J. Haadi Jafarian CV June J. Haadi Jafarian
|
|
- Beatrice Harris
- 5 years ago
- Views:
Transcription
1 J. Haadi Jafarian Assistant Professor Dept. of Computer Science and Engineering University of Colorado Denver EDUCATION Ph.D University of North Carolina at Charlotte. Software and Information Systems. M.Sc Sharif University of Technology. Information Technology. B.Sc University of Tehran. Software Engineering. RESEARCH INTEREST/BACKGROUND My research interest lies in a spectrum of topics in security and privacy, including but not limited to active cyber defense, security analytics and automation, big data analytics for security and privacy, and securing critical infrastructures including cyber-physical systems, and Internet-of-Things. My Ph.D. research focuses on proposing two novel classes of active cyber defense against advanced and persistent network threats (APT) and sophisticated DDoS attacks, namely Cyber Agility (Moving Target Defense), and Active Cyber Deception. My Master s research includes topics in access control for pervasive and IoT environments, location privacy, and host-based intrusion detection. My industrial research background includes practical areas in network security (e.g. network telescopes, DNS sinkholes), malware analysis, database security, incident response, and Web security. PUBLICATIONS Citation Indices No. of citations: 366, h-index = 7, i10-index = 5 Active Cyber Defense [Ph.D. Research] J. Haadi Jafarian, A. Niakanlahiji, E. Al-Shaer, Q. Duan, Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers, 3rd ACM Workshop on Moving Target Defense, CCS Keywords - MTD, Deception, honeypot, honeynet, reconnaissance, data Anonymization J. Haadi Jafarian, E. Al-Shaer, Qi Duan, An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 12, Keywords - attack characterization, MTD, worm propagation, hypothesis testing, advanced persistent threat (APT), software-defined networking (SDN), Satisfiability Modulo Theories (SMT) 1
2 J. Haadi Jafarian, E. Al-Shaer and Qi Duan, Adversary-aware IP Address Randomization for Proactive Agility against Sophisticated Attackers, INFOCOM Keywords - adversary attribution, MTD, address mutation, worm propagation, hypothesis testing J. Haadi Jafarian, E. Al-Shaer and Qi Duan, Spatiotemporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers, ACM Workshop on Moving Target Defense, CCS Keywords - MTD, address mutation, worm propagation, spatial mutation, lateral movement modeling, graph theory E. Al-Shaer, Qi Duan and J. Haadi Jafarian, Random Host Mutation for Moving Target Defense, SECURECOMM, Keywords - MTD, IP mutation, Satisfiability Modulo Theories (SMT), worm propagation modeling J. Haadi Jafarian, E. Al-Shaer and Qi Duan, OpenFlow Random Host Mutation: Transparent Moving Target Defense using Software Defined Networking, ACM HotSDN, No. of citations: 200+ Keywords - MTD, IP mutation, SMT, Software-defined networking (SDN), OpenFlow DDoS Mitigation [Ph.D. Research] Qi Duan, E. Al-Shaer and J. Haadi Jafarian, Efficient Random Route Mutation Considering Flow and Network Constraints, IEEE CNS, Keywords - Route mutation, DDoS mitigation, Game Theory, SDN J. Haadi Jafarian, E. Al-Shaer and Qi Duan, Formal Approach for Route Agility against Persistent Attackers, ESORICS, Keywords - Route mutation, DDoS mitigation, SDN Qi Duan, J. Haadi Jafarian, E. Al-Shaer and J. Xu, On DDoS Attack Related Minimum Cut Problems, arxiv: , Keywords - minimum cut problem, DDoS, network inhibition problem Access Control J. Haadi Jafarian, H. Takabi, H. Touati, E. Hesamifard, M. Shehab, Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach, SACMAT Keywords - role mining, role-based access control (RBAC), Satisfiability Modulo Theories (SMT) J. Haadi Jafarian, M. Amini, CAMAC: A Context-Aware Mandatory Access Control Model, ISeCure journal, Vol.1, No. 1, Keywords - mandatory access control (MAC), context-aware systems, Internet-of-Things (Pervasive) environments A. Noorollahi, J. Haadi Jafarian, M. Amini, R. Jalili, GTHBAC: A Generalized Temporal History-based Access Control Model, Telecommunication Systems, Volume 45, Issue 2-3, pp , Keywords - semantic-based access control, temporal logic J. Haadi Jafarian, M. Amini, R. Jalili, A Context-Aware Mandatory Access Control Model for Multilevel Security Environments, SafeComp, Keywords - mandatory access control (MAC), multi-level environments, context-aware systems A. Noorollahi, M. Amini, R. Jalili, J. Haadi Jafarian, A History-Based Semantic Aware Access Control Model Using Logical Time Approach, IDCS, Keywords - semantic-based access control, temporal logic, logical time 2
