RESUME WORK: (0484) / 3098

Similar documents
Enas El-Sayed Mohammed El-Sharawy

CYBERSECURITY: Scholarship and Job Opportunities

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

FACULTY OF INFORMATION TECHNOLOGY

MSc in Information Systems

Saint Petersburg Electrotechnical University "LETI" (ETU "LETI") , Saint Petersburg, Russian FederationProfessoraPopova str.

Optus Macquarie University Cyber Security Hub A/Prof Christophe Doche Executive Director

Hacker Academy UK. Black Suits, White Hats!

Muhannad Al-Jabi Personal Profile

CURRICULUM VITAE. Dr. David Muchangi Mugo

Date /

MASTER OF SCIENCE IN COMPUTER SCIENCE

Scientific journal Title of paper Journal name Year / Volume / Pages Unemployment and Labour Force Market in Republic of Kosova

AREAS OF SPECIALIZATION. Digital Image Processing Computer Vision Pattern Recognition Image Retrieval Image Reconstruction Face Recognition

INTERNATIONAL BOARD OF FORENSIC ENGINEERING SCIENCES Stirling Road, Hollywood, FL Re-certification Application IDENTIFICATION

Les joies et les peines de la transformation numérique

Stavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987

COMPUTER FORENSICS (CFRS)

Scientific journal Title of paper Journal name Year / Volume / Pages Unemployment and Labour Force Market in Republic of Kosova

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

MOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03

Web Security Vulnerabilities: Challenges and Solutions

CALENDAR FOR THE YEAR 2018

Master of Engineering Program in Mining Engineering (International Program) Program Overview. Fields of Research

Personal Information Name: Khalid Abed Dahleez. Key Qualifications:

Students in the 12-course program will have the following degree requirements:

Instructions for using a fillable PDF form

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

J. Haadi Jafarian CV June J. Haadi Jafarian

Defence Research and Development Canada. Cyber surveillance of information systems

Why Should I become a Member?

PhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt.

ORACLE PL/SQL DATABASE COURSE

Oracle Database 11g & MySQL 5.6 Developer Handbook (Oracle Press) PDF

North Dakota State University Fargo, ND Ph.D. in Software Engineering Emphasis area: Security Requirements Engineering

Ethical Hacker Foundation and Security Analysts Course Semester 2

Using Data Science to deliver Workforce & Labour Market Insights. Gary Gan Co-Founder, JobKred

Implementation Strategy for Cybersecurity Workshop ITU 2016

SOFTWARE DEVELOPMENT: DATA SCIENCE

CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK

Master & Doctor of Philosophy Programs in Computer Science

Cybersecurity Workshop: Critical Cybersecurity Education & Professional Development

University of Baghdad

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research:

2013 Ph.D (Computer Vision), Queensland University of Technology, Brisbane, Australia,

About the course.

Summer Computer Science / Engineering

Reasons to Become CISSP Certified. Keith A. Watson, CISSP CERIAS

GLS UNIVERSITY. Faculty of Computer Technology Master of Computer Applications (MCA) Programme

The Oracle Academy Introduction to Computer Science

Capacity Enhancement Courses

The GenCyber Program. By Chris Ralph

Date of Birth 17 November, 1990 Country of Citizenship/Residence Nigeria. Certificate:

Master of Science Aerospace Engineering

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018

Introducing Cyber Resiliency Concerns Into Engineering Education

Bachelor of Information Technology (Network Security)

CYBER HUNTING. 4 th Annual Interdisciplinary Cyber Crime Conference Michigan State University March 3, Dr. Nicole Beebe, Ph.D.

ORACLE PRIMAVERA RISK ANALYSIS (PERTMASTER )

Personal Profile. Allied Additional Subordinate Subject studied. Management Information System. Electronic Commerce. Image Processing.

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

CHARTERED INSTITUTE OF MARKETING. Strathmore Institute of Management & Technology

AY Fulbright Egyptian Student Program Master s Grant (Online Application Guidelines)

Amr Mausad Sauber. : - Assistant Professor of Computer Science, Math Department, Faculty of Science, Menoufiya University since

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018

An Overview of Mobile Security

Amit Kumar Sikder. Objective. Keywords. Education. Research Interests

VACANCY ANNOUNCEMENT

[PDF] Hacking: The Ultimate Beginners Guide To The World Of Hacking

Department of Computer Science & Engineering

MSc Computing and Technology (Part-Time)

Ministry of Higher Education- Research and Development Office

Cyber Security Program

Who we are: Database Research - Provenance, Integration, and more hot stuff. Boris Glavic. Department of Computer Science

FULBRIGHT FOREIGN STUDENT PROGRAM

CYLAB PARTNERS CONFERENCE Information Networking Institute

Certified Revenue Management Executive Certification Application

Student Handbook Master of Information Systems Management (MISM)

Robert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Ethical Hacking. Content Outline: Session 1

Reading Writing Speaking Reading Writing Speaking. English Intermediate Intermediate Elementary Intermediate Intermediate Elementary

Curriculum Vitae. Android Developer EDUCATION EDUCATION. Radioelectronics Electronic-optical machine building

(ISC) 2 Continuing Professional Education (CPE) Handbook

Software Engineer Development of the Agent Support Tool (AST) for Instant Ink, applying TDD in Ruby on Rails.

