This document provides a summary of Nezer Jacob Zaidenberg's professional background and qualifications. It includes his work addresses, areas of research, education history, academic and industrial appointments, grants, publications, courses taught, and graduate students supervised. The key information presented includes that Nezer Zaidenberg is currently a faculty member in the software engineering department at Shenkar College of Engineering and Design in Israel, and his areas of research include cybersecurity, operating systems, and software engineering. He holds a Ph.D. in Mathematical Information Technology from the University of Jyväskylä in Finland.
This document discusses a research project on developing an extensible access control framework for cloud-based applications. It is being conducted by the KTH Applied Information Security Lab in collaboration with NUST. The project aims to address authorization and access control issues in cloud computing. It involves developing software requirements, architecture design documents, implementing attribute-based access control and other models, and testing the framework on OpenStack cloud instances. Progress updates and future milestones are provided over nine project quarters.
This document provides a syllabus for the B.Tech Information Technology program up to the fourth year. It outlines the courses, credits, theory, and practical components for each semester.
The second year includes courses in values and ethics, physics, environmental engineering, analog and digital electronics, data structures, computer organization, and numerical methods. Practical labs are included for various topics.
The third year covers algorithm design, computer architecture, operating systems, databases, computer networks, software engineering, and electives in various fields. Seminars and industrial training are also included.
The fourth year focuses on advanced topics like internet technology, multimedia, e-commerce, cloud computing, project management, and a major individual
Irfan Sabir is seeking to enhance his knowledge and experience through original ideas. He has a M.S. in Electrical Engineering from Bahria University and a Masters in Electronics from Sarhad University of Science & Information Technology. He has over 12 years of experience operating and maintaining analytical instruments like XRD, NMR, TGA, FTIR, and more. He is currently working as a Sub-Engineer at Quaid-i-Azam University, operating analytical instruments and studying materials for optoelectronic applications.
The document is a call for papers for the International Conference on Machine Learning and Data Analysis (ICMLDA 2008) to be held October 22-24, 2008 in San Francisco, USA. It provides information on submission guidelines and important dates, as well as an overview of topics that will be covered at the conference related to machine learning and data analysis techniques and applications. Accepted papers will be published in the conference proceedings and considered for publication in relevant journals.
Cristian Randieri has an extensive background in engineering, computer science, and research. He received his PhD in Engineering in Computer Science and Telecommunications from Catania University in 2004. Since then, he has held several research and teaching positions, including at CERN, various Italian universities, and as the founder and CEO of his own company Intellisystem Technologies. He has significant experience leading research and development projects in areas like remote monitoring, automation, and video surveillance for applications in industrial plants, hospitals, and more.
June 2020: Top Read Articles in Control Theory and Computer Modellingijctcm
This summary provides the key details from the document in 3 sentences:
This document discusses two articles from the International Journal of Control Theory and Computer Modelling. The first article describes Zigbee, a low power wireless technology standard, its specifications, architecture and applications. The second article presents an artificial neural network approach using multilayer perceptrons to forecast weather parameters like temperature based on past data.
Workshop on Synchrophasors and Control Applications for Power SystemsLuigi Vanfretti
Wednesday, March 16, 2016
9:00 – 9:10
Coffee and Refreshments
9:10 - 9:20
Welcome and introduction
Vedran Perić, KTH
9:20 - 10:10
SmartTS Lab: Overview and Major Projects
Luigi Vanfretti, KTH
10:10 - 11:00
Near On-line Estimation of hydro power plant transfer functions from phasor measurements
Kjetil Uhlen, NTNU
11:00 - 11:10
Coffee break
11:10 - 12:00
PMU-based protection for grid operation applications – Wide Area Monitoring platform and controlled islanding
Marjan Popov, TU Delft
12:00 - 13:40 Lunch break
13:40 - 14:30
Real-time Oscillation Monitoring with Large-Scale PMU data
Mani Venkatasubramanian, Washington State University
14:30 - 15:20
Without tailored modeling data, no satisfactory control at a reasonable cost
Xavier Bombois, Laboratoire Ampère UMR CNRS 5005
15:20 – 15:30
Coffee break
15:40 – 16:30
Ultracapacitor Based Supplementary Excitation Module for Improvement of Synchronous Generator Transient Stability
Luis Rouco, Universidad Pontificia Comillas
16:30 – 17:20
The l1 heuristic for the estimation of piecewise constant/linear signals
Cristian Rojas, KTH
This curriculum vitae summarizes the qualifications and experience of Giovanni Crupi. Crupi received his Ph.D. in 2006 from the University of Messina in Italy, with a thesis on the characterization and modeling of advanced microwave transistors. He has since held various research positions, including positions at the University of Leuven in Belgium and the University of Ferrara in Italy. Crupi has published over 40 papers in international journals and conferences, and his work focuses on analytical modeling and characterization of advanced microwave devices. He currently works as a contract researcher at the University of Messina.
