إسم المؤهل | جامعة المؤهل | تاريخ المؤهل |
---|---|---|
الدكتوراه في Computer science | جامعة كارولينا الجنوبية | 19/04/1441 |
الماجستير في Computer science | جامعة كارولينا الجنوبية | 28/08/1439 |
الماجستير في Computer science | جامعة كارولينا الجنوبية | 23/02/1436 |
في Computer Science | 2014 | 15/07/1435 |
البكالوريوس في علوم حاسب | جامعة الطائف | 01/07/1429 |
اسم البحث | تاريخ تقديم البحث | رابط البحث |
---|---|---|
Ransomware Attack Detection and Prevention | 1442-03-15 12:00:00 ص | |
Human factor & Artificial intelligence: For Future Software Security to be Invincible, a Confronting Comprehensive Survey | 1442-03-15 12:00:00 ص | |
Honeypot in Internet-of-Things Devices | 1442-03-15 12:00:00 ص | |
A Study on Social Engineering Attacks: Phishing Attack | 1442-03-15 12:00:00 ص | |
The Role of Dark Web on Cyberspace | 1442-03-15 12:00:00 ص | |
The Buffer Overflow Attack and How to Solve Buffer Overflow in Recent Research | 1442-03-15 12:00:00 ص | |
Cyber Insurance: A Case Study of the United Arab Emirates, European Union’s, and Poland | 1442-03-15 12:00:00 ص | |
Tracing Distributed Denial of Service Attacks from Practical Perspectives | 1442-03-15 12:00:00 ص | |
Comprehensive Study of Current Reverse Engineering Tools and Techniques | 1442-03-15 12:00:00 ص | |
Enhance Software Security Utilizing Code Obfuscation | 1442-03-15 12:00:00 ص | |
Smart Contract Survey | 1442-03-15 12:00:00 ص | |
False Data Injection Attack in Healthcare | 1442-03-15 12:00:00 ص | |
Adversarial data poisoning attacks against the PC learning algorithm | 1441-05-06 12:00:00 ص | Adversarial data poisoning attacks against the PC learning algorithm |
Modeling Concept Drift in the Context of Discrete Bayesian Networks | 1441-01-02 12:00:00 ص | |
Detecting Adversarial Attacks in the Context of Bayesian Networks | 1440-10-28 12:00:00 ص | Detecting Adversarial Attacks in the Context of Bayesian Networks |
Data Dependencies Preserving Shuffle in Relational Database | 1440-09-27 12:00:00 ص | Data Dependencies Preserving Shuffle in Relational Database |
Long Duration Data Poisoning Attacks on Bayesian Networks | 1440-08-26 12:00:00 ص | |
Cyber Attacks against the PC Learning Algorithm | 1439-12-21 12:00:00 ص | Cyber Attacks against the PC Learning Algorithm |
How to Generate the Network You Want with the PC Learning Algorithm | 1439-09-17 12:00:00 ص | How to Generate the Network You Want with the PC Learning Algorithm |
Bayesian Structure Learning Attacks | 1439-07-15 12:00:00 ص |
إسم الجهة | الخبرة | من | إلي |
---|---|---|---|
Taif University | Professional Consultant | 13/01/1442 | |
Taif University | Assistant Professor | 28/04/1441 | |
University of South Carolina | Research Assistant | 14/11/1437 | 16/04/1441 |
University of South Carolina | Teaching Assistant | 04/10/1433 | 20/02/1436 |
University of South Carolina | Research Assistant | 27/09/1433 | 16/04/1441 |
Taif University | Teaching Assistant | 17/05/1430 | 11/04/1432 |
إسم الدورة | المكان | تاريخ الدورة |
---|---|---|
Cybersecurity training via the ACM | The ACM Conference on Computer and Communications Security (CCS) | 10/02/1439 |
الجائزة/براءة الاختراع | الجهة المانحة | التاريخ |
---|---|---|
Selected for submission to a special issue of Knowledge Discovery and Information retrieval journal | Knowledge Discovery and Information retrieval journal | 14/04/1441 |
Selected among Best Students’ Papers Award in KDIR’19 | The International Conference on Knowledge Discovery and Information Retrieval | 13/12/1440 |
Selected among Best Students’ Papers Award in DBSec’19 | 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy | 12/11/1440 |
Selected for submission to a special issue of International Journal of General Systems | WUPES Conference | 04/12/1439 |
Received Epsilon Pi Epsilon, the honor society for the computing and information disciplines | University of South Carolina | 25/06/1436 |
Received an award from Taif University for graduating with first honor, Ranked first on the College of Computers and Information Technology graduates in May 2008 | Taif University | 09/05/1429 |
Received multiple awards from the Ministry of Education in Saudi Arabia for being one of the highly scored students in middle and high school in 2001, 2002, 2003, and 2004 | Ministry of Education |
مسمي اللجنة | نوع اللجنة | تاريخ الإنضمام |
---|---|---|
Member at the committee of Master of Cybersecurity Program at College of Computers and Information Technology, Taif University | خارج الجامعة | 20/05/1441 |
PC member at IFIP WG 11.3 Conference on Data and Applications Security and Privacy | داخل الجامعة | 12/11/1440 |
PC member at the IEEE International Conference on Data Intelligence and Security | داخل الجامعة | 20/10/1440 |
Student volunteer in Information Technology Center of Indie Grits in Columbia, South Carolina. | خارج الجامعة | 05/06/1437 |
Student volunteer at Leadership and Service Center at the University of South Carolina. | خارج الجامعة | 24/10/1435 |
Volunteer at Transitions Homeless Center at the state of South Carolina | داخل الجامعة | 14/10/1434 |
ملف السيرة الذاتية |
---|