RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS

Size: px
Start display at page:

Download "RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS"

Transcription

1 RESUME WEI LI Graduate School of Computer and Information Sciences Nova Southeastern University 3301 College Avenue, Fort Lauderdale-Davie, FL Office: (954) Fax: (954) URL: EDUCATION Ph.D. in Computer Science, Mississippi State University, Starkville, Mississippi, 12/2005 M.S. in Computer Science, Mississippi State University, Starkville, Mississippi, 12/2002 M.E. in Computer Science, Shandong University, Jinan, China, 07/1999 B.E. in Computer Engineering, Shandong University, Jinan, China, 07/1994 EMPLOYMENT Associate Professor, Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, FL, 08/2009 present. Assistant Professor, Graduate School of Computer and Information Sciences, Nova Southeastern University, Fort Lauderdale, FL, 08/ /2009. Research Assistant, Center for Computer Security Research (CCSR), Mississippi State University, Starkville, MS, 05/ /2005. Teaching Assistant, Department of Computer Science and Engineering, Mississippi State University, Starkville, MS, 08/ /2001. Software Engineer, Shandong Academy of Sciences, Jinan, China, 07/ /2000 Software Developer, Shandong CVIC Software Company, Jinan, China, 07/ /1996 RESEARCH INTERESTS Attack modeling and simulation, intrusion prevention and detection, network security, information assurance, security engineering, machine learning HONORS AND AWARDS Marquis Who s Who in America, 2010 External Funding Award, Nova Southeastern University, 2009, 2010 Registration Scholarship, IEEE Information Assurance Workshop (IEEE IAW), 2005 Best Student Paper Award, US Department of Energy Cyber Security Group Training Conference, 2004 Cisco Systems Information Assurance Scholarship, Cisco Systems Inc., 2004 Barrier Scholarship, Mississippi State University, Certificate of Appreciation for the Data Warehouse project, Naval Oceanographic Office, 2002 Research Assistant of the Year Nominee, Mississippi State University, 2001 Top student scholarships, Shandong University, China,

2 PUBLICATIONS Books Li., W. (Ed.) (2011). Proceedings of the ISCA 26th International Conference on Computers and Their Applications (CATA 2011). March 23-25, New Orleans, Louisiana. Cary, NC: International Society for Computers and their Applications. ISBN: Li., W. (Ed.) (2009). Proceedings of the ISCA 24th International Conference on Computers and Their Applications (CATA 2009). April 8-10, New Orleans, Louisiana. Cary, NC: International Society for Computers and their Applications. ISBN: Li, W., Vaughn, R., & Saiedian, H. (2002). Pre-Requirements Traceability. In J. Marciniak (Ed.), Encyclopedia of Software Engineering (Vol. 1, pp ). New York: John Wiley & Sons Inc. ISBN: Journals Li, W., Vaughn, R., & Dandass, Y. (2006). An Approach to Model Network Exploitations Using Exploitation Graphs. Simulation: Transactions of the Society for Modeling and Simulation International, 82(8), Conference Proceedings Li, W., Wan, H., Ren, X., & Li, S. (2012). A Refined RBAC Model for Cloud Computing. Proceedings of the 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012). May 30 June 1, Shanghai, China (pp ). Piscataway, NJ: IEEE. Li, W., Li, S., & Wan, H. (2011). An Access Control Mechanism in Cloud Computing Environments. Proceedings of the 2011 National Annual High Performance Computing of China (HPC China 2011). Oct 26 29, Jinan, China. Beijing, China: China Computer Federation. (In Chinese) Li, W., & Liu, P. (2011). Teaching Computer Networks for Distance Computer Science Students: An Instructor s Perspective. Proceedings of the 15 th Global Chinese Conference on Computers in Education (GCCCE-2011). May 29 31, Hangzhou, China (pp ). Taoyuan, Taiwan: Global Chinese Society for Computers in Education (GCSCE). Li, W. (2010). A Tree-Based Model for Firewall Policy Management. Proceedings of the ISCA First International Conference on Advanced Computing and Communications (ACC-2010). September 15-17, Orlando, FL. Cary, NC: International Society for Computers and their Applications. Li, W. (2009). A Space-Efficient Approach to Consistency Check of Firewall Rules. Proceedings of the ISCA 22th International Conference on Computer Applications in Industry