This document discusses a research project on developing an extensible access control framework for cloud-based applications. It is being conducted by the KTH Applied Information Security Lab in collaboration with NUST. The project aims to address authorization and access control issues in cloud computing. It involves developing software requirements, architecture design documents, implementing attribute-based access control and other models, and testing the framework on OpenStack cloud instances. Progress updates and future milestones are provided over nine project quarters.
This document provides a syllabus for the B.Tech Information Technology program up to the fourth year. It outlines the courses, credits, theory, and practical components for each semester.
The second year includes courses in values and ethics, physics, environmental engineering, analog and digital electronics, data structures, computer organization, and numerical methods. Practical labs are included for various topics.
The third year covers algorithm design, computer architecture, operating systems, databases, computer networks, software engineering, and electives in various fields. Seminars and industrial training are also included.
The fourth year focuses on advanced topics like internet technology, multimedia, e-commerce, cloud computing, project management, and a major individual
Irfan Sabir is seeking to enhance his knowledge and experience through original ideas. He has a M.S. in Electrical Engineering from Bahria University and a Masters in Electronics from Sarhad University of Science & Information Technology. He has over 12 years of experience operating and maintaining analytical instruments like XRD, NMR, TGA, FTIR, and more. He is currently working as a Sub-Engineer at Quaid-i-Azam University, operating analytical instruments and studying materials for optoelectronic applications.
The document is a call for papers for the International Conference on Machine Learning and Data Analysis (ICMLDA 2008) to be held October 22-24, 2008 in San Francisco, USA. It provides information on submission guidelines and important dates, as well as an overview of topics that will be covered at the conference related to machine learning and data analysis techniques and applications. Accepted papers will be published in the conference proceedings and considered for publication in relevant journals.
Cristian Randieri has an extensive background in engineering, computer science, and research. He received his PhD in Engineering in Computer Science and Telecommunications from Catania University in 2004. Since then, he has held several research and teaching positions, including at CERN, various Italian universities, and as the founder and CEO of his own company Intellisystem Technologies. He has significant experience leading research and development projects in areas like remote monitoring, automation, and video surveillance for applications in industrial plants, hospitals, and more.
June 2020: Top Read Articles in Control Theory and Computer Modellingijctcm
This summary provides the key details from the document in 3 sentences:
This document discusses two articles from the International Journal of Control Theory and Computer Modelling. The first article describes Zigbee, a low power wireless technology standard, its specifications, architecture and applications. The second article presents an artificial neural network approach using multilayer perceptrons to forecast weather parameters like temperature based on past data.
Workshop on Synchrophasors and Control Applications for Power SystemsLuigi Vanfretti
Wednesday, March 16, 2016
9:00 – 9:10
Coffee and Refreshments
9:10 - 9:20
Welcome and introduction
Vedran Perić, KTH
9:20 - 10:10
SmartTS Lab: Overview and Major Projects
Luigi Vanfretti, KTH
10:10 - 11:00
Near On-line Estimation of hydro power plant transfer functions from phasor measurements
Kjetil Uhlen, NTNU
11:00 - 11:10
Coffee break
11:10 - 12:00
PMU-based protection for grid operation applications – Wide Area Monitoring platform and controlled islanding
Marjan Popov, TU Delft
12:00 - 13:40 Lunch break
13:40 - 14:30
Real-time Oscillation Monitoring with Large-Scale PMU data
Mani Venkatasubramanian, Washington State University
14:30 - 15:20
Without tailored modeling data, no satisfactory control at a reasonable cost
Xavier Bombois, Laboratoire Ampère UMR CNRS 5005
15:20 – 15:30
Coffee break
15:40 – 16:30
Ultracapacitor Based Supplementary Excitation Module for Improvement of Synchronous Generator Transient Stability
Luis Rouco, Universidad Pontificia Comillas
16:30 – 17:20
The l1 heuristic for the estimation of piecewise constant/linear signals
Cristian Rojas, KTH
This curriculum vitae summarizes the qualifications and experience of Giovanni Crupi. Crupi received his Ph.D. in 2006 from the University of Messina in Italy, with a thesis on the characterization and modeling of advanced microwave transistors. He has since held various research positions, including positions at the University of Leuven in Belgium and the University of Ferrara in Italy. Crupi has published over 40 papers in international journals and conferences, and his work focuses on analytical modeling and characterization of advanced microwave devices. He currently works as a contract researcher at the University of Messina.
