Research and Work Experience

Professor of Computer Science at Indiana University of Pennsylvania, Indiana, PA. 2010-present. (Associate Professor from 2002-2010)

  • In addition to teaching undergraduate courses (Please see Teaching page for details), I have been heavily involved in the department Information Assurance and Cybersecurity Program funded by grants from DoD, NFS, Cisco and NSA.
  • My research over the past period addresses the following topics (most recent first):
    • Investigating innovative approaches to solve challenging security problems via the use of AI and Machine Learning techniques.
    • Adopting an inherently interdisciplinary approach to explore challenges facing cybersecurity education and proposed innovative solutions.
    • Exploring effective approaches for instilling fundamentals of cybersecurity at K-12 levels.
    • Researching how to comprehensively assess the effectiveness of online course delivery using a multitude of performance criteria.
    • Working with Multidisciplinary researchers to characterize cyberspace and research novel techniques to minimize misuse and exploitations.
    • Employing various approaches for reliably measuring Computer Science courses learning outcomes and delivering various programming courses online.
    • Identifying various security concerns when dealing with multimedia data and proposing creative solutions to such problems.
    • Developing efficient techniques to hide/discover secret messages embedded into video media.
    • Investigating advanced methodologies to secure wireless transmission. These efforts were compiled in courses that were part of the developed Master of Sciences in Information Assurance (MSIA). This program is now on hold.
  • I have played a leading role in several multidisciplinary research groups that comprises several faculty members. These groups have prepared several proposals on security aspects that include systems for detecting radioactive plumes, digital forensics, biometric identification, and models to analyze terror use of the Internet. Some of these proposals have already been submitted to DoD, DOJ, NSF, NSA & other funding sources.
  • Other research projects that I have conducted after receiving my Ph.D. include:
    • Studying effective techniques of applying quantum cryptography to ensure the security of financial transactions.
    • Examining security problems associated with the vast growing use of mobile commerce and suggesting applicable solutions to them.
    • The development of a multidisciplinary educational system (Integrated Multifunction Computer-Control Education System - IMFCCES) aiming at the creation of networked, interactive classrooms. The system design was used to submit two proposals for external funding to the USAid program in Egypt.
  • It is worth noting that the majority of the results of these research efforts are published in various international journals and conferences and/or employed to submit a range of proposals to diverse funding sources (please see Grants, Publications, and Scholarly Activities sections for more details).

Ph.D. Research: Computer Science Department at Old Dominion University, Norfolk, VA. 1999-2002.

  • The basic objective of my Ph.D. dissertation was to propose techniques constituting a fully content-based system for retrieving video data. These techniques target the efficiency, reliability, scalability, extensibility, and effectiveness requirements of such applications. These techniques cover video abstraction and segmentation, key frames extraction, indexing scheme, and video retrieval and similarity matching. The developed system, denoted as VCR for Video Content-based Retrieval, achieved significant performance improvement compared to other systems for segmenting and summarizing video data. Moreover, the proposed similarity matching model represents a novel contribution to the field.

Research Assistant: Computer Science Department at Old Dominion University, Norfolk, VA. 1998-2002.

  • IRI-h (Interactive Remote Instruction-heterogeneous) Project: I worked for three years in IRI-h, which is a Java-based system to enable active learning over the Internet. It works for any operating system supported by Java as well as for heterogeneous network environments. This project features scalability, support for home users, interoperability and other desirable capabilities. I worked on the design and implementation of the audio and video modules and on analyzing, designing, implementing, and mobile-menu the recording and playback functionalities of all used streams. This multi-million-dollar project was primarily funded by grants from NSF, Sun Microsystems, and COX Cable Company.
  • Another project I joined for approximately a year was concerned with the investigation and design of efficient routing algorithms for Mobile Ad Hoc Networks (MANET). Using a simulated environment, the proposed system performance was very sound under various circumstances. This project was funded by the Office of Naval Research (ONR).
  • For a semester, I explored the performance of a parallel machine (SGI Origin). The memory hierarchy performance was of special interest, thus, TLB misses, primary data cache misses, and secondary data cache misses were the main performance criteria considered, in addition to the number of clock cycles.

Researcher: Departments of Electronics and Communications Engineering and Computers Engineering and Control at Zagazig University, Egypt, 1994-1998.

  • My research at that time focused on Neural Networks and Optimization Techniques. The genetic algorithms (one of the evaluated optimization techniques) were used to design and implement a system capable of identifying the optimal, or near optimal neural network architecture that can be used to solve an arbitrary problem.
  • I also developed customized database software packages for medical applications.

Lecturer and Teaching Assistant: Departments of Electronics and Communications Engineering and Computers Engineering & Control at Zagazig University, Egypt, 94-98.