3 and Engineering (CAINE 09). November 4-6, San Francisco, CA (pp ). Cary, NC: International Society for Computers and their Applications. Li, W. (2008). Using Exploit Similarities for Concise Representation of Attack Scenarios. Proceedings of the ISCA 21th International Conference on Computer Applications in Industry and Engineering (CAINE 08). November 12-14, Honolulu, HI (pp ). Cary, NC: International Society for Computers and their Applications. Li, W. & Vaughn, R. (2007). Efficient Update on Exploitation Graphs for Vulnerability Analysis. Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering (CAINE 07). November 7-9, San Francisco, CA (pp ). Cary, NC: International Society for Computers and their Applications. Li, W. (2006). A Security Engineering Process for Vulnerability Assessment. Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering (CAINE 06). November 13-15, Las Vegas, NV (pp ). Cary, NC: International Society for Computers and their Applications. Li, W. & Vaughn, R. (2006). Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. Proceedings of the Second International Workshop on Cluster Security, May 17, Singapore (p. 26). Piscataway, NJ: IEEE. Li, W. & Vaughn, R. (2006). Modeling and Simulating Network Exploitations Using Simplified Exploitation Graphs. Symposium for Simulation Software Security: Proceedings of the 2006 Spring Simulation Multiconference (SpringSim'06), April 2-6, Huntsville, AL (pp ). San Diego, CA: The Society for Modeling and Simulation International. Li, W. & Vaughn, R. (2006). Modeling and Simulating System Exploitations through Exploitation Graphs for Security Engineering. Proceedings of the 39th Hawaii International Conference on System Sciences (HICSS 06), January 4-7, Kauai, HI (p. 225). Piscataway, NJ: IEEE. Li, W. & Vaughn, R. (2005). Using Exploitation Graphs to Model Network Exploitations. Proceedings of the 2005 Symposium on Risk Management and Cyber-Informatics. July 11-13, Orlando, FL (pp. X404-X409). Li, W. & Vaughn, R. (2005). Building Compact Exploitation Graphs for a Cluster Computing Environment. Proceedings of the 6th IEEE Information Assurance Workshop, June 15-17, West Point, NY (pp ). Piscataway, NJ: IEEE. Li, W. & Vaughn, R. (2005). An Approach to Model Network Exploitations Using Exploitation Graphs. Military, Government, and Aerospace Simulation Symposium: Proceedings of the 2005 Spring Simulation Multiconference (SpringSim 05), April 3-7, San Diego, CA (pp ). San Diego, CA: The Society for Modeling and Simulation International.

4 Li, W. & Allen, E. (2005). An Access Control Model for Secure Cluster-Computing Environments. Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS 05), January 3-6, Big Island, HI (p. 309). Piscataway, NJ: IEEE. Li, W. (2004). Using Genetic Algorithm for Network Intrusion Detection. Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference, May 24-27, Kansas City, KS. (Best Student Paper) Li, W. & Vaughn, R. (2001). Towards Requirements Traceability. Proceedings of the 5th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2001) and the 7th International Conference on Information Systems Analysis and Synthesis (ISAS 2001), July 22-25, Orlando, Florida. Other Publications Li., W. (2005). An Approach to Graph-Based Modeling on Network Explorations. PhD Dissertation. Department of Computer Science and Enigneering, Mississippi State University. Li., W. (2004). Graph Based Network Vulnerability Analysis and Alert Correlation. Southeastern Software Engineering (SESE) Conference Doctoral Symposium. March 29-31, Huntsville, AL. Li., W. (2002). The Integration of Security Sensors into the Intelligent Intrusion Detection System (IIDS) in a Cluster Environment. Masters Project Report. Department of Computer Science and Enigneering, Mississippi State University. Li., W. (2002). The Integration of Security Sensors into Intelligent Intrusion Detection System in a Cluster Environment. Southeastern Software Engineering (SESE) Conference Doctoral Symposium. April 9-11, Huntsville, AL. Li., W. (1999). Research and Development of a Business Decision Support System. Masters Thesis. Department of Computer Science, Shandong University. (In Chinese) GRANTS National Security Agency (NSA) Information Assurance Scholarship Program (IASP), September 2008 September 2009, PI, $51, National Security Agency (NSA) Information Assurance Scholarship Program (IASP), September 2009 December 2010, PI, $18, UNIVERSITY SERVICES University Institutional Review Board (IRB), alternate representative for GSCIS, 05/2007- present

5 University Internal Review Committee (IRC) for MCIS program (2007), MSIS program (2008), and MSCS program (2011) SCHOOL SERVICES GSCIS Booth, RSA Conference, San Francisco, CA, April 2007 GSCIS On-Campus Open Houses, 2008, 2010 GSCIS PhD Admissions Committee for CISD, DCIS programs GSCIS Curriculum Review Committee for CISC, MCIS, CISD, and DCIS programs SCHOLARLY SERVICES Conference Program Chair ISCA 26 th International Conference on Computers and Their Applications (CATA 2011), March 2011, New Orleans, LA ISCA 24 th International Conference on Computers and Their Applications (CATA 2009), April 2009, New Orleans, LA Conference Session Chair 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012). May 30 June 1, Shanghai, China 2005 Symposium on Risk Management and Cyber-Informatics (RMCI '05), July 2005, Orlando, FL ISCA 22 nd International Conference on Computer Applications in Industry and Engineering (CAINE-09), November 2009, San Francisco, CA ISCA 20 th International Conference on Computer Applications in Industry and Engineering (CAINE-07), November 2007, San Francisco, CA Conference Program Committee Member IADIS International Conference on Internet Technologies & Society (ITS 2011), December 2011, Shanghai, China ISCA 24 th International Conference on Computer Applications in Industry and Engineering (CAINE-11), November 2011, Honolulu, Hawaii Fourth International Conference on Internet Technologies and Applications (ITA11), September 2011, North Wales, UK IADIS International Conference on Internet Technologies & Society (ITS 2010), November 2010, Perth, Australia ISCA 23 rd International Conference on Computer Applications in Industry and Engineering (CAINE-10), November, 2010, Las Vegas, Nevada ISCA 18 th International Conference on Software Engineering and Data Engineering (SEDE-09), June 22-24, 2009, Las Vegas, Nevada ISCA 22 nd International Conference on Computer Applications in Industry and Engineering (CAINE-09), November 2009, San Francisco, CA Third International Conference on Internet Technologies & Applications (ITA09), September 2009, Wrexham, North Wales, UK

