Abdullahi Arabo MEng, MBCS, PhD Email: abdullahi.arabo@oii.ox.ac.uk



Similar documents
Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Dr. Waleed A. Alrodhan (Biographical Sketch)

Computing & Telecommunications Services Monthly Report March 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

Dr Christos Anagnostopoulos. 1. Education. 2. Present employment. 3. Previous Appointments. Page 1 of 6

University of Bradford. 1 year full time, 2 years part-time

Cyber Security and Digital Forensics Training Platform

Smart Cities. Photo used under Creative Commons from nigelhowe

Case 2:08-cv ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Michelle Govan & Anand Philip Network & Security Engineering

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Joint Master in Information Security and Data Management (ISDM)

MSc Cyber Security UKPASS P Course 1 Year Full-Time, 2-3 Years Part-Time

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Plymouth University. Faculty of Science and Engineering. School of Computing Electronics and Mathematics. Programme Specification

UNIVERSITY OF LINCOLN JOB DESCRIPTION

Programme Specification and Curriculum Map for MSc Computer and Network Security

Diploma in Business. Your pathway to the second year of a UK degree

School of Computer Science

University MBA 2014/15

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

MSc Studies in Computing

Speaker: Ms Stephanie Chan, Psychologist, MSc in Forensic Psychology. Director: Dr A Majeed B A Khander, concurrently Deputy Director of Police

Supervisors: Ph.D., Dr.scient. Hans C. Fogedby and Prof. Per Bak Institute of Physics & Astronomy, University of Århus, DK-8000 Århus C, Denmark.

LEWIS SCHOOL OF ENGLISH

Programme Specification. MSc Human Resource Management. Valid from: September 2015 Faculty of Business

DR AYŞE KÜÇÜKYILMAZ. Imperial College London Personal Robotics Laboratory Department of Electrical and Electronic Engineering SW7 2BT London UK

Undergraduate Accounting programmes

Undergraduate Business & Management programmes

P/T 2B: 2 nd Half of Term (8 weeks) Start: 25-AUG-2014 End: 19-OCT-2014 Start: 20-OCT-2014 End: 14-DEC-2014

Programme Specification: MSc Electronic Commerce

P/T 2B: 2 nd Half of Term (8 weeks) Start: 26-AUG-2013 End: 20-OCT-2013 Start: 21-OCT-2013 End: 15-DEC-2013

Fixed term 1 September August 2015

P/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015

Programme Specification and Curriculum Map for MSci Sports Informatics & Data Analytics

New Route PhD program in UK. Dr Tatiana Kalganova

visit UK Marketing Opportunities 2013 Everything you need to plan your trip in 2013 Visit the USA Visit USA Online Visitusa.org.uk

Current and Future Research into Network Security Prof. Madjid Merabti

ASTON UNIVERSITY PROGRAMME SPECIFICATION

FELLOWSHIPS, GRANTS, ACADEMIC AWARDS

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Analysis One Code Desc. Transaction Amount. Fiscal Period

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Diploma of Management

CURRICULUM VITAE Herbert L. Dershem

Academic Calendars. Term I (20081) Term II (20082) Term III (20083) Weekend College. International Student Admission Deadlines

HISTORICAL LIST OF ALL SCHEMES, COURSES AND PROGRAMMES RECOGNISED FROM 1945 ONWARDS

White Paper: Efficient Management of Cloud Resources

Aug Present Hurricadia Creative Services / Hurricadia Photography

MSC IN SOFTWARE ENGINEERING

MSc in Banking Practice and Management and Chartered Fellowship

Awaken Consulting Limited

PROGRAMME SPECIFICATION UNDERGRADUATE PROGRAMMES. Programme name BEng Electrical & Electronic Engineering with Foundation Year

1. Introduction. 2. User Instructions. 2.1 Set-up

Interim Manager Profile / Consultant Profile. Robert W. Haase Dipl. Ing. (FH) / Dipl. Wirtschafts Ing. (FH)

PROGRAMME SPECIFICATION

Programme Specification for the MSc in Computing (<Specialism>)

Honours Degree (top-up) Computing Abbreviated Programme Specification Containing Both Core + Supplementary Information

Network Security Innovation Platform

Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison

Important Dates Calendar FALL

MASTER OF PHILOSOPHY IN LATIN AMERICAN STUDIES

Masters in Human Computer Interaction

Masters in Advanced Computer Science

How To Make A Trinity Phd More Structure

Masters in Artificial Intelligence

Programme Specification and Curriculum Map for MSc Computer Network Management

Masters in Information Technology

Programme Specification

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES. Programme name Maritime Operations and Management (MOAM)