  • I taught and assisted in teaching various undergraduate computer science and engineering courses.
  • As an undergraduate student, my graduation project was to design and implement a cross-assembler for the Z-80 microprocessors, using the 80x86 assembly languages. 1993.

Professional Activities and Recognition

2020

  • Director of the Institute for Cybersecurity (ICS) at IUP. Our program is designated by the National Security Agency and Department of Homeland Security (NSA/DHS) as a National Center of Academic Excellence in Cyber Defense (CAE-CD).
  • ACM member.
  • Awarded the 2020 Indiana University of Pennsylvania’s Sponsored Programs Award for Outstanding Achievement in Public Service.
  • Member of the Editorial Advisory Board for the Information Resources Management Journal (IRMJ).
  • Member of the editorial review of the International Journal of E-adoption (IJEA).
  • Member of the Editorial Advisory Board for the Journal of Cases on Information Technology (JCIT).

2019

2018

2017

2016

2015

2014

2013

  • Director of the Institute for Information Assurance at IUP. Our program is designated by NSA as CAE_IAE.
  • Invited to participate in a 2-day research roundtable conference with several nationally recognized security experts. The meeting was funded by a grant from IBM and was held at the IUP Studio on Oct. 18-19, ‎‎2013.
  • Invited to participate as an external member of the tenure and promotion committee of faculty at Michigan Technological University.
  • ACM member.
  • Reviewer of the manuscript for Cay Horstmann’s “Python for Everyone” published by Wiley.
  • Member of the Editorial Advisory Board for the Journal of Cases on Information Technology (JCIT) and the Information Resources Management Journal
  • Member of the editorial review board of the International Journal of E-adoption (IJEA).
  • Member of the Editorial Advisory Board and a reviewer for Scientific Journal International (SJI).
  • Forum Judge for the Third Annual Graduate Scholars Forum sponsored by IUP, Indiana, PA, April, 2013.

2012

  • Director of the Institute for Information Assurance at IUP. Our program is designated by NSA as CAE_IAE.
  • My paper on the 13th International ACM SIGITE conference has won the best paper award.
  • Member of the Technical Program Committee for the 7th International Conference on Multimedia and Ubiquitous Engineering (MUE-13), Daegu, Korea, May 9-11, 2013.
  • ACM member.
  • Member of the Editorial Advisory Board for the Journal of Cases on Information Technology (JCIT) and the Information Resources Management Journal
  • Member of the editorial review board of the International Journal of E-adoption (IJEA).
  • Member of the Editorial Advisory Board and a reviewer for Scientific Journal International (SJI).
  • Forum Judge for the Second Annual Graduate Scholars Forum sponsored by IUP, Indiana, PA, April 4, 2012.

2011

2010

2009

  • Invited to participate in the third research roundtable meeting. The theme of this meeting was “Cyber Threats: Challenges and Responses”. The meeting was sponsored by the Ridgeway Center for International ‎Security Studies at the University of ‎Pittsburgh and the John P. Murtha Institute for Homeland ‎Security at IUP on Sept. 10-11, ‎‎2009.
  • Member of the Editorial Advisory Board for the Journal of Cases on Information Technology (JCIT) and the Information Resources Management Journal
  • Member of the editorial review board of the International Journal of E-adoption (IJEA).
  • Member of the Editorial Advisory Board and a reviewer for Scientific Journal International (SJI).
  • Forum Judge for the Fourth Annual Undergraduate Scholars Forum sponsored by IUP, Indiana, PA, April 6th, 2009.

2008

  • Reviewer of the manuscript for the best-selling author Daniel Liang’s “Introduction to ‎Programming Using C++,” Second Edition, published by Pearson-Prentice Hall.
  • Chair for the Multimedia Information Management Track of the 2008 Information Resources Management Association (IRMA) International Conference held in Charlotte, NC, May 2008.
  • Session moderator (Session IV. B.) of the Eighth Annual Conference of Academy of Business and Information Technology ‎‎(ABIT), Pittsburgh, May 1-3, 2008.‎
  • Appointed as a Murtha Institute Faculty fellow along with other thirteen IUP faculty forming a multidisciplinary research group interested in Homeland Security Issues. April, 2008
  • Member of the Editorial Advisory Board for the Journal of Cases on Information Technology (JCIT) and the Information Resources Management Journal
  • Member of the editorial review board of the International Journal of E-adoption (IJEA) since March, 2008.
  • Invited to participate in the second research roundtable meeting. The theme of this meeting was “Policy Regarding Terrorists’ Use of the Internet”. The meeting was sponsored by the Center for National Preparedness at the University of Pittsburgh and the John P. Murtha Institute for Homeland Security at IUP on March 7-8, 2008.
  • Member of the Editorial Advisory Board and a reviewer for SJI.
  • Reviewer for The Pennsylvania Association of Computer and Information Science Educators (PACISE) annual conference, April 4-5, 2008, Kutztown, PA.
  • Listed in the AcademicKeys Who's Who in Sciences Higher Education (WWSHE).

