Professor of Computer Science at Indiana University of Pennsylvania, Indiana, PA. 2010-present. (Associate Professor from 2002-2010)
In addition to teaching undergraduate courses (Please see Teaching page for details), I have been heavily involved in the department Information Assurance and Cybersecurity Program funded by grants from DoD, NFS, Cisco and NSA.
My research over the past period addresses the following topics (most recent first):
Investigating innovative approaches to solve challenging security problems via the use of AI and Machine Learning techniques.
Adopting an inherently interdisciplinary approach to explore challenges facing cybersecurity education and proposed innovative solutions.
Exploring effective approaches for instilling fundamentals of cybersecurity at K-12 levels.
Researching how to comprehensively assess the effectiveness of online course delivery using a multitude of performance criteria.
Working with Multidisciplinary researchers to characterize cyberspace and research novel techniques to minimize misuse and exploitations.
Employing various approaches for reliably measuring Computer Science courses learning outcomes and delivering various programming courses online.
Identifying various security concerns when dealing with multimedia data and proposing creative solutions to such problems.
Developing efficient techniques to hide/discover secret messages embedded into video media.
Investigating advanced methodologies to secure wireless transmission. These efforts were compiled in courses that were part of the developed Master of Sciences in Information Assurance (MSIA). This program is now on hold.
I have played a leading role in several multidisciplinary research groups that comprises several faculty members. These groups have prepared several proposals on security aspects that include systems for detecting radioactive plumes, digital forensics, biometric identification, and models to analyze terror use of the Internet. Some of these proposals have already been submitted to DoD, DOJ, NSF, NSA and other funding sources.
Other research projects that I have conducted after receiving my Ph.D. include:
Studying effective techniques of applying quantum cryptography to ensure the security of financial transactions.
Examining security problems associated with the vast growing use of mobile commerce and suggesting applicable solutions to them.
The development of a multidisciplinary educational system (Integrated Multifunction Computer-Control Education System - IMFCCES) aiming at the creation of networked, interactive classrooms. The system design was used to submit two proposals for external funding to the USAid program in Egypt.
It is worth noting that the majority of the results of these research efforts are published in various international journals and conferences and/or employed to submit a range of proposals to diverse funding sources (please see Grants, Publications, and Scholarly Activities sections for more details).
Ph.D. Research: Computer Science Department at Old Dominion University, Norfolk, VA. 1999-2002.
The basic objective of my Ph.D. dissertation was to propose techniques constituting a fully content-based system for retrieving video data. These techniques target the efficiency, reliability, scalability, extensibility, and effectiveness requirements of such applications. These techniques cover video abstraction and segmentation, key frames extraction, indexing scheme, and video retrieval and similarity matching. The developed system, denoted as VCR for Video Content-based Retrieval, achieved significant performance improvement compared to other systems for segmenting and summarizing video data. Moreover, the proposed similarity matching model represents a novel contribution to the field.
Research Assistant: Computer Science Department at Old Dominion University, Norfolk, VA. 1998-2002.
IRI-h (Interactive Remote Instruction-heterogeneous) Project: I worked for three years in IRI-h, which is a Java-based system to enable active learning over the Internet. It works for any operating system supported by Java as well as for heterogeneous network environments. This project features scalability, support for home users, interoperability and other desirable capabilities. I worked on the design and implementation of the audio and video modules and on analyzing, designing, implementing, and mobile-menu the recording and playback functionalities of all used streams. This multi-million-dollar project was primarily funded by grants from NSF, Sun Microsystems, and COX Cable Company.
Another project I joined for approximately a year was concerned with the investigation and design of efficient routing algorithms for Mobile Ad Hoc Networks (MANET). Using a simulated environment, the proposed system performance was very sound under various circumstances. This project was funded by the Office of Naval Research (ONR).
For a semester, I explored the performance of a parallel machine (SGI Origin). The memory hierarchy performance was of special interest, thus, TLB misses, primary data cache misses, and secondary data cache misses were the main performance criteria considered, in addition to the number of clock cycles.
