SlideShare a Scribd company logo
1 of 2
Download to read offline
Mohammed Abuhamad
Contact
Information
Department of Computer Engineering
University of Central Florida (UCF)
368 Research I, 4000 Central Florida Blvd. Orlando, Florida, 32816
Tel: (407) 663-8139
Email: m.abuhamad@msn.com
Research
Interests
Information Security
Software Security, Mobile and Pervasive Computing Security, Privacy
Artificial Intelligence
Deep Learning and Machine Learning Security Applications, Anomaly Detection
Data Science
Data Mining, Information Retrieval, Knowledge Technology.
Business Intelligence
Customer Relationship Management, Enterprise Resource Planning, Data Integration, Business
Analytics, Statistical Inference, Probabilistic Models and Simulation, Performance Indicators.
Education Computer Science, University of Central Florida (UCF), Orlando, USA.
PhD candidate January 2019 - present
Computer Engineering, INHA University, Incheon, Republic of Korea.
PhD candidate September 2015 - present
Information Science & Technology, National University of Malaysia, Bangi, Malaysia.
Master of Information Technology (Artificial Intelligence) September 2010 - March 2013
Information Technology, Islamic University of Gaza, Gaza, Palestine.
Bachelor Degree in Computer Science September 2002 - August 2007
Courses and
Training
National University Of Malaysia, Bangi, Malaysia
– Workshop: Writing and Publishing in High Impact Journals January 2013
Pentaho Corporation, Kuala Lumpur, Malaysia
– Training Course: Pentaho Agile Business Intelligence System October - December 2012
– Workshop: Pentaho Business Analytics October - December 2012
– Workshop: Pentaho Data Integration October - December 2012
CAIT – National University Of Malaysia, Bangi, Malaysia
– Training Course: Microsoft Dynamics (Enterprise Resource Planning) May 2012
– Training Course: Microsoft Dynamics (Customer Relationship Management) March 2012
Career Development Institute, Gaza, Palestine
– Workshop: Leading Your Team June 2012
Computer Land Training centre, Gaza, Palestine
– Training Course: Web Programming and Design June - August 2009
Professional
Experience
Security Analytics Research Lab (SEAL)
University of Central Florida, United States of America January 2019 - present
Member; working on projects in the area of information security.
Projects:
– Circumventing software authorship identification using adversarial attributions
– Deep learning-based implicit continuous authentication using smartphone sensors
– Deep Learning-based library signature for accurate third-party library detection for android
Information Security Research Laboratory (ISRL)
INHA University, Republic of Korea September 2015 - December 2018
Member; working on government-funded research projects in the area of information security.
Projects:
– Big data approach to analyzing, characterizing, modeling, and defending against distributed
denial of service attacks
– Development of biometrics-based key infrastructure technology for on-line identification
– Real-time traffic measurement and high performance in-memory DB technologies for data center
Ministry of Interior, Palestine May 2013 to August 2015
– Employee at the computer and development department
Knowledge Technology Research Group,
Centre of Artificial Technology, Malaysia February 2011 to February 2013
Member, worked on several projects related to knowledge technology.
Projects:
– Semantic analysis for news streams
– Real-time business intelligence systems
– High frequency financial data analysis
Ministry of Interior, Palestine September 2007 to July 2010
– Employee at the computer and development department
Fajir Company for Computers, Palestine March 2008 to May 2010
– Owner and Manager
Several Web Services and Hosting Enterprises July 2007 to February 2010
– Freelancer as Web and software developer
Computer Skills – Programming Languages: Python, R, Java, C, C++.
– Applications and Tools: TEX, LATEX, Variety of web desgin and development tools, Pandas
and other common productivity packages for Windows, OS X, and Linux platforms
– Machine Learning Tools: Tensorflow, Keras, Scikit-learn, Pandas, NLTK , Gensim, Weka,
and others
– Business Intelligence: Pentaho Agile Business Intelligence System, Microsoft Dynamics
– Operating System: Linux, Windows, Apple OS X
Publications – “Code authorship identification using convolutional neural networks”, Future Generation Com-
puter Systems Volume 95 (2019)
– “Data Categorization and Model Weighting Approach for Language Model Adaptation in
Statistical Machine Translation” International Journal of Advanced Computer Science and
Applications Volume 10 (2019)
– “Large-Scale and Language-Oblivious Code Authorship Identification”, CCS ’18 Proceedings
of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018)
– “Event-Driven Business Intelligence Approach for Real-Time Integration of Technical and
Fundamental Analysis in Forex Market”, Journal of Computer Science Volume 9 (2013)
– “Chemical Rings Handwritten Recognition Based on Neural Network”, Uiquitous Computing
and Communication Journal Volume 3 (2008)
References Prof. Aziz Mohaisen
Computer Science Department, University of Central Florida, USA
Founding director of the Security Analytics Research Lab (SEAL)
Tel: +1 407-823-1294
Email: mohaisen@ucf.edu
Office: 377 Research 1, 4353 Scorpius Street, Orlando, FL 32816-0120, USA
Web: https://www.cs.ucf.edu/∼ mohaisen
Prof. Daehun Nyang
Computer Engineering Department, Inha University, Republic of Korea
Founding director of the Information Security Research Laboratory (ISRL)
Tel: +82 32-860-8424
Email: nyang@inha.ac.kr
Office: 1009 Hitech Center, Inha University
Web: http://www.isrl.kr (http://seclab.inha.ac.kr)
Prof. Masnizah Mohd
Head of Postgraduate Studies, Faculty of Information Science and Technology,
National University of Malaysia, Malaysia
Tel: +6-03-8921-6813
Email: mas@ftsm.ukm.my

