J. Haadi Jafarian CV June J. Haadi Jafarian

Size: px
Start display at page:

Download "J. Haadi Jafarian CV June J. Haadi Jafarian"

Transcription

1 J. Haadi Jafarian Assistant Professor Dept. of Computer Science and Engineering University of Colorado Denver EDUCATION Ph.D University of North Carolina at Charlotte. Software and Information Systems. M.Sc Sharif University of Technology. Information Technology. B.Sc University of Tehran. Software Engineering. RESEARCH INTEREST/BACKGROUND My research interest lies in a spectrum of topics in security and privacy, including but not limited to active cyber defense, security analytics and automation, big data analytics for security and privacy, and securing critical infrastructures including cyber-physical systems, and Internet-of-Things. My Ph.D. research focuses on proposing two novel classes of active cyber defense against advanced and persistent network threats (APT) and sophisticated DDoS attacks, namely Cyber Agility (Moving Target Defense), and Active Cyber Deception. My Master s research includes topics in access control for pervasive and IoT environments, location privacy, and host-based intrusion detection. My industrial research background includes practical areas in network security (e.g. network telescopes, DNS sinkholes), malware analysis, database security, incident response, and Web security. PUBLICATIONS Citation Indices No. of citations: 366, h-index = 7, i10-index = 5 Active Cyber Defense [Ph.D. Research] J. Haadi Jafarian, A. Niakanlahiji, E. Al-Shaer, Q. Duan, Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers, 3rd ACM Workshop on Moving Target Defense, CCS Keywords - MTD, Deception, honeypot, honeynet, reconnaissance, data Anonymization J. Haadi Jafarian, E. Al-Shaer, Qi Duan, An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 12, Keywords - attack characterization, MTD, worm propagation, hypothesis testing, advanced persistent threat (APT), software-defined networking (SDN), Satisfiability Modulo Theories (SMT) 1

2 J. Haadi Jafarian, E. Al-Shaer and Qi Duan, Adversary-aware IP Address Randomization for Proactive Agility against Sophisticated Attackers, INFOCOM Keywords - adversary attribution, MTD, address mutation, worm propagation, hypothesis testing J. Haadi Jafarian, E. Al-Shaer and Qi Duan, Spatiotemporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers, ACM Workshop on Moving Target Defense, CCS Keywords - MTD, address mutation, worm propagation, spatial mutation, lateral movement modeling, graph theory E. Al-Shaer, Qi Duan and J. Haadi Jafarian, Random Host Mutation for Moving Target Defense, SECURECOMM, Keywords - MTD, IP mutation, Satisfiability Modulo Theories (SMT), worm propagation modeling J. Haadi Jafarian, E. Al-Shaer and Qi Duan, OpenFlow Random Host Mutation: Transparent Moving Target Defense using Software Defined Networking, ACM HotSDN, No. of citations: 200+ Keywords - MTD, IP mutation, SMT, Software-defined networking (SDN), OpenFlow DDoS Mitigation [Ph.D. Research] Qi Duan, E. Al-Shaer and J. Haadi Jafarian, Efficient Random Route Mutation Considering Flow and Network Constraints, IEEE CNS, Keywords - Route mutation, DDoS mitigation, Game Theory, SDN J. Haadi Jafarian, E. Al-Shaer and Qi Duan, Formal Approach for Route Agility against Persistent Attackers, ESORICS, Keywords - Route mutation, DDoS mitigation, SDN Qi Duan, J. Haadi Jafarian, E. Al-Shaer and J. Xu, On DDoS Attack Related Minimum Cut Problems, arxiv: , Keywords - minimum cut problem, DDoS, network inhibition problem Access Control J. Haadi Jafarian, H. Takabi, H. Touati, E. Hesamifard, M. Shehab, Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach, SACMAT Keywords - role mining, role-based access control (RBAC), Satisfiability Modulo Theories (SMT) J. Haadi Jafarian, M. Amini, CAMAC: A Context-Aware Mandatory Access Control Model, ISeCure journal, Vol.1, No. 1, Keywords - mandatory access control (MAC), context-aware systems, Internet-of-Things (Pervasive) environments A. Noorollahi, J. Haadi Jafarian, M. Amini, R. Jalili, GTHBAC: A Generalized Temporal History-based Access Control Model, Telecommunication Systems, Volume 45, Issue 2-3, pp , Keywords - semantic-based access control, temporal logic J. Haadi Jafarian, M. Amini, R. Jalili, A Context-Aware Mandatory Access Control Model for Multilevel Security Environments, SafeComp, Keywords - mandatory access control (MAC), multi-level environments, context-aware systems A. Noorollahi, M. Amini, R. Jalili, J. Haadi Jafarian, A History-Based Semantic Aware Access Control Model Using Logical Time Approach, IDCS, Keywords - semantic-based access control, temporal logic, logical time 2