3 J. Haadi Jafarian, M. Amini, R. Jalili, A dynamic mandatory access control model, Advances in Computer Science and Engineering, Springer, Keywords - mandatory access control (MAC), context-aware systems, Internet-of-Things (Pervasive) environments Privacy J. Haadi Jafarian, A Vagueness-based Obfuscation Technique for Protecting Location Privacy, PASSAT, Keywords - location privacy, spatial obfuscation, reliability, mobile networks J. Haadi Jafarian, A. Noorollahi, M. Amini, R. Jalili, Protecting Location Privacy through a Graphbased Location Representation and a Robust Obfuscation Technique, ICISC, Keywords - location privacy, spatial obfuscation, reliability, graph theory, distributed systems Intrusion Detection J. Haadi Jafarian, A. Abbasi, S. Safaei, A Gray-Box DPDA-Based Intrusion Detection Technique Using System-Call Monitoring, CEAS, Keywords - host-based intrusion detection, system call monitoring, pushdown automata (PDA) THESIS Ph.D. Thesis, Cyber Agility for Attack Deterrence and Deception, under supervision of Dr. Ehab-Al- Shaer, UNC Charlotte, M.Sc. Thesis, A Context-aware Information Flow Control Model, Sharif University of Technology, B.Sc. Thesis, An Efficient Multi-layer Architecture for Web Applications, University of Tehran, TEACHING University of Colorado Denver Teaching, CSCI 4800: Web Application Development, fall 2017 University of North Carolina at Charlotte Teaching, ITIS 4166 Network Based Application Development, fall 2015 TA, ITIS 6230/8230 Information Infrastructure Protection, fall 2012, spring 2014, spring 2015 TA, GRAD 6010/8010 Academic Writing for Graduate Students, spring 2016, fall 2016 TA, ITIS 6167/8161 Network and Information Security, spring 2013, spring 2014, fall 2014 TA, ITIS 3200 Introduction to Information Security and Privacy, fall 2013 Sharif University of Technology, Iran TA, Database security, spring 2008, spring 2009 TA, Advanced operating systems, fall
4 AWARDS AND HONORS 2017 Recognized as Most Successful Iranian Student at UNCC, faculty committee RSA Security Scholar, RSA Conference Security Scholar Program. ~2000$ award Center for Graduate Life at UNC Charlotte, Doctoral Writing Fellowship. 8000$ Graduate Assistantship Support Plan, Tuition scholarship. $100, Ranked 12 among in national entrance exam for Master s studies in IT 2000 Ranked 570 among 100,000+ in national entrance exam for undergraduate studies ACADEMIC SERVICE Reviewer IEEE INFOCOM JNSM 2017 IEEE Access 2014 HotSOS 2017 ICDCS 2014 TNSM 2014,16 CNSM 2013 IEEE IM CNS 2012 NOMS CCS 2012 NDSS 2015 ACM MTD Workshop Executive Committee Member ISeCure Journal 4
5 Word Cloud of Research Publications 5
Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte
Cyber Defense & Network Assurance (CyberDNA) Center Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte March 5, 2012 About CyberDNA Vision CyberDNA Center is to enable assurable and usable
More informationMOHAMMAD ASHIQUR RAHMAN
1033 NOTTINGHAM DR (APT: A), COOKEVILLE, TENNESSEE, USA Phone: +17042419165 (Cell) +19313723525 (Office) E-mail: marahman@tntech.edu; ashiq2503@gmail.com LinkedIn: http://www.linkedin.com/pub/mohammad-ashiqur-rahman/72/b71/a59/
More informationMohsen Rezvani. Curriculum Vitae
Mohsen Rezvani * Last modified: October 22, 2018. PERSONAL INFORMATION: Office Email Department of Computer Engineering, Shahrood University of Technology, Shahrood, Iran mrezvani@shahroodut.ac.ir, mohsen.rezvani@gmail.com
More informationCYBERSECURITY: Scholarship and Job Opportunities
CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationMaster & Doctor of Philosophy Programs in Computer Science
Master & Doctor of Philosophy Programs in Computer Science Research Fields Pattern Recognition Data Analysis Internet of Things and Network Communication Machine Learning Web Semantic and Ontology For
More informationThe University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree
Accreditation & Quality Assurance Center Curriculum for Doctorate Degree 1. Faculty King Abdullah II School for Information Technology 2. Department Computer Science الدكتوراة في علم الحاسوب (Arabic).3
More informationMOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03
MOHAMMED I. AL-SALEH Jordan University of Science and Technology, Computer Science Department, Irbid, P.O. Box 3030, 22110 +962-788-052-892 misaleh@just.edu.jo, moealsaleh@gmail.com EDUCATION Ph.D., 2011
More informationProgram Proposal for a Direct Converted Program. BS in COMPUTER SCIENCE
Program Proposal for a Direct Converted Program BS in COMPUTER SCIENCE Document Page number Curriculum Sheet p. 2 p. -year Roadmap p. p. 5 Two Year Course Schedule p. 6 (2018 2019 AY and 2019 2020 AY)
More informationCHAIR Jr, r7~. cou EGE FACULTY CHAIR (if \G,Jl ~ ~k amica~ pc{ 2.-0 I ; <-0 l "?J Approved,G. 'S u,\? Approved. Approved
2013-2014 LONG SIGNATURE SHEET Proposal Number: SIS 10-07-13 _ ~f/; UNC CHARIDITE Proposal Title: Establish a graduate level course: Cloud Data Storage.:1T1.5 6' ~ 7AJ "1-11$ 8')(.0 Originating Department:
More informationMS in Electrical Engineering & MS in Computer Engineering
MS in Electrical Engineering & MS in Computer Engineering Choosing a Degree Program Specialization Area & Degree Option Useful Hints George Mason University Volgenau School of Engineering (VSE) College
More informationAn Overview of Mobile Security
An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim
More informationThe GenCyber Program. By Chris Ralph
The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest
More informationMS in Computer Sciences & MS in Software Engineering
SUKKUR INSTITUTE OF BUSINESS ADMINISTRATION Merit-Quality-Excellence Schema of Studies for MS in Computer Sciences & MS in Software Engineering (2016-2017) DEPARTMENT OF COMPUTER SCIENCE Schema of Studies
More informationDepartment of Computer Science
Department of Computer Science The Department of Computer Science offers a Master of Science degree and a Doctor of Philosophy degree in Computer Science. M.S. in Computer Science (p. 1) Ph.D. in Computer
More informationCourse Curriculum for Master Degree in Network Engineering and Security
Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science
More informationINFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity
INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State
More informationFRVM: Flexible Random Virtual IP Multiplexing in. software-defined networks
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks Dilli P. Sharma, Dong Seong Kim University of Canterbury Christchurch, New Zealand dilli.sharma@pg.canterbury.ac.nz dongseong.kim@canterbury.ac.nz
More informationImani Palmer ipalmer2.web.engr.illinois.edu
Imani Palmer ipalmer2@illinois.edu ipalmer2.web.engr.illinois.edu 240.676.7741 Research Interest Education Cyber Security, System Security, Real-Time Streaming Engines, Data Analysis University of Illinois
More informationStavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987
413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education
More informationCelebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018
Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more
More informationSTUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS
STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS Presentation Overview Location of the Department s premises The Department in a Nutshell Studies and Education: Offered in the context
More informationMS in Electrical Engineering & MS in Computer Engineering
MS in Electrical Engineering & MS in Computer Engineering Choosing a Degree Program, Specialization Area & Degree Option Useful Hints George Mason University Volgenau School of Engineering (VSE) College
More informationA senior design project on network security
Michigan Technological University Digital Commons @ Michigan Tech School of Business and Economics Publications School of Business and Economics Fall 2007 A senior design project on network security Yu
More informationKianoush GholamiBoroujeni Ph.D. in Computer Science
Kianoush GholamiBoroujeni Ph.D. in Computer Science Address: 1440 SW 104th Path, Apt 301 Miami, FL 33174. +1 (305)200-9577 kianooush@gmail.com Personal Webpage ABOUT ME HIGHLIGHTS...........................................................................................................