This document provides biographical and professional details about Naveed Ali Kaim Khani. It outlines his education including a PhD from Dalian University of Technology in China and a Master's from TELECOM & Management SudParis in France. It also details his work experience including positions as an Assistant Professor in Pakistan and China, and projects in wireless networking. Finally, it lists 6 publications in international journals and 1 paper under review.
1. Jaehoon Jeong is a software engineer at Brocade Communications Systems who received his Ph.D. in computer science from the University of Minnesota in 2009.
2. His research has focused on wireless sensor networks, vehicular networks, and storage area networks.
3. He has over 15 publications in international conferences and journals related to IPv6, mobile ad hoc networks, and sensor network localization and tracking algorithms.
The document outlines the vision, mission, and strategy of the STFC (Science and Technology Facilities Council) in implementing e-Science technologies. The goals are to exploit data from STFC facilities through innovative infrastructure, integrate activities nationally and internationally, and improve computation and data management capabilities to enable new scientific discoveries.
Pieter Van der Vyver is an electronic engineer from South Africa with expertise in computational neuroscience, machine learning, and software engineering. He has a Master's degree in electronic engineering and speaks several languages. He has worked on research projects involving cochlear implants and speech encoding. His professional experience includes positions in research, technical delivery management, and software development using technologies such as IBM Rational, Matlab, and various programming languages. He has received several awards for his work.
This curriculum vitae outlines the qualifications and experience of Dr. Andrew Paul Nisbet. He is currently a Senior Lecturer in Computer Science at Manchester Metropolitan University, where he has worked since 2004. His research focuses on compiler optimization techniques for parallel, multicore, and embedded systems. He has supervised several PhD students to completion and currently supervises two PhD students.
Ramesh Mylavarapu is an Applications Engineer at Cypress Semiconductor with experience developing firmware for USB devices. He developed a USB composite device firmware that allows a device to function as a mass storage, video, and HID device using multithreading. He has a M.Tech from IIT Kharagpur and a B.Tech from Andhra University. His skills include C programming, embedded systems, analog and digital electronics, and electromagnetic simulation tools.
Lu-an Liu has extensive experience in electronics engineering, signal processing, and sound and vibration. He has independently developed several machine-to-machine communication systems using mobile networks, ARM processors, and protocols like CANbus and Modbus to communicate with heat pumps. He is skilled in areas like electronic design, wireless communications, programming, and acoustic measurements and analyses. Liu holds a master's degree from KTH in Sound and Vibration and is currently working on his thesis.
This document is a resume for Jaehoon Jeong. It summarizes his professional experience, education, skills, and publications. Some key details include:
- He is currently a Software Engineer at Brocade Communications Systems, working on IPv6 and IPsec implementations.
- He received a Ph.D. in Computer Science from the University of Minnesota in 2009, with a focus on wireless sensor networking.
- He has published over 15 papers in international conferences on topics related to wireless sensor networks, vehicular networks, and IPv6 networking.
- His experience includes research positions at the University of Minnesota and ETRI in Korea, as well as internships at SGI and McData.
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
IT Industry publishes original research articles, review articles, and extended versions of conference papers. Articles resulting from research of both theoretical and/or practical natures performed by academics and/or industry practitioners are welcome. IT in Industry aims to become a leading IT journal with a high impact factor.
This curriculum vitae outlines the professional experience and education of Marco Caselli. He received his PhD from the University of Twente in 2016, where he researched network security for industrial control systems. His work experience includes positions as a researcher focusing on cybersecurity, a visiting researcher at UC Berkeley, and security consultant roles. He has strong skills in programming, modeling languages, and operating systems relevant to cybersecurity.
The document is a curriculum vitae for Hanafy Mahmoud Ali. It provides personal information such as his name, contact details, education history, work experience, teaching experience, software skills, published works, and references. Hanafy has a PhD in Computer Engineering from El-Minia University and works as an Assistant Professor teaching various computer engineering and networking courses at multiple universities in Egypt and Saudi Arabia.
Towards universitas indonesia_next_generation_firewall_serviceTonny Adhi Sabastian
This was my talk at Asia Pacific Rim Universities CEO Forum 2015 at HKUST. This slide told the progress of L7 Firewall Development at University if Indonesia using Free/Open Source stack
My updated resume for (UMTS, WCDMA, LTE-Advanced 4G and 5G, SDN and NVF) wireless engineering.
Please feel free to contact me if you have any questions.
June 2020: Top Read Articles in Advanced Computingacijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of computing.
Cloud Computing Security From Sngle to multi Clouds Full DocumentaionVamshi Chowdary
This document is a project report submitted by 4 students for their Bachelor of Technology degree. It discusses security issues related to cloud computing, including moving from single cloud providers to multiple cloud (or multi-cloud) providers. The report aims to address security risks like data integrity, data intrusion, and service availability when using cloud services. It also describes the DepSky system model for improving cloud storage security using multiple cloud providers.
