CURRICULUM VITAE September, 2015 C1. Personal Information Asaad AbdulRahman Nayyef Alani Department of Computer Science,, Sultan Qaboos University, P.O. Box 36, Al-Khoudh 123, Muscat, Sultanate of Oman, Office Tel: (968) 24141407, Fax: (968) 24141407. Email: assad@squ.edu.om Personal Address House No. 2, Way 3233, Al-Khoudh, Muscat, Sultanate of Oman Personal Data 1. Nationality Iraqi 2. Civil Status Married 3. Linguistic Abilities Arabic: Mother tongue English: Well spoken, read and written C2. Education and Employment Information C2.1. Educational Information 1. Institution Al_Rafideen University, Iraq Degree B.Sc. Major Computer Science (Information System) Department Computers Science Year 2001 2. Institution Iraqi Commission for Computers and Informatics Institute for Postgraduate, Baghdad, Iraq Degree M.Sc. Major Computer Science (Data Security) Department Computer Science Year 2005 Dissertation Title Proposed System for Intrusion Detection in a Web Site 1 P age
C2.2. Employment Information Academic Oct. 2006 Sept.2009 Oct.2009 Sept. 2012 Oct. 2012 to date Lecturer Lecturer Lecturer Department of Computer Science, Ittihad Gulf College Oman, Muscat (Oman) (Academic affiliation with Staffordshire University, UK) Department of Computer Science,, Sultan Qaboos University (SQU) Administration Oct. 2009 Sept. 2012 Oct. 2013 to date Head - Centre for Information Systems Member in Quality Assurance Committees (Documentation Matters) Gulf College Oman, Muscat (Oman) (Academic affiliation with Staffordshire University, UK) Department of Computer Science,, SQU C3. Awards and Recognitions 1 Awarded a full MSc in Computer Science \ Data Security. Iraq 2003-2005. 2 Awarded a first rank among the 16 students in Master Degree in Computer Science \ Data Security. 3 Participated in the evaluation of the E-Admission System in Ministry of Higher Education Higher Education Admission Centre 2006 2012 2 P age
C4. Teaching C4.1. Teaching Experience 1. Teaching Services in the Department of Computer Science I taught the following courses: a. Undergraduate Courses Computer Networks Windows Programming Computer Graphics Computer Communication Information and Security Theory Embedded System Databases Systems Introduction to Computer Science Fundamentals of Information Technology Java Programming C# Programming, C++ Programming C Programming, Pascal Programming PC & Software Packages Object Oriented Programming Advanced Java Programming 2. Curricula Development and Innovation I was involved in organizing and updating undergraduate programs. b. Undergraduate Programs Involved in updating modern trends in Computer Science and IT program in Gulf College Oman, Academic affiliation with Staffordshire University, UK. Improved the undergraduate courses in Ittihad University. Involved in the review and development the IT program in Gulf College Oman, Academic affiliation with Staffordshire University, UK. Involved in the review and development of the new ABET. Advised in average of 20 students per semester in Ittihad University. 3 P age
C5. Services C5.1. Department, College, University and National Committees 1. Academic Committees and Services: Sultan Qaboos University: Member in Quality Assurance Committees (Documentation Matters) in department of computer science. 2013- to date Dealing with Low vision/blind students. 2013- to date Member in Follow up failed students. 2012-2014 Member in Student Helpdesk. 2012-2014 Member in placement and exit tests committee. 2012-2014 Gulf College Oman Member in Management Executive Committee. 2009-2012 Head of Centre for Information System. 2009-2012 Head of Library IT infrastructure. 2009-2012 Member in Library Advisory Committee. 2009-2012 C5.2. Organizing Seminars and Workshops a. E-Learning Seminars (12 seminars) 1. Teaching Activities outside the Classroom Offered a number of workshops to students on topics such as Implementing and Configuring (TMG) Forefront Threat Management Gateway (2012). Implementing and Configuring Kaspersky Business Space Security and Kaspersky Security for Internet Gateway Middle East (2011). Implementing and Configuring LAN with Windows 2008 Server Network Administration (2010). Installing Wireless Network Lab. (2009). Installing and Configuring Windows Servers 2003(2006). 2. Workshop Attendance Asaad Abdul Rahman Nayyef, First Cyber Security Ambassadors Gathering 2014, Muscat, Oman, January 19 2014. Asaad Abdul Rahman Nayyef, Regional Cybersecurity Summit 2014, Muscat, Oman, April 20-22 2014. 4 P age
