Abid Khan. December, 2012-to Date Politecnico De Torino, Italy

Size: px
Start display at page:

Download "Abid Khan. December, 2012-to Date Politecnico De Torino, Italy"

Transcription

1 Abid Khan Personal Data Place of Birth: Address: Skype ID: Research Interests Peshawar, Pakistan Dept. of Computer Science,COMSATS Inst. of IT, Islamabad, Pakistan abidkhan.hit Cryptography application in security & privacy issues of distributed computing (including cloud computing, smart grids,p2p, D2D, IoT), secure provenance, genomic privacy Education Politecnico De Torino, Italy PostDoc Fellow December December 2011 Harbin Institute of Technology, Harbin, P.R.China Ph.D. Candidate, Computer Science, October 2004 to April 2008 Dissertation Topic: Secure Mobile Agent Computation Advisor: Prof. Xiamu Niu Quaid e Azam University, Islamabad, Pakistan M.Sc., Computer Science, 2002 Punjab University,Lahore, Pakistan B.SC, Mathematics and Physics,1999 Academic Experience CIIT, Islamabad, Pakistan Assistant Professor December, 2011-to Date CIIT, Islamabad, Pakistan As Incharge Graduate Programs responsible for managing all graduate programs related activities such as: students admission interviews, counseling graduate students, coordinating with faculty & students in MS/PhD Thesis related activities etc. December, 2012-to Date Politecnico De Torino, Italy PostDoc Fellow December December 2011 CIIT, Islamabad, Pakistan Assistant Professor April December, 2009 Taught graduate level courses of Cryptography,Design and Analysis of Algorithms. Responsible for lectures, exams,homework assignments, and grades. Lecturer July October 2004 Talks Given Secure Provenance in perspective: Issues and Challenges Invited talk given at Bahria University, 24th Dec Provenance in O 2 Invited Speaker at 5th ALICE/CERN ITS upgrade, MFT and O2 Asian Workshop,Wuhan,China, June 7-9, 2015.

2 Cloud Computing Security Issues and Challenges Invited Speaker at Bahria University, Islamabad, Pakistan,26th Dec, Security modeling of authentication mechanism of cloud computing using Petri Nets Invited Speaker at Pak-China Workshop on Network Security, organized by Pakistan Academy of Sciences, July Secure Mobile Agent Computation, given to e-security Lab at Politecnico De Torino,Italy, Feb Teaching Some of the courses which i taught recently are: 1. Cryptography Essentials (Spring 2017) 2. Public Key Cryptography (Spring 2017, 2016,2015,Fall 2014, Spring 2014,Fall 2013,Spring 2012) 3. Advance Algorithms Analysis (Fall 2015, Spring 2015,Fall 2014, Spring 2014,Fall 2013,Spring 2012) 4. Distributed System(Fall 2015, Spring 2015,Fall 2014, Spring 2014,Fall 2013,Fall 2011) 5. Cryptography and Network Security(Spring 2013) 6. Advance Topics in Mathematical Modelling (Spring 2012) 7. Cloud Computing Security and Privacy (Fall 2012) 8. Data Structures and Algorithms (Spring 2004) 9. Advanced Software Engineering(Fall 2002,Spring 2003) 10. Object Oriented Programming(Spring 2004,Fall 2003) 11. Introduction to Programming using Java(Spring 2003,Fall 2003) Students Supervision Graduated 1. Muzna Tahir(MS CS) Set Aggregation based Secure Data Aggregation in Smart Grids (Thesis Defended June, 2016) 2. Umber Sheikh(MS CS) Root Cause Analysis using Graph based inference (Thesis Defended June, 2016) 3. Usman Shafique(MS Information Security) Towards detection of Rank Attack in Routing Protocol for Low Power Lossy Network (IOT Security) (Thesis Defended June, 2016) 4. Faiqa Maqsood(MS CS) False Data Injection in Smart Grids (Thesis Defended June, 2016) 5. Bilal Ahmed(MS CS) Ontology based inferencing in large scale Provenance (Thesis Defended June, 2016) 6. Abdul Waheed(MS CS) Rule based inferencing in large scale Provenance (Thesis Defended June, 2016) 7. Khizar (MS CS), Research topic: A Zero Watermarking for data integrity protection in wireless sensor networks,thesis Defended (January, 2016) 8. Muhammad Ahmed (MS Information Security), Research topic: Towards a multi-agent Based Approach for Geo-location Assurance in Cloud Computing,Thesis Defended (January, 2016)

3 9. Muhammad Tayyab (MS Information Security), Research topic: A Fingerprinting Based approach for Illegal copy detection for Geo-location of Cloud Data.,Thesis Defended (January, 2016) 10. Kinza Sarwar (MS Information Security) Secure Logging as a service using a Zero Watermarking approach, Thesis Defended (January, 2016) 11. Samia Rehman (MS Information Security), Research topic: MATE in the Cloud-Secure Data Deletion on full compromised of cloud using proof of availability(poa),thesis Defended (June, 2015) 12. Anam Ahsan (MS Information Security), Research topic: An Ontology based approach for genomic privacy, Thesis Defended (June, 2015) 13. Haseeb Ahmed (MS Information Security), Research topic: Attribute based access control for outsourced provenance graph Thesis Defended (June, 2015) 14. Fuzel Jamil(MS CS), Research topic: Secure Provenance Storage Using Authenticated Data Structure, Thesis Defended (June, 2015) 15. Rehana Haider(MS CS), Research topic: A Secure Provenance Provenance Scheme using Provable Data Possession(PDP), Thesis Defended (June, 2015) 16. Ishtiaq Ahmed (MS CS), Research topic: A Model for generating unified format logs and provenance using RDF,Thesis Defended (June, 2015) 17. Usama Saleem (MS CS), Research topic: Towards Fault tolerant URL Filtering,Thesis Defended (June, 2015)(co-supervised with Dr.Mansoor) 18. Saba Noor (MS CS), Research topic: A ontology based approach to detect genomic privacy attacks,thesis Defended (June, 2015)(co-supervised with Dr.Mansoor) 19. Farah Naz(MS CS),Watermarking as a Service(WaaS) with Anonymity,Thesis Defended (Feb, 2015) 20. Sidra tul Muntaha(MS CS),Preserving Privacy of Outsourced Genomic Data,Thesis Defended (Feb, 2015) 21. Nasir Khan(MS CS),URL Filtering as a Big Data Problem,Thesis Defended (Feb, 2015) 22. Faheem Zafar(MS CS), Thesis Title: A Scalable Data Integrity Mechanism Based on PDP and JARs,Thesis Defended (June,2014) 23. Ayaaz Ahmed(MS CS), Thesis Title: Secure Logging as a service using Reversible Watermarking, Thesis Defended (January,2014) 24. Kashif Riaz(MS CS)(Co-Supervised with Dr.Mansoor Ahmed), Thesis Title : Ontology based framework for URL Filtering and Blocking, Thesis Defended (January,2014) 25. Amil Rohani Dar(MS Computer Science)(Co-Supervised with Dr.Mansoor Ahmed), Thesis Title: Medel Dewey Decimal Classification Scheme Using OWL Ontology for CIIT Library, Thesis Defended (January,2014) 26. Mubashira Nasir,(MS Information Security) (Co-Supervised with Dr. Adeel Anjum), Thesis Title: Privacy Preservation of Skewed Data, Thesis Defended (June 2016) 27. Muhammad Nazim,(MS CS) (Co-Supervised with Dr.Mansoor Ahmed), Thesis Title: Ontologybased approach for detecting Semantic Web attacks, Thesis Defended (June 2016) 28. Saleha Shafqat, (MS CS) (Co-Supervised with Dr.Mansoor Ahmed), Thesis Title: An Ontology-Based approach for detecting Drug Abuse Epidemiology, Thesis Defended (December 2015) 29. Amber Abid,(MS CS) (Co-Supervised with Dr.Mansoor Ahmed), Thesis Title:Ontologybased approach for detecting System Errors using Logs, Thesis Defended (December 2015)