6 ISCA 21 st International Conference on Computer Applications in Industry and Engineering (CAINE-08), November 2008, Honolulu, HI IEEE First International Workshop on War & Peace Driving: Wireless Security and Public Uptake WPD(WSPU), in conjunction with 4 th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2008 ), October 2008, Avignon, France ISCA 23 rd International Conference on Computers and Their Applications (CATA 2008), April 2008, Cancun, Mexico Second International Conference on Internet Technologies & Applications (ITA07), September 2007, Wrexham, North Wales, UK ISCA 20 th International Conference on Computer Applications in Industry and Engineering (CAINE-07), November 2007, San Francisco, CA ISCA 19 th International Conference on Computer Applications in Industry and Engineering (CAINE-06), November 2006, Las Vegas, NV REVIEWERSHIPS Journals Journal of Computer (JCP) International Journal of Computers and Applications International Journal of Computer and Information Science (IJCIS) ISCA International Journal of Computers and Their Applications International Conference on Information Systems 2009 (ICIS 2009), Phoenix, Arizona EURASIP Journal on Wireless Communications and Networking Textbooks Stallings, W., & Brown, L. (2007). Computer Security: Principles and Practice. Prentice Hall. Conery, J. S. (2010). Exploration in Computing: An Introduction to Computer Science. CRC Press. AFFILIATIONS Association of Computer Machinery (ACM) ACM Special Interest Group on Security, Audit and Control (SIGSAC) Institute of Electrical and Electronics Engineers (IEEE) Upsilon Pi Epsilon (UPE) International Society for Computers and Their Applications (ISCA) CERTIFICATES SANS GIAC Security Essentials Certified (GSEC), COURSES TAUGHT Masters Courses

7 CISC615 - Design and Analysis of Algorithm CISC650 - Computer Networks CISC654/ MCIS652 - Information Security CISC663 - Object Oriented Database Systems CISC670 - Artificial Intelligence MCIS661/MMIS661 - Object Oriented Applications MCIS665 - Client Server Computing MCIS683 - Secure Computer Systems MCIS684 - Applied Cryptography Doctoral Courses CISD760 - Artificial Intelligence CISD765 Cryptography CISD775 Network Security

North Dakota State University Fargo, ND Ph.D. in Software Engineering Emphasis area: Security Requirements Engineering

North Dakota State University Fargo, ND Ph.D. in Software Engineering Emphasis area: Security Requirements Engineering Josh Pauli, Ph.D. EDUCATION North Dakota State University Fargo, ND Ph.D. in Software Engineering 2003-2006 Emphasis area: Security Requirements Engineering Dakota State University Madison, SD M.S. in

More information

Robert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA

Robert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA Summary Rob began his technical career with Automatic Data Processing (ADP), in their Dealer Service Division. His position at ADP laid the foundation for his passion for finding solutions to business

More information

Jun Li, Ph.D. School of Computing and Information Sciences Phone:

Jun Li, Ph.D. School of Computing and Information Sciences Phone: Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/

More information

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding. Mustafa El-Halabi Contact Information Fleifel Building Cell Phone: + (979) 422 4585 Mathaf E-mail: mhalabi@aust.edu.lb Beirut, Lebanon Webpage: https://mustafa-halabi.appspot.com/ Research Interests Education

More information

MAGNO QUEIROZ Curriculum Vitae

MAGNO QUEIROZ Curriculum Vitae MAGNO QUEIROZ Curriculum Vitae Office Management Information Systems Jon M. Huntsman School of Business Utah State University 3515 Old Main Hill Logan, UT 84322-3515 Location: Eccles Business Building

More information

HAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h)

HAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h) HAI ZHOU Electrical and Computer Engineering Northwestern University 2535 Happy Hollow Rd. Evanston, IL 60208-3118 Glenview, IL 60025 haizhou@ece.nwu.edu www.ece.nwu.edu/~haizhou (847) 491-4155 (o) (847)

More information

Dr. Ahmed K. Sadek 2. Experience

Dr. Ahmed K. Sadek 2. Experience Dr. Ahmed K. Sadek Education University of Maryland, College Park Ph.D. in Electrical and Computer Engineering, GPA = 4.0/4.0, May 2007 Thesis title: Cross-Layer Design for Cooperative Communications and

More information

Thuan Luong Nguyen. Dissertation Title: Assessing Knowledge Management Values by Using Intellectual Capital to Measure Organizational Performance

Thuan Luong Nguyen. Dissertation Title: Assessing Knowledge Management Values by Using Intellectual Capital to Measure Organizational Performance Thuan Luong Nguyen Advanced Data Analytics Graduate School The University of North Texas 1155 Union Circle, Denton TX 76203 Email: Thuan.Nguyen@unt.edu Education Doctor of Philosophy (Ph.D.) in Information

More information

CURRICULUM VITA. Richard E. Biehl, Ph.D.