More informationComputer Engineering and Systems Group. Alex Sprintson Dept. of ECE Texas A&M University
Computer Engineering and Systems Group Alex Sprintson Dept. of ECE Texas A&M University 2 About Computer Engineering in ECE A joint program between ECE and CS CE degrees M. S., M. E., Ph.D. Group leader:
More informationBuilding Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018
Building Partnerships to meet Global Security Challenges Dr. Taylor Eighmy August 14, 2018 Charting Our Cybersecurity Future Cyber UTSA A leader in cyber education since 1999 Undergraduate Masters Doctoral
More informationThesis: An Extensible, Self-Tuning, Overlay-Based Infrastructure for Large-Scale Stream Processing and Dissemination Advisor: Ugur Cetintemel
Olga Papaemmanouil Phone: +1 (401) 588-0230 Department of Computer Science Fax: +1 (401) 863-7657 Box 1910, 115 Waterman St, Floor 4 Email: olga@cs.brown.edu Providence, RI, 02912, USA Web: http://www.cs.brown.edu/
More informationDigital Measures Users Guide
Digital Measures Users Guide 1 Table of Content Getting Started in Digital Measures 3 Prepopulated data 4 How to report errors in Digital Measures 4 What is Optional vs. Mandatory 6 Navigating Digital
More informationNaval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: FALL AY17)
Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: FALL AY17) Name/Rank/Service: Month/Year Enrolled: Projected Graduation Date:
More informationDiscover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017
Discover Viterbi: Computer Science, Cyber Security & Informatics Programs Viterbi School of Engineering University of Southern California Fall 2017 WebEx Quick Facts Will I be able to get a copy of the
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationCSci530 Final Exam. Fall 2014
CSci530 Final Exam Fall 2014 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 120 minutes to complete the exam. Please prepare your answers on
More informationATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS
PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS INTRODUCTION Attivo Networks has partnered with McAfee to detect real-time in-network threats and to automate incident response
More informationInformation Security Research and Education at Aalto. N. Asokan
Information Security Research and Education at Aalto N. Asokan http://asokan.org/asokan/ @nasokan About me Professor, Aalto University, from Aug 2013 Professor, University of Helsinki, 2012-2017 IEEE Fellow
More informationAmir Aminzadeh Gohari
Amir Aminzadeh Gohari Contact Information Computer Eng. Phone: (707) 953-2647 E-mail: amirazg@ece.ucsb.edu Santa Barbara, CA 93106 USA Web: http://ece.ucsb.edu/ amirazg Education Sept. 2007 June 2011 Ph.D.,
More informationBahador Bakhshi Sareskanrood
Bahador Bakhshi Sareskanrood PhD, Assistance Professor Department of Computer Engineering Amirkabir University of Technology E-mail: bbakhshi[at]aut.ac.ir Homepage: ceit.aut.ac.ir/~bakhshis Fields of Interest
More informationHacker Academy UK. Black Suits, White Hats!
Hacker Academy UK Black Suits, White Hats! Cyber Security Training and Services Do your devices Protect you against Cyber-attacks? Chinese hackers have allegedly stolen 50 terabytes of data on F-35 aircraft,
More informationAYAN MONDAL ayan.mondal/
AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)
More informationUNIVERSITY OF SOUTH ALABAMA COMPUTER SCIENCE
UNIVERSITY OF SOUTH ALABAMA COMPUTER SCIENCE 1 Computer Science CSC 108 Intro to Computer Science 3 cr An introduction to the major areas of computer science, such as computing systems, the binary number
More informationCYBER HUNTING. 4 th Annual Interdisciplinary Cyber Crime Conference Michigan State University March 3, Dr. Nicole Beebe, Ph.D.