2007

  • Invited to participate in a research roundtable series titled “Medieval Ideology and 21st Century Technology: Al Qaeda, Terrorism and the Internet” Participants include nationally known experts in the field. The roundtable was sponsored by the John P. Murtha Institute for Homeland Security at IUP on Oct. 5-6, 2007.
  • Invited to participate on a Panel Discussion titled “Privacy in the Age of Information Technology” at the Pennsylvania Association of Computer and Information Science Educators (PACISE) annual conference, March 23-24, 2007, Lock Haven, PA.
  • Co-Chair for the Multimedia Information Management Track of the 2007 Information Resources Management Association (IRMA) International Conference held in Vancouver, Canada, May 2007.
  • Member of the Technical Program Committee (Information Assurance Track) for the first International Annual Conference of Business, Information and Management Academy (BIMA) March 17-18, 2007, sponsored by the American University of Sharjah.
  • Member of the Editorial Advisory Board for the Journal of Cases on Information Technology (JCIT) and the Information Resources Management Journal
  • Member of the Technical Program Committee for the International Association of Science and Technology for Development (IASTED). Conferences include the International Conference on Artificial Intelligence and Applications 2007 conference in Innsbruck, Austria; the 19th IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS 2007), November, 2007, Cambridge, Massachusetts; etc.
  • Member of the Editorial Advisory Board and a reviewer for Scientific Journal International (SJI).
  • Reviewer for The Pennsylvania Association of Computer and Information Science Educators (PACISE) annual conference, March 23-24, 2007, Lock Haven, PA.
  • Listed in Marquis Who's Who in American Education, (2007-2008) Edition.
  • Listed in Marquis Who's Who in America, 2007 (61st) Edition.

2006

  • Invited to be the session chair for the IMSA (Internet and Multimedia Systems and Applications) 2006 international conference held in Honolulu. The session title was Multimedia Information Systems I.
  • Listed in Marguis Who's Who in America, 2006 (60th) Edition.
  • Listed in Marquis Who's Who of Emerging Leaders, 2006 (1st) Edition.
  • Member of the Editorial Advisory Board for the Journal of Cases on Information Technology (JCIT) and the Information Resources Management Journal
  • Member of the Technical Program Committee for the Information Resources Management Association (IRMA) 2006 International Conference.
  • Member of the Technical Program Committee for the IASTED. Conferences include the International Conference on Networks and Communication Systems; the 17th International Conference on Modeling and simulation; etc.
  • Member of the Steering Committee for The Pennsylvania Association of Computer and Information Science Educators (PACISE) 2006 annual conference.
  • Reviewer for the Computer Science track of the Pennsylvania State System of Higher Education (PASSHE) Faculty Professional Development Council (FPDC) Grants.

2005

2004

  • Reviewer for the Encyclopedia of Multimedia Technology and Networking.
  • Reviewer for the Encyclopedia of Information Science and Technology.
  • Reviewer for the Information Resources Management Journal (IRMJ).
  • Member of the Editorial Advisory Board for the Annals of Cases on Information Technology (ACIT) Journal. and the Information Resources Management Journal
  • Member of the Technical Program Committee for the Information Resources Management Association (IRMA) 2004 International Conference.
  • Member of the Technical Program Committee for the International Association of Science and Technology for Development (IASTED). Conferences include the International Conference on Parallel & Distributed Computing & Systems (PDCS), the International Conference on Networks and Communication Systems (NCS), etc.

2003

  • Reviewer for the Hawaii International Conference on Computer Sciences, 2004.
  • Member of the Technical Program Committee for the International Association of Science and Technology for Development (IASTED). Conferences include the International Conference on Modeling, Simulation, and Optimization (MSO); the International Conference on Communication Systems and Applications (CSA); etc.

2001-2002

Technical Skills

Programming Skills:

  • Python, C#, Java, C/C++, Visual C++, Assembly languages of different processors, Basic, Fortran, CGI programming and Web programming, HTML, PERL, PL/SQL, and UNIX scripts.

Operating Systems and Platforms

  • Linux, Windows, UNIX (Solaris and SunOS), and MS-DOS.

Technical Knowledge

  • Encryption techniques, Steganography and Watermarking Methodologies, MPEG, JPEG, Signal, Image, & Video Processing, Database Systems, Multimedia Systems, Image/Video Compression, mobile computing and networking, and parallel computer architecture.