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

How to apply for professional membership and registration. 22 October 2018 Terry Winter Membership Manager

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Cisco Networking Academy CCNA Cybersecurity Operations 1.1 Curriculum Overview Updated July 2018

2.1. Scope of environmental site assessment

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE

22nd TF-CSIRT Meeting, Porto

CCNA Cybersecurity Operations. Program Overview

CAREER SERVICES RESUME WORKSHEET

Transcription:

RESUME 1.GENERAL İNFORMATİON DATE OF ISSUED 17.02.2017 IDENTİFİCATİON NUMBER TİTLE NAME SURNAME MAİL ADDRESS BİRTHDAY PHONE E-MAİL Arş. Gör. Ömer ASLAN Siirt University, Engineering Architecture Faculty, Computer Engineering Department, Siirt MOBİLE: WORK: (0484) 223-1224 / 3098 omer.aslan@siirt.edu.tr 2.EDUCATİON DATE OF GRADUATİON DEGREE UNİVESİTY-FAKULTY- DEPARTMENT 2009 Undergraduate Trakya University, Engineering Architecture Faculty, Computer Engineering Department 2014 Master University of Texas at San Antonio (UTSA) Computer Science Department - PhD Ankara University, Engineering Faculty, Computer Engineering Department 3. ACADEMİC AND PROFESSİONAL EXPERİENCE INSTİTUTİON/FOUNDATİON COUNTRY CİTY DEPARTMENT JOB TASK PERİOD Bisoft Software Company Turkey Ankara Software Software Developer M.E. B USA Kentucky, Academic Scholarship Texas Englis and Student Master Siirt University Turkey Siirt Computer Research Engineering Faculty Engineering Asistant 210 2011-2014 2015-On going

4.CERTİFİCATES RECEİVED DATE NAME OF CERTİFİCATE PERİOD 2017 White Hat Hacker Training(BGA Company) 5 days 2015 Academic English Writing Skills Development(Standford 2 months University) 2012 Academic English(Kentucky University) 6 month 2011 Academic English(Haccettepe University) 6 month 2010 Oracle Database Management(Bisoft Company) 10 days 5. PROJECT EXPERIENCE NAME OF PROJECT INSTİTUTİON/ FOUNDATİON BUDGET DATE JOB TYPE OF PROJECT ARDEB NUMBER 6.OTHER ACADEMIC ACTIVITIES (Referee / Consultancy / Editing Experience) Number of counseling you have done for articles / reviews registered in international indexes in the recent year The number of consultancy you have done for the projects in the recent year Total number of citations received by your publications Number of students you have counseling Completed Master PhD Expertise On-going Other Activities (Work / responsibility / membership etc.) Thesis Supervised (Completed)

7.PUBLİCATİONS SCI, SSCI, AHCI Index Articles Published in the Journals Academic Papers Published in Other Journals International publications in conference proceedings and symposiums 1) Ömer Aslan, Refik Samet, Mitigating Cyber Security Attacks by being Aware of Vulnerabilities and Bugs, 2017 IEEE International Conference on CYBERWORLDS, University of Chester, Chester, United Kingdom 20-22nd September, 2017. 2) Ömer Aslan, Refik Samet, Investigation of Possibilities to Detect Malware Using Existing Tools, 14th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2017 October 30th to November 3rd, Hammamet, Tunisia, 2017. 3) Ömer Aslan, Effect of International Stock Exchange Indices on Istanbul Stock Exchange, International Conference on Multidisciplinary, Science, Engineering and Technology (IMESET 17 Bitlis), Oct 27-29, 2017, Bitlis. 7 4) Ömer Aslan, Face Recognition by Using Pruning PCA and BPNN, International Conference on Multidisciplinary, Science, Engineering and Technology (IMESET 17 Bitlis), Oct 27-29, 2017, Bitlis. 5) Ömer Aslan, Performance Comparison of Static Malware Analysis Tools Versus Antivirus Scanners To Detect Malware, International Multidisciplinary Studies Congress (IMSC) on 25-26 November 2017 Antalya/Turkey. 6) Ömer Aslan, A Review of Cache Coherence Problem and Protocols, International Multidisciplinary Studies Congress (IMSC) on 25-26 November 2017 Antalya/Turkey. 7) Ömer Aslan, " How to Decrease Cyber Threats by Reducing Software Vulnerabilities and Bugs", 1st International Mediterranean Science and Engineering Congress (IMSEC 2016) Çukurova University, Congress Center, October 26-28, 2016, Adana / TURKEY Pages: 639-646, Paper ID:210 8. FOREIGN LANGUAGE AND PROGRAMMING LANGUAGES

Foreign Language Knowledge Name Reading Listening Speaking Writing Turkish(native ) Advanced level Advanced level Advanced level Advanced level English Advanced level Advanced level Advanced level Advanced level Russian Beginner level Beginner level Beginner level Beginner level Computer Programming Knowledge Name Level Java C# Python Matlab Android (mobil programlama) Veri Tabanı Dilleri Adı Düzey Oracle Veri Tabanı SQL Server MySql SQL ve Pl/SQL dilleri 9. RESEARCH INTERESTS Name of the Field Information Security Cyber Security Malware Analysis Malware Detection Software Vulnerabilities Anomaly Detection Fraud Detection Machine Learning Deep Learning Data Mining 10. ADMİNİSTRATİVE DUTİES