3 J. Haadi Jafarian, M. Amini, R. Jalili, A dynamic mandatory access control model, Advances in Computer Science and Engineering, Springer, Keywords - mandatory access control (MAC), context-aware systems, Internet-of-Things (Pervasive) environments Privacy J. Haadi Jafarian, A Vagueness-based Obfuscation Technique for Protecting Location Privacy, PASSAT, Keywords - location privacy, spatial obfuscation, reliability, mobile networks J. Haadi Jafarian, A. Noorollahi, M. Amini, R. Jalili, Protecting Location Privacy through a Graphbased Location Representation and a Robust Obfuscation Technique, ICISC, Keywords - location privacy, spatial obfuscation, reliability, graph theory, distributed systems Intrusion Detection J. Haadi Jafarian, A. Abbasi, S. Safaei, A Gray-Box DPDA-Based Intrusion Detection Technique Using System-Call Monitoring, CEAS, Keywords - host-based intrusion detection, system call monitoring, pushdown automata (PDA) THESIS Ph.D. Thesis, Cyber Agility for Attack Deterrence and Deception, under supervision of Dr. Ehab-Al- Shaer, UNC Charlotte, M.Sc. Thesis, A Context-aware Information Flow Control Model, Sharif University of Technology, B.Sc. Thesis, An Efficient Multi-layer Architecture for Web Applications, University of Tehran, TEACHING University of Colorado Denver Teaching, CSCI 4800: Web Application Development, fall 2017 University of North Carolina at Charlotte Teaching, ITIS 4166 Network Based Application Development, fall 2015 TA, ITIS 6230/8230 Information Infrastructure Protection, fall 2012, spring 2014, spring 2015 TA, GRAD 6010/8010 Academic Writing for Graduate Students, spring 2016, fall 2016 TA, ITIS 6167/8161 Network and Information Security, spring 2013, spring 2014, fall 2014 TA, ITIS 3200 Introduction to Information Security and Privacy, fall 2013 Sharif University of Technology, Iran TA, Database security, spring 2008, spring 2009 TA, Advanced operating systems, fall

4 AWARDS AND HONORS 2017 Recognized as Most Successful Iranian Student at UNCC, faculty committee RSA Security Scholar, RSA Conference Security Scholar Program. ~2000$ award Center for Graduate Life at UNC Charlotte, Doctoral Writing Fellowship. 8000$ Graduate Assistantship Support Plan, Tuition scholarship. $100, Ranked 12 among in national entrance exam for Master s studies in IT 2000 Ranked 570 among 100,000+ in national entrance exam for undergraduate studies ACADEMIC SERVICE Reviewer IEEE INFOCOM JNSM 2017 IEEE Access 2014 HotSOS 2017 ICDCS 2014 TNSM 2014,16 CNSM 2013 IEEE IM CNS 2012 NOMS CCS 2012 NDSS 2015 ACM MTD Workshop Executive Committee Member ISeCure Journal 4

5 Word Cloud of Research Publications 5

Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte

Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte Cyber Defense & Network Assurance (CyberDNA) Center Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte March 5, 2012 About CyberDNA Vision CyberDNA Center is to enable assurable and usable

More information

MOHAMMAD ASHIQUR RAHMAN

MOHAMMAD ASHIQUR RAHMAN 1033 NOTTINGHAM DR (APT: A), COOKEVILLE, TENNESSEE, USA Phone: +17042419165 (Cell) +19313723525 (Office) E-mail: marahman@tntech.edu; ashiq2503@gmail.com LinkedIn: http://www.linkedin.com/pub/mohammad-ashiqur-rahman/72/b71/a59/