More Related Content

What's hot

Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
Gap finder finding inconsistency of security information from unstructured text
Gap finder finding inconsistency of security information from unstructured textGap finder finding inconsistency of security information from unstructured text
Gap finder finding inconsistency of security information from unstructured textShakas Technologies
 
document-part- (6).doc
document-part- (6).docdocument-part- (6).doc
document-part- (6).docmayuramanirudh
 
Tejashree gharat cmu resume_dec15
Tejashree gharat cmu resume_dec15Tejashree gharat cmu resume_dec15
Tejashree gharat cmu resume_dec15Tejashree Gharat
 
Munjal_Patel_NYU_resume
Munjal_Patel_NYU_resumeMunjal_Patel_NYU_resume
Munjal_Patel_NYU_resumeMunjal Patel
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsVishwesh Nagamalla
 
Security Education Resource Mapping Project
Security Education Resource Mapping ProjectSecurity Education Resource Mapping Project
Security Education Resource Mapping ProjectIIIT Hyderabad
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
Utkarsh Garg Resume
Utkarsh Garg ResumeUtkarsh Garg Resume
Utkarsh Garg ResumeUtkarsh Garg
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
RT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsRT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsjournalBEEI
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 

What's hot (19)

Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
Gap finder finding inconsistency of security information from unstructured text
Gap finder finding inconsistency of security information from unstructured textGap finder finding inconsistency of security information from unstructured text
Gap finder finding inconsistency of security information from unstructured text
 
document-part- (6).doc
document-part- (6).docdocument-part- (6).doc
document-part- (6).doc
 
Contents
ContentsContents
Contents
 
Tejashree gharat cmu resume_dec15
Tejashree gharat cmu resume_dec15Tejashree gharat cmu resume_dec15
Tejashree gharat cmu resume_dec15
 
Munjal_Patel_NYU_resume
Munjal_Patel_NYU_resumeMunjal_Patel_NYU_resume
Munjal_Patel_NYU_resume
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systems
 
Security Education Resource Mapping Project
Security Education Resource Mapping ProjectSecurity Education Resource Mapping Project
Security Education Resource Mapping Project
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
Utkarsh Garg Resume
Utkarsh Garg ResumeUtkarsh Garg Resume
Utkarsh Garg Resume
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
RT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected thingsRT-RCT: an online tool for real-time retrieval of connected things
RT-RCT: an online tool for real-time retrieval of connected things
 
ABSTRACT
ABSTRACTABSTRACT
ABSTRACT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Skills
SkillsSkills
Skills
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
776 s0005
776 s0005776 s0005
776 s0005
 

Similar to CV

On Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineOn Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineMustafa Jarrar
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...IJECEIAES
 
Stermedia - AI and software solutions for manufacturing/industry 4.0
Stermedia - AI and software solutions for manufacturing/industry 4.0Stermedia - AI and software solutions for manufacturing/industry 4.0
Stermedia - AI and software solutions for manufacturing/industry 4.0stermedia
 
Resume Of Philip Cruz #1 Updated
Resume Of Philip Cruz #1 UpdatedResume Of Philip Cruz #1 Updated
Resume Of Philip Cruz #1 UpdatedPhilip Cruz
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET Journal
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityIRJET Journal
 
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyayCareer guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyaySabyasachi Mukhopadhyay
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
Big Data Analytics : Understanding for Research Activity
Big Data Analytics : Understanding for Research ActivityBig Data Analytics : Understanding for Research Activity
Big Data Analytics : Understanding for Research ActivityAndry Alamsyah
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
Application of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptxApplication of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptxchristinacammillus20
 
ICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdfICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdfBurhanNaeem1
 

Similar to CV (20)

On Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineOn Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in Palestine
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...
 