Wael Dghais is a senior researcher and lecturer in electrical engineering with interests in EDA tools, modeling of nanoscale transistors, optoelectronics devices, and industrial process characterization. He received his PhD in electrical engineering from the University of Aveiro in 2013. He has over 10 years of experience in research, teaching, and industry.
This document summarizes the experience of Luis Perez, a desktop engineer with over 30 years of experience in IT infrastructure management, workstation support, and project management. He has extensive expertise in areas such as Active Directory, SQL Server, IIS, and workstation design/provisioning. Currently he works for the Service of Information Technology and Telecommunications of the State of Fribourg, where he manages over 30,000 workstations and leads projects such as Windows 10 migrations and the implementation of monitoring systems. Prior to this role, he held several positions such as Assistant Vice President at Lombard Odier Bank, where he managed over 4,000 workstations and infrastructure projects.
Syed Shakeel Hashmi is an Assistant Professor and Internship Coordinator in the Electronics & Communication Department at the Faculty of Science & Technology of IFHE University in Hyderabad, India. He has over 14 years of experience in teaching and has pursued a PhD in Wireless Communication. He teaches courses in digital signal processing, communication systems, and networks. His research interests include wireless communication and cognitive radio.
This document provides biographical and professional details about Naveed Ali Kaim Khani. It outlines his education including a PhD from Dalian University of Technology in China and a Master's from TELECOM & Management SudParis in France. It also details his work experience including positions as an Assistant Professor in Pakistan and China, and projects in wireless networking. Finally, it lists 6 publications in international journals and 1 paper under review.
1. Jaehoon Jeong is a software engineer at Brocade Communications Systems who received his Ph.D. in computer science from the University of Minnesota in 2009.
2. His research has focused on wireless sensor networks, vehicular networks, and storage area networks.
3. He has over 15 publications in international conferences and journals related to IPv6, mobile ad hoc networks, and sensor network localization and tracking algorithms.
The document outlines the vision, mission, and strategy of the STFC (Science and Technology Facilities Council) in implementing e-Science technologies. The goals are to exploit data from STFC facilities through innovative infrastructure, integrate activities nationally and internationally, and improve computation and data management capabilities to enable new scientific discoveries.
Pieter Van der Vyver is an electronic engineer from South Africa with expertise in computational neuroscience, machine learning, and software engineering. He has a Master's degree in electronic engineering and speaks several languages. He has worked on research projects involving cochlear implants and speech encoding. His professional experience includes positions in research, technical delivery management, and software development using technologies such as IBM Rational, Matlab, and various programming languages. He has received several awards for his work.
This curriculum vitae outlines the qualifications and experience of Dr. Andrew Paul Nisbet. He is currently a Senior Lecturer in Computer Science at Manchester Metropolitan University, where he has worked since 2004. His research focuses on compiler optimization techniques for parallel, multicore, and embedded systems. He has supervised several PhD students to completion and currently supervises two PhD students.
Ramesh Mylavarapu is an Applications Engineer at Cypress Semiconductor with experience developing firmware for USB devices. He developed a USB composite device firmware that allows a device to function as a mass storage, video, and HID device using multithreading. He has a M.Tech from IIT Kharagpur and a B.Tech from Andhra University. His skills include C programming, embedded systems, analog and digital electronics, and electromagnetic simulation tools.
Lu-an Liu has extensive experience in electronics engineering, signal processing, and sound and vibration. He has independently developed several machine-to-machine communication systems using mobile networks, ARM processors, and protocols like CANbus and Modbus to communicate with heat pumps. He is skilled in areas like electronic design, wireless communications, programming, and acoustic measurements and analyses. Liu holds a master's degree from KTH in Sound and Vibration and is currently working on his thesis.
This document is a resume for Jaehoon Jeong. It summarizes his professional experience, education, skills, and publications. Some key details include:
- He is currently a Software Engineer at Brocade Communications Systems, working on IPv6 and IPsec implementations.
- He received a Ph.D. in Computer Science from the University of Minnesota in 2009, with a focus on wireless sensor networking.
- He has published over 15 papers in international conferences on topics related to wireless sensor networks, vehicular networks, and IPv6 networking.
- His experience includes research positions at the University of Minnesota and ETRI in Korea, as well as internships at SGI and McData.
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
IT Industry publishes original research articles, review articles, and extended versions of conference papers. Articles resulting from research of both theoretical and/or practical natures performed by academics and/or industry practitioners are welcome. IT in Industry aims to become a leading IT journal with a high impact factor.
