examinatio
More informationWeb Security Vulnerabilities: Challenges and Solutions
Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA
More informationAYAN MONDAL ayan.mondal/
AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)
More informationThe fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and
More informationJohn Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA (805)
Curriculum Vitae Contact Information Education John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA 93407 (805)756-6528 clements@brinckerhoff.org 2005
More informationTEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor
TEXAS STATE VITA I. Academic/Professional Background A. Name: David L. Gibbs Title: Assistant Professor B. Educational Background Degree Year University Major Thesis/Dissertation PhD 2015 Texas State University
More informationDATES OF NEXT EVENT: Conference: June 4 8, 2007 Exhibits: June 4 7, 2007 San Diego Convention Center, San Diego, CA
EVENT AUDIT DATES OF EVENT: Conference: July 24 28, 2006 Exhibits: July 24 27, 2006 LOCATION: Moscone Center, San Francisco, CA EVENT PRODUCER/MANAGER: Company Name: Association for Computing Machinery
More informationMohamed Mahmoud Mahmoud Azab. Education: Ongoing research:
Mohamed Mahmoud Mahmoud Azab -Assistant Prof., Informatics Research Institute, The City of Scientific Research & Technology Applications, Alexandria-Egypt. - Researcher, VT-MENA research center of Excellence,
More informationThis is to certify that. Chris FitzGerald. has completed the course. Systems Security Engineering _eng 2/10/08
This is to certify that Chris FitzGerald has completed the course Systems Security Engineering - 206760_eng on 2/10/08 Systems Security Engineering About This Course Overview/Description To define the
More informationFACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University
FACULTY PROFILE Name Designation Email ID : A.K.Kavitha : Assistant Professor : kavitha.ece@srit.org Area of Specialization : Wireless Communication Total Experience : Academic : 7 Years and 3 Industry
More informationMatthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Arizona State University
Matthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Office: BA 320A E-mail (Work): msopha@asu.edu W. P. Carey School of Business Phone
More informationDATES OF EVENT: Conference: March 31 April 2, 2009 Exhibits: April 1 3, Sands Expo & Convention Center, Las Vegas, NV
EVENT AUDIT DATES OF EVENT: Conference: March 31 April 2, 2009 Exhibits: April 1 3, 2009 LOCATION: Sands Expo & Convention Center, Las Vegas, NV EVENT PRODUCER/MANAGER: Company Name: Reed Exhibitions Address:
More informationCHAIR Jr, r7~. cou EGE FACULTY CHAIR (if \G,Jl ~ ~k amica~ pc{ 2.-0 I ; <-0 l "?J Approved,G. 'S u,\? Approved. Approved
2013-2014 LONG SIGNATURE SHEET Proposal Number: SIS 10-07-13 _ ~f/; UNC CHARIDITE Proposal Title: Establish a graduate level course: Cloud Data Storage.:1T1.5 6' ~ 7AJ "1-11$ 8')(.0 Originating Department:
More informationDATES OF EVENT: Conference: March 23 March 25, 2010 Exhibits: March 24 March 26, Sands Expo & Convention Center, Las Vegas, NV
EVENT AUDIT DATES OF EVENT: Conference: March 23 March 25, 2010 Exhibits: March 24 March 26, 2010 LOCATION: Sands Expo & Convention Center, Las Vegas, NV EVENT PRODUCER/MANAGER: Company Name: Reed Exhibitions
More informationMOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03
MOHAMMED I. AL-SALEH Jordan University of Science and Technology, Computer Science Department, Irbid, P.O. Box 3030, 22110 +962-788-052-892 misaleh@just.edu.jo, moealsaleh@gmail.com EDUCATION Ph.D., 2011
More informationChristopher P. Hodges, PE, RRC, CFM, LEED AP, IFMA Fellow, FRICS Principal
Christopher P. Hodges, PE, RRC, CFM, LEED AP, IFMA Fellow, FRICS Principal Years with FEA: 20 Total Years Experience: 30+ Education: Master of Science, Materials Science & Engineering, Johns Hopkins University
More informationAmy Babay April 2018
Amy Babay www.dsn.jhu.edu/~babay 814-528-4205 babay@cs.jhu.edu Education PhD in Computer Science April 2018 PhD Research: Structured overlay networks for a new generation of Internet services, dependable
More informationResume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram
Resume Name: Designation: Qualifications: Subjects taught: Research specialization: Dr. M.Seshashayee Assistant Professor MCA, M.Tech, Ph.D. Programming In Java, Internet programming, Software Engineering,
More informationAuditor General's Office
City Purchasing Card Expense Report - January 2011 01/05/2011 National Association of Local Government Auditors $101.40 Professional Development Training: Knighton Award Contract (Webinar) 01/07/2011 The
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationBrian F. Cooper. Distributed systems, digital libraries, and database systems
Brian F. Cooper Home Office Internet 2240 Homestead Ct. #206 Stanford University cooperb@stanford.edu Los Altos, CA 94024 Gates 424 http://www.stanford.edu/~cooperb/app/ (408) 730-5543 Stanford, CA 94305
More informationManTech Advanced Systems International 2018 Security Training Schedule
ManTech Advanced Systems International 2018 Security Training Schedule Risk Management Framework Course Dates Course Location Course Cost February 12 15, 2018 Las Vegas, NV $1,950.00 March 12 15, 2018
More informationAn Overview of Mobile Security
An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim
More informationA Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing ( )
A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing (1970 1997) Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233
More informationPersonnel Certification