More information

Mohsen Rezvani. Curriculum Vitae

Mohsen Rezvani. Curriculum Vitae Mohsen Rezvani * Last modified: October 22, 2018. PERSONAL INFORMATION: Office Email Department of Computer Engineering, Shahrood University of Technology, Shahrood, Iran mrezvani@shahroodut.ac.ir, mohsen.rezvani@gmail.com

More information

CYBERSECURITY: Scholarship and Job Opportunities

CYBERSECURITY: Scholarship and Job Opportunities CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Master & Doctor of Philosophy Programs in Computer Science

Master & Doctor of Philosophy Programs in Computer Science Master & Doctor of Philosophy Programs in Computer Science Research Fields Pattern Recognition Data Analysis Internet of Things and Network Communication Machine Learning Web Semantic and Ontology For

More information

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3

More information

MOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03

MOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03 MOHAMMED I. AL-SALEH Jordan University of Science and Technology, Computer Science Department, Irbid, P.O. Box 3030, 22110 +962-788-052-892 misaleh@just.edu.jo, moealsaleh@gmail.com EDUCATION Ph.D., 2011

More information

Program Proposal for a Direct Converted Program. BS in COMPUTER SCIENCE

Program Proposal for a Direct Converted Program. BS in COMPUTER SCIENCE Program Proposal for a Direct Converted Program BS in COMPUTER SCIENCE Document Page number Curriculum Sheet p. 2 p. -year Roadmap p. p. 5 Two Year Course Schedule p. 6 (2018 2019 AY and 2019 2020 AY)

More information

CHAIR Jr, r7~. cou EGE FACULTY CHAIR (if \G,Jl ~ ~k amica~ pc{ 2.-0 I ; <-0 l "?J Approved,G. 'S u,\? Approved. Approved

CHAIR Jr, r7~. cou EGE FACULTY CHAIR (if \G,Jl ~ ~k amica~ pc{ 2.-0 I ; <-0 l ?J Approved,G. 'S u,\? Approved. Approved 2013-2014 LONG SIGNATURE SHEET Proposal Number: SIS 10-07-13 _ ~f/; UNC CHARIDITE Proposal Title: Establish a graduate level course: Cloud Data Storage.:1T1.5 6' ~ 7AJ "1-11$ 8')(.0 Originating Department:

More information

MS in Electrical Engineering & MS in Computer Engineering

MS in Electrical Engineering & MS in Computer Engineering MS in Electrical Engineering & MS in Computer Engineering Choosing a Degree Program Specialization Area & Degree Option Useful Hints George Mason University Volgenau School of Engineering (VSE) College

More information

An Overview of Mobile Security

An Overview of Mobile Security An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

MS in Computer Sciences & MS in Software Engineering

MS in Computer Sciences & MS in Software Engineering SUKKUR INSTITUTE OF BUSINESS ADMINISTRATION Merit-Quality-Excellence Schema of Studies for MS in Computer Sciences & MS in Software Engineering (2016-2017) DEPARTMENT OF COMPUTER SCIENCE Schema of Studies

More information

Department of Computer Science

Department of Computer Science Department of Computer Science The Department of Computer Science offers a Master of Science degree and a Doctor of Philosophy degree in Computer Science. M.S. in Computer Science (p. 1) Ph.D. in Computer

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State

More information

FRVM: Flexible Random Virtual IP Multiplexing in. software-defined networks

FRVM: Flexible Random Virtual IP Multiplexing in. software-defined networks FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks Dilli P. Sharma, Dong Seong Kim University of Canterbury Christchurch, New Zealand dilli.sharma@pg.canterbury.ac.nz dongseong.kim@canterbury.ac.nz

More information

Imani Palmer ipalmer2.web.engr.illinois.edu

Imani Palmer ipalmer2.web.engr.illinois.edu Imani Palmer ipalmer2@illinois.edu ipalmer2.web.engr.illinois.edu 240.676.7741 Research Interest Education Cyber Security, System Security, Real-Time Streaming Engines, Data Analysis University of Illinois

More information

Stavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987

Stavros Nikolaou. 413 Gates Hall URL:  Ithaca, NY, 14853, USA Date of Birth: December, 1987 413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education

More information

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018 Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more

More information

STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS

STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS Presentation Overview Location of the Department s premises The Department in a Nutshell Studies and Education: Offered in the context