4 30. Mubashar Hassan, (MS CS) (Co-Supervised with Dr.Mansoor Ahmed), Thesis Title:Ontologybased approach for multilingual URL filtering/blocking,thesis Defended (December 2015) 31. Muhammad Haseeb and Wajahat Munir(BS Computer Science), mobile agent based query execution for data management in cloud computing 32. Mubashira Nasir and Madiha Masood(BS CS), Suspicious activity detection (Spring 2013) 33. Arsalan Ahmed and Omer Akbar (BS Computer Science), security as a service for smart phones (Spring 2014) 34. Hassan Nadeem, Shahid A. Khan(BS Software Eng), Volunteer Computing on Android Devices,Spring M. Wajih ul Murtaza, Bilal Najeeb(BS CS), Provenance as a Service(PraaS), Spring 2016 In-Progress 1. Faheem Zafar (PhD), Research Topic: Security and Privacy of Cloud Data Storage (Since Fall 2014). 2. Idrees Ahmed (PhD) Research Topic: Provenance Chain Security 3. Hayat Khan(PhD), Research Topic: Cloud Forensics 4. Furqan Shahid(PhD),Research Topic: Garbled Computing 5. Ali Ahmed(PhD),Research topic: Security Ontologies (Co-supervised with Dr.Mansoor Ahmed Since Fall 2014) Journal Publications 1. Adeel Anjum, Abid Khan, Mansoor Ahmed, Masoom Alam et al. τ-safety: A Privacy Model for Sequential Publication with Arbitrary Updates, Computer & Security:Elsevier Volume 66, May 2017, Pages Anam nazir, Sai rehmanmalik, Nadeem Cheema, Muhammad Khurram Khan, Ziang Yang, Tanveer Khan, and Abid Khan A High-Level Domain-specific Language for SIEM: Design, Development and Formal Verification, Cluster Computing:Springer, 2017 (Accepted IF=1.514) 3. Faheem Zafar, Abid Khan, Mansoor Ahmed et al. A Survey of Data integrity schemes: Taxonomy, design challenges and future trends, Computer & Security:Elsevier Volume 65, March 2017, Pages 29 49, (IF 1.640) 4. Abid Khan, Sidra Tul Muntaha, Mansoor Ahmed, Adeel Anjum, Saif Ur Rehman, and Nadeem Javaid, Preserving Privacy and leakage protection of Outsourced Genomic Data Journal of Medical Imaging and Health Informatics, 2017 (Accepted IF 0.8) 5. Saleha Shafqat, Mansoor Ahmed, Abid Khan et al., An Ontology-Based Approach for Detecting Drug Abuse Epidemiology, Journal of Medical Imaging and Health Informatics, 2017 (Accepted IF 0.8) 6. Abid Khan, Farhana Jabeen,Farah Naz, Sabah Suhail, Mansoor Ahmed and Sarfaraz Nawaz, Buyer Seller Watermarking Protocols Issues and Challenges - A Survey, Journal of Network and Computer Applications: Elsevier Volume(75):pp: , Nov 2016 (IF=2.331) 7. Nadeem Javaid, Sheraz Hussain, Ashfaq Ahmad, Muhammad Imran, Abid Khan, Mohsen Guizan, Region based cooperative routingin underwater wireless sensor networks, Journal of Network and Computer Applications, (IF=2.331)

