MOHAMMED I. AL-SALEH EDUCATION Ph.D., 2011 University of New Mexico, USA Dissertation Title Major GPA 4.03

Similar documents
PhD. of Information Networks ( ). Cairo University. Faculty of Computers and Information. Cairo. Egypt.

Mohamed Mahmoud Mahmoud Azab. Education: Ongoing research:

J. Haadi Jafarian CV June J. Haadi Jafarian

Muhannad Al-Jabi Personal Profile

RESUME WORK: (0484) / 3098

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

RESUME WEI LI EDUCATION EMPLOYMENT RESEARCH INTERESTS HONORS AND AWARDS

B.Sc. in Electrical Engineering, Jordan University of Science and Technology (JUST), Jordan, June 2000.

Page 1 of 6. B.Sc. (Honors) in Electrical Engineering, Kuwait University, August 1999.

C.V. Yahya Mohammad Tashtoush, Ph.D. Associate Prof.

Course Curriculum for Master Degree in Network Engineering and Security

C.V ACADEMIC EXPERIENCES

Enas El-Sayed Mohammed El-Sharawy

CYBERSECURITY: Scholarship and Job Opportunities

An Overview of Mobile Security

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Sherenaz Waleed Al-Haj Baddar

COMPUTER FORENSICS (CFRS)

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.

Course Outline. CCNA Cyber Ops SECOPS Official Cert Guide (Course & Labs)

North Dakota State University Fargo, ND Ph.D. in Software Engineering Emphasis area: Security Requirements Engineering

Ministry of Higher Education- Research and Development Office

Ibrahim H. Khleifat. Summary of Qualifications:

CompTIA Cybersecurity Analyst+

AYAN MONDAL ayan.mondal/

STUDIES IN DIGITAL SYSTEMS INVESTMENT ON KNOWLEDGE OF DIGITAL SYSTEMS

Prof. Mohammad Sulieman Qatawneh

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Dr. Ahmed K. Sadek 2. Experience

Mahmoud Al-Ayyoub Alshbool

Building Partnerships to meet. Global Security Challenges. Dr. Taylor Eighmy August 14, 2018

Degree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR

MASTER OF SCIENCE IN COMPUTER SCIENCE

A United States Cyber Academy Program

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Basima Ahmed Haroun Elshqeirat

CompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018

Stavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987

DAISY Data Analysis and Information SecuritY Lab

Zoltan Safar. Education. Awards and Honors. Experience

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

University of Baghdad

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Gassan Abu Jumra Alsyad

CAREER SERVICES RESUME WORKSHEET

Curriculum Vitae. University, England, UK, Ph.D. Digital Computer Systems, Electronic Systems Design Department, Cranfield

Ghufran Hijawi. Personal Profile

SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK

Imani Palmer ipalmer2.web.engr.illinois.edu

College Of. Technological Innovation

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

Cyber Defense & Network Assurance (CyberDNA) Center. Professor Ehab Al Shaer, Director of CyberDNA Center UNC Charlotte

Amit Kumar Sikder. Objective. Keywords. Education. Research Interests

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

The GenCyber Program. By Chris Ralph

Department of Computer Science & Engineering

Dr. Muhammad Mubashir Khan

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

August 18-19, 2018 (Saturday-Sunday)

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

Masters in Advanced Computer Science

Amy Babay April 2018

TEXAS STATE VITA. A. Name: David L. Gibbs Title: Assistant Professor

Web Security Vulnerabilities: Challenges and Solutions

STUDENT AND ACADEMIC SERVICES

Objective: Education:

MSc in Information Systems

Department of Computer Science

DR. AMER NIZAR ABUALI P.O Box: 1, Philadelphia University Jordan Tel

Diploma in Computer Science Computer Science Department, Faculty of Science, Sudan University of Science and Technology (SUST) First Class.

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

AccessData offers a broad array of training options.

Network Infrastructures & Service Provisioning

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby

Advanced Diploma on Information Security

Dr. Zheng Chang. Personal. Education and Qualifications. Professional Experience

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

Curriculum Vitae Detective Paul A. Lindvay #5497 Arizona Department of Public Safety Computer Forensics Unit

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security

FREE ONLINE WEBSITE MALWARE SCANNER WEBSITE SECURITY

The fast track to top skills and top jobs in cyber. Guaranteed.

KCG College of Technology, Chennai

Assistant Professor, Department of Electrical Engineering, College of Engineering Jan 2010 now

Mohsen Rezvani. Curriculum Vitae

Velammal Engineering College Department of Computer Science and Engineering

Matthew Patrick Sopha Clinical Assistant Professor Department of Information Systems, W. P. Carey School of Business, Arizona State University

Resume. Techniques. Mail ID: Contact No.: S.No. Position held Organisation From To. AU PG Center, Vizianagaram

Amir Aminzadeh Gohari

Jun Li, Ph.D. School of Computing and Information Sciences Phone:

Descriptions for CIS Classes (Fall 2017)

EDUCATION RESEARCH EXPERIENCE

Certified Ethical Hacker (CEH)