C6. Scholarly Achievements and Related Activities C6.1. Research Experience and Research Interests My main researches interests include Internal Intrusion Detection, Embedded Internal Sensors in cloud computing, Embedded Security System, Information hiding and Data Security. C6.2. Publications a. Published Papers in Refereed Journals Al-Khanjari, Z., Alani, A., Kraiem, N. and Jamoussi, Y. 2013. Proposing a Real Time Internal Intrusion Detection System Towards a Secured Development of E-Government Web Site. European Scientific Journal (ESJ), European Scientific Institution, /SPECIAL/ edition vol.3 ISSN: 1857 7881 (Print) e - ISSN 1857-7431, pp. 27-37. December 2013. Al-Khanjari, Z., Alani, A. and Al-Hermizy, S. 2014. A Proposed Security Architecture for Establishing Privacy Domains in e-health Cloud. European Scientific Journal (ESJ), European Scientific Institution. /SPECIAL/ edition, ISSN: 1857 7881 (Print) e - ISSN 1857-7431. Vol. 2. pp. 322-330, June, 2014. Al-Khanjari, Z. and Alani, A.2014. Developing Secured Interoperable Cloud Computing Services, European Scientific Journal (ESJ), 10(24), pp. 341-350, August 2014. Al-Khanjari, Z. and Alani, A. 2014. Testability of Information Leak in the Source Code for Independent Test Organization by Using Back Propagation Algorithm. European Scientific Journal (ESJ), European Scientific Institution. /SPECIAL/ edition ISSN: 1857 7881 (Print) e - ISSN 1857-7431. Vol.3. pp. 447-457. September 2014. b. Papers in Refereed Conference Proceedings It is worth to note that all my papers were refereed whether they are published in journals or conferences. Also, it is important to mention here that the conference publications on Computer Science and IT are equivalent to and as prestigious as Journal publications. Some of the conferences are very high ranked conferences and most prestigious than some Journals. 1. Al-Khanjari, Z., Alani, A., Kraiem, N. and Jamoussi, Y. 2013. Proposing a Real Time Internal Intrusion Detection System Towards a Secured Development of E-Government Web Site, Proceedings of The 1 st Eurasian Multidisciplinary Forum (EMF 2013), Vol. 3, pp. 27-37. Tbilisi, Georgia. October 24-26, 2013. 2. Al-Khanjari, Z., Alani, A. and Al-Hermizy, S. 2014. A Proposed Security Architecture for Establishing Privacy Domains in e-health Cloud. Proceedings of The 1st Mediterranean Interdisciplinary Forum on Social 5 P age
Sciences and Humanities, MIFS 2014, Vol.2, pp. 322-330. Beirut, Lebanon. April 23-26, 2014. 3. Al-Khanjari, Z. and Alani, A. 2014. Developing Secured Interoperable Cloud Computing Services, Proceedings of The European Interdisciplinary Forum (EIF2014). pp. 60-68. Vilnius. June 18-19, 2014. 4. Al-Khanjari, Z. and Alani, A. 2014. Testability of Information Leak in the Source Code for Independent Test Organization by Using Back Propagation Algorithm, The Proceedings of The 2 nd Annual International Interdisciplinary Conference 2014 (AIIC 2014). Vol. 3, pp. 447-457. Azores, Portugal. July 8-12, 2014. 5. Alani, A. 2015. Design and Implementation new Algorithm for Digital Investigation by using Images Metadata, Second International Conference on Interdisciplinary Legal Studies 2015,09-10 June, 2015 Toronto, Canada. 6. Alani, A. and Al- Khanjari, Z.2015. Detection Techniques of Digital Image Forgery by Using Images Metadata in Digital Investigation, the International Academic Conference on Law, Politics and management (IACLPM 2015),, from 28 to 29 of May 2015 - Vilnius, Lithuania. c. Book Chapters, Refereed Al-Khanjari, Z.A. and Alani, A. 2014. Real Time Internal Intrusion Detection: A Case Study of Embedded Sensors and Detectors in E-Government Website. This chapter has been accepted for publication as a chapter in the Book entitled: Threat Detection and Countermeasures in Network Security, IGIBook series, Publisher: IGI Global (www.igi-global.com). Editors are: Prof. Dr. Alaa Hussein Al-Hamami & Dr. Ghossoon Al-Sadoon. Publisher: IGI Global. d. Refereed Abstract Al-Khanjari, Z. and Alani, A. 2014. Developing Secured Interoperable Cloud Computing Services, Abstract of an International Scientific Forum, 18-19 June 2014, Vilnius-Net. This abstract has been published in the book: Drivers for Progress in the Global Society. Academic Association of Management and Administration. pp. 49. 