CYBER HUNTING 4 th Annual Interdisciplinary Cyber Crime Conference Michigan State University March 3, 2017 Dr. Nicole Beebe, Ph.D. CISSP, CCFP, EnCE, ACE Department of Information Systems and Cyber Security
More informationRandom Host Mutation for Moving Target Defense
Random Host Mutation for Moving Target Defense Ehab Al-Shaer, Qi Duan, and Jafar Haadi Jafarian Department of Software and Information Systems University of North Carolina at Charlotte Charlotte, NC, USA
More informationMASTER OF SCIENCE IN COMPUTER SCIENCE
THE UNIVERSITY OF ZAMBIA SCHOOL OF NATURAL SCIENCES DEPARTMENT OF COMPUTER STUDIES MASTER OF SCIENCE IN COMPUTER SCIENCE November 2014 1) BACKGROUND From the inception of Computer Science programmes at
More informationSherenaz Waleed Al-Haj Baddar
Sherenaz Waleed Al-Haj Baddar s.alhajbaddar@gmail.coms.baddar@ju.edu.jo Personal Information Nationality: Jordanian Current Employer: King Abdullah II School for Information Technology, The University
More informationNEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in
NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee
More informationCall for Papers for Communication QoS, Reliability and Modeling Symposium
Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end
More informationMaster Course in Computer Science Orientation day
Master Course in Computer Science Orientation day Info on the Department of Computer Science Ranked first (in its area) in 5-year Research Assessment by Ministry of University and Research 2013 e 2017
More informationIT Security in Large IT Infrastructures SS18 Lecture 00: Preliminary Discussion
IT Security in Large IT Infrastructures SS18 Lecture 00: Preliminary Discussion Florian Fankhauser Christian Schanes Christian Brem Franz Mairhofer INSO Industrial Software Institute of Information Systems
More informationFrench Research in Comp. Virology and Operational Cryptology
French Research in Computer Virology and Operational Cryptology Eric Filiol efiliol@esat.terre.defense.gouv.fr ESAT Rennes - Virology and Cryptology Lab. Canada - France Meeting on Security Vancouver -
More informationUNIVERSITY OF SOUTH ALABAMA COMPUTER SCIENCE
UNIVERSITY OF SOUTH ALABAMA COMPUTER SCIENCE 1 Computer Science CSC 108 Intro to Computer Science 3 cr An introduction to the major areas of computer science, such as computing systems, the binary number
More informationCybersecurity Workshop: Critical Cybersecurity Education & Professional Development
Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development Ben Scribner, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education & Awareness Branch
More informationECIT Institute (Est.2003)
ECIT Institute (Est.2003) Research Excellence & Innovation 180 people 4 Queen s University Belfast Research Groups - Digital Communications - High Frequency Electronics - Speech, Imaging and Vision Systems
More informationDAISY Data Analysis and Information SecuritY Lab
DAISY Data Analysis and Information SecuritY Lab Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare Yingying (Jennifer) Chen Director of Data Analysis
More informationWelcome to Maastricht University. School of Business and Economics
Welcome to Maastricht University School of Business and Economics MSc Business Intelligence and Smart Services (BISS) Service design and development in cyber-society Dr. Alexander Grigoriev Why should
More informationMAGNO QUEIROZ Curriculum Vitae
MAGNO QUEIROZ Curriculum Vitae Office Management Information Systems Jon M. Huntsman School of Business Utah State University 3515 Old Main Hill Logan, UT 84322-3515 Location: Eccles Business Building
More informationMuhannad Al-Jabi Personal Profile
Muhannad Al-Jabi Personal Profile Curriculum vitae Personal details Surname Forename Email address Contact phone number Al-Jabi Muhannad Computer Engineering Department Nablus Palestine mjabi@najah.edu
More informationCertified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationBACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help
More informationNote: All Electrical & Computer Engineering graduate students will be expected to read this guide before consulting academic advisors.
Graduate Student Guide Department of Electrical & Computer Engineering Fall 2017 Note: All Electrical & Computer Engineering graduate students will be expected to read this guide before consulting academic
More informationRESUME WORK: (0484) / 3098
RESUME 1.GENERAL İNFORMATİON DATE OF ISSUED 17.02.2017 IDENTİFİCATİON NUMBER TİTLE NAME SURNAME MAİL ADDRESS BİRTHDAY PHONE E-MAİL Arş. Gör. Ömer ASLAN Siirt University, Engineering Architecture Faculty,
More informationEducational Qualification PhD (Computer and science engineering) - pursuing from Sir Padampat Singhania University, Udaipur, Rajasthan.
Mrs. Vijaya Umesh Pinjarkar Mobile : 9757143228 Email: vkhirodkar@somaiya.edu Professional Objective To utilize my teaching skills towards a challenging career in growth oriented and leading edge that
More informationWeb Security Vulnerabilities: Challenges and Solutions
Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA
More informationGraduate Student Orientation
Graduate Student Orientation Department of Computer Science The Volgenau School of Engineering Professor Sanjeev Setia, Chair Fall 2018 http://cs.gmu.edu Presented by: Professor Alex Brodsky Outline CS
More informationActive defence through deceptive IPS
Active defence through deceptive IPS Authors Apostolis Machas, MSc (Royal Holloway, 2016) Peter Komisarczuk, ISG, Royal Holloway Abstract Modern security mechanisms such as Unified Threat Management (UTM),
More informationDoctoral School: József Hatvany Doctoral School for Computer Science and Engineering
University of Miskolc Faculty of Mechanical Engineering and Doctoral School: József Hatvany Doctoral School for Computer Science and Engineering Name of the Study Program: Computer Science and Engineering
More informationThe ECE Curriculum. Prof. Bruce H. Krogh Associate Dept. Head.