Department Technical Manager

CCIE Exam Certification CCIE Routing and Switching Exam Certification Guide dec-2009

Programme Specification: MSc Computing (Information Security)

FACULTY OF BUSINESS AND LAW

M.Sc Healthcare Management. B.Sc Computer Science University of Central Florida- US

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison

International Communications and Development

LOUGHBOROUGH UNIVERSITY

Teaching and Learning Strategy for UCL Computer Science. Stage 1: the narrative or vision

Transcription:

Email: abdullahi.arabo@oii.ox.ac.uk Profile Dr Arabo has over six years experience in research and development within the field of Network Security, Security of System-of-Systems composition, Mobile adhoc networks, ubiquitous computing and Identity Management. His research is not only academically focused but in collaboration with industrial partners and funded by the EPSRC. He has published three book chapters and a number of peer reviewed Journals and conference papers. Dr Arabo has also gained a four years experience in teaching, providing lab support and tutorials in modules within computer science such as Computer Architecture, Computer Forensics and Operating Systems for both undergraduate and postgraduate students. He is a Professional member of British Computer Society (BCS) - (MBCS), committee member of Information Security Specialised Group (ISSG) and a committee member of his local BCS branch and the Young Professional Representative (YPG) of the branch. Mr Arabo, has a well established and promising research tract within the area of information security, these is demonstrated with his wide international publications, book chapters, conference papers and participation in top IEEE technical conference program committees and journal reviewing. Research and Development Research Fellow: 2011-Date: Oxford Internet Institute, University of Oxford Leading a project on Future connected home security. Responsible as part of a team for researching and developing future home network and service security; Including development of security frameworks for devices such as smart phones, digital cameras, home hubs and Internet TVs; protocols to connect devices with cloud services; security analysis of remote management systems for home appliances; and a security framework for content sharing between the home and social networks. Working in collaboration British Telecommunication to enhance their flagship project and market within connected home. The project forms a key strategic development for BT future home networking and product development. We develop new security frameworks and protocols for both connected home devices and home network. The project covers areas such as Content Sharing, Content management, Policy and DRM, Smart Metering, Consumerisation of IT etc. Our research and development are not only limited or tailored to home networks both to corporate network and devices. Researcher in Network Security: 2007-2011: Liverpool John Moores University EPSRC and Industrial collaboration Funded research on Security of System-of- Systems Composition within Emergency Crisis Management Environment. I was responsible as part of a team for researching and developing security System-of Systems composition Simulation tools in C# (for windows Mobile) and C++. This is a join project between the university and a major security consulting company that deals with the Ministry of Defence (MoD) UK. Disseminating research results in terms of conference papers, journals papers, book chapters and presenting the results in conferences, industrial collaborating meetings, visitors from overseas and within the UK One of conference papers warn the Best Paper Award for IEEE SOSE 2010

Teaching and lab supervision for undergraduates and postgraduates- Computer Architecture, Computer Forensic, Operating Systems Organising and co-ordinating meetings with research collaborators and other partners Teaching roles include: tutorials, supervising lab sessions and teaching in Computer Forensic and Computer Systems Architecture. Serving as Journal Reviewer/review for International Journal of Network Security Technical Programme Committee member for IEEE ICCNC and other conferences PhD in Network Security: 2007-2011: Liverpool John Moores University Supervised by Professor Qi Shi (Professor in Computer Security) and Professor Madjid Merabti (Professor in Computer Security and Networks) EPSRC Funded research on Identity Management in Mobile ad-hoc Networks Responsible for planning and managing my won research work, design, implementation and synthesis of a new user-centred and context-aware identity management framework in Mobile ad-hoc Network within Ubiquitous environment. Disseminated research results in a number of IEEE peer reviewed conferences, Journal publications and book chapters. Use of GTNet and NS-2, NS-3 Simulators, developing in-house simulator in C++ and C# I have presented all my papers in conferences both within the UK and overseas. Have taken the advantage of the department and collaborating partners to develop collaborative publications, dissemination of research work, patent applications and grand applications. Employment History Research Fellow: 2011-Date: Oxford Internet Institute, University of Oxford Leading a project on the development and security of future connected home; working with two teams one from BT and the other based in University of Oxford as well as working on an EU FP7 project Webinos. IT Security Consultant: 2011-Date: British Telecommunications Providing support and leading a project on Future Home Network Security. The project covers new development in Future Connected Home 3.0 and beyond. I lead two teams one based in BT and the other bases in Oxford Internet Institute, University of Oxford. The project forms a key strategic development for BT future home networking and product development. We develop new security frameworks and protocols for both connected home devices and home network. The project covers areas such as Content Sharing, Content management, Policy and DRM, Smart Metering, Consumerisation of IT etc. Our research and development are not only limited or tailored to home networks both to corporate network and devices. Researcher in Network Security: Jun 07- Sep 2011, Liverpool John Moores University: I was responsible as part of a team for researching and developing security systems of systems composition tool in C# and C++. This is a joint project between the university and a major security consulting company that deals with the Ministry of Defence (MoD). IT Consultant: Feb 06 Jun 07 with Bishop Gore Comprehensive School: main duties of Web Authoring using PHP and MySQL based on a Linux server.