CURRICULUM VITA. Richard E. Biehl, Ph.D. CURRICULUM VITA Richard E. Biehl, Ph.D. Lecturer Department of Industrial Engineering and Management Systems College of Engineering & Computer Science University of Central Florida 12800 Pegasus Dr., Orlando,

More information

Dr. Imran Khan University of Nebraska-Lincoln Marketing (402)

Dr. Imran Khan University of Nebraska-Lincoln Marketing (402) Dr. Imran Khan University of Nebraska-Lincoln Marketing (402) 472-4536 Email: ikhan3@unl.edu Education DBA, Kennesaw State University, 2014. Major: Marketing Dissertation Title: Vendor Firm Characteristics

More information

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor TEXAS STATE VITA I. Academic/Professional Background A. Name: David L. Gibbs Title: Assistant Professor B. Educational Background Degree Year University Major Thesis/Dissertation PhD 2015 Texas State University

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Dukpa Kim FIELDS OF INTEREST. Econometrics, Time Series Econometrics ACADEMIC POSITIONS

Dukpa Kim FIELDS OF INTEREST. Econometrics, Time Series Econometrics ACADEMIC POSITIONS Dukpa Kim Contact Information Department of Economics Phone: 82-2-3290-5131 Korea University Fax: 82-2-3290-2661 145 Anam-ro, Seongbuk-gu Email: dukpakim@korea.ac.kr Seoul, 02841 Korea FIELDS OF INTEREST

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

This document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information.

This document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information. December 2010 CDFM OVERVIEW The American Society of Military Comptrollers offers the Certified Defense Financial Manager (CDFM) program to those persons desiring to demonstrate proficiency in the core

More information

J I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213

J I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 J I N G H A I R A O Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 Office: +1 412 268 1357 Fax: +1 412 268 7287 Mobile: +1 412

More information

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and

More information

Jianhua Yang Ph.D. Professor TSYS School of Computer Science, Columbus State University 4225 University Ave., Columbus, GA (office)

Jianhua Yang Ph.D. Professor TSYS School of Computer Science, Columbus State University 4225 University Ave., Columbus, GA (office) Jianhua Yang Ph.D. Professor TSYS School of Computer Science, Columbus State University 4225 University Ave., Columbus, GA 31907 706-507-8180(office) yang_jianhua@columbusstate.edu, jhayng302@gmail.com

More information

PAST PRESENTATIONS Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016

PAST PRESENTATIONS Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016 Past Presentations PAST PRESENTATIONS 2016 Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016 Current Healthcare Information Security Trends and Challenges,

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

CURRICULUM VITAE. June, 2013

CURRICULUM VITAE. June, 2013 CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il

More information

A United States Cyber Academy Program

A United States Cyber Academy Program The GIAC certifications I earned in the Academy really helped open doors for me as a cybersecurity professional. Justin Sappington, Information Security Analyst at Umpqua Bank A United States Cyber Academy

More information

CURRICULUM VITAE SHON L. HARRIS, CISSP

CURRICULUM VITAE SHON L. HARRIS, CISSP CURRICULUM VITAE SHON L. HARRIS, CISSP Logical Security, Inc. 9901 I-10 West, Suite 800 San Antonio, Texas 78230 210-566-0488 888-373-5116 888-373-5116 Fax ShonHarris@LogicalSecurity.com www.logicalsecurity.com

More information

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS Vendor Events SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS National Events over 1200 profession IT Security attendees and over 45 SANS classes

More information

NEC Labs America, Princeton, NJ

NEC Labs America, Princeton, NJ Jie XIONG School of Information Systems Singapore Management University Jie XIONG jxiong@smuedusg Office Phone: 6828 9094 Date of CV revision: Citizenship: Singaporean Education 2010-2015 PhD in Computer

More information

EDUCATION RESEARCH EXPERIENCE

EDUCATION RESEARCH EXPERIENCE PERSONAL Name: Mais Nijim Gender: Female Address: 901 walkway, apartment A1 Socorro, NM 87801 Email: mais@cs.nmt.edu Phone: (505)517-0150 (505)650-0400 RESEARCH INTEREST Computer Architecture Storage Systems

More information

Opportunities to Integrate Technology Into the Classroom. Presented by:

Opportunities to Integrate Technology Into the Classroom. Presented by: Opportunities to Integrate Technology Into the Classroom Presented by: Mark Salamasick, CIA, CISA, CRMA, CSP Executive Director of Audit University of Texas System Discussion Topics Internal Audit Textbook

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with RP6, is presenting the SANS VetSuccess CyberTalent Immersion

More information

Certification Program. CSCM and CMAA

Certification Program. CSCM and CMAA Certification Program CSCM and CMAA 1 Business Management Institute History of BMI Development began in 1986 at Georgia State University with the support of the Georgia Chapter and the CMAA Board of Directors.