5 8. Mariam Akbar, Nadeem Javaid, Wadood Abdul, Sanaa Ghouzali, Abid Khan, Iftikhar Azim Niaz, Manzoor Ilahi, Balanced transmissions based trajectories of mobile sink in homogeneous wireless sensor networks, accepted in Journal of Sensors,IF= Saba Noor, Mansoor Ahmed, Abid Khan et al., An Ontology-Based Approach for Detecting Attacks on Genomic Data, Journal of Medical Imaging and Health Informatics, 2017 (Accepted IF 0.8) 10. Adeel Anjum, Saba Suhail, Faheem Zafar, Abid Khan, Privacy Preservation in Skewed Data using Frequency Distribution and Weightage (FDW), Journal of Medical Imaging and Health Informatics, 2017 (Accepted IF 0.8) 11. M. Alam, A.Ihsan, Abid Khan,Muazzam Ali et al., Optimizing SIEM Throughput on the Cloud Using Parallelization, PLOS ONE Nov, (IF=3.54) 12. Faheem Zafar,Abid Khan, Mansoor Ahmed, Majid Iqbal Khan, Farhana Jabeen, Zara Hamid, Naveed Ahmed and Faisal Bashir, A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs, KSII Transactions on Internet and Information Systems, vol. 10, no. 6, pp , DOI: /tiis (IF 0.537) 13. Faisal Bashir, Meer Khan,Ali Lodhi, Abid Khan, Sink-to-sink coordination framework using RPL: Routing protocol for low power and lossy networks, Journal of Sensors Vol.2016(2016) (IF 1.182). 14. Ashfaq Ahmad, Nadeem Javaid, Nabil Alrajeh, Zahoor Ali Khan, Umar Qasim, and Abid Khan, A Modified Feature Selection and Artificial Neural Network-Based Day-Ahead Load Forecasting Model for a Smart Grid, Applied Sciences(Special Issue Applied Artificial Neural Network ), 2015, 5(4), ; doi: /app , (IF 1.484) 15. Mukhtar Azeem, Majid Iqbal, Najamus Saqib,Manzoor Illahi, Abid Khan, and Mansoor Ahmed et al Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE , Mathematical Problems in Engineering Volume 2014 (2014), (IF 1.082) 16. Sidra Faheel, Munam Ali Shah, Abid Khan,Mansoor Ahmed, Smart Cities: A Survey on Security Concerns, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 2, Saba Arshad, Munam Ali Shah, Abid Khan,Mansoor Ahmed, Android Malware Detection and Protection: A Survey (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 2, D. Mahmood, N. Javaid, Z. A. Khan, U. Qasim, A. Khan, S. Qurashi, A. Memon, Modeling and Evaluating Performance of Routing Operations in Reactive Routing Protocols,Journal of Basic and Applied Scientific Research, 2013(ISI-Index) 19. Mahmood, D.; Javaid, N.; Qasim, U.; Khan, Z. A.; Khan, A.; Qurashi, S.; Memon, A, Modeling and Evaluating Performance of Routing Operations in Proactive Routing Protocols,Journal of Basic and Applied Scientific Research, 2013(ISI-Index) 20. A. Khan, X. Niu and Z. Yong, A Hybrid Approach for Mobile Agent Security using Reversible Watermarking and Dynamic Data Structure IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.1, No.1, January 2007 Pages: ISSN: X. Niu, A. Khan et al. Benchmarking Survey of Mobile Agent Systems, Source: Tien Tzu Hsueh Pao/Acta Electronica Sinica, v 33, n SUPPL, December, 2005, Pages: ISSN: Publisher: Chinese Institute of Electronics, Beijing, ,China (EI: Accession Number: ) 22. A. Khan, X. Niu and Z. Yong, Mobile Agent Computation Results Protection with Head Sealing, IJCSES International Journal of Computer Sciences and Engineering Systems, Vol.2, No.1, January 2008 Pages: ISSN:

6 23. A.Khan, X. Niu and Z. Yong, A Robust Framework for protecting Computation Results of Mobile Agents, Information Technology Journal 7(1): (EI Index) Conference Publications 1. Saba Suhail, Zuhaib ud din, Faheem Zafar, Abid Khan, Choong Seon Hong, Introducing Secure Provenance in IoT: Requirements and Challenges International Workshop on Secure Internet of Things(SIoT 2016), held in Conjunction with European Symposium on Research in Computer Security(ESORICS 2016), Crete - Greece. 2. Khizar, Muhammad Saleem Khan, Abid Khan, and Zuhaib Uddin Ahmad, A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks, IEEE international conference on network based information system (NBiS 2016) Ostrava, Czech Republic. 3. Muhammad Saleem Khan, Idrees Ahmed, Abid Khan, Majid. I. Khan Adaptive Reputation Weight Assignments Scheme for MANETs, (IEEE TrustComm-2016),Beijing,China. 4. Idrees Ahmed, Abid Khan, Muhammad Saleem Khan, Mansoor Ahmed, Aggregated Signatures for Chaining: A Secure Provenance Scheme, in 1st IEEE International Workshop on Security and Privacy in Advanced Persistent Threat (SPAPT 2016) held in conjunction with IEEE TrustComm-2016, Beijing,China. 5. A. Waheed and M. Ali Shah and Abid Khan, Secure login protocols: An analysis on modern attacks and solutions,in Proceedings of IEEE 22nd International Conference on Automation and Computing (ICAC), pp ,Colchester, UK, Sept Bilal S.Raja,Ahmed Ali,Mansoor Ahmed, Abid Khan et al., Semantics enabled role based sentiment analysis for drug abuse on social media: A framework, IEEE Symposium on Computer Applications Industrial Electronics (ISCAIE), , 2016, Penang, Malaysia. 7. M. Ahmed, A. Khan et al, Ontology-based solution for managing license agreement using Semantic Desktop,The Fifth International Conference on Collaborative Computing ARES 2010, proceedings. 8. Abid Khan, Q. Arshad, X. Niu, W. Anwar, Z. Yong, On the Security Properties of Mobile Agent Graph Head Sealing(MAGHS), IEEE International Conference on Information Security and Assurance(ISA 2009,Springer- Verlag LNCS : Pages ) 9. Abid Khan, N.Khan, W. Anwar, M. Ahmed, Mobile Agent Watermarking: Security Properties and attacks revisited, ACM FIT 2009 Proceedings. 10. A.N.Khan, X.Sha, W.Anwar, Abid Khan, Performance Analysis of Prioritized and Non Prioritized Handoff Call Queuing Schemes in Mobile Cellular Networks, ACM FIT 2009 Proceedings. 11. Abid Khan, U. Sharif, M. Ahmed, A.N.Khan, CLUSMA:A Mobile Agent based clustering middleware for Wireless Sensor Networks ACM FIT 2009 Proceedings 12. A.N.Khan, A.Khan, et al, Performance Analysis of Prioritized and Un-Prioritized Handoff Queuing Schemes in Cellular Mobile Networks ACM FIT 2009 Proceedings 13. Abid Khan, X. Niu and Z. Yong, On the Security Properties and attacks against Mobile Agent Watermark Encapsulation(MAWE) IEEE International Conference on System, Man and Cybernetics,(IEEE SMC 2008)(EI Index) 14. Abid Khan, X. Niu, Z. Yong Protecting Mobile Agent Computation results with reversible watermarking and digital signature. IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IEEE IIHMSP 2007),IEEE Computer Society, Pages (EI Index) 15. Z. Yong, X. Niu, A. Khan et al. A Novel Method of Watermarking Relational Databases Using Character String. IASTED International Conference on Artificial Intelligence and Applications, IASTED AIA 2006, Innsbruck Austria: (EI Index)