More information

MS in Electrical Engineering & MS in Computer Engineering

MS in Electrical Engineering & MS in Computer Engineering MS in Electrical Engineering & MS in Computer Engineering Choosing a Degree Program, Specialization Area & Degree Option Useful Hints George Mason University Volgenau School of Engineering (VSE) College

More information

A senior design project on network security

A senior design project on network security Michigan Technological University Digital Commons @ Michigan Tech School of Business and Economics Publications School of Business and Economics Fall 2007 A senior design project on network security Yu

More information

Kianoush GholamiBoroujeni Ph.D. in Computer Science

Kianoush GholamiBoroujeni Ph.D. in Computer Science Kianoush GholamiBoroujeni Ph.D. in Computer Science Address: 1440 SW 104th Path, Apt 301 Miami, FL 33174. +1 (305)200-9577 kianooush@gmail.com Personal Webpage ABOUT ME HIGHLIGHTS...........................................................................................................

More information

Computer Engineering and Systems Group. Alex Sprintson Dept. of ECE Texas A&M University

Computer Engineering and Systems Group. Alex Sprintson Dept. of ECE Texas A&M University Computer Engineering and Systems Group Alex Sprintson Dept. of ECE Texas A&M University 2 About Computer Engineering in ECE A joint program between ECE and CS CE degrees M. S., M. E., Ph.D. Group leader:

More information

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018 Building Partnerships to meet Global Security Challenges Dr. Taylor Eighmy August 14, 2018 Charting Our Cybersecurity Future Cyber UTSA A leader in cyber education since 1999 Undergraduate Masters Doctoral

More information

Thesis: An Extensible, Self-Tuning, Overlay-Based Infrastructure for Large-Scale Stream Processing and Dissemination Advisor: Ugur Cetintemel

Thesis: An Extensible, Self-Tuning, Overlay-Based Infrastructure for Large-Scale Stream Processing and Dissemination Advisor: Ugur Cetintemel Olga Papaemmanouil Phone: +1 (401) 588-0230 Department of Computer Science Fax: +1 (401) 863-7657 Box 1910, 115 Waterman St, Floor 4 Email: olga@cs.brown.edu Providence, RI, 02912, USA Web: http://www.cs.brown.edu/

More information

Digital Measures Users Guide

Digital Measures Users Guide Digital Measures Users Guide 1 Table of Content Getting Started in Digital Measures 3 Prepopulated data 4 How to report errors in Digital Measures 4 What is Optional vs. Mandatory 6 Navigating Digital

More information

Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: FALL AY17)

Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: FALL AY17) Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: FALL AY17) Name/Rank/Service: Month/Year Enrolled: Projected Graduation Date:

More information

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017 Discover Viterbi: Computer Science, Cyber Security & Informatics Programs Viterbi School of Engineering University of Southern California Fall 2017 WebEx Quick Facts Will I be able to get a copy of the

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

CSci530 Final Exam. Fall 2014

CSci530 Final Exam. Fall 2014 CSci530 Final Exam Fall 2014 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 120 minutes to complete the exam. Please prepare your answers on

More information

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS INTRODUCTION Attivo Networks has partnered with McAfee to detect real-time in-network threats and to automate incident response

More information

Information Security Research and Education at Aalto. N. Asokan

Information Security Research and Education at Aalto. N. Asokan Information Security Research and Education at Aalto N. Asokan http://asokan.org/asokan/ @nasokan About me Professor, Aalto University, from Aug 2013 Professor, University of Helsinki, 2012-2017 IEEE Fellow

More information

Amir Aminzadeh Gohari

Amir Aminzadeh Gohari Amir Aminzadeh Gohari Contact Information Computer Eng. Phone: (707) 953-2647 E-mail: amirazg@ece.ucsb.edu Santa Barbara, CA 93106 USA Web: http://ece.ucsb.edu/ amirazg Education Sept. 2007 June 2011 Ph.D.,

More information

Bahador Bakhshi Sareskanrood

Bahador Bakhshi Sareskanrood Bahador Bakhshi Sareskanrood PhD, Assistance Professor Department of Computer Engineering Amirkabir University of Technology E-mail: bbakhshi[at]aut.ac.ir Homepage: ceit.aut.ac.ir/~bakhshis Fields of Interest

More information

Hacker Academy UK. Black Suits, White Hats!