Researcher: Departments of Electronics and Communications Engineering and Computers Engineering and Control at Zagazig University, Egypt, 1994-1998.
My research at that time focused on Neural Networks and Optimization Techniques. The genetic algorithms (one of the evaluated optimization techniques) were used to design and implement a system capable of identifying the optimal, or near optimal neural network architecture that can be used to solve an arbitrary problem.
I also developed customized database software packages for medical applications.
Lecturer and Teaching Assistant: Departments of Electronics and Communications Engineering and Computers Engineering and Control at Zagazig University, Egypt, 94-98.
I taught and assisted in teaching various undergraduate computer science and engineering courses.
As an undergraduate student, my graduation project was to design and implement a cross-assembler for the Z-80 microprocessors, using the 80x86 assembly languages. 1993.
Role: Participants along with cybersecurity experts from CMU, PITT, IUP, WVU, and other stake holders in western PA including two PITT senior vice chancellors.
Role: Host and Organizer | Description: Day-long event featuring a series of lectures presented by nationally recognized security experts from government, academia and industry.
Role: Host and Organizer | Description: Day-long event featuring a series of lectures presented by nationally recognized security experts from academia and industry.
Role: Host and Presenter | Description: International delegation of 17 cybersecurity professionals who requested to visit IUP to learn more about cybersecurity initiatives. Held at IUP main campus in collaboration with Global Pittsburgh.
Role: Presenter | Title: “Benefits from a Novel Outreach Project that Supports Cybersecurity Professional Development at various Community Colleges in PA.”
Wireless Gas Sensors in IoT Applications: Overview and Trends Project | June 2022
Role: Invited Subject-matter Expert | Description: Research project sponsored by the German-based International Institute for Research Performance and Innovation Management
NSA GenCyber Directors Spring Meeting | May 2022 | Arlington, VA
Role: Host and Organizer | Description: This event featured a series of lectures presented by nationally recognized security experts from academia and industry and was held at IUP.
Role: Host and Organizer | Description: This event featured a series of lectures presented by nationally recognized security experts from academia and industry and was held at IUP.
Great Decisions Foreign Policy Lecture Series | Mar 2020 | Cancelled due to the Pandemic
Role: Invited Presenter | Title: “Artificial Intelligence and Data.”
Role: Host and Organizer | Description: This event featured a series of lectures presented by nationally recognized security experts from academia and industry and was held at IUP.
Role: Host and Organizer | Description: This event featured a series of lectures presented by nationally recognized security experts from academia and industry and was held at IUP.
NSA GenCyber Directors Fall Meeting| Sep 2018 | Phoenix, AZ
Role: Presenter | Title: “Representative Activities and Materials of the IUP 2018 GenCyber Camp.”
NSA Principals Meeting | June 2018 | Huntsville, AL
Role: Participant
NSA GenCyber Directors Spring Meeting| Apr 2018 | Bellevue, WA
Role: Host and Organizer | Description: This event featured a series of lectures presented by nationally recognized security experts from academia and industry and was held at IUP.
NSA GenCyber Directors Fall Meeting| Sep 2017 | Orlando, FL
Role: Presenter | Titles: “Representative engaging activities at IUP’s 2017 GenCyber summer student camp,” and “IUP GenCyber 2017 Camp Presentations and Activity Demonstrations.”
NSA Principals Meeting | June 2017 | Huntsville, AL
Role: Participant
NSA GenCyber Directors Spring Meeting| May 2017 | San Antonio, TX
Role: Presenter | Titles: “IUP GenCyber 2016 Best Practices for Combination Camps,” “Online Safety and Ethics in IUP GenCyber Summer 2016 Camp,” and “IUP GenCyber 2016 Camp Presentations and Activity Demonstrations,”
7th Graduate Scholars Forum | Apr 2017 | Indiana, PA
Role: Participant | Description: Sponsored by IUP.
2nd IASD Technology Day | Jan 2017 | Indiana, PA
Role: Invited Presenter | Title: “Essential Fundamentals of Cybersecurity.”