7 Articles Submitted 1. Masoom Alam, Tanveer Khan, Naina, Abid Khan, Privacy Aware Cross Tenant Access Control using Garbled Computing in the Cloud, IEEE Trans. on Information Forensics and Security 2. Mouzna Tahir, Abid Khan, Masoom Alam et al., Towards a Set Aggregation-Based Data Integrity Scheme for Smart Grids, annals of Telecommunications, Springer. 3. Usman Shafique, Abdur Rehman, Abid Khan, Faisal Bashir, Wadood Abdul and Sanaa Ghouzali, Towards detection of rank attack in routing protocol for low-power lossy network, IEEE Access 4. Idrees Ahmed, Abid Khan, Saif ur Rehman, Nadeem Javaid, Mohsen Guizani, Order Preserving Secure Provenance Scheme For Distributed Networks, IEEE Trans. on Information Forensics and Security 5. Shamaila Bisma Khan,Saif-ur-Rehman Malik, Masoom Alam, Abid Khan, Adnan Akhunzada, Muhammad Khurram Khan, Formal Modeling and Verification of Security Information and Event Management System Submitted to Springer Multimedia Tools and Application: Special Issue on Big Data Security 6. Masoom alam, Abid Khan et al., Interoperable ERP Systems: A Technical Implementation in OpenERP, PLOSONE 7. Abid Khan, Kinza Sarwar, Mansoor Ahmed, Saif ur Rehman, Abdul Hameed, Nadeem Javaid, Adeel Anjum, Secure Logging Schemes: Taxonomy, Design Challenges and Future Trends, IEEE Trans. on Information Forensics and Security M Junaid Shabbir, Najam-us-Saqib, Adeel Anjum, Saif U. R. Malik, Naveed Ahmed, Abid Khan, and Mansoor Ahmed, A Dual Signature-based Secure Internet E-Voting System, IEEE Security and Privacy, Abid Khan, Muhammad Tayyab, Muhammad Ahmed, Abdul Hameed and Mansoor Ahmed, A Survey of Geolocation Assurance schemes: taxonomy, design challenges, and future trends P2P Networks and applications: SI(Springer) Umber Sheikh, Bilal Ahmed, Waheed Ahmed, Abid Khan, Mansoor Ahmed, Abdul Hameed, A Comparative Analysis and Taxonomy of Provenance Inference Applications, Tools, and Techniques, Elsevier: Journal of Systems & Softwares 11. Idrees Ahmed, Abid Khan, Mansoor Ahmed et al. Towards an Order Preserving Secure Provenance Scheme For Distributed Networks Computer & Security Article 2016 Submitted 12. Khizar, Abid Khan,Abdul Hameed,Masoor Ahmed, Zuhaibud din, Nadeem Javaid, Aun Haider, A Zero Watermarking Scheme for Data Integrity in Wireless Sensor Networks JNCA: Elsevier K.Riaz, Abid Khan, Mansoor Ahmed Developing Web Filtering Ontology using protege OWL Tool Journal of Web Semantics Article K.Riaz, Abid Khan, Mansoor Ahmed Ontology based Framework for URL Filtering and Blocking Journal of Data Semantics,Springer K.Riaz, Abid Khan, Mansoor Ahmed A Survey of URL Filtering and Blocking JNCA: Elsevier Muhammad Hussain, Mansoor Ahmed and Abid Khan, Multi-Lingual URL Filtering: an Ontology-based approach Journal of Web Semantics, Saleha Asad, Mansoor Ahmed, Abid Khan and Amber Abid An Ontology-Based Approach for Detecting Drug Abuse Epidemiology, Journal of Biomedical Informatics, 2016

8 18. Farhana Khan,Abid Kan et al. Trust and reputation in e-health systems Health Info. Journal, K.Riaz, A.Khan, M.Ahmed,R.Usman Developing Web Filtering Ontology using protege OWL Tool, Journal of Web Semantics,Elsevier (Submitted) 20. K.Riaz, Abid Khan, M.Ahmed,R.Usman Ontology based Framework for URL Filtering and Blocking, Journal of Data Semantics,Springer (Submitted) 21. K.Riaz, Abid Khan, M.Ahmed,R.Usman A Survey of URL Filtering and Blocking, Journal of Network and Computer Applications,Elsevier (Submitted) Computer Skills Programming Experience in Java Applications: Generic Mapping Tools (GMT) - Unix mapping software, L A T E X, common Windows database, spreadsheet, and presentation software Operating Systems: Unix/Linux, Windows. MIRACL Library for Elliptic Curve Cryptography Bouncy Castle Provider for Cryptographic functions Languages English: Fluent Italian: Basic(willing to learn & improve) Chinese: Good listening and speaking skills(willing to learn & improve) References 1. Dr. Mansoor Ahmed, Assistant Professor Department of Computer Science, CIIT, Islamabad, Pakistan mansoor@comsats.edu.pk 2. Dr. Adeel Anjum, Assistant Professor Department of Computer Science, CIIT, Islamabad, Pakistan, adeel.anjum@comsats.edu.pk 3. Dr.Masoom Alam, Associate Professor Department of Computer Science, CIIT, Islamabad, Pakistan, masoom.alam@comsats.edu.pk 4. Dr.Nadeem Javaid, Associate Professor Department of Computer Science, CIIT, Islamabad, Pakistan, nadeemjavaid@comsats.edu.pk 5. Dr. Waqas Anwar, Associate Professor, Department of Computer Science, CIIT, Lahore, Pakistan, waqas@ciit.net.pk 6. Prof.Dr. ZheMing Lu, Professor, Zhejiang University, Hangzhou, P.R.China zhemingl@yahoo.com

Progress ICT TRG 2016~17. Team Lead: Dr Sajjad A. Madani Presented by Prof Dr Izhar Hussain

Progress ICT TRG 2016~17. Team Lead: Dr Sajjad A. Madani Presented by Prof Dr Izhar Hussain Progress ICT TRG 2016~17 Team Lead: Dr Sajjad A. Madani Presented by Prof Dr Izhar Hussain 1 Flow of Presentation 1. Research Theme 2. Projects and Progress 3. Way Forward 2 Original Research Themes e-solutions

More information

Dr. SHERAZ ANJUM (MSc PhD MIET CEng)

Dr. SHERAZ ANJUM (MSc PhD MIET CEng) Dr. SHERAZ ANJUM (MSc PhD MIET CEng) drsheraz@comsats.edu.pk House CB-758/A, Abdullah Street, Near Quba Market, Lane # 5, Peshawar Road, Rawalpindi Qualification PhD Engineering Microelectronics and Solid-State

More information

Stavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987

Stavros Nikolaou. 413 Gates Hall URL:  Ithaca, NY, 14853, USA Date of Birth: December, 1987 413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education

More information

Dr. Muhammad Mubashir Khan

Dr. Muhammad Mubashir Khan Dr. Muhammad Mubashir Khan Associate Professor (Approved PhD Supervisor of Higher Education Commission Pakistan) Department of Computer Science & IT, NED University of Engineering & Technology, University

More information

Name: Prof. Dr. Iftikhar Hussain. Designation: Vice Chancellor. Department: Industrial Engineering. Specialization: Flexible Manufacturing Systems