Hacker Academy UK. Black Suits, White Hats! Hacker Academy UK Black Suits, White Hats! Cyber Security Training and Services Do your devices Protect you against Cyber-attacks? Chinese hackers have allegedly stolen 50 terabytes of data on F-35 aircraft,

More information

AYAN MONDAL ayan.mondal/

AYAN MONDAL ayan.mondal/ AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)

More information

UNIVERSITY OF SOUTH ALABAMA COMPUTER SCIENCE

UNIVERSITY OF SOUTH ALABAMA COMPUTER SCIENCE UNIVERSITY OF SOUTH ALABAMA COMPUTER SCIENCE 1 Computer Science CSC 108 Intro to Computer Science 3 cr An introduction to the major areas of computer science, such as computing systems, the binary number

More information

CYBER HUNTING. 4 th Annual Interdisciplinary Cyber Crime Conference Michigan State University March 3, Dr. Nicole Beebe, Ph.D.

CYBER HUNTING. 4 th Annual Interdisciplinary Cyber Crime Conference Michigan State University March 3, Dr. Nicole Beebe, Ph.D. CYBER HUNTING 4 th Annual Interdisciplinary Cyber Crime Conference Michigan State University March 3, 2017 Dr. Nicole Beebe, Ph.D. CISSP, CCFP, EnCE, ACE Department of Information Systems and Cyber Security

More information

Random Host Mutation for Moving Target Defense

Random Host Mutation for Moving Target Defense Random Host Mutation for Moving Target Defense Ehab Al-Shaer, Qi Duan, and Jafar Haadi Jafarian Department of Software and Information Systems University of North Carolina at Charlotte Charlotte, NC, USA

More information

MASTER OF SCIENCE IN COMPUTER SCIENCE

MASTER OF SCIENCE IN COMPUTER SCIENCE THE UNIVERSITY OF ZAMBIA SCHOOL OF NATURAL SCIENCES DEPARTMENT OF COMPUTER STUDIES MASTER OF SCIENCE IN COMPUTER SCIENCE November 2014 1) BACKGROUND From the inception of Computer Science programmes at

More information

Sherenaz Waleed Al-Haj Baddar

Sherenaz Waleed Al-Haj Baddar Sherenaz Waleed Al-Haj Baddar s.alhajbaddar@gmail.coms.baddar@ju.edu.jo Personal Information Nationality: Jordanian Current Employer: King Abdullah II School for Information Technology, The University

More information

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

Master Course in Computer Science Orientation day

Master Course in Computer Science Orientation day Master Course in Computer Science Orientation day Info on the Department of Computer Science Ranked first (in its area) in 5-year Research Assessment by Ministry of University and Research 2013 e 2017

More information

IT Security in Large IT Infrastructures SS18 Lecture 00: Preliminary Discussion

IT Security in Large IT Infrastructures SS18 Lecture 00: Preliminary Discussion IT Security in Large IT Infrastructures SS18 Lecture 00: Preliminary Discussion Florian Fankhauser Christian Schanes Christian Brem Franz Mairhofer INSO Industrial Software Institute of Information Systems

More information

French Research in Comp. Virology and Operational Cryptology

French Research in Comp. Virology and Operational Cryptology French Research in Computer Virology and Operational Cryptology Eric Filiol efiliol@esat.terre.defense.gouv.fr ESAT Rennes - Virology and Cryptology Lab. Canada - France Meeting on Security Vancouver -

More information

UNIVERSITY OF SOUTH ALABAMA COMPUTER SCIENCE

UNIVERSITY OF SOUTH ALABAMA COMPUTER SCIENCE UNIVERSITY OF SOUTH ALABAMA COMPUTER SCIENCE 1 Computer Science CSC 108 Intro to Computer Science 3 cr An introduction to the major areas of computer science, such as computing systems, the binary number

More information

Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development

Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development Ben Scribner, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education & Awareness Branch

More information

ECIT Institute (Est.2003)

ECIT Institute (Est.2003) ECIT Institute (Est.2003) Research Excellence & Innovation 180 people 4 Queen s University Belfast Research Groups - Digital Communications - High Frequency Electronics - Speech, Imaging and Vision Systems