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

CURRICULUM VITA. Kristin M. Swartz

CURRICULUM VITA. Kristin M. Swartz CURRICULUM VITA Kristin M. Swartz PERSONAL DATA Office Address: Email: Justice Administration University of Louisville Brigman Hall 210 Louisville, KY 40292 kristin.swartz@louisville.edu Office Phone Number:

More information

Personal Profile. Allied Additional Subordinate Subject studied. Management Information System. Electronic Commerce. Image Processing.

Personal Profile. Allied Additional Subordinate Subject studied. Management Information System. Electronic Commerce. Image Processing. Personal Profile (1) Name of the teacher (in full): Ms. Sarika Vijay Purao (2) Department: (3) Designation: Assistant Professor (4) Qualifications of the teacher:- Degree/ Post Graduate Degree Examinatio

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

AYAN MONDAL ayan.mondal/

AYAN MONDAL ayan.mondal/ AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)

More information

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS FAST TRACK Three steps to a cybersecurity career QUALIFY Take the qualifying exam, complete the application process, and

More information

John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA (805)

John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA (805) Curriculum Vitae Contact Information Education John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA 93407 (805)756-6528 clements@brinckerhoff.org 2005

More information

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor TEXAS STATE VITA I. Academic/Professional Background A. Name: David L. Gibbs Title: Assistant Professor B. Educational Background Degree Year University Major Thesis/Dissertation PhD 2015 Texas State University

More information

DATES OF NEXT EVENT: Conference: June 4 8, 2007 Exhibits: June 4 7, 2007 San Diego Convention Center, San Diego, CA

DATES OF NEXT EVENT: Conference: June 4 8, 2007 Exhibits: June 4 7, 2007 San Diego Convention Center, San Diego, CA EVENT AUDIT DATES OF EVENT: Conference: July 24 28, 2006 Exhibits: July 24 27, 2006 LOCATION: Moscone Center, San Francisco, CA EVENT PRODUCER/MANAGER: Company Name: Association for Computing Machinery

More information

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research:

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research: Mohamed Mahmoud Mahmoud Azab -Assistant Prof., Informatics Research Institute, The City of Scientific Research & Technology Applications, Alexandria-Egypt. - Researcher, VT-MENA research center of Excellence,

More information

This is to certify that. Chris FitzGerald. has completed the course. Systems Security Engineering _eng 2/10/08

This is to certify that. Chris FitzGerald. has completed the course. Systems Security Engineering _eng 2/10/08 This is to certify that Chris FitzGerald has completed the course Systems Security Engineering - 206760_eng on 2/10/08 Systems Security Engineering About This Course Overview/Description To define the

More information

FACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University

FACULTY PROFILE. Total Experience : Academic : 7 Years and 3 Months. Degree Branch / Specialization College University FACULTY PROFILE Name Designation Email ID : A.K.Kavitha : Assistant Professor : kavitha.ece@srit.org Area of Specialization : Wireless Communication Total Experience : Academic : 7 Years and 3 Industry

More information

Matthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Arizona State University

Matthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Arizona State University Matthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Office: BA 320A E-mail (Work): msopha@asu.edu W. P. Carey School of Business Phone

More information

DATES OF EVENT: Conference: March 31 April 2, 2009 Exhibits: April 1 3, Sands Expo & Convention Center, Las Vegas, NV

DATES OF EVENT: Conference: March 31 April 2, 2009 Exhibits: April 1 3, Sands Expo & Convention Center, Las Vegas, NV EVENT AUDIT DATES OF EVENT: Conference: March 31 April 2, 2009 Exhibits: April 1 3, 2009 LOCATION: Sands Expo & Convention Center, Las Vegas, NV EVENT PRODUCER/MANAGER: Company Name: Reed Exhibitions Address:

More information

CHAIR Jr, r7~. cou EGE FACULTY CHAIR (if \G,Jl ~ ~k amica~ pc{ 2.-0 I ; <-0 l "?J Approved,G. 'S u,\? Approved. Approved

CHAIR Jr, r7~. cou EGE FACULTY CHAIR (if \G,Jl ~ ~k amica~ pc{ 2.-0 I ; <-0 l ?J Approved,G. 'S u,\? Approved. Approved 2013-2014 LONG SIGNATURE SHEET Proposal Number: SIS 10-07-13 _ ~f/; UNC CHARIDITE Proposal Title: Establish a graduate level course: Cloud Data Storage.:1T1.5 6' ~ 7AJ "1-11$ 8')(.0 Originating Department:

More information

DATES OF EVENT: Conference: March 23 March 25, 2010 Exhibits: March 24 March 26, Sands Expo & Convention Center, Las Vegas, NV