This curriculum vitae outlines the professional experience and education of Marco Caselli. He received his PhD from the University of Twente in 2016, where he researched network security for industrial control systems. His work experience includes positions as a researcher focusing on cybersecurity, a visiting researcher at UC Berkeley, and security consultant roles. He has strong skills in programming, modeling languages, and operating systems relevant to cybersecurity.
The document is a curriculum vitae for Hanafy Mahmoud Ali. It provides personal information such as his name, contact details, education history, work experience, teaching experience, software skills, published works, and references. Hanafy has a PhD in Computer Engineering from El-Minia University and works as an Assistant Professor teaching various computer engineering and networking courses at multiple universities in Egypt and Saudi Arabia.
Towards universitas indonesia_next_generation_firewall_serviceTonny Adhi Sabastian
This was my talk at Asia Pacific Rim Universities CEO Forum 2015 at HKUST. This slide told the progress of L7 Firewall Development at University if Indonesia using Free/Open Source stack
My updated resume for (UMTS, WCDMA, LTE-Advanced 4G and 5G, SDN and NVF) wireless engineering.
Please feel free to contact me if you have any questions.
June 2020: Top Read Articles in Advanced Computingacijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of computing.
Cloud Computing Security From Sngle to multi Clouds Full DocumentaionVamshi Chowdary
This document is a project report submitted by 4 students for their Bachelor of Technology degree. It discusses security issues related to cloud computing, including moving from single cloud providers to multiple cloud (or multi-cloud) providers. The report aims to address security risks like data integrity, data intrusion, and service availability when using cloud services. It also describes the DepSky system model for improving cloud storage security using multiple cloud providers.
Wael Dghais is a senior researcher and lecturer in electrical engineering with interests in EDA tools, modeling of nanoscale transistors, optoelectronics devices, and industrial process characterization. He received his PhD in electrical engineering from the University of Aveiro in 2013. He has over 10 years of experience in research, teaching, and industry.
This document summarizes the experience of Luis Perez, a desktop engineer with over 30 years of experience in IT infrastructure management, workstation support, and project management. He has extensive expertise in areas such as Active Directory, SQL Server, IIS, and workstation design/provisioning. Currently he works for the Service of Information Technology and Telecommunications of the State of Fribourg, where he manages over 30,000 workstations and leads projects such as Windows 10 migrations and the implementation of monitoring systems. Prior to this role, he held several positions such as Assistant Vice President at Lombard Odier Bank, where he managed over 4,000 workstations and infrastructure projects.
Syed Shakeel Hashmi is an Assistant Professor and Internship Coordinator in the Electronics & Communication Department at the Faculty of Science & Technology of IFHE University in Hyderabad, India. He has over 14 years of experience in teaching and has pursued a PhD in Wireless Communication. He teaches courses in digital signal processing, communication systems, and networks. His research interests include wireless communication and cognitive radio.
1. NEZER JACOB ZAIDENBERG
WORK ADDRESS
Shenkar college of engineering and design
Department of software engineering
12 Anna Frank st
Ramat Gan, Israel
University of Jyväkylä
Department of mathematical information technology
P.O. Box 35 (Agora)
FIN-40014 Finland
PERSONAL ADDRESS
30 haodem st.
Hod Hasharon
45350, Israel
http://www.scipio.org
Finland: +358-(400)-805-4939 | Israel: +972 (54) 553-1415 | US: +(1) 720-408-3909
AREAS OF RESEARCH
CYBER : trusted computing, systems, privacy
OPERATING SYSTEMS : Virtualization, hypervisors, high speed interconnects
SOFTWARE ENGINEERING : Systems, No-SQL, networks
EDUCATION
DOCENT University of Jyväkylä December 2013
MATHEMATICAL INFORMATION TECHNOLOGY
“VIRTUALIZATION AND PROTECTIONOF DIGITAL CONTENT”
Ph.D University of Jyväkylä June 2012
MATHEMATICAL INFORMATION TECHNOLOGY
Thesis under supervision of Prof. Amir Averbuch and Prof Pekka Neittaanmäki
Dissertation topic: “Developing advanced systems with aspects of virtualization”
MBA Tel Aviv University June 2007
SPECIALIZING IN FINANCE
M.SC Tel Aviv University May 2002
OPERATIONS RESEARCH
Thesis under supervision of Prof. Amir Averbuch
Thesis topic “sFDPC and the Internet real time streaming packet cascading”
B.SC Tel Aviv University September 1999
Computer science & statistics and operations research
ACADEMIC APPOINTMENTS
Tel Aviv university – researcher STRIMM consortium 2003-2005
Tel Aviv university – researcher EGEE (Isragrid) 2008-2010
University of Jyväskylä – Post doc researcher 2012
University of Jyväskylä – Post doc researcher. Leader of Truly protect 2012-2014
Shenkar college of engineering and design – software engineering faculty member 2014-PRESENT
INDUSTRIAL APPOINTMENTS
FULL TIME POSITIONS
Axanna - VP R&D 2007-2008
o Managed 3M$ per annum budget
Uterasoft – Founder and CTO 2005-2007
o Led two roudns of financing
Corigin – Project manager and chief software architect 2002-2005
o Led two flagship projects
vTRAILS – Founder, President and CTO 1999-2002
o Led 3 rounds of financing
o Managed team of 40
ECI telecom – System administrator, DBA 1998-1999
2. CONSULTANT
Videocells (Herzelia, Israel); redesigned and led the company through product and infrastructure
transformations
Friendly Technologies (Ramat Gan, Israel) Faced product design and performance challenges.