The ECE Curriculum Prof. Bruce H. Krogh Associate Dept. Head krogh@ece.cmu.edu 1 Freshman year ECE Core Courses 18-100 Introduction to Electrical and Computer Engineering physical devices analog circuits
More informationBACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Purdue University Global 208-209 Catalog BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help you
More informationMASTER OF ENGINEERING PROGRAM IN INFORMATION
MASTER OF ENGINEERING PROGRAM IN INFORMATION AND COMMUNICATION TECHNOLOGY FOR EMBEDDED SYSTEMS (INTERNATIONAL PROGRAM) Curriculum Title Master of Engineering in Information and Communication Technology
More informationBlending Information Systems Security and Forensics Curricula
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2012 Proceedings Midwest (MWAIS) 5-2012 Blending Information Systems Security and Forensics Curricula Jason Ferguson Friends University,
More informationBest Practices in Healthcare Risk Management. Balancing Frameworks/Compliance and Practical Security
Best Practices in Healthcare Risk Management Balancing Frameworks/Compliance and Practical Security Our industry is full of jargon terms that make it difficult to understand what we are buying To accelerate
More informationSecurity and networks
Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,
More informationZechao Shang. Department of Computer Science (773)
Zechao Shang Department of Computer Science (773)766-0354 University of Chicago zcshang@cs.uchicago.edu 5730 South Ellis Avenue people.cs.uchicago.edu/ zcshang Chicago, Illinois 60637 INTERESTS I am interested
More informationEstablishment of new Department of Informatics, UNIRI and experiences in teaching SE course
Establishment of new Department of Informatics, UNIRI and experiences in teaching SE course Nataša Hoić-Božić, natasah@inf.uniri.hr Sanja Čandrlić, sanjac@inf.uniri.hr Odjel za informatiku, Sveučilište
More informationPh.D. in Computer Science (
Computer Science 1 COMPUTER SCIENCE http://www.cs.miami.edu Dept. Code: CSC Introduction The Department of Computer Science offers undergraduate and graduate education in Computer Science, and performs
More informationICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS
Website: http:// ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Important note on English as a Second Language (ESL) and International
More informationIEEE Ghana Section. NEW OFFICERS- January 2017 to December 2018
IEEE Ghana Section NEW OFFICERS- January 2017 to December 2018 IEEE National Chair He is IEEE senior member. He received his PhD degree in Information Technology in 2014 from Aalborg University, Denmark.
More informationRYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education
RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy
More informationBrian F. Cooper. Distributed systems, digital libraries, and database systems
Brian F. Cooper Home Office Internet 2240 Homestead Ct. #206 Stanford University cooperb@stanford.edu Los Altos, CA 94024 Gates 424 http://www.stanford.edu/~cooperb/app/ (408) 730-5543 Stanford, CA 94305
More informationIntegrated Security Destination Area Workshop May
Integrated Security Destination Area Workshop May 19 2017 Research Breakout Sessions Cyber Physical Systems Security 5/16/2017 Virginia Tech Integrated Security Destination Area Cyber Physical Systems
More informationEndpoint Protection : Last line of defense?