More information

DAISY Data Analysis and Information SecuritY Lab

DAISY Data Analysis and Information SecuritY Lab DAISY Data Analysis and Information SecuritY Lab Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare Yingying (Jennifer) Chen Director of Data Analysis

More information

Welcome to Maastricht University. School of Business and Economics

Welcome to Maastricht University. School of Business and Economics Welcome to Maastricht University School of Business and Economics MSc Business Intelligence and Smart Services (BISS) Service design and development in cyber-society Dr. Alexander Grigoriev Why should

More information

MAGNO QUEIROZ Curriculum Vitae

MAGNO QUEIROZ Curriculum Vitae MAGNO QUEIROZ Curriculum Vitae Office Management Information Systems Jon M. Huntsman School of Business Utah State University 3515 Old Main Hill Logan, UT 84322-3515 Location: Eccles Business Building

More information

Muhannad Al-Jabi Personal Profile

Muhannad Al-Jabi Personal Profile Muhannad Al-Jabi Personal Profile Curriculum vitae Personal details Surname Forename Email address Contact phone number Al-Jabi Muhannad Computer Engineering Department Nablus Palestine mjabi@najah.edu

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help

More information

Note: All Electrical & Computer Engineering graduate students will be expected to read this guide before consulting academic advisors.

Note: All Electrical & Computer Engineering graduate students will be expected to read this guide before consulting academic advisors. Graduate Student Guide Department of Electrical & Computer Engineering Fall 2017 Note: All Electrical & Computer Engineering graduate students will be expected to read this guide before consulting academic

More information

RESUME WORK: (0484) / 3098

RESUME WORK: (0484) / 3098 RESUME 1.GENERAL İNFORMATİON DATE OF ISSUED 17.02.2017 IDENTİFİCATİON NUMBER TİTLE NAME SURNAME MAİL ADDRESS BİRTHDAY PHONE E-MAİL Arş. Gör. Ömer ASLAN Siirt University, Engineering Architecture Faculty,

More information

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.

Educational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan. Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

Graduate Student Orientation

Graduate Student Orientation Graduate Student Orientation Department of Computer Science The Volgenau School of Engineering Professor Sanjeev Setia, Chair Fall 2018 http://cs.gmu.edu Presented by: Professor Alex Brodsky Outline CS

More information

Active defence through deceptive IPS

Active defence through deceptive IPS Active defence through deceptive IPS Authors Apostolis Machas, MSc (Royal Holloway, 2016) Peter Komisarczuk, ISG, Royal Holloway Abstract Modern security mechanisms such as Unified Threat Management (UTM),

More information

Doctoral School: József Hatvany Doctoral School for Computer Science and Engineering

Doctoral School: József Hatvany Doctoral School for Computer Science and Engineering University of Miskolc Faculty of Mechanical Engineering and Doctoral School: József Hatvany Doctoral School for Computer Science and Engineering Name of the Study Program: Computer Science and Engineering

More information

The ECE Curriculum. Prof. Bruce H. Krogh Associate Dept. Head.

The ECE Curriculum. Prof. Bruce H. Krogh Associate Dept. Head. The ECE Curriculum Prof. Bruce H. Krogh Associate Dept. Head krogh@ece.cmu.edu 1 Freshman year ECE Core Courses 18-100 Introduction to Electrical and Computer Engineering physical devices analog circuits

More information

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Purdue University Global 208-209 Catalog BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help you

More information

MASTER OF ENGINEERING PROGRAM IN INFORMATION

MASTER OF ENGINEERING PROGRAM IN INFORMATION MASTER OF ENGINEERING PROGRAM IN INFORMATION AND COMMUNICATION TECHNOLOGY FOR EMBEDDED SYSTEMS (INTERNATIONAL PROGRAM) Curriculum Title Master of Engineering in Information and Communication Technology

More information

Blending Information Systems Security and Forensics Curricula

Blending Information Systems Security and Forensics Curricula Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2012 Proceedings Midwest (MWAIS) 5-2012 Blending Information Systems Security and Forensics Curricula Jason Ferguson Friends University,

More information

Best Practices in Healthcare Risk Management. Balancing Frameworks/Compliance and Practical Security

Best Practices in Healthcare Risk Management. Balancing Frameworks/Compliance and Practical Security Best Practices in Healthcare Risk Management Balancing Frameworks/Compliance and Practical Security Our industry is full of jargon terms that make it difficult to understand what we are buying To accelerate