DATES OF EVENT: Conference: March 23 March 25, 2010 Exhibits: March 24 March 26, Sands Expo & Convention Center, Las Vegas, NV EVENT AUDIT DATES OF EVENT: Conference: March 23 March 25, 2010 Exhibits: March 24 March 26, 2010 LOCATION: Sands Expo & Convention Center, Las Vegas, NV EVENT PRODUCER/MANAGER: Company Name: Reed Exhibitions

More information

MOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03

MOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03 MOHAMMED I. AL-SALEH Jordan University of Science and Technology, Computer Science Department, Irbid, P.O. Box 3030, 22110 +962-788-052-892 misaleh@just.edu.jo, moealsaleh@gmail.com EDUCATION Ph.D., 2011

More information

Christopher P. Hodges, PE, RRC, CFM, LEED AP, IFMA Fellow, FRICS Principal

Christopher P. Hodges, PE, RRC, CFM, LEED AP, IFMA Fellow, FRICS Principal Christopher P. Hodges, PE, RRC, CFM, LEED AP, IFMA Fellow, FRICS Principal Years with FEA: 20 Total Years Experience: 30+ Education: Master of Science, Materials Science & Engineering, Johns Hopkins University

More information

Amy Babay April 2018

Amy Babay April 2018 Amy Babay www.dsn.jhu.edu/~babay 814-528-4205 babay@cs.jhu.edu Education PhD in Computer Science April 2018 PhD Research: Structured overlay networks for a new generation of Internet services, dependable

More information

Resume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram

Resume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram Resume Name: Designation: Qualifications: Subjects taught: Research specialization: Dr. M.Seshashayee Assistant Professor MCA, M.Tech, Ph.D. Programming In Java, Internet programming, Software Engineering,

More information

Auditor General's Office

Auditor General's Office City Purchasing Card Expense Report - January 2011 01/05/2011 National Association of Local Government Auditors $101.40 Professional Development Training: Knighton Award Contract (Webinar) 01/07/2011 The

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Brian F. Cooper. Distributed systems, digital libraries, and database systems

Brian F. Cooper. Distributed systems, digital libraries, and database systems Brian F. Cooper Home Office Internet 2240 Homestead Ct. #206 Stanford University cooperb@stanford.edu Los Altos, CA 94024 Gates 424 http://www.stanford.edu/~cooperb/app/ (408) 730-5543 Stanford, CA 94305

More information

ManTech Advanced Systems International 2018 Security Training Schedule

ManTech Advanced Systems International 2018 Security Training Schedule ManTech Advanced Systems International 2018 Security Training Schedule Risk Management Framework Course Dates Course Location Course Cost February 12 15, 2018 Las Vegas, NV $1,950.00 March 12 15, 2018

More information

An Overview of Mobile Security

An Overview of Mobile Security An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim

More information

A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing ( )

A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing ( ) A Complete Bibliography of the Proceedings Volumes of the ACM Symposia on the Theory of Computing (1970 1997) Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233

More information

Personnel Certification

Personnel Certification Personnel Certification Facilitating the Growth of a Global Economy Roy A. Swift, Ph.D. Senior Director, Personnel Credentialing Accreditation Programs American National Standards Institute Building a

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute, in collaboration with Augusta Warrior Project and Augusta University, is presenting

More information

Bachelor of Applied Science Degree IT NETWORKING

Bachelor of Applied Science Degree IT NETWORKING Bachelor of Applied Science Degree IT NETWORKING Beginning fall 2017! Whatcom Community College s nationally acclaimed computer information systems program will begin offering a bachelor of applied science

More information

Zoltan Safar. Education. Awards and Honors. Experience

Zoltan Safar. Education. Awards and Honors. Experience 1361 A. V. Williams Bldg. Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742, USA Phone: (+1) 301-405-5779 E-mail: zsafar@umd.edu Education Ph.D. in Electrical

More information

Dr. Muhammad Mubashir Khan

Dr. Muhammad Mubashir Khan Dr. Muhammad Mubashir Khan Associate Professor (Approved PhD Supervisor of Higher Education Commission Pakistan) Department of Computer Science & IT, NED University of Engineering & Technology, University

More information

AGILE BUSINESS MEDIA, LLC 500 E. Washington St. Established 2002 North Attleboro, MA Issues Per Year: 12 (412)

AGILE BUSINESS MEDIA, LLC 500 E. Washington St. Established 2002 North Attleboro, MA Issues Per Year: 12 (412) Please review your report carefully. If corrections are needed, please fax us the pages requiring correction. Otherwise, sign and return to your Verified Account Coordinator by fax or email. Fax to: 415-461-6007

More information

Arbee L.P. Chen ( 陳良弼 )

Arbee L.P. Chen ( 陳良弼 ) Arbee L.P. Chen ( 陳良弼 ) Asia University Taichung, Taiwan EDUCATION Phone: (04)23323456x1011 Email: arbee@asia.edu.tw - Ph.D. in Computer Engineering, Department of Electrical Engineering, University of

More information

Curriculum Vitae Detective Paul A. Lindvay #5497 Arizona Department of Public Safety Computer Forensics Unit