Web Design (Multimedia) Assistant, promoted to Training Programme Coordinator: Mar 05 Jul 05, WMG Training Ltd; main duties included: web design, project planning and implementation, conducting training sessions. IT Consultant: Nov 04 Apr 05, with Achieve Now Ltd; main responsibilities included responsibility for, installation upgrade and support, Assessment of processes and standards used by project teams for delivering software products Education History PhD in Network Security: 2007- Sep 2011: Liverpool John Moores University Supervised by Professor Qi Shi (Professor in Computer Security) and Professor Madjid Merabti (Professor in Computer Security and Networks). EPSRC funded PhD project titled User-centred and Context-ware identity Management in Mobile ad-hoc Networks (UCIN in MANets). 26 Jul 09 8 Aug 09: Young Muslims Leadership Programme, Oxford University Centre for Islamic Development. Jun 07 Aug 07: IPICS University of Glamorgan: IPICS Consortium - Glamorgan University, two weeks summers course focusing on Information and Communications Security and computer forensics. Academic community as the academic European summer school on computer security, the conference covers most of the areas of information and communication security, with topics ranging from Cryptography, Information Security Concepts and Management, Computer Systems Security and Penetration Testing, Web Services and Security RFID Security, just bit to mention a few. The conference also focused on mini-stream especially focused on the field of digital investigation, looking in further depth the issues of computer crime, forensic examination of computers and the related issues. Computer Forensics is an emerging discipline and a topic of specialisation of the ISRG September 2003- June 2007: - MEng Computing University of Wales Swansea United Kingdom Grade of 2:1, modular course consist of writing reports, group and individual work and presentations supported by lectures, seminars and conferences. Achieving high marks in Network & Communication, Security and other modules. Positions of Responsibility Sep 08- date: YPG Rep and Committee Member BCS Merseyside Branch, Committee member for BCS ISSG Sep. 06 Jun 07: Vice Chairman: FOSIS Wales, with main responsibilities of coordinating activities, and organising joint events. Nov 05 Nov 06: - Vice President and Chairman with PR responsibilities of UWS Imam Project within the Islamic Society of University of Wales Swansea.

May 06- Jun 06 - Member of the Quality Management System for Administration (QMS) Core Function Review for the International Student Advisory Service Committee, data analysis, interpretation, communication and evaluation are some of the useful skills applied and gained. Sep 04 Nov 05:- President of the Islamic Society University of Wales Swansea. Sep 03 Jun 04: -Course representative for the first year students in computer science, skills developed includes communication, negotiations, interpersonal and gaining full confidence during difficult situation. Achievements Based Paper Award for IEEE SOSE 2010 Conference Warn a Competition on Writing an Article on Challenges of Muslims in the West price Ummrah Ticket - 750 Full sponsorship from Oxford University and Princess Wales Trust to attend a two week summer training course in Oxford July April 2009. Full 4 years student Bursary for my PhD from Liverpool John Moore s University 2007-2011. Full 3 years studentship from Bedfordshire University 2007-2010. Received an Outstanding Contribution to Student Community from FOSIS Wales 06. Received an Individual Contribution Award from Swansea University Students Union 06 Initiating and successfully creating a project, Mosque Project, which offered a wide range of campus support for students 05/06 Received a letter in recognition of Excellent work from the Vice Chancellor. Wider media coverage with regards to issues of creating peace and harmony with peaceful co-existence, including a front page feature, Man of Peace, in the Swansea Evening Post. Recognition by MD of contributing 65% towards the success of the Company in the summer of 05. Completing Projects on time and within budget. Membership of Professional Bodies Professional Member of British Computer Society (MBCS) Committee member Information Security Specialist Group (ISSG) BCS Committee member Merseyside BCS Branch Young Professional Group (YPG) BCS representative for Merseyside Branch Member of Communications Management Association (CMA) Membership of Conference Technical Program Committee and Journal Reviewing I am also contributing to International Journal of Network Security (IJNS) as an editor/reviewer for last four years, and also serves as technical program committee member for IEEE ICCNC for the past four years, IAPEC 2011, ISIEA for the past three years and ICEDSA for the past two years. I am currently involved in organising an invited Session on System-of-Systems Security for the 6 th IEEE conference on SoSE 2011