More information

Security and networks

Security and networks Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,

More information

Zechao Shang. Department of Computer Science (773)

Zechao Shang. Department of Computer Science (773) Zechao Shang Department of Computer Science (773)766-0354 University of Chicago zcshang@cs.uchicago.edu 5730 South Ellis Avenue people.cs.uchicago.edu/ zcshang Chicago, Illinois 60637 INTERESTS I am interested

More information

Establishment of new Department of Informatics, UNIRI and experiences in teaching SE course

Establishment of new Department of Informatics, UNIRI and experiences in teaching SE course Establishment of new Department of Informatics, UNIRI and experiences in teaching SE course Nataša Hoić-Božić, natasah@inf.uniri.hr Sanja Čandrlić, sanjac@inf.uniri.hr Odjel za informatiku, Sveučilište

More information

Ph.D. in Computer Science (

Ph.D. in Computer Science ( Computer Science 1 COMPUTER SCIENCE http://www.cs.miami.edu Dept. Code: CSC Introduction The Department of Computer Science offers undergraduate and graduate education in Computer Science, and performs

More information

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Website: http:// ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Important note on English as a Second Language (ESL) and International

More information

IEEE Ghana Section. NEW OFFICERS- January 2017 to December 2018

IEEE Ghana Section. NEW OFFICERS- January 2017 to December 2018 IEEE Ghana Section NEW OFFICERS- January 2017 to December 2018 IEEE National Chair He is IEEE senior member. He received his PhD degree in Information Technology in 2014 from Aalborg University, Denmark.

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy

More information

Brian F. Cooper. Distributed systems, digital libraries, and database systems

Brian F. Cooper. Distributed systems, digital libraries, and database systems Brian F. Cooper Home Office Internet 2240 Homestead Ct. #206 Stanford University cooperb@stanford.edu Los Altos, CA 94024 Gates 424 http://www.stanford.edu/~cooperb/app/ (408) 730-5543 Stanford, CA 94305

More information

Integrated Security Destination Area Workshop May

Integrated Security Destination Area Workshop May Integrated Security Destination Area Workshop May 19 2017 Research Breakout Sessions Cyber Physical Systems Security 5/16/2017 Virginia Tech Integrated Security Destination Area Cyber Physical Systems

More information

Endpoint Protection : Last line of defense?

Endpoint Protection : Last line of defense? Endpoint Protection : Last line of defense? First TC Noumea, New Caledonia 10 Sept 2018 Independent Information Security Advisor OVERVIEW UNDERSTANDING ENDPOINT SECURITY AND THE BIG PICTURE Rapid development

More information

Enas El-Sayed Mohammed El-Sharawy

Enas El-Sayed Mohammed El-Sharawy Enas El-Sayed Mohammed El-Sharawy Assistant Professor Computer Department Education Faculty Jubail Personal Data Nationality Egyptian Date of Birth 3 November 1984 Department Computer Science Official

More information

Computer Science Electives and Clusters

Computer Science Electives and Clusters Course Number CSCI- Computer Science Electives and Clusters Computer Science electives belong to one or more groupings called clusters. Undergraduate students with the proper prerequisites are permitted

More information

Information Systems. Courses. Information Systems 1

Information Systems. Courses. Information Systems 1 Information Systems 1 Information Systems Courses INFSYS 1800 Computers and Information Systems: 3 This course develops skills in technology awareness, computer fluency, computing devices, ethical use

More information

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)

EFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV) Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Smart Attacks require Smart Defence Moving Target Defence

Smart Attacks require Smart Defence Moving Target Defence Smart Attacks require Smart Defence Moving Target Defence Prof. Dr. Gabi Dreo Rodosek Executive Director of the Research Institute CODE 1 Virtual, Connected, Smart World Real World Billions of connected

More information

ISACA Central Ohio Chapter Academic Scholarship 2018

ISACA Central Ohio Chapter Academic Scholarship 2018 ISACA Central Ohio Chapter Academic Scholarship 2018 What is ISACA? ISACA is a worldwide association of IS governance professionals ISACA advances global business leaders in technology, information and

More information

COURSE COUNSELING (FOR YEARS 3 & 4 IN )