Curriculum Vitae Detective Paul A. Lindvay #5497 Arizona Department of Public Safety Computer Forensics Unit Computer Forensics Training (1005 Hours) Cybercop 315 Windows Artifacts Attended: May 2014 (32 hours) in Phoenix, AZ Advanced Computer Forensic Analysis and Incident Response Attended: February 2014 (36

More information

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 2016-2018 Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1 THE KU MSIT HANDBOOK 2 MS in Information Technology (MSIT) School of Engineering The University of Kansas According

More information

SANS Vendor Offerings Detail

SANS Vendor Offerings Detail SANS Vendor Offerings Detail After working with SANS for a few years now, the audience at SANS events and webinars continues to represent some of the most forward thinking IT security practitioners looking

More information

BCS Higher Education Qualifications. Level 6 Web Engineering Syllabus

BCS Higher Education Qualifications. Level 6 Web Engineering Syllabus BCS Higher Education Qualifications Level 6 Web Engineering Syllabus Version 3.0 December 2016 This is a United Kingdom government regulated qualification which is administered and approved by one or more

More information

ITSY Information Technology Security Course Syllabus Spring 2018

ITSY Information Technology Security Course Syllabus Spring 2018 ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L

More information

PhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt.

PhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt. AMAL MOH D BARAKAT AL-DWEIK HEBRON, WEST BANK, PALESTINE +970-2-2235142. EMAIL: AMAL@PPU.EDU Education PhD. of Information Networks (2004-2009). Cairo University. Faculty of Computers and Information.

More information

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan. Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that

More information

Page 1 of 6. B.Sc. (Honors) in Electrical Engineering, Kuwait University, August 1999.

Page 1 of 6. B.Sc. (Honors) in Electrical Engineering, Kuwait University, August 1999. Abd-Elhamid Mohamed Taha School of Computing, Queen's University, Kingston, Ontario, K7L 3N6 Tel: +1 (613) 533-6000 X75029, Fax: +1 (613) 533-6513 E-mail: taha@cs.queensu.ca, URL: http://www.cs.queensu.ca/~taha

More information

CYBERSECURITY: Scholarship and Job Opportunities

CYBERSECURITY: Scholarship and Job Opportunities CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job

More information

Karim H. Vellani, CPP, CSC Certified Security Consultant

Karim H. Vellani, CPP, CSC Certified Security Consultant Professional Experience Summary Karim H. Vellani is the President of Threat Analysis Group, LLC, an independent security consulting firm. Karim is Board Certified in Security Management (CPP), a Board

More information

Chris Vegter University of Northern Colorado Monfort College of Business (970)

Chris Vegter University of Northern Colorado Monfort College of Business (970) Chris Vegter University of Northern Colorado Monfort College of Business (970) 351-1244 Email: chris.vegter@unco.edu Education MBA, Colorado State University, 2006. Area of Study: Business Administration

More information

IMA and the CMA How They Can Help Your Career. Presented by: Honorable Kim R. Wallin, CMA, CFM, CPA John B. Pollara, CMA

IMA and the CMA How They Can Help Your Career. Presented by: Honorable Kim R. Wallin, CMA, CFM, CPA John B. Pollara, CMA IMA and the CMA How They Can Help Your Career Presented by: Honorable Kim R. Wallin, CMA, CFM, CPA John B. Pollara, CMA 1 IMA and Your Career WE NEED TO INSERT THE VIDEO HERE Agenda The Institute of Management

More information

Performance Evaluation of National Knowledge Network Connectivity

Performance Evaluation of National Knowledge Network Connectivity International Journal of Computer Applications (975 888) Performance Evaluation of National Knowledge Network Connectivity Vipin Saxena, PhD. Department of Computer Science B.B. Ambedkar University (A

More information

Print and Online Editorial Calendar

Print and Online Editorial Calendar January 2014 Ad close: 12/2/13 Materials due: 12/5/13 Campus Security & Life Safety Mobile Apps Security Locks, Doors, and Hardware ID Cards Municipal Security Video Surveillance Locks FETC, Jan. 28-31,

More information

Collaborative Next Generation Networking

Collaborative Next Generation Networking CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing

More information

Curriculum Vitæ. (Home address) 8399 Transvaal Blue Street Phone: (702) Las Vegas, NV Cell: (702)

Curriculum Vitæ. (Home address) 8399 Transvaal Blue Street Phone: (702) Las Vegas, NV Cell: (702) Curriculum Vitæ Jan Bækgaard Pedersen School of Computer Science Phone: (702) 895 2557 University of Nevada, Las Vegas Fax: (702) 895 2639 4505 South Maryland Parkway Email: matt@cs.unlv.edu Las Vegas,

More information

Software verification and testing, software evolution, program analysis, and formal methods.

Software verification and testing, software evolution, program analysis, and formal methods. GUOWEI YANG Assistant Professor Department of Computer Science Texas State University 601 University Drive, San Marcos, TX 78666 +1 (512) 245-2469 gyang@txstate.edu RESEARCH INTERESTS Software verification

More information

Programme Specification. MSc Telecommunications Engineering 2016/17

Programme Specification. MSc Telecommunications Engineering 2016/17 School of Engineering and the Built Environment Glasgow Caledonian University Programme Specification MSc Telecommunications Engineering 2016/17 1 Programme Specification Pro-forma 1. GENERAL INFORMATION

More information

Stavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987

Stavros Nikolaou. 413 Gates Hall URL:  Ithaca, NY, 14853, USA Date of Birth: December, 1987 413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education

More information

PUBLICATIONS. Journal Papers

PUBLICATIONS. Journal Papers PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.