Personnel Certification Facilitating the Growth of a Global Economy Roy A. Swift, Ph.D. Senior Director, Personnel Credentialing Accreditation Programs American National Standards Institute Building a
More informationThe fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS
The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting
More informationBachelor of Applied Science Degree IT NETWORKING
Bachelor of Applied Science Degree IT NETWORKING Beginning fall 2017! Whatcom Community College s nationally acclaimed computer information systems program will begin offering a bachelor of applied science
More informationZoltan Safar. Education. Awards and Honors. Experience
1361 A. V. Williams Bldg. Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742, USA Phone: (+1) 301-405-5779 E-mail: zsafar@umd.edu Education Ph.D. in Electrical
More informationDr. Muhammad Mubashir Khan
Dr. Muhammad Mubashir Khan Associate Professor (Approved PhD Supervisor of Higher Education Commission Pakistan) Department of Computer Science & IT, NED University of Engineering & Technology, University
More informationAGILE BUSINESS MEDIA, LLC 500 E. Washington St. Established 2002 North Attleboro, MA Issues Per Year: 12 (412)
Please review your report carefully. If corrections are needed, please fax us the pages requiring correction. Otherwise, sign and return to your Verified Account Coordinator by fax or email. Fax to: 415-461-6007
More informationArbee L.P. Chen ( 陳良弼 )
Arbee L.P. Chen ( 陳良弼 ) Asia University Taichung, Taiwan EDUCATION Phone: (04)23323456x1011 Email: arbee@asia.edu.tw - Ph.D. in Computer Engineering, Department of Electrical Engineering, University of
More informationCurriculum Vitae Detective Paul A. Lindvay #5497 Arizona Department of Public Safety Computer Forensics Unit
Computer Forensics Training (1005 Hours) Cybercop 315 Windows Artifacts Attended: May 2014 (32 hours) in Phoenix, AZ Advanced Computer Forensic Analysis and Incident Response Attended: February 2014 (36
More informationUpdated with information about the new certificate programs THE KU MSIT HANDBOOK 1
2016-2018 Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 THE KU MSIT HANDBOOK 2 MS in Information Technology (MSIT) School of Engineering The University of Kansas According
More informationSANS Vendor Offerings Detail
SANS Vendor Offerings Detail After working with SANS for a few years now, the audience at SANS events and webinars continues to represent some of the most forward thinking IT security practitioners looking
More informationBCS Higher Education Qualifications. Level 6 Web Engineering Syllabus
BCS Higher Education Qualifications Level 6 Web Engineering Syllabus Version 3.0 December 2016 This is a United Kingdom government regulated qualification which is administered and approved by one or more
More informationITSY Information Technology Security Course Syllabus Spring 2018
ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L
More informationPhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt.
AMAL MOH D BARAKAT AL-DWEIK HEBRON, WEST BANK, PALESTINE +970-2-2235142. EMAIL: AMAL@PPU.EDU Education PhD. of Information Networks (2004-2009). Cairo University. Faculty of Computers and Information.
More informationEducational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.
Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that
More informationPage 1 of 6. B.Sc. (Honors) in Electrical Engineering, Kuwait University, August 1999.
Abd-Elhamid Mohamed Taha School of Computing, Queen's University, Kingston, Ontario, K7L 3N6 Tel: +1 (613) 533-6000 X75029, Fax: +1 (613) 533-6513 E-mail: taha@cs.queensu.ca, URL: http://www.cs.queensu.ca/~taha
More informationCYBERSECURITY: Scholarship and Job Opportunities
CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job
More informationKarim H. Vellani, CPP, CSC Certified Security Consultant
Professional Experience Summary Karim H. Vellani is the President of Threat Analysis Group, LLC, an independent security consulting firm. Karim is Board Certified in Security Management (CPP), a Board
More informationChris Vegter University of Northern Colorado Monfort College of Business (970)
Chris Vegter University of Northern Colorado Monfort College of Business (970) 351-1244 Email: chris.vegter@unco.edu Education MBA, Colorado State University, 2006. Area of Study: Business Administration
More informationIMA and the CMA How They Can Help Your Career. Presented by: Honorable Kim R. Wallin, CMA, CFM, CPA John B. Pollara, CMA
IMA and the CMA How They Can Help Your Career Presented by: Honorable Kim R. Wallin, CMA, CFM, CPA John B. Pollara, CMA 1 IMA and Your Career WE NEED TO INSERT THE VIDEO HERE Agenda The Institute of Management
More informationPerformance Evaluation of National Knowledge Network Connectivity
International Journal of Computer Applications (975 888) Performance Evaluation of National Knowledge Network Connectivity Vipin Saxena, PhD. Department of Computer Science B.B. Ambedkar University (A
More informationPrint and Online Editorial Calendar
January 2014 Ad close: 12/2/13 Materials due: 12/5/13 Campus Security & Life Safety Mobile Apps Security Locks, Doors, and Hardware ID Cards Municipal Security Video Surveillance Locks FETC, Jan. 28-31,
More informationCollaborative Next Generation Networking
CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing
More informationCurriculum Vitæ. (Home address) 8399 Transvaal Blue Street Phone: (702) Las Vegas, NV Cell: (702)
Curriculum Vitæ Jan Bækgaard Pedersen School of Computer Science Phone: (702) 895 2557 University of Nevada, Las Vegas Fax: (702) 895 2639 4505 South Maryland Parkway Email: matt@cs.unlv.edu Las Vegas,
More informationSoftware verification and testing, software evolution, program analysis, and formal methods.