Name: Prof. Dr. Iftikhar Hussain. Designation: Vice Chancellor. Department: Industrial Engineering. Specialization: Flexible Manufacturing Systems Name: Prof. Dr. Iftikhar Hussain Designation: Vice Chancellor Department: Industrial Engineering Specialization: Flexible Manufacturing Systems Email: iftikhar@uetpeshawar.edu.pk Area of Interest: Design,

More information

Idris Mala. Qualification. Area of Specialization. Contact Information: Ext.: 3035

Idris Mala. Qualification. Area of Specialization. Contact Information:   Ext.: 3035 Idris Mala Contact Information: Email: imala@uit.edu Ext.: 3035 Qualification ME (Telecom) UIT HU 2006 MS (Info. Tech.) Hamdard University 2002 BE (Electrical) NEDUET 1984 Area of Specialization Database

More information

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address

More information

Mohsen Rezvani. Curriculum Vitae

Mohsen Rezvani. Curriculum Vitae Mohsen Rezvani * Last modified: October 22, 2018. PERSONAL INFORMATION: Office Email Department of Computer Engineering, Shahrood University of Technology, Shahrood, Iran mrezvani@shahroodut.ac.ir, mohsen.rezvani@gmail.com

More information

Framework For Cloud Computing Networks Pdf

Framework For Cloud Computing Networks Pdf A Cooperative Intrusion Detection System Framework For Cloud Computing Networks Pdf of Intrusion Detection Systems proposed over the years. Cloud Computing Cloud Computing suffers from various network

More information

CURRICULUM VITAE. June, 2013

CURRICULUM VITAE. June, 2013 CURRICULUM VITAE ד"ר אבי סופר Dr. Avi Soffer June, 2013 ORT Braude College, Department of Software Engineering, P.O. Box 78, Karmiel 2161002, Israel Telephone: +972-4-990-1720 Email: asoffer@braude.ac.il

More information

Sermakani. AM Mobile: : IBM Rational Rose, IBM Websphere Studio Application Developer.

Sermakani. AM Mobile: : IBM Rational Rose, IBM Websphere Studio Application Developer. Objective: With sound technical knowledge as background and with innovative ideas, I am awaiting to work on challenging jobs that expose my skills and potential ability. Also looking for the opportunity

More information

Brian F. Cooper. Distributed systems, digital libraries, and database systems

Brian F. Cooper. Distributed systems, digital libraries, and database systems Brian F. Cooper Home Office Internet 2240 Homestead Ct. #206 Stanford University cooperb@stanford.edu Los Altos, CA 94024 Gates 424 http://www.stanford.edu/~cooperb/app/ (408) 730-5543 Stanford, CA 94305

More information

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3

More information

CPD ACTIVITIES CALENDAR FOR THE YEAR 2018

CPD ACTIVITIES CALENDAR FOR THE YEAR 2018 CPD ACTIVITIES CALENDAR FOR THE YEAR 208 PEB Name: PEB Reg. No. Name of PEB Coordinator: ACADEMY PEB-S-UET-0059 Prof. Rizwan U. Farooqui S. No. CPD Title. Hands on Training: Ansys Fluent 2. Performance

More information

Request-Response Interaction Model in Constrained Networks

Request-Response Interaction Model in Constrained Networks Request-Response Interaction Model in Constrained Networks Izaz Ahmad Khan 1 *, Muhammad Safdar 2, Farman Ullah 3, Syed Roohullah Jan 4, Fazlullah Khan 5, Sabir Shah 6 1,2,3,6 Department of Computer Science,

More information

EDUCATION RESEARCH EXPERIENCE

EDUCATION RESEARCH EXPERIENCE PERSONAL Name: Mais Nijim Gender: Female Address: 901 walkway, apartment A1 Socorro, NM 87801 Email: mais@cs.nmt.edu Phone: (505)517-0150 (505)650-0400 RESEARCH INTEREST Computer Architecture Storage Systems

More information

17. Hussain, M. Z. & Jamaludin (2006), Postivity-preserving piecewise rational cubic interpolation, Matematika, Vol. 22(2), Hussain, M.

17. Hussain, M. Z. & Jamaludin (2006), Postivity-preserving piecewise rational cubic interpolation, Matematika, Vol. 22(2), Hussain, M. RESEARCH PROFILE:. Sarfraz, M. Butt, S. & Hussain, M. Z. (994), Interpolation for the positive data using rational cubics, Proc. ISOSS-IV August 27-3, Lahore, Pakistan, Vol. 8, 25-26. 2. Hussain, M. Z.

More information

DEPARTMENT OF COMPUTER SCIENCE

DEPARTMENT OF COMPUTER SCIENCE Department of Computer Science 1 DEPARTMENT OF COMPUTER SCIENCE Office in Computer Science Building, Room 279 (970) 491-5792 cs.colostate.edu (http://www.cs.colostate.edu) Professor L. Darrell Whitley,

More information

National University of Computer and Emerging Sciences, CFD Campus

National University of Computer and Emerging Sciences, CFD Campus National University of Computer and Emerging Sciences, CFD Campus From: INTER OFFICE MEMO 11-14/CFD-DR/006 November 12, 2014 Dr. Rana Muhammad Gufran Khan Incharge, Department of Electrical Engineering,

More information

Curriculum Vitae. Degree Grade/Division Major Subjects Institute

Curriculum Vitae. Degree Grade/Division Major Subjects Institute PERSONAL INFORMATION: Curriculum Vitae Name: Farhan Ullah Father s Name: Farid Ullah Nationality: Pakistani Marital Status: Married Date of birth: 01-04-1985 NIC: 17201-9456109-7 Email: farhankhan.cs@gmail.com

More information

Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") , Saint Petersburg, Russian FederationProfessoraPopova str.

Saint Petersburg Electrotechnical University LETI (ETU LETI) , Saint Petersburg, Russian FederationProfessoraPopova str. Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") 197376, Saint Petersburg, Russian FederationProfessoraPopova str., 5 Master s program "Computer Science and Knowledge Discovery" Professor

More information

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

Enas El-Sayed Mohammed El-Sharawy

Enas El-Sayed Mohammed El-Sharawy Enas El-Sayed Mohammed El-Sharawy Assistant Professor Computer Department Education Faculty Jubail Personal Data Nationality Egyptian Date of Birth 3 November 1984 Department Computer Science Official

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

IEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING

IEEE 2013 JAVA PROJECTS  Contact No: KNOWLEDGE AND DATA ENGINEERING IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

More information

J. Haadi Jafarian CV June J. Haadi Jafarian

J. Haadi Jafarian CV June J. Haadi Jafarian J. Haadi Jafarian Assistant Professor Dept. of Computer Science and Engineering University of Colorado Denver 704-408-3264 haadi.jafarian@ucdenver.edu EDUCATION Ph.D. 2017 University of North Carolina

More information

PhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt.

PhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt. AMAL MOH D BARAKAT AL-DWEIK HEBRON, WEST BANK, PALESTINE +970-2-2235142. EMAIL: AMAL@PPU.EDU Education PhD. of Information Networks (2004-2009). Cairo University. Faculty of Computers and Information.

More information

Personal Profile. Allied Additional Subordinate Subject studied. Management Information System. Electronic Commerce. Image Processing.

Personal Profile. Allied Additional Subordinate Subject studied. Management Information System. Electronic Commerce. Image Processing. Personal Profile (1) Name of the teacher (in full): Ms. Sarika Vijay Purao (2) Department: (3) Designation: Assistant Professor (4) Qualifications of the teacher:- Degree/ Post Graduate Degree Examinatio

More information

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology

ACIT'2015. Conference Program. Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology ACIT'2015 Conference Program Under the Patronage of Her Excellency Mrs. Majd Shweikeh Minister of Telecommunications and Information Technology Day 1 (Tuesday 15 December 2015) Registration Opening session

More information

J I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213

J I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 J I N G H A I R A O Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 Office: +1 412 268 1357 Fax: +1 412 268 7287 Mobile: +1 412

More information

First merit list for BS Microbiology

First merit list for BS Microbiology First merit list for BS Microbiology List of Candidates on Open Merit 1 11915 Maryam Wazir Attaullah Wazir mari.khan044@gmail.com OpenMeritSeats F R Bannu KPK SSC 853 1050 888 1100 Obtained NTS NAT 75

More information

Biodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering),

Biodata. Name: Ms. Jyoti M. Hurakadli. Designation: Associate Professor. Qualification: M.Tech (Computer Network Engineering), Biodata Name: Ms. Jyoti M. Hurakadli Designation: Associate Professor Qualification: M.Tech (Computer Network Engineering), B.E. (Computer Science and Engineering) Specialization: Computer Networking Date

More information

Detection of Missing Values from Big Data of Self Adaptive Energy Systems

Detection of Missing Values from Big Data of Self Adaptive Energy Systems Detection of Missing Values from Big Data of Self Adaptive Energy Systems MVD tool detect missing values in timeseries energy data Muhammad Nabeel Computer Science Department, SST University of Management

More information

Curriculum Vitae of Paolo Romano

Curriculum Vitae of Paolo Romano Curriculum Vitae of Paolo Romano Personal Information Place and Date of Birth: Rome (Italy), 4 March 1979 Citizenship: Italian Office Address: Dipartimento di Informatica e Sistemistica Antonio Ruberti

More information

CURRICULUM VITAE. I. General Information Dr. Samiullah Khan

CURRICULUM VITAE. I. General Information Dr. Samiullah Khan 1 CURRICULUM VITAE I. General Information Name: Dr. Samiullah Khan Date & Place of Birth February 22, 1982, Lakki Marwat (KPK) Postal Address: Institute of Business Management Sciences University of Agriculture,

More information

MASTER OF ENGINEERING PROGRAM IN INFORMATION

MASTER OF ENGINEERING PROGRAM IN INFORMATION MASTER OF ENGINEERING PROGRAM IN INFORMATION AND COMMUNICATION TECHNOLOGY FOR EMBEDDED SYSTEMS (INTERNATIONAL PROGRAM) Curriculum Title Master of Engineering in Information and Communication Technology

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Sherenaz Waleed Al-Haj Baddar

Sherenaz Waleed Al-Haj Baddar Sherenaz Waleed Al-Haj Baddar s.alhajbaddar@gmail.coms.baddar@ju.edu.jo Personal Information Nationality: Jordanian Current Employer: King Abdullah II School for Information Technology, The University

More information

AYAN MONDAL ayan.mondal/

AYAN MONDAL ayan.mondal/ AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)

More information

Kianoush GholamiBoroujeni Ph.D. in Computer Science

Kianoush GholamiBoroujeni Ph.D. in Computer Science Kianoush GholamiBoroujeni Ph.D. in Computer Science Address: 1440 SW 104th Path, Apt 301 Miami, FL 33174. +1 (305)200-9577 kianooush@gmail.com Personal Webpage ABOUT ME HIGHLIGHTS...........................................................................................................

More information

30 Eleanor Dr., # 908, Ottawa, ON, Canada, K2E 7E5 +1 (613)

30 Eleanor Dr., # 908, Ottawa, ON, Canada, K2E 7E5 +1 (613) 30 Eleanor Dr., # 908, Ottawa, ON, Canada, K2E 7E5 +1 (613) 907-6109 http://www.sce.carleton.ca/~ufarooq ufarooq@sce.carleton.ca Umar FAROOQ Research Interests Distributed Systems, Large-Scale Multi-Organizational

More information

Payal Gulati. House No. 1H-36, NIT, Faridabad E xp e r i e nc e

Payal Gulati. House No. 1H-36, NIT, Faridabad E xp e r i e nc e Payal Gulati House No. 1H-36, NIT, gulatipayal@yahoo.co.in Total Experience: 9.5 years E xp e r i e nc e Currently working as Assistant Professor (IT) in YMCA University of Science & Technology, since

More information

Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop / Conferences / FDP attended : 25

Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop / Conferences / FDP attended : 25 Name & Photo : R.VALARMATHI Designation: Qualification : Area of Specialisation : Associate Professor M.E.,(Ph.d) Cloud Computing Experience : Teaching : UG: 18 years PG : 6 Industry : - No. of workshop

More information

First merit list for MPhil Islamiyat

First merit list for MPhil Islamiyat Print General Meritlist First merit list for MPhil Islamiyat NOTE: The following candidates have been o ered admissions provisionally. The candidates are requested to print online fee challan using this

More information

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network A Survey on policies in Mobile ad-hoc Computational S. Kamble 1, A. Savyanavar 2 1PG Scholar, Department of Computer Engineering, MIT College of Engineering, Pune, Maharashtra, India 2Associate Professor,

More information

COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY

COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY Name: Department: Contact Details: Address for communication Email Phone Intercom Academic Background Qualifications: Qualifying Post Graduate Degree: Ph. D

More information

Collaborative Next Generation Networking

Collaborative Next Generation Networking CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission

More information

PRGMEA (North Zone) Lahore Voters List

PRGMEA (North Zone) Lahore Voters List PAKISTAN READYMADE GARMENTS MANUFACTURERS & EXPORTERS ASSOCIATION (NORTH ZONE) LAHORE 1 2 3 4 5 6 7 8 M/s Ali Murtaza Associates (Pvt.) Ltd. 22-KM Off Ferozepur Road, Rohi Nala, Mauza Dolu Khurd. Tehsil