Selected Publication List Book Chapters 1. Arabo, A., Shi, Q., and Merabti, M., ContextRank: Begetting Order to Usage of Context Information and Identity Management in Pervasive Ad-hoc Environments, in Emerging Pervasive and Ubiquitous Aspects of Information Systems: Cross-Disciplinary Advancements, Symonds, J., Editor. 2011, Information Science Reference (an imprint of IGI Global). p. 275-297 2. Arabo, A., Shi, Q and Merabti, M, Dynamic Device Configuration in Ubiquitous Environments, in Global Security, Safety, and Sustainability Communications in Computer and Information Science, S.J. Tenreiro de Magalhaes, Hamid, Hessami, Ali G. (Eds.), Editor. 2010, Springer. p. 263-273. 3. Arabo, A., Shi, Q and Merabti, M, Situation Awareness in Systems of Systems Ad-hoc Environments, in H. Jahankhani, A.G. Hessami, and F. Hsu (Eds.): 5th International Conference on Global Security. Safety and Sustainability 2009, CCIS. 2009, Springer-Verlag Berlin Heidelberg 2009. p. 27-34. Journals 1. Arabo, A., Shi, Q and Merabti, M, Context-Aware Identity Management in Pervasive Ad-hoc Environments. International Journal of Advanced Pervasive and Ubiquitous Computing, 2009. 1(4): p. 29-42. 2. Arabo, A., Shi, Q and Merabti, M, A Framework for User-Centred and Context- Aware Identity Management in Mobile Ad-hoc Networks (UCIM). Ubiquitous Computing and Communication Journal - Special Issue on New Technologies, Mobility and Security, 2009. NTMS - Special Issue. 3. Arabo, A., Shi, Q and Merabti, M, Ubiquitous Secure Cash Withdrawal International Journal of Database Theory and Application, 2009. 1(2): p. 55-64 Conferences 1. Kifayat, K., Arabo, A., Drew, O., Llewellyn-Jones, D., Shi, Q., Merabti, M, Waller A., Craddock, R. and Jones, G., State-of-the-Art in System-of-Systems Security for Crisis Management, In The Fourth Annual Layered Assurance Workshop (LAW 2010), Dec 2010, Texas.

2. Arabo, A., Shi, Q and Merabti, M, Data Mishandling and Profile Building in Ubiquitous Environments, in IEEE International Conference on Privacy, Security, Risk and Trust. 2010, IEEE Cpmputer Society: Minneapolis, Minnesota, USA. p. 1056-1063. 3. Zhou, B., Arabo, A., Drew, O., Llewellyn-Jones, Kifayat, K., D., Shi, Q., Merabti, M, Waller A., Craddock, R. and Jones, G., System-of-Systems Boundary Check in a Public Event Scenario. 5th IEEE International Conference on Systems of Systems Engineering, 2010. (WON BEST PAPER AWARD). 4. Muhammad, A., Arabo, A., Shi, Q., Merabti, M. and Askwith, B., et al. A Secure Gateway Service for Accessing Networked Appliances. in Fifth International Conference on Systems and Networks Communications. 2010: IEEE Computer Society, France. 5. Arabo, A., Shi, Q and Merabti, M. Dynamic Policy Specification in Ubiquitous Environments. in The 11th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting 2010. Holiday Inn, Liverpool, UK. 6. Arabo, A., Shi, Q and Merabti, M. User-Centred Identity Management in Mobile Ad-hoc Networks. in 10th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2009). 2009. Liverpool, UK. 7. Arabo, A., Shi, Q and Merabti, M. Towards a Context-Aware Identity Management in Mobile Ad-hoc Networks (IMMANets). in The IEEE 23rd International Conference on Advanced Information Networking and Applications Workshops (AINA-09), May 26-29, 2009. 2009. University of Bradford, Bradford, UK. 8. Arabo, A., Shi, Q and Merabti, M., Llewellyn-Jones, D., Identity Management in Mobile Ad-hoc Networks (IMMANets): A Survey. in 9th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2008). 2008. Liverpool, UK. 9. Arabo, A. Secure cash withdrawal through mobile phone/device. in International Conference on Computer and Communication Engineering, 2008. ICCCE 2008. 2008.

10. Zhou, B., Arabo, A., Drew, O., Llewellyn-Jones, D., Shi, Q., Merabti, M, Waller A., Craddock, R., Jones, G. and Yau, A., Data Flow Security Analysis for System-of-Systems in a Public Security Incident. in The 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008). 2008. Liverpool, UK