GUOWEI YANG Assistant Professor Department of Computer Science Texas State University 601 University Drive, San Marcos, TX 78666 +1 (512) 245-2469 gyang@txstate.edu RESEARCH INTERESTS Software verification
More informationProgramme Specification. MSc Telecommunications Engineering 2016/17
School of Engineering and the Built Environment Glasgow Caledonian University Programme Specification MSc Telecommunications Engineering 2016/17 1 Programme Specification Pro-forma 1. GENERAL INFORMATION
More informationStavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987
413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education
More informationPUBLICATIONS. Journal Papers
PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.
More informationObjective: Education:
Christopher L. Copeland 1008 Westminster Ln., Mansfield TX 76063 817.791.6728 chris@chriscopeland.com ccopeland@tarleton.edu Objective: I am an education professional with significant technical and process
More information45 th Design Automation Conference
45 th Design Automation Conference EVENT AUDIT DATES OF EVENT: Conference: June 8 13, 2008 Exhibits: June 8 10, 2008 LOCATION: Anaheim Convention Center, Anaheim, CA EVENT PRODUCER/MANAGER: Company Name:
More informationPh.D. with Distinction in Computer Science Advisor: Prof. Micha Sharir Dissertation: Geometric Arrangements: Substructures and Algorithms
April 29, 2009 Esther Ezra phone (919) 660-6578 Levine Science Research Center D340 fax (919) 660-6502 Department of Computer Science, Duke University http://www.math.tau.ac.il/~estere Durham NC 27708
More informationOSC Guidance and Training for Internal Audit and Internal Control Practitioners. Tina Kim John Buyce
OSC Guidance and Training for Internal Audit and Internal Control Practitioners Tina Kim John Buyce Training Requirements for Auditors and Internal Control Professionals Yellow Book: Chapter 3 General
More informationCybersecurity Training
Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/cybetrn Expert-led training with
More informationCurriculum Vitae. University, England, UK, Ph.D. Digital Computer Systems, Electronic Systems Design Department, Cranfield
Curriculum Vitae Name: Imad Hussain Merza Al-Hussaini Place of Birth: Basrah, Iraq Date of Birth: 22/11/1953 Religion: Muslim Nationality: Iraqi Marital Status: Married Contact Information: Mobile: +9647901943311/
More informationA Bibliography of Publications of Jingling Xue
A Bibliography of Publications of Jingling Xue Jingling Xue Department of Mathematics, Statistics and Computing Science Armidale, NSW 2351 Australia Tel: +61 67 73 3149 FAX: +61 67 73 3312 E-mail: xue@neumann.une.edu.au
More informationRevising the MSIS 2016 Model Curriculum : Status Update and Panel Discussion
Association for Information Systems AIS Electronic Library (AISeL) 2015 Proceedings SIGED: IAIM Conference 2015 Revising the MSIS 2016 Model Curriculum : Status Update and Panel Discussion Heikki Topi
More informationCurriculum vitae , Athens GREECE : Web:
Curriculum vitae EVA H. JAHO 2 Naksou st., Vyronas 16 233, Athens GREECE : +306938648996 E-mail: jaho.eva@gmail.com Web: http://cgi.di.uoa.gr/~ejaho/ EDUCATION 6/2007 12/2011 PhD, Department of Informatics
More informationComputer and Network Security CET 4663 Dr. Philip Craiger Fall 2009
Computer and Network Security CET 4663 Dr. Philip Craiger Fall 2009 PROFESSOR Dr. Philip Craiger, CISSP Department of Engineering Technology & Assistant Director for Digital Evidence National Center for
More informationSTUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS
STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS Presentation Overview Location of the Department s premises The Department in a Nutshell Studies and Education: Offered in the context
More informationCelebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018
Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more
More informationUniversity of South Florida St. Petersburg
University of South Florida St. Petersburg Kate Tiedemann College of Business Christopher J. Davis, Ph.D. CEng FBCS Professor - Information Systems & Decision Sciences Office: LPH 424 Phone: 727-873-4944
More informationJoe Michael Kniss December 2005
Joe Michael Kniss December 2005 Research Interests 50 S. Central Campus Dr. MEB 3490 Salt Lake City, UT, 84112 jmk@sci.utah.edu Phone: 801-898-7977 http://www.cs.utah.edu/ jmk I am currently conducting
More informationHow to Become a CMA (Certified Management Accountant) May 10, 2017
How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More information