Infowrap/Blusky (Israel/Italy) Supervised technology transfer to Italian buyer.
Expay-Global (Israel/Bulgaria) Solution infrastructure and R&D focus, security, PCI authorization.
NDS/Cisco (Jerusalem, Israel); provided training on Mac architecture internals; generated
repeated business for the implementation of three products. Designed PS3 port of PC-Show
product.
SintecMedia (Jerusalem, Israel); Technology advisor for the CTO; Software architecture for STB.
Data mining.
Kardan VC (Tel Aviv, Israel); headed technology due-diligence for investment.
EDF Energy (Plymouth, UK); UK’s #1 utility provider. Transfer from mainframe to open systems.
MCE-systems User space driver development
Diligent/IBM Fibrechannel driver development under linux
Perion Mac (OSX) internals
Finjan Windows to Solaris porting
Axxana research on brocade switches
RESEARCH GRANTS AND PERSONAL AWARDS
1. 2003-5 STRIMM consurtium grant for peer-2-peer streaming (based on masters thesis) w/ Prof
Amir Averbuch (TAU)
2. 20012-14 TEKES TUTLI grant for TRULY-PROTECT 1.25M€
3. Ellen and arrturi Nyyssosen foundation grant (18,600€)
4. TrulyProtect business plan won technology award CCSU 2013
PROFESSIONAL SOCIETIES AND ACTIVITIES
IEEE (SINCE 2011)
a. PROCTOR AND “COACH” OF SCHOOL TEAM FOR IEEEXTREME 2014 COMPETITION
SCS (SINCE 2011)
FINNISH MATHEMATICAL SOCIETY – SINCE 2012
ACADEMIC COURSES
SECURE SYSTEM DESIGN (M.SC LEVEL) – JYU 2013-14
OPERATING SYSTEM SECURITY 1 (DOMAINS MANAGEMENT- M.SC LEVEL) - JYU 2013-2014
OPERATING SYSTEM SECURITY 2 (TRUSTED COMPUTING - M.SC LEVEL) – JYU 2011-12, 2013-2014 – 2
TIMES (ONCE AS “TRUSTED COMPUTING”)
MASTER DEGREE - CYBER WORKSHOP (M.SC LEVEL) – MTA 2014-2015
BACHELOR DEGREE - LINUX WORKSHOP MTA 2010-2011, 2009-2010 TAU 2009-2010 – TOTAL 3 TIMES
MASTER SEMINAR (M.SC LEVEL) – JYU 2013-2014
FIBRECHANNEL (M.SC LEVEL) – JYU 2011-2012
DATABASES – SHNKAR 2012-2013
SECURE PROGRAMMING – SHENKAR 2014-2015
CYBER SEMINAR - SHENKAR 2014-2015
CYBER SYSTEMS - SHENKAR 2014-2015
SYSTEM PROGRAMMING UNIX MTA (2012-2013, 2013-2014, 2014-2015) SHENKAR (2013-2014, 2014-
2015) TOTAL 6 TIMES
SECURE PROGRAMMING - SEMINAR HAKIBUTZIM (2009-2010)
ADVANCED TOPICS IN OPERATING SYSTEMS (M.SC / B.SC) TAU (2009-2010, 2010-2011) MTA (2009-
2010, 2010-2011, 2011-2012, 2012-2013, 2013-2014) TOTAL 7 TIMES
REAL TIME OPERATING SYSTEMS – RUPPIN (2009-2010)
OPERATING SYSTEMS – MTA (2009-2010, 2010-2011) TAU (2009-2010, 2010-2011) RUPPIN (2009-
2010), SEMINAR HAKIBUTZIM (2009-2010) – TOTAL 10 TIMES
CALCULUS 1 – MTA (2008-2009)
COMPUTER ORGANIZATION AND ASSEMBLER (OPEN UNIVERSITY 1998-1999)
4. GRADUATE STUDENTS SUPERVISION AND CO-SUPERVISION
DOCTORAL STUDENTS
Present
Limor Gavish @ University of jyväskylä
Michael Kiperberg @ University of jyväskylä (to graduate 2015)
Amit Resh @ University of jyväskylä
Amir Hussain Rajnama @ University of jyväskylä
Tiina Kovanen @ University of jyväskylä
MASTER STUDENTS
Present