2014. e. Degree Theses Alani, A. E-Learning by using Java language, Dissertation 2001 for the Degree of B.Sc. in Computer Science, Supervised by Professor Abas Alflahe, Department of Computer Science,, Al_Rafideen University. Alani, A. Proposed System for Intrusion Detection in a Web Site, Thesis for the Degree of Master of Science (Data Security),, (2 years, courses and thesis, full time) Supervised by Prof. Amer Almlah, Department of Computer Science, Iraqi Commission for Computers and Informatics Institute for Postgraduate Studies in Iraq. 2006 6 P age
C6.3. Other Information a. International Collaborations I have been involved to work with several professional researchers internationally. Asaad Abdul Rahman Nayyef conducted a visit to Portugal to attend the AIIC 2014 conference and meet the rector of the University of the Azores and Carrying the message to Vice- Chancellor of Sultan Qaboos University H.E. Dr. Ali Al-Bemani about collaboration between the Sultan Qaboos University and Azores University during the period 7-13 July 2014. Asaad Abdul Rahman Nayyef collaborated with Senior Professor Dr. Elizabeth K. Hawthorne and Professor Dr.Rose K. Shumba, University of Maryland University in USA to discussions of research collaboration in cyber investigations and digital forensics online. Asaad Abdul Rahman Nayyef conducted a visit to Portugal during the period 7-13 July 2014 and meet Dr. Jovan Shopovski the president of European Scientific Institute to hold discussions on their ongoing research collaboration. Asaad Abdul Rahman Nayyef conducted a visit to Portugal during the period 7-13 July 2014 and meet Dr. Jose Noronha Rodrigues the Chief of International Legal Studies Center to discussions of research collaboration in Digital Investigation by using security of Metadata. Asaad Abdul Rahman Nayyef served as a Professional Ambassador for Information Security in Information Technology Authority. Asaad Abdul Rahman Nayyef has been selected as a member in Center of Excellence in Information Assurance in King Saud University. Asaad Abdul Rahman Nayyef collaborated with Dr. Mariah Gilbert Acquisitions Editorial Assistant for International Publisher of Progressive Academic Research in Hershey, Pennsylvania, USA. b. Community Services Asaad Abdul Rahman Nayyef served as a Professional Security Ambassador in First Cyber Security Ambassadors Gathering 2014, January 19 2014, Muscat, Oman. Asaad Abdul Rahman Nayyef served as a Professional Security Ambassador in Information Technology Authority (ITA) in Regional Cybersecurity Summit 2014, April 20-22 2014, Muscat, Oman. 7 P age
c. Computing Skills Being IT specialist, I gained several computing skills. The following to name a few: 1. Advanced programming ability in C, Pascal, Assembly, FORTRAN, and Basic. 2. Good programming ability in Visual Basic, C, C++, C# and JAVA. 3. Familiar with UNIX, Photoshop and Dreamweaver. 4. A good experience with Windows (3.1/95/98/NT/2000/XP/ Vista /2003/2008/2012/ win7/8 and 8.1), MS-Office (Word, Access, and Excel). 5. A good experience with Relational Databases packages ( FoxPro 2.6, Access, Oracle7 to Oracle 12C and SQLServer 2000 to 2014). 6. Implementing and Planning a Windows Server 2003, 2008 and 2012 R2 Network Infrastructure. 7. Implementing and Designing a Windows Server 2003, 2008 and 2012 R2 Active Directory. 8. Managing and Maintaining a Windows Server 2003, 2008 and 2012 R2 Environment. 9. Network Security and Server Administrators. 10. Computer Programming Language 11. Computer Network 12. Oracle Database Systems 13. Information and security theory End of Vitae 8 P age