Robert A. Robertson Ph.D., CISSP, GCFE, GCFA, GCIA

744 Motooka Nishi-ku Fukuoka , Japan Phone/Fax:

Transcription:

MOHAMMED I. AL-SALEH Jordan University of Science and Technology, Computer Science Department, Irbid, P.O. Box 3030, 22110 +962-788-052-892 misaleh@just.edu.jo, moealsaleh@gmail.com EDUCATION Ph.D., 2011 University of New Mexico, USA Details: Dissertation Title: Fine-grained reasoning about the security and usability trade-off in modern security tools Major: Computer Science GPA: 4.03/4.0 M.Sc., 2007 New Mexico State University, USA Details: Thesis Title: Software support for threaded runtime monitoring Major: Computer Science GPA: 4.0/4.0 B.Sc., 2003 Jordan University of Science and Technology, Jordan Details: Major: Computer Science GPA: 88.0/100 Rank: 1 st among the students graduated with me.

MOHAMMED I. AL-SALEH PAGE 2 AWARDS In 2003, I got a fully-supported scholarship from Jordan University of Science and Technology to get M.Sc. and Ph.D. degrees from the USA. JOB EXPERIENCE Associate Professor: 2016 - present Jordan University of Science and Technology Assistant Professor: 2011-2016 Jordan University of Science and Technology Teaching Assistant: 2009-2010 University of New Mexico Research Assistant: 2008-2011 University of New Mexico Teaching Assistant: 2006-2007 New Mexico State University Research Assistant: 2006-2007 New Mexico State University Teaching Assistant: 2003-2005 Jordan University of Science and Technology RESEARCH INTERESTS Information security Network security Dynamic information flow tracking Digital forensics Antivirus analysis Operating systems security Malware analysis

MOHAMMED I. AL-SALEH PAGE 3 Intrusion detection Web security OTHER CERTIFICATES I am a CISCO Certified Network Associate (CCNA) ITQ (Instructor Trainer Qualification) certified (ToT). COURSES I TAUGHT Advanced Operating Systems Computer Security Network Security Operating Systems Computer Networks Computation Theory Data Structures & Algorithms Basics in Computer (Graduate Level) (Graduate Level) MASTER S STUDENTS GRADAUTD UNDER MY SUPERVISION Yahya A. Forihat. Towards Evidence Acquisition of Android Devices in Mobile Phone Forensics (12/2012) Fatima M.AbuHjeela. Bypassing the Antivirus On-Access Scanner's Thresholds (05/2013) Atta Al-Khaleel. Carving and Clustering Documents in Portable Document Format for Digital Forensics (08/2015) Mona Kamal Jamil Al-Shamaileh. Investigating User Deleted Accounts for Digital Forensics (11/2015)

MOHAMMED I. AL-SALEH PAGE 4 Hanan M. Hamdan. Precise performance characterization of the Antivirus on the file system operations (01/2016) Rasha K. Al-Huthaifi. Improving Antivirus Scanning Engines: Memory On-Access Scanner (12/2016) A COMMITTEE MEMBER FOR THE FOLLOWING MASTER S STUDENTS Hail A. Albashiri. Collaborative Recommendation System Improvement Using Multi Attribute Decision Making Method (11/2012) Ahmad A. Al-Dahoud. Autonomic Cloud Computing Resources Scaling (05/2013) Dua'a Bani-Salameh. Toward a cost-effective scheduling scheme in smart grids Data (12, 2014) Bushra M. Al-Hasan. Integrated Indoor Navigation Techniques to Allow Blind and Visually Impaired People to Reach a Precise Object (01/2015) Duaa M. Ekhtoom. Best-Compression Neighbor Technique To Analyze Metamorphic Viruses. (09/2016) A REVIEWER/TCP MEMBER The International Conference on Information and Communication Systems (ICICS) IET Information Security Journal of King Saud University - Computer and Information Sciences Simulation Modelling Practice and Theory International journal of electronic security and digital forensics International journal of information security AN EDITORIAL MEMBER journal of computer science

MOHAMMED I. AL-SALEH PAGE 5 PUBLICATIONS JOURNAL ARTICLES Al-Saleh, Mohammed I., and Ziad A. Al-Sharif. "Utilizing data lifetime of TCP buffers in digital forensics: Empirical study." Digital Investigation 9.2 (2012): 119-124. Al-Saleh, Mohammed Ibrahim, Antonio M. Espinoza, and Jedediah R. Crandall. "Antivirus performance characterisation: system-wide view." IET Information Security 7.2 (2013): 126-133. Al-Saleh, Mohammed I., Fatima M. AbuHjeela, and Ziad A. Al-Sharif. "Investigating the detection capabilities of antiviruses under concurrent attacks." International Journal of Information Security 14.4 (2015): 387-396. Al-Saleh, Mohammed I., "The impact of the antivirus on the digital evidence."international Journal of Electronic Security and Digital Forensics 5.3-4 (2013): 229-240. Al-Saleh, Mohammed I. and Bilal Shebaro."Enhancing Malware Detection: Clients Deserve More Protection. International Journal of Electronic Security and Digital Forensics 8.1 (2016): 1-16. Al-Saleh, Mohammed I., and Yahya A. Forihat. "Skype forensics in android devices." International Journal of Computer Applications 78.7 (2013): 38-44. Al-Saleh, Mohammed I., and Mona Al-Shamaileh. "Forensic Artifacts Associated with Intentionally Deleted User Accounts." International Journal of Electronic Security and Digital Forensics. 9.2 (2017): 167-179. Alsmirat, Mohammad A., Islam Obaidat, Yaser Jararweh, and Mohammed Al- Saleh. "A security framework for cloud-based video surveillance system." Multimedia Tools and Applications (2017): 1-16.