Eviatar Khen @ Tel Aviv University (w/ Prof. Amir Averbuch)
Alexei Sragovitch @ Tel Aviv Jaffa-academic college (w/ Dr. Carmi Merimovitch)
Asaf Algawi @ Tel Aviv Jaffa-academic college (w/ Dr. Carmi Merimovitch)
Evyatar Tamir @ Tel Aviv Jaffa-academic college (w/ Dr. Carmi Merimovitch)
Avihu Efrat @ University of jyväskylä
Tomer Shani @ University of jyväskylä
David Bauminger @ University of jyväskylä
M.Sc students thesis under my supervision / co supervision
Past
Limor Gavish – Thesis submitted @ Tel Aviv university (2012 w/ Prof. Amir Averbuch)
Thesis: http://www.scipio.org/students/LimorGavish/book.pdf
Michael Kiperberg – Thesis submitted @ Tel Aviv University (2012, Cum laude w/ Prof. Amir Averbuch)
Thesis: http://www.cs.tau.ac.il/thesis/thesis/Kiperberg.Michael-MSc.thesis.pdf
Tomer Margalit – Thesis submitted @ Tel Aviv University (2013 w/ Prof. Amir Averbuch)
Thesis: http://www.scipio.org/students/TomerMargalit/amirror3.pdf
Tamir Erez – Thesis submitted @ Tel Aviv Jaffa-academic collage (2013 w/ Dr. Carmi Merimovich)
Thesis: http://www.scipio.org/students/TamirErez/G2GMsc.pdf
Amit Resh @ University of jyväskylä (2013)
Asaf David @ Tel Aviv Jaffa-academic college (2014 w/ Dr. Carmi Merimovich)
Yuval Meir @ Tel Aviv University (2014 w/ Prof. Amir Averbuch)
PUBLICATIONS
5. 5 most important publications
1. "Truly Protect: An Efficient VM-Based Software Protection”
2. “An Efficient VM-Based Software Protection”
3. “A low bitrate approach to replication of block devices and virtual machines”
4. “LgDb 2.0: A code coverage and profiler architecture for the Linux kernel”
5. Business plan:Truly protect - winner of CCSU 2013 technology award
Book chapters
1. Trusted computing. to appear at CYBER SECURITY ANALYTICS Vol. 3 Cybersecurity
technologies (w/ Pekka Neittaanmäki)
2. Game console hacks to appear at CYBER SECURITY ANALYTICS Vol. 3 Cybersecurity
technologies
3. Timing and side channel attacks to appear at CYBER SECURITY ANALYTICS Vol. 3
Cybersecurity technologies (w/ Amit Resh)
4. Trusted computing Projects at JYU to appear at CYBER SECURITY ANALYTICS Vol. 3
Cybersecurity technologies (TrulyProtect w/ Michael Kiperberg, Amit Resh, Pekka Neittaanmäki.
TrulyTrusted w/ Tiina Kovanen, Evyatar Tamir and Pekka Neittaanmäki)
Journal papers
Trusted computing publication
1. Averbuch A., Kiperberg M., Zaidenberg N. "Truly Protect : An Efficient VM-Based Software
Protection” IEEE System journal September 2013
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6553406
2. M Kiperberg M. and Zaidenberg N. “Efficient Remote Authentication” to appear in Journal of
information warfare October 2013
Peer-2-peer streaming
1. Averbuch, A., Roditi, Y., & Zaidenberg, N. (2013). PPPC — peer-2-peer streaming and algorithm
for creating spanning trees for peer-2-peer networks. In S. Repin, T. Tiihonen, & T. Tuovinen
(Eds.), Numerical Methods for Differential Equations, Optimization, and Technological Problems.