More information

MAHATMA GANDHI INSTITUTE OF TECHNOLOGY Gandipet, Hyderabad FACULTY PROFILE 1. JNTUH REGISTRATION ID:

MAHATMA GANDHI INSTITUTE OF TECHNOLOGY Gandipet, Hyderabad FACULTY PROFILE 1. JNTUH REGISTRATION ID: MAHATMA GANDHI INSTITUTE OF TECHNOLOGY Gandipet, Hyderabad 500 075 FACULTY PROFILE 1. JNTUH REGISTRATION ID: 60150405-003701 2. DATE OF BIRTH: 10-01-1982 3. DESIGNATION: Asst.Professor 4. YEARS OF EXPERIENCE:

More information

MS in Computer Sciences & MS in Software Engineering

MS in Computer Sciences & MS in Software Engineering SUKKUR INSTITUTE OF BUSINESS ADMINISTRATION Merit-Quality-Excellence Schema of Studies for MS in Computer Sciences & MS in Software Engineering (2016-2017) DEPARTMENT OF COMPUTER SCIENCE Schema of Studies

More information

Analysis of Query Processing and Optimization

Analysis of Query Processing and Optimization Analysis of Query Processing and Optimization Nimra Memon, Muhammad Saleem Vighio, Shah Zaman Nizamani, Niaz Ahmed Memon, Adeel Riaz Memon, Umair Ramzan Shaikh Abstract Modern database management systems

More information

Master Course in Computer Science Orientation day

Master Course in Computer Science Orientation day Master Course in Computer Science Orientation day Info on the Department of Computer Science Ranked first (in its area) in 5-year Research Assessment by Ministry of University and Research 2013 e 2017

More information

M.S. in Information Systems

M.S. in Information Systems M.S. in Information Systems 1 M.S. in Information Systems (30 Credits) M.S. in Information Systems IS Core Courses IS 601 Web Systems Development 3 IS 663 System Analysis and Design 3 IS 631 Enterprise

More information

Results Winter Exam P r e s s Re le a s e

Results Winter Exam P r e s s Re le a s e P r e s s Re le a s e Pakistan Institute of Public Finance Accountants (PIPFA) has declared its Results of Corporate, AGP, Punjab Government, PMAD & Public Sectors for Winter Exam-2015, held during 02

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Dr. Ehsan Ullah Munir

Dr. Ehsan Ullah Munir Dr. Ehsan Ullah Munir Senior Member IEEE Associate Professor / Head Department of Computer Science COMSATS Institute of Information technology Wah Cantt, Pakistan Cell: 0333-5428189, Email: ehsanmunir@comsats.edu.pk

More information

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia

More information

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan. Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that

More information

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient

More information

Project Progress Report

Project Progress Report ASEAN IVO Project 2017 Project Title: A Hybrid Security Framework for IoT Networks Project Members: PTIT (Vietnam): Prof. Hai (others: Dr.Minh, Dr.Dau, MSc.Thang, Dr.Duy, ) NECTEC (Thailand): Dr. Chalee

More information

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State

More information

Name: S.Brindha. Assistant Professor Grade I. Designation: Qualification: B.E, M.E, Ph.D (Pursuing)

Name: S.Brindha. Assistant Professor Grade I. Designation: Qualification: B.E, M.E, Ph.D (Pursuing) Name: S.Brindha Designation: Qualification: B.E, M.E, Ph.D (Pursuing) Assistant Professor Grade I Area of specialization: B.E(ECE), M.E( &Networking) Ph.D(Pursuing) Radio over Fiber Networks Experience

More information

CURRICULUM VITÆ. Naama Kraus B.Sc. in Computer Science and Mathematics, Bar-Ilan University, Cum Laude GPA: 90.

CURRICULUM VITÆ. Naama Kraus B.Sc. in Computer Science and Mathematics, Bar-Ilan University, Cum Laude GPA: 90. CURRICULUM VITÆ Naama Kraus naamakraus@gmail.com Personal Information Home Address: 6 Trumpeldor Ave., Haifa, 32582, Israel Phone (Home): +972 4 8328216 Phone (Mobile): +972 55 6644563 Date of Birth: 29-APR-1974

More information

Void main Technologies

Void main Technologies Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program. ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

Resume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram

Resume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram Resume Name: Designation: Qualifications: Subjects taught: Research specialization: Dr. M.Seshashayee Assistant Professor MCA, M.Tech, Ph.D. Programming In Java, Internet programming, Software Engineering,

More information

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION

More information

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research:

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research: Mohamed Mahmoud Mahmoud Azab -Assistant Prof., Informatics Research Institute, The City of Scientific Research & Technology Applications, Alexandria-Egypt. - Researcher, VT-MENA research center of Excellence,

More information

Evolution of XML Applications

Evolution of XML Applications Evolution of XML Applications University of Technology Sydney, Australia Irena Mlynkova 9.11. 2011 XML and Web Engineering Research Group Department of Software Engineering Faculty of Mathematics and Physics

More information

Interconnected Computer Networks Security and Internet of Things: Wireless Sensor Networks

Interconnected Computer Networks Security and Internet of Things: Wireless Sensor Networks Interconnected Computer Networks Security and Internet of Things: Wireless Sensor Networks Inam Ullah Khan 1, Nazia Azim 2,Syed Bilal Hussain Shah, Yin Fuliang 4, Muhammad Sameen 5 1 Isra University, Islamabadad

More information

Dr. Zheng Chang. Personal. Education and Qualifications. Professional Experience

Dr. Zheng Chang. Personal. Education and Qualifications. Professional Experience Dr. Zheng Chang Assistant Professor (Tutkijatohtori, Docent) Faculty of Information Technology University of Jyväkylä P.O.Box 35(Agora), 40014 Jyväkylä, Finland Phone: +358 408054143 Email: zheng.chang@jyu.fi

More information

Doctoral School: József Hatvany Doctoral School for Computer Science and Engineering

Doctoral School: József Hatvany Doctoral School for Computer Science and Engineering University of Miskolc Faculty of Mechanical Engineering and Doctoral School: József Hatvany Doctoral School for Computer Science and Engineering Name of the Study Program: Computer Science and Engineering

More information

Void main Technologies

Void main Technologies SNO TITLE Domain 1. A Hybrid Approach for Detecting Automated Spammers in Twitter Data mining 2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage 3. A Lightweight Secure