Endpoint Protection : Last line of defense? First TC Noumea, New Caledonia 10 Sept 2018 Independent Information Security Advisor OVERVIEW UNDERSTANDING ENDPOINT SECURITY AND THE BIG PICTURE Rapid development
More informationEnas El-Sayed Mohammed El-Sharawy
Enas El-Sayed Mohammed El-Sharawy Assistant Professor Computer Department Education Faculty Jubail Personal Data Nationality Egyptian Date of Birth 3 November 1984 Department Computer Science Official
More informationComputer Science Electives and Clusters
Course Number CSCI- Computer Science Electives and Clusters Computer Science electives belong to one or more groupings called clusters. Undergraduate students with the proper prerequisites are permitted
More informationInformation Systems. Courses. Information Systems 1
Information Systems 1 Information Systems Courses INFSYS 1800 Computers and Information Systems: 3 This course develops skills in technology awareness, computer fluency, computing devices, ethical use
More informationEFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationSmart Attacks require Smart Defence Moving Target Defence
Smart Attacks require Smart Defence Moving Target Defence Prof. Dr. Gabi Dreo Rodosek Executive Director of the Research Institute CODE 1 Virtual, Connected, Smart World Real World Billions of connected
More informationISACA Central Ohio Chapter Academic Scholarship 2018
ISACA Central Ohio Chapter Academic Scholarship 2018 What is ISACA? ISACA is a worldwide association of IS governance professionals ISACA advances global business leaders in technology, information and
More informationCOURSE COUNSELING (FOR YEARS 3 & 4 IN )
COURSE COUNSELING (FOR YEARS 3 & 4 IN 2017-18) Department of Information Engineering April 19, 2017 OUTLINE IERG & MIEG Curricula Major required & IE elective courses New IE courses IE courses offered
More informationDepartment of Computer Science
College of Science and Mathematics Department of Computer Science Dr. Vasil Hnatyshin Department Head Advising brochures also available online at: https://rucsm.org/cs/advising/brochures/ Fall 2017 Computer
More informationCOMPUTER SCIENCE (CSCI)
Bucknell University 1 COMPUTER SCIENCE (CSCI) Faculty Professors: Xiannong Meng, Luiz Felipe Perrone Associate Professors: Stephen M. Guattery (Chair), Brian R. King, Lea D. Wittie Assistant Professors:
More informationConfigSynth: A Formal Framework for Network Security Design Synthesis
ConfigSynth: A Formal Framework for Network Security Design Synthesis Mohammad Ashiqur Rahman and Ehab Al-Shaer CyberDNA Research Center, UNC Charlotte Motivation Complexity of Security Configuration is
More informationChris Vegter University of Northern Colorado Monfort College of Business (970)
Chris Vegter University of Northern Colorado Monfort College of Business (970) 351-1244 Email: chris.vegter@unco.edu Education MBA, Colorado State University, 2006. Area of Study: Business Administration
More informationImam Mohammad Ibn Saud Islamic University College of Computer and Information Sciences Department of Computer Sciences
1121-1122 In the Name Of Allah, the Most Beneficent, the Most Merciful Imam Mohammad Ibn Saud Islamic University Department of Computer Sciences Program Description of Master of Science in Computer Sciences
More informationINFINIT Y TOTAL PROTECTION
CHECK POINT INFINIT Y TOTAL PROTECTION CHECK POINT INFINITY TOTAL PROTECTION Be s t T hre at P revention, A ll Inclusi ve INTRODUCTION Enterprises today need to battle Gen V (5th Generation) cyber-attacks,
More informationSoftware Reliability and Reusability CS614
Software Reliability and Reusability CS614 Assiut University Faculty of Computers & Information Quality Assurance Unit Software Reliability and Reusability Course Specifications2011-2012 Relevant program
More informationComputer Science and Engineering Ira A. Fulton Schools of Engineering
DEJUN YANG Computer Science and Engineering Ira A. Fulton Schools of Engineering 480-252-4741 Arizona State University dejun.yang@asu.edu Tempe, Arizona 85281 http://www.public.asu.edu/~dyang16/ EDUCATION
More informationNetwork Intrusion Forensics System based on Collection and Preservation of Attack Evidence
, pp.354-359 http://dx.doi.org/10.14257/astl.2016.139.71 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence Jong-Hyun Kim, Yangseo Choi, Joo-Young Lee, Sunoh Choi,
More information2013 Ph.D (Computer Vision), Queensland University of Technology, Brisbane, Australia,
David Ryan Curriculum Vitae 27 Wyncroft St, Holland Park Brisbane, Queensland 4121 (+61) 424 554 196 david.ryan1@gmail.com dryan.id.au Education 2013 Ph.D (Computer Vision), Queensland University of Technology,
More informationSpecialties Description
Software Engineering and Specialties Description http://asu.kh.ua/ 2017 NTU KhPI Software Engineering and National Technical University Kharkiv Polytechnic Institute is the oldest technical university
More informationInformation Security Research and Education at Aalto. N. Asokan
Information Security Research and Education at Aalto N. Asokan http://asokan.org/asokan/ @nasokan About me Professor, Aalto University, from Aug 2013 Professor, University of Helsinki, 2012-2017 IEEE Fellow
More information