MOHAMMED I. AL-SALEH PAGE 6 Al-Saleh, Mohammed I., and Yaser Jararweh. Fingerprinting Violating Machines with In-Memory Protocol Artifacts. International Journal of Advanced Intelligence Paradigms. (To apprear) Al-Saleh, Mohammed I., and Rasha K. Al-Huthaifi. On Improving Antivirus Scanning Engines: Memory On-Access Scanner. Journal of Computer Science. (To apprear) Iyad Abu Doush and Mohammed I. Al-Saleh. Can genetic algorithms help virus writers reshape their creations and avoid detection? (To appear) CONFERENCE ARTICLES Al-Saleh, Mohammed I., and Jedidiah R. Crandall. "On information flow for intrusion detection: What if accurate full-system dynamic information flow tracking was possible?" Proceedings of the 2010 workshop on New security paradigms. ACM, 2010. Al-Saleh, Mohammed I., and Jedidiah R. Crandall. "Application-level reconnaissance: Timing channel attacks against antivirus software." 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). 2011. Al-Saleh, Mohammed I., Patrick Bridges, and Jedidiah R. Crandall. Architectural Support for Securing Sensor Networks against Remote Attacks. ISCA First International Conference on Sensor Networks and Applications (SNA- 2009). San Francisco, CA. November 2009. Al-Saleh, Mohammed I. and Ziad Al-Sharif. "Ram forensics against cyber crimes involving files." The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013). The Society of Digital Information and Wireless Communication, 2013. Al-Khaleel, Atta, Duaa Bani-Salameh, and Mohammed I. Al-Saleh. "On the Memory Artifacts of the Tor Browser Bundle." The International Conference on

MOHAMMED I. AL-SALEH PAGE 7 Computing Technology and Information Management (ICCTIM2014). The Society of Digital Information and Wireless Communication, 2014. Al-Saleh, Mohammed I. "Towards Extending the Antivirus Capability to Scan Network Traffic." The International Technology Management Conference (ITMC2015). 2015. Al-Sharif, Al-Sharif A., Dana N. Odeh, and Mohammad I. Al-Saleh" Towards Carving PDF Files in the Main Memory." The International Technology Management Conference (ITMC2015). 2015. Al-Saleh, Mohammed I. "Fingerprinting Violating Machines With TCP Timestamps." The Third International Conference on Digital Security and Forensics (DigitalSec2016). Balhaf, Khaled, Mohammed A. Shehab, T. Wala'a, Mahmoud Al-Ayyoub, Mohammed Al-Saleh, and Yaser Jararweh. "Using GPUs to speed-up Levenshtein edit distance computation." In 2016 7th International Conference on Information and Communication Systems (ICICS), pp. 80-84. IEEE, 2016. Duaa Ekhtoom, Mahmoud Al-Ayyoub, Mohammed I. Al-Saleh, and Ismail Hmeidi. "A Compression-Based Technique to Classify Metamorphic Malware." 13th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2016). Al-Saleh, Mohammed I., and Rasha K. Al-Huthaifi. Towards Providing Memory On-Access Scanners. The Fourth International Conference on Computer Science, Computer Engineering, and Education Technologies. Lebanon April 26-28, 2017. Ahmad Ababneh, Mohammad Abu Awwad, and Mohammed I. Al-Saleh. IMO Forensics in Android and Windows Systems. IISA 2017, Cyprus, 28-30 August 2017. Ziad Al-Sharif, Mohammad I. Al-Saleh and Luay Alawneh, Towards the Memory Forensics of OOP Execution Behavior. IISA 2017, Cyprus, 28-30 August 2017.

MOHAMMED I. AL-SALEH PAGE 8 ONGOING PROJECTS Precise performance characterization of the antivirus software. Carving files from RAM OTHER ACADEMIC ACTIVITIES AND HIGHLIGHTS I participated in the Regional Cyber Security Day 2015 organized by Center for Interdisciplinary Studies in Security and Privacy (CRISSP-AD) and hosted by New York University Abu Dhabi (NYUAD). In the meeting, we explored enhancing collaboration between security researchers in the region and funding options. Among others, my paper Enhancing Malware Detection: Clients Deserve More Protection was selected by the publishers to be on their science spot: (http://sciencespot.co.uk/low-cost-malwaredetection.html). It was also reported by several news websites such as (last accessed on 06-Jan-16): http://www.sciencedaily.com/releases/2015/12/151207 114003.htm http://phys.org/news/2015-12-malware-loophole.html http://www.homelandsecuritynewswire.com/dr2015120 8-lowcost-malware-detection