Role: Invited Presenter | Title: “Fostering a Strong Cybersecurity Culture in High and Middle School Students and Teachers through a Holistic Multidisciplinary Approach.”
Role: Presenter | Title: “Can Online Delivery Result in Comparable Achievement of Course Outcomes and Student Success in Different Computer Science Courses?”
NSA GenCyber Directors Fall Meeting| Sep 2016 | Boston, MA
Role: Invited Presenter | Title: “Measuring the Effect of Course Contents on the Perceived Effectiveness and Student Satisfaction in Online Computer Science Courses.”
Role: Host and Organizer | Description: This event featured a series of lectures presented by nationally recognized security experts from academia and industry and was held at IUP.
Role: Host and Organizer | Description: This event featured a series of lectures presented by nationally recognized security experts from academia and industry and was held at IUP.
Role: Participant | Description: Sponsored by: California State University San Bernardino, Cyber Security Center and supported by: NSF, NSA, & DHS.
Intelligence Process & Policy Group Presentation | May 2013 | Indiana, PA
Role: Invited Subject Matter Expert | Description: The topic of this presentation was on cyberspace's risk to U.S. national security for the next 2-5 years and was sponsored by the IUP Political Science Department.
3rd Graduate Scholars Forum | Apr 2013 | Indiana, PA
Role: Participant | Description: Sponsored by IUP.
Great Decisions 2013 Program | Feb 2013
Role: Presenter | Title: “Recent Changes in Egypt.”
1st IASD Technology Day | Jan 2013 | Indiana, PA
Role: Invited Panel Member | Panel Title: “Academic Integrity in Online and Technology Rich Environments.”
Role: Host and Organizer | Description: This event featured a series of lectures presented by nationally recognized security experts from academia and industry and was held at IUP.
University Assessment Workshop | Oct 2012 | Indiana, PA
Role: Participant | Description: Presented by Dr. Doug Eder.
13th ACM Conference on Information Technology Education | Oct 2012 | Calgary, Canada
Role: Presenter | Title: “Comparing Achievement of Intended Learning Outcomes in Online Programming Classes with Blended Offerings”
Role: Participant | Description: This event featured a series of lectures presented by nationally recognized security experts from academia and industry and was held at IUP.
Role: Participant | Description: This event featured a series of lectures presented by nationally recognized security experts from academia and industry and was held at IUP.
25th PACISE Conference | Apr 2010 | West Chester, PA
Role: Presenter | Title: “On-line Delivery of the First Programming Course in an Undergraduate Computer Science Degree: Is it Possible?”
5th Undergraduate Scholars Forum | Apr 2010 | Indiana, PA
Role: Participant | Description: Sponsored by IUP.
Role: Participant | Description: This event featured a series of lectures presented by nationally recognized security experts from academia and industry and was held at IUP.
Cyber Threats: Challenges and Reponses Roundtable | Sep 2009 | Indiana, PA
Role: Invited Participant | Description: Sponsored by the Ridgeway Center for International Security Studies at the University of Pittsburgh and the John P. Murtha Institute for Homeland Security.
Role: Participant | Description: This event featured a series of lectures presented by nationally security experts from academia and industry and was held at the IUP main campus.
Improvised Explosive Devices Webinar| Oct 2008 | Indiana, PA
Role: Participant | Description: Presented by the Department of Homeland Security and hosted by the Murtha Institute.
A Hands-on Workshop for Integrating Technology into Your Pedagogy | Oct 2008 | Indiana, PA
Role: Participant | Description: One -day workshop sponsored by the Center for Teaching Excellence (CTE) at IUP and presented by Dr. Gian Pagnucci.
ACPAC Emerging Technology Committee | June 2008 | Indiana, PA
Role: Presenter | Title: “Exploring the Applicability of Deploying Remote Proctoring Systems to Ensure the Integrity of On-line Testing.”
Classroom Civility Workshop | May 2008 | Indiana, PA
Role: Participant | Description: Half-day sponsored by the CTE at IUP and conducted by Dr. Barbara Frey.
Best Practices in On-line Pedagogy Workshop| May 2008 | Indiana, PA
Role: Participant | Description: One-day workshop sponsored by CTE at IUP and presented by Dr. Frey.