COURSE COUNSELING (FOR YEARS 3 & 4 IN ) COURSE COUNSELING (FOR YEARS 3 & 4 IN 2017-18) Department of Information Engineering April 19, 2017 OUTLINE IERG & MIEG Curricula Major required & IE elective courses New IE courses IE courses offered

More information

Department of Computer Science

Department of Computer Science College of Science and Mathematics Department of Computer Science Dr. Vasil Hnatyshin Department Head Advising brochures also available online at: https://rucsm.org/cs/advising/brochures/ Fall 2017 Computer

More information

COMPUTER SCIENCE (CSCI)

COMPUTER SCIENCE (CSCI) Bucknell University 1 COMPUTER SCIENCE (CSCI) Faculty Professors: Xiannong Meng, Luiz Felipe Perrone Associate Professors: Stephen M. Guattery (Chair), Brian R. King, Lea D. Wittie Assistant Professors:

More information

ConfigSynth: A Formal Framework for Network Security Design Synthesis

ConfigSynth: A Formal Framework for Network Security Design Synthesis ConfigSynth: A Formal Framework for Network Security Design Synthesis Mohammad Ashiqur Rahman and Ehab Al-Shaer CyberDNA Research Center, UNC Charlotte Motivation Complexity of Security Configuration is

More information

Chris Vegter University of Northern Colorado Monfort College of Business (970)

Chris Vegter University of Northern Colorado Monfort College of Business (970) Chris Vegter University of Northern Colorado Monfort College of Business (970) 351-1244 Email: chris.vegter@unco.edu Education MBA, Colorado State University, 2006. Area of Study: Business Administration

More information

Imam Mohammad Ibn Saud Islamic University College of Computer and Information Sciences Department of Computer Sciences

Imam Mohammad Ibn Saud Islamic University College of Computer and Information Sciences Department of Computer Sciences 1121-1122 In the Name Of Allah, the Most Beneficent, the Most Merciful Imam Mohammad Ibn Saud Islamic University Department of Computer Sciences Program Description of Master of Science in Computer Sciences

More information

INFINIT Y TOTAL PROTECTION

INFINIT Y TOTAL PROTECTION CHECK POINT INFINIT Y TOTAL PROTECTION CHECK POINT INFINITY TOTAL PROTECTION Be s t T hre at P revention, A ll Inclusi ve INTRODUCTION Enterprises today need to battle Gen V (5th Generation) cyber-attacks,

More information

Software Reliability and Reusability CS614

Software Reliability and Reusability CS614 Software Reliability and Reusability CS614 Assiut University Faculty of Computers & Information Quality Assurance Unit Software Reliability and Reusability Course Specifications2011-2012 Relevant program

More information

Computer Science and Engineering Ira A. Fulton Schools of Engineering

Computer Science and Engineering Ira A. Fulton Schools of Engineering DEJUN YANG Computer Science and Engineering Ira A. Fulton Schools of Engineering 480-252-4741 Arizona State University dejun.yang@asu.edu Tempe, Arizona 85281 http://www.public.asu.edu/~dyang16/ EDUCATION

More information

Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence

Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence , pp.354-359 http://dx.doi.org/10.14257/astl.2016.139.71 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence Jong-Hyun Kim, Yangseo Choi, Joo-Young Lee, Sunoh Choi,

More information

2013 Ph.D (Computer Vision), Queensland University of Technology, Brisbane, Australia,

2013 Ph.D (Computer Vision), Queensland University of Technology, Brisbane, Australia, David Ryan Curriculum Vitae 27 Wyncroft St, Holland Park Brisbane, Queensland 4121 (+61) 424 554 196 david.ryan1@gmail.com dryan.id.au Education 2013 Ph.D (Computer Vision), Queensland University of Technology,

More information

Specialties Description

Specialties Description Software Engineering and Specialties Description http://asu.kh.ua/ 2017 NTU KhPI Software Engineering and National Technical University Kharkiv Polytechnic Institute is the oldest technical university

More information

Information Security Research and Education at Aalto. N. Asokan

Information Security Research and Education at Aalto. N. Asokan Information Security Research and Education at Aalto N. Asokan http://asokan.org/asokan/ @nasokan About me Professor, Aalto University, from Aug 2013 Professor, University of Helsinki, 2012-2017 IEEE Fellow

More information