More information

Jun Li, Ph.D. School of Computing and Information Sciences Phone:

Jun Li, Ph.D. School of Computing and Information Sciences Phone: Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/

More information

UNIVERSITY OF ENGINEERING & TECHNOLOGY LAHORE

UNIVERSITY OF ENGINEERING & TECHNOLOGY LAHORE UNIVERSITY OF ENGINEERING & TECHNOLOGY LAHORE 1 Power System Simulation Laboratory Venue: Ground Floor Department of Electrical Engineering (New Block) (Opposite Electronics Lab) Description This course

More information

MS in Electrical Engineering & MS in Computer Engineering

MS in Electrical Engineering & MS in Computer Engineering MS in Electrical Engineering & MS in Computer Engineering Choosing a Degree Program Specialization Area & Degree Option Useful Hints George Mason University Volgenau School of Engineering (VSE) College

More information

Comparative Analysis of GUI Testing vs. HCI: Applying on Information Systems

Comparative Analysis of GUI Testing vs. HCI: Applying on Information Systems Proceedings of the 1st International Multi-Disciplinary Conference (IMDC), The University of Lahore, Gujrat Campus, PK, 23- Comparative Analysis of GUI Testing vs. HCI: Applying on Information Systems

More information

MSc entry onwards UCL UCL. Engineering Sciences

MSc entry onwards UCL UCL. Engineering Sciences PROGRAMME SPECIFICATION Programme Specification MSc in Information Security Programme title: Final award (BSc, MA etc): (where stopping off points exist they should be detailed here and defined later in

More information

STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS

STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS Presentation Overview Location of the Department s premises The Department in a Nutshell Studies and Education: Offered in the context

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0 ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN: Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The

More information

Performance Evaluation Analysis of Group Mobility in Mobile Ad hoc Networks

Performance Evaluation Analysis of Group Mobility in Mobile Ad hoc Networks Performance Evaluation Analysis of Group Mobility in Mobile Ad hoc Networks Ehtsham Irshad, Wajahat Noshairwan, Muhammad Shafiq, Shahzada Khurram, Azeem Irshad, Muhammad Usman University Institute of Information

More information

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding. Mustafa El-Halabi Contact Information Fleifel Building Cell Phone: + (979) 422 4585 Mathaf E-mail: mhalabi@aust.edu.lb Beirut, Lebanon Webpage: https://mustafa-halabi.appspot.com/ Research Interests Education

More information

Security in sensors, an important requirement for embedded systems

Security in sensors, an important requirement for embedded systems Security in sensors, an important requirement for embedded systems Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer AISEC Institute for Applied

More information

QUALIFICATION HIGHLIGHTS

QUALIFICATION HIGHLIGHTS MUHAMMAD ZUBAIR School of Information and Communication Engineering Dalian University of Technology, Dalian, China E-mail: m.zubairpaf@gmail.com, Mobile: 008615998557184 PhD Scholar Telecommunication expert

More information

Dr. Muhammad Qaiser Saleem

Dr. Muhammad Qaiser Saleem Dr. Muhammad Qaiser Saleem Postal address: H. No. G 103, Street 3 Phase 4, Officers Colony, Wah Cantt, Rawalpindi, Punjab,. Personal Particulars IT Experience: Date of Birth: Marital Status: Nationality:

More information

Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington

Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington email: sevilla@cs.washington.edu Research Interests Computer networks, Host mobility, Web technology, Content caching Education University

More information

DR. UMMA HANY. Current Status: Education: Career Summary:

DR. UMMA HANY. Current Status: Education: Career Summary: DR. UMMA HANY Address: House No. 20, Road No. 18, Sector-11, Uttara, Dhaka-1230 Mobile : +8801712002418 e-mail : ummahany@baiust.edu.bd; ummahany@gmail.com. Current Status: Associate Professor and Head

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

The 2018 (14th) International Conference on Data Science (ICDATA)

The 2018 (14th) International Conference on Data Science (ICDATA) CALL FOR PAPERS LATE BREAKING PAPERS, POSITION PAPERS, ABSTRACTS, POSTERS Paper Submission Deadline: May 20, 2018 The 2018 (14th) International Conference on Data Science (ICDATA) (former International

More information

Department of Computer Science

Department of Computer Science Department of Computer Science The Department of Computer Science offers a Master of Science degree and a Doctor of Philosophy degree in Computer Science. M.S. in Computer Science (p. 1) Ph.D. in Computer

More information

Muhannad Al-Jabi Personal Profile

Muhannad Al-Jabi Personal Profile Muhannad Al-Jabi Personal Profile Curriculum vitae Personal details Surname Forename Email address Contact phone number Al-Jabi Muhannad Computer Engineering Department Nablus Palestine mjabi@najah.edu

More information

Thesis: An Extensible, Self-Tuning, Overlay-Based Infrastructure for Large-Scale Stream Processing and Dissemination Advisor: Ugur Cetintemel

Thesis: An Extensible, Self-Tuning, Overlay-Based Infrastructure for Large-Scale Stream Processing and Dissemination Advisor: Ugur Cetintemel Olga Papaemmanouil Phone: +1 (401) 588-0230 Department of Computer Science Fax: +1 (401) 863-7657 Box 1910, 115 Waterman St, Floor 4 Email: olga@cs.brown.edu Providence, RI, 02912, USA Web: http://www.cs.brown.edu/

More information

CURRICULUM VITAE. Discipline University /Board Year % Secured. Indian Institute of Technology (IIT), Kharagpur. (NIT), Rourkela

CURRICULUM VITAE. Discipline University /Board Year % Secured. Indian Institute of Technology (IIT), Kharagpur. (NIT), Rourkela CURRICULUM VITAE Name: Dr. ASHOK KUMAR TURUK Personal Data : Position Held: Assistant Professor Department : Computer Science & Engineering Office Address : Dept. of Computer Science & Engineering. (NIT)

More information

Dr. Ahmed K. Sadek 2. Experience

Dr. Ahmed K. Sadek 2. Experience Dr. Ahmed K. Sadek Education University of Maryland, College Park Ph.D. in Electrical and Computer Engineering, GPA = 4.0/4.0, May 2007 Thesis title: Cross-Layer Design for Cooperative Communications and

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Telecommunications and Networks Award MSc School School of Engineering and Mathematical Sciences Department or equivalent School

More information

Gateway Based WSN algorithm for environmental monitoring for Energy Conservation

Gateway Based WSN algorithm for environmental monitoring for Energy Conservation International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-56 Gateway Based WSN algorithm for environmental monitoring for Energy Conservation Arunesh Kumar Singh 1, Arjun Kumar

More information