Creating Meaningful Writing Assignments: An application workshop | May 2008 | Indiana, PA
Role: Participant | Description: Half-day workshop hosted by IUP, facilitated by Dr. Sitler.
2008 Annual Writing Workshop for Faculty | May 2008 | Indiana, PA
Role: Participant | Description: Two-day workshop facilitated by Dr. Robert Yagelski and hosted by IUP.
Eighth Annual Conference of Academy of Business and Information Technology (ABIT) | May 2008 | City, State
Role: Presenter and Session Chair| Title: “Designing a Prototype Digital Video Steganographic System.”
23rd Annual PACISE Conference| Apr 2008 | Kutztown, PA
Role: Presenter and Reviewer | Title: “What Do You Need to Know about Multimedia Security?”
Undergraduate Scholars Forum | Apr 2008 | Indiana, PA
Role: Participant | Description: Sponsored by IUP.
Second Annual Homeland Defense and Security Education Summit | Mar 2008 | College Park, MD
Role: Participant | Description: Sponsored by the University of Maryland.
Policy Regarding Terrorists’ Use of the Internet Roundtable | Mar 2008 | Indiana, PA
Role: Invited Participant | Description: Second research roundtable sponsored by the Center for National Preparedness at the University of Pittsburgh and the John P. Murtha Institute for Homeland Security at IUP.
Integrative Learning Workshop| Feb 2008 | Indiana, PA
Role: Participant | Description: One-day workshop sponsored by the CTE at IUP and presented by Dr. Matt Fisher.
Plagiarism 101: Keys to Prevent Academic Misconduct Conference| Nov 2007 | Indiana, PA
Role: Participant | Description: Audio conference presented by Dr. Dennis Gregory at IUP.
Second Life Workshop| Nov 2007 | Indiana, PA
Role: Participant | Description: One-day workshop convened by Dr. James Lenze of the Department of Communications Media at IUP.
What do the Best College Teachers Do? Workshop| Oct 2007 | Indiana, PA
Role: Participant | Description: One-day workshop sponsored by the CTE at IUP and presented by Dr. Ken Bain.
Medieval Ideology and 21st Century Technology: Al Qaeda, Terrorism and the Internet Roundtable | Oct 2007 | Indiana, PA
Role: Invited Participant | Description: Research roundtable series sponsored by John P. Murtha Institute for Homeland Security at IUP.
Getting Your Course Online Workshop| July 2007 | Indiana, PA
7th Annual ABIT Conference | Apr 2007 | Pittsburgh, pa
Role: Presenter | Title: “Multimedia Data Security: Present Status and Future Directions.”
22nd Annual PACISE Conference| Mar 2007 | Lock Haven, PA
Role: Presenter, Panel Member, and Reviewer| Titles: “Addressing the Impact of the MPEG-7 Standard upon Video Retrieval Systems,” and “Privacy in the age of Information Technology.”
The Scholarship of Teaching and Learning Workshop | Feb 2007 | Indiana, PA
Role: Participant | Description: One-day workshop sponsored by CTE and presented by Dr. Maryellen Weimer.
Computer Construction, Installation and Configuration of a Secure Operating System Workshop | Jan 2007 | Indiana, PA
Role: Supervisor | Description: Half-day workshop hosted by the IA Group at IUP and co-sponsored by Murtha Institute for Homeland Security.
Role: Presenter | Title: “A Survey on Current Challenges and Future Trends for Multimedia Information Retrieval Systems.”
6th Annual ABIT Conference | Apr 2006 | Pittsburgh, PA
Role: Presenter | Title: “Performance Evaluation of Intrusion Detection Systems.”
21st Annual PACISE Conference | Apr 2006 | Indiana, PA
Role: Presenter | Title: “Multimedia Information Retrieval: Definition, Motivations, Challenges, Future trends, and an example of a real-world application.”
Network Security Workshop| Aug 2003 | Indiana, PA
Role: Participant | Description: Hands-on workshop held and Indiana University of PA.