IoT
IoTIoT
IoT
 
Stermedia - AI and software solutions for manufacturing/industry 4.0
Stermedia - AI and software solutions for manufacturing/industry 4.0Stermedia - AI and software solutions for manufacturing/industry 4.0
Stermedia - AI and software solutions for manufacturing/industry 4.0
 
Resume Of Philip Cruz #1 Updated
Resume Of Philip Cruz #1 UpdatedResume Of Philip Cruz #1 Updated
Resume Of Philip Cruz #1 Updated
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
 
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyayCareer guidance talk it makaut_ppt_sabyasachi mukhopadhyay
Career guidance talk it makaut_ppt_sabyasachi mukhopadhyay
 
Resume
Resume Resume
Resume
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
Batra_shilpa
Batra_shilpaBatra_shilpa
Batra_shilpa
 
CaselliM_CV
CaselliM_CVCaselliM_CV
CaselliM_CV
 
Big Data Analytics : Understanding for Research Activity
Big Data Analytics : Understanding for Research ActivityBig Data Analytics : Understanding for Research Activity
Big Data Analytics : Understanding for Research Activity
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Application of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptxApplication of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptx
 
ICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdfICMRI2023_paper_3887.pdf
ICMRI2023_paper_3887.pdf
 
Dr Khdour CV
Dr Khdour CVDr Khdour CV
Dr Khdour CV
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 

Recently uploaded

定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一Fs sss
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
Ch. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfCh. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfJamalYaseenJameelOde
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfDivyeshPatel234692
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...Suhani Kapoor
 
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一F La
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一2s3dgmej
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证obuhobo
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
frfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.pptfrfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.pptSURYAKANTSAHDEO
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一lvtagr7
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Discovery Institute
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改yuu sss
 
How to Find the Best NEET Coaching in Indore (2).pdf
How to Find the Best NEET Coaching in Indore (2).pdfHow to Find the Best NEET Coaching in Indore (2).pdf
How to Find the Best NEET Coaching in Indore (2).pdfmayank158542
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of JobRemote DBA Services
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptShafqatShakeel1
 
Gray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfGray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfpadillaangelina0023
 
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdfobuhobo
 

Recently uploaded (20)

定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
Ch. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfCh. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdf
 
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort ServiceYoung Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
 
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
VIP High Profile Call Girls Jamshedpur Aarushi 8250192130 Independent Escort ...
 
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
 
frfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.pptfrfefeferfefqfeferc2012 Report Out Slides Final.ppt
frfefeferfefqfeferc2012 Report Out Slides Final.ppt
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, India
 
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
办澳洲詹姆斯库克大学毕业证成绩单pdf电子版制作修改
 
How to Find the Best NEET Coaching in Indore (2).pdf
How to Find the Best NEET Coaching in Indore (2).pdfHow to Find the Best NEET Coaching in Indore (2).pdf
How to Find the Best NEET Coaching in Indore (2).pdf
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Job
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.ppt
 
Gray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfGray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdf
 
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
加利福尼亚大学伯克利分校硕士毕业证成绩单(价格咨询)学位证书pdf
 