Dedicated to Professor P. Neittaanmäki on His 60th Birthday (pp. 363-377). Computational
Methods in Applied Sciences (27). Berlin: Springer. doi:10.1007/978-94-007-5288-7_20
Trusted computing publication
1. A. Averbuch, M. Kiperberg, N. Zaidenberg (2011) "An Efficient VM-Based Software
Protection” IEEE NSS 2011 http://www.cs.tau.ac.il/~kiperber/truly.pdf
2. A. Resh & N. Zaidenberg (2013) "Can keys be hidden inside the CPU on modern Windows
host” ECIW 2013 pages 231-235
3. N. Zaidenberg & A. David (2013) Truly protect video delivery ECIW 2013 pages 405-407
4. M. Kiperberg & N. Zaidenberg (2013) "Efficient Remote Authentication" ECIW 2013 pages
144-148
5. E. Tamir, N. Zaidenberg & P Neittaanmäki (2014) “TrulyTrusted Operating System
Environment” to appear ICCSM 2014
6. A. Algawi, P. Neittaanmaki, N. Zaidenberg & T Parisinos (2014) “In kernel implementation of
RSA routines” to appear ICCSM 2014
7. A. David & N. Zaidenberg (2014) “Maintaining streaming video DRM” to appear ICCSM 2014
Operating systems improvements
6. 1. Averbuch A., T. Margalit, N. Zaidenberg N. & Khen E. (2011) "A low bitrate approach to
replication of block devices and virtual machines" IEEE NAS 2011
"http://www.computer.org/csdl/proceedings/nas/2011/4509/00/4509a180-abs.html"
2. Khen E., Zaidenberg N. & Averbuch A. (2011) Using virtualization for online kernel profiling,
code coverage and instrumentation SPECTS 2011
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5984854&tag=1
3. Khen E., Zaidenberg N., Averbuch A. & Fermocovich E. (2013) "LgDb 2.0: A code coverage
and profiler architecture for the Linux kernel" SPECTS 13
4. Erez T. & Zaidenberg N. (2013) "Grid2Go – A web based internet of things grid computing
engine requiring only a browser. ICI 2013
Systems
1. Averbuch, A., Roditi, Y., & Zaidenberg, N. (2011). An algorithm for creating a spanning graph
for peer-2-peer internet broadcast. In S. Repin, T. Tiihonen, & T. Tuovinen (Eds.), Proceedings
of CAO2011: ECCOMAS Thematic Conference on Computational Analysis and Optimization :
University of Jyväskylä, June 9-11, 2011 (pp. 73-76). Reports of the Department of
Mathematical Information Technology. Series A, Collections (1/2011). [Jyväskylä]: University of
Jyväskylä
2. Zaidenberg N. (2014) HoneyGuard - Opensource VSaaS system
Mathematical genetics (population dynamics) and modeling
1. Zaidenberg N. & Eshel I. (2012) “Zaidenberg’s learning model for the evolution of altruistically
cooperation” ECCOMAS 2012 (4826)
Other Publications
Ph.D dissertation : “Developing advanced systems with aspects of virtualization” Zaidenberg N.
University of Jyvaskyla June 2012
M.Sc thesis : “sFDPC and the Internet real time streaming packet cascading” Zaidenberg N. Tel
Aviv University September 2011
“Truly-Protect: Business plan” K. Choi, I. Legmpelos, T. Palosnick, M. Polo-Guardia, D.
Zaidenberg and N. Zaidenberg. Winner of CCSU 2013 Technology award.
Posters
1. "Asynchronous replication solution for Unix, replicating storage and QEMU and Lguest VMs". Amir
Averbuch, Eviatar Khen, Tomer Margalit and Nezer Zaidenberg SYSTOR 2011
2. "LgDb" Amir Averbuch, Eviatar Khen and Nezer Zaidenberg SYSTOR 2011
3. Truly-Protect: An efficient VM-Based copy protection. Amir Averbuch, Michael Kiperberg and Nezer
Zaidenerg SYSTOR 2012 http://pjd-1.ccs.neu.edu/~pjd/systor12/posters/systor12-poster4.pdf
4. A method for hiding decryption keys in copy protected software Amit Resh and Nezer Zaidenberg
SYSTOR 2013
5. Grid2Go: A Web Based Internet of Things GRID Computing Engine. Tamir Erez and Nezer
Zaidneberg SYSTOR 2013
6. TrulyProtect 2.0 and attacks on TrulyProtect 1.0 Amit Resh, Nezer Zaidenberg, Limor Gavish,
Michael Kiperberg and Eviatar Khen ECIW 2013 http://academic-
conferences.org/eciw/eciw2013/eciw13-proceedings.htm
Patents in the field of trusted computing
1. "Virtual Machine Software Protection" N.Zaidenberg and M. Kiperberg
2. "SYSTEM AND METHODS FOR CPU CACHE PINNING OF A COMPUTING DEVICE" N.
7. Zaidenberg M. Kiperberg and A. Resh
3. “Remote Authentication Application” N Zaidenberg M. Kiperberg and A. Resh
Contributions to Linux Kernel
1. In kernel RSA implementation
2. Minor contributions to several components including lguest parallel port driver etc.