More information

Objective: Education:

Objective: Education: Christopher L. Copeland 1008 Westminster Ln., Mansfield TX 76063 817.791.6728 chris@chriscopeland.com ccopeland@tarleton.edu Objective: I am an education professional with significant technical and process

More information

45 th Design Automation Conference

45 th Design Automation Conference 45 th Design Automation Conference EVENT AUDIT DATES OF EVENT: Conference: June 8 13, 2008 Exhibits: June 8 10, 2008 LOCATION: Anaheim Convention Center, Anaheim, CA EVENT PRODUCER/MANAGER: Company Name:

More information

Ph.D. with Distinction in Computer Science Advisor: Prof. Micha Sharir Dissertation: Geometric Arrangements: Substructures and Algorithms

Ph.D. with Distinction in Computer Science Advisor: Prof. Micha Sharir Dissertation: Geometric Arrangements: Substructures and Algorithms April 29, 2009 Esther Ezra phone (919) 660-6578 Levine Science Research Center D340 fax (919) 660-6502 Department of Computer Science, Duke University http://www.math.tau.ac.il/~estere Durham NC 27708

More information

OSC Guidance and Training for Internal Audit and Internal Control Practitioners. Tina Kim John Buyce

OSC Guidance and Training for Internal Audit and Internal Control Practitioners. Tina Kim John Buyce OSC Guidance and Training for Internal Audit and Internal Control Practitioners Tina Kim John Buyce Training Requirements for Auditors and Internal Control Professionals Yellow Book: Chapter 3 General

More information

Cybersecurity Training

Cybersecurity Training Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/cybetrn Expert-led training with

More information

Curriculum Vitae. University, England, UK, Ph.D. Digital Computer Systems, Electronic Systems Design Department, Cranfield

Curriculum Vitae. University, England, UK, Ph.D. Digital Computer Systems, Electronic Systems Design Department, Cranfield Curriculum Vitae Name: Imad Hussain Merza Al-Hussaini Place of Birth: Basrah, Iraq Date of Birth: 22/11/1953 Religion: Muslim Nationality: Iraqi Marital Status: Married Contact Information: Mobile: +9647901943311/

More information

A Bibliography of Publications of Jingling Xue

A Bibliography of Publications of Jingling Xue A Bibliography of Publications of Jingling Xue Jingling Xue Department of Mathematics, Statistics and Computing Science Armidale, NSW 2351 Australia Tel: +61 67 73 3149 FAX: +61 67 73 3312 E-mail: xue@neumann.une.edu.au

More information

Revising the MSIS 2016 Model Curriculum : Status Update and Panel Discussion

Revising the MSIS 2016 Model Curriculum : Status Update and Panel Discussion Association for Information Systems AIS Electronic Library (AISeL) 2015 Proceedings SIGED: IAIM Conference 2015 Revising the MSIS 2016 Model Curriculum : Status Update and Panel Discussion Heikki Topi

More information

Curriculum vitae , Athens GREECE : Web:

Curriculum vitae , Athens GREECE : Web: Curriculum vitae EVA H. JAHO 2 Naksou st., Vyronas 16 233, Athens GREECE : +306938648996 E-mail: jaho.eva@gmail.com Web: http://cgi.di.uoa.gr/~ejaho/ EDUCATION 6/2007 12/2011 PhD, Department of Informatics

More information

Computer and Network Security CET 4663 Dr. Philip Craiger Fall 2009

Computer and Network Security CET 4663 Dr. Philip Craiger Fall 2009 Computer and Network Security CET 4663 Dr. Philip Craiger Fall 2009 PROFESSOR Dr. Philip Craiger, CISSP Department of Engineering Technology & Assistant Director for Digital Evidence National Center for

More information

STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS

STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS Presentation Overview Location of the Department s premises The Department in a Nutshell Studies and Education: Offered in the context

More information

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018 Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more

More information

University of South Florida St. Petersburg

University of South Florida St. Petersburg University of South Florida St. Petersburg Kate Tiedemann College of Business Christopher J. Davis, Ph.D. CEng FBCS Professor - Information Systems & Decision Sciences Office: LPH 424 Phone: 727-873-4944

More information

Joe Michael Kniss December 2005

Joe Michael Kniss December 2005 Joe Michael Kniss December 2005 Research Interests 50 S. Central Campus Dr. MEB 3490 Salt Lake City, UT, 84112 jmk@sci.utah.edu Phone: 801-898-7977 http://www.cs.utah.edu/ jmk I am currently conducting

More information

How to Become a CMA (Certified Management Accountant) May 10, 2017

How to Become a CMA (Certified Management Accountant) May 10, 2017 How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information