CV

  • 1. Mohammed Abuhamad Contact Information Department of Computer Engineering University of Central Florida (UCF) 368 Research I, 4000 Central Florida Blvd. Orlando, Florida, 32816 Tel: (407) 663-8139 Email: m.abuhamad@msn.com Research Interests Information Security Software Security, Mobile and Pervasive Computing Security, Privacy Artificial Intelligence Deep Learning and Machine Learning Security Applications, Anomaly Detection Data Science Data Mining, Information Retrieval, Knowledge Technology. Business Intelligence Customer Relationship Management, Enterprise Resource Planning, Data Integration, Business Analytics, Statistical Inference, Probabilistic Models and Simulation, Performance Indicators. Education Computer Science, University of Central Florida (UCF), Orlando, USA. PhD candidate January 2019 - present Computer Engineering, INHA University, Incheon, Republic of Korea. PhD candidate September 2015 - present Information Science & Technology, National University of Malaysia, Bangi, Malaysia. Master of Information Technology (Artificial Intelligence) September 2010 - March 2013 Information Technology, Islamic University of Gaza, Gaza, Palestine. Bachelor Degree in Computer Science September 2002 - August 2007 Courses and Training National University Of Malaysia, Bangi, Malaysia – Workshop: Writing and Publishing in High Impact Journals January 2013 Pentaho Corporation, Kuala Lumpur, Malaysia – Training Course: Pentaho Agile Business Intelligence System October - December 2012 – Workshop: Pentaho Business Analytics October - December 2012 – Workshop: Pentaho Data Integration October - December 2012 CAIT – National University Of Malaysia, Bangi, Malaysia – Training Course: Microsoft Dynamics (Enterprise Resource Planning) May 2012 – Training Course: Microsoft Dynamics (Customer Relationship Management) March 2012 Career Development Institute, Gaza, Palestine – Workshop: Leading Your Team June 2012 Computer Land Training centre, Gaza, Palestine – Training Course: Web Programming and Design June - August 2009 Professional Experience Security Analytics Research Lab (SEAL) University of Central Florida, United States of America January 2019 - present Member; working on projects in the area of information security. Projects: – Circumventing software authorship identification using adversarial attributions – Deep learning-based implicit continuous authentication using smartphone sensors – Deep Learning-based library signature for accurate third-party library detection for android Information Security Research Laboratory (ISRL) INHA University, Republic of Korea September 2015 - December 2018 Member; working on government-funded research projects in the area of information security. Projects: – Big data approach to analyzing, characterizing, modeling, and defending against distributed denial of service attacks – Development of biometrics-based key infrastructure technology for on-line identification – Real-time traffic measurement and high performance in-memory DB technologies for data center
  • 2. Ministry of Interior, Palestine May 2013 to August 2015 – Employee at the computer and development department Knowledge Technology Research Group, Centre of Artificial Technology, Malaysia February 2011 to February 2013 Member, worked on several projects related to knowledge technology. Projects: – Semantic analysis for news streams – Real-time business intelligence systems – High frequency financial data analysis Ministry of Interior, Palestine September 2007 to July 2010 – Employee at the computer and development department Fajir Company for Computers, Palestine March 2008 to May 2010 – Owner and Manager Several Web Services and Hosting Enterprises July 2007 to February 2010 – Freelancer as Web and software developer Computer Skills – Programming Languages: Python, R, Java, C, C++. – Applications and Tools: TEX, LATEX, Variety of web desgin and development tools, Pandas and other common productivity packages for Windows, OS X, and Linux platforms – Machine Learning Tools: Tensorflow, Keras, Scikit-learn, Pandas, NLTK , Gensim, Weka, and others – Business Intelligence: Pentaho Agile Business Intelligence System, Microsoft Dynamics – Operating System: Linux, Windows, Apple OS X Publications – “Code authorship identification using convolutional neural networks”, Future Generation Com- puter Systems Volume 95 (2019) – “Data Categorization and Model Weighting Approach for Language Model Adaptation in Statistical Machine Translation” International Journal of Advanced Computer Science and Applications Volume 10 (2019) – “Large-Scale and Language-Oblivious Code Authorship Identification”, CCS ’18 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018) – “Event-Driven Business Intelligence Approach for Real-Time Integration of Technical and Fundamental Analysis in Forex Market”, Journal of Computer Science Volume 9 (2013) – “Chemical Rings Handwritten Recognition Based on Neural Network”, Uiquitous Computing and Communication Journal Volume 3 (2008) References Prof. Aziz Mohaisen Computer Science Department, University of Central Florida, USA Founding director of the Security Analytics Research Lab (SEAL) Tel: +1 407-823-1294 Email: mohaisen@ucf.edu Office: 377 Research 1, 4353 Scorpius Street, Orlando, FL 32816-0120, USA Web: https://www.cs.ucf.edu/∼ mohaisen Prof. Daehun Nyang Computer Engineering Department, Inha University, Republic of Korea Founding director of the Information Security Research Laboratory (ISRL) Tel: +82 32-860-8424 Email: nyang@inha.ac.kr Office: 1009 Hitech Center, Inha University Web: http://www.isrl.kr (http://seclab.inha.ac.kr) Prof. Masnizah Mohd Head of Postgraduate Studies, Faculty of Information Science and Technology, National University of Malaysia, Malaysia Tel: +6-03-8921-6813 Email: mas@ftsm.ukm.my