Awad A Younis Mussa Ph.D. Lecturer Department of Computer Science Georgia State University

Similar documents
MASTER OF SCIENCE (M.S.) MAJOR IN COMPUTER SCIENCE

Xinyu Tang. Education. Research Interests. Honors and Awards. Professional Experience

Hongyan Ma. University of California, Los Angeles

We are strong in research and particularly noted in software engineering, information security and privacy, and humane gaming.

Department of Computer Science GCU Prospectus

Open Source Mobile Learning: Mobile Linux Applications By Lee Chao

Massachusetts Institute of Technology Tel: Massachusetts Avenue Room 32-D558 MA 02139

Algebra Nation and Computer Science for MS Initiatives. Marla Davis, Ph.D. NBCT Office of Secondary Education

EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ;

Execution Plan for Software Engineering Education in Taiwan

USER ADAPTATION IN E-LEARNING ENVIRONMENTS

Computer Organization I (Tietokoneen toiminta)

Computer Science (CS)

ZACHARY J. OSTER CURRICULUM VITAE

Journal title ISSN Full text from

Specification of the Verity Learning Companion and Self-Assessment Tool

Development of an IT Curriculum. Dr. Jochen Koubek Humboldt-Universität zu Berlin Technische Universität Berlin 2008

November 17, 2017 ARIZONA STATE UNIVERSITY. ADDENDUM 3 RFP Digital Integrated Enrollment Support for Students

Undergraduate Program Guide. Bachelor of Science. Computer Science DEPARTMENT OF COMPUTER SCIENCE and ENGINEERING

Master s Programme in Computer, Communication and Information Sciences, Study guide , ELEC Majors

Curriculum Vitae FARES FRAIJ, Ph.D. Lecturer

Multimedia Courseware of Road Safety Education for Secondary School Students

Laboratorio di Intelligenza Artificiale e Robotica

The Impact of Test Case Prioritization on Test Coverage versus Defects Found

On-Line Data Analytics

Laboratorio di Intelligenza Artificiale e Robotica

Academic Catalog Programs & Courses Manchester Community College

UCEAS: User-centred Evaluations of Adaptive Systems

CURRICULUM VITAE PERSONAL DETAILS. Evans Anderson Kirimi Miriti Year of Birth: English (Excellent), Kiswahili (Excellent), French (Fair).

Teaching Algorithm Development Skills

Telekooperation Seminar

Modeling user preferences and norms in context-aware systems

PeopleSoft Human Capital Management 9.2 (through Update Image 23) Hardware and Software Requirements

InTraServ. Dissemination Plan INFORMATION SOCIETY TECHNOLOGIES (IST) PROGRAMME. Intelligent Training Service for Management Training in SMEs

Reducing Features to Improve Bug Prediction

Top US Tech Talent for the Top China Tech Company

Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum

Coding II: Server side web development, databases and analytics ACAD 276 (4 Units)

Lectora a Complete elearning Solution

Student Feedback Analysis Report

DIGITAL GAMING & INTERACTIVE MEDIA BACHELOR S DEGREE. Junior Year. Summer (Bridge Quarter) Fall Winter Spring GAME Credits.

A cognitive perspective on pair programming

Emmanuel Opara, D.B.A. Associate Professor Accounting & Finance & MIS College of Business

COVER SHEET. This is the author version of article published as:

On the Combined Behavior of Autonomous Resource Management Agents

Ph.D. Computer Engineering and Information Science. Case Western Reserve University. Cleveland, OH, 1986

ROBERT M. FULLER. Ph.D. Indiana University, Kelley School of Business, June 2003 Major: Management Information Systems Minor: Organizational Behavior

Regan's Resume Last Edit : 31 March 2008

The Comparative Study of Information & Communications Technology Strategies in education of India, Iran & Malaysia countries

An Introduction and Overview to Google Apps in K12 Education: A Web-based Instructional Module

CS Machine Learning

Data Fusion Models in WSNs: Comparison and Analysis

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Business Analytics and Information Tech COURSE NUMBER: 33:136:494 COURSE TITLE: Data Mining and Business Intelligence

Date : Controller of Examinations Principal Wednesday Saturday Wednesday

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC

Rule discovery in Web-based educational systems using Grammar-Based Genetic Programming

Dinesh K. Sharma, Ph.D. Department of Management School of Business and Economics Fayetteville State University

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1

ReinForest: Multi-Domain Dialogue Management Using Hierarchical Policies and Knowledge Ontology

European Cooperation in the field of Scientific and Technical Research - COST - Brussels, 24 May 2013 COST 024/13

Ministry of Education and Science of Kazakhstan. Karaganda State Technical University

A Case Study: News Classification Based on Term Frequency

Towards a Collaboration Framework for Selection of ICT Tools

Chamilo 2.0: A Second Generation Open Source E-learning and Collaboration Platform

Mathematics 112 Phone: (580) Southeastern Oklahoma State University Web: Durant, OK USA

Integrating E-learning Environments with Computational Intelligence Assessment Agents

Web-based Learning Systems From HTML To MOODLE A Case Study

Applying Information Technology in Education: Two Applications on the Web

CNS 18 21th Communications and Networking Simulation Symposium

GRADUATE STUDENT HANDBOOK Master of Science Programs in Biostatistics

MAHATMA GANDHI KASHI VIDYAPITH Deptt. of Library and Information Science B.Lib. I.Sc. Syllabus

Citrine Informatics. The Latest from Citrine. Citrine Informatics. The data analytics platform for the physical world

CWIS 23,3. Nikolaos Avouris Human Computer Interaction Group, University of Patras, Patras, Greece

CIS 121 INTRODUCTION TO COMPUTER INFORMATION SYSTEMS - SYLLABUS

Ericsson Wallet Platform (EWP) 3.0 Training Programs. Catalog of Course Descriptions

Introduction to Mobile Learning Systems and Usability Factors

University of Ulster, Northern Ireland. SilverFish Studios, Northern Ireland

Axiom 2013 Team Description Paper

Ecole Polytechnique Fédérale de Lausanne EPFL School of Computer and Communication Sciences IC. School of Computer and Communication Sciences

GRAND CHALLENGES SCHOLARS PROGRAM

ABC of Programming Linda

Curriculum Vitae Bharat K. Soni

EdX Learner s Guide. Release

TREATMENT OF SMC COURSEWORK FOR STUDENTS WITHOUT AN ASSOCIATE OF ARTS

Rule Learning with Negation: Issues Regarding Effectiveness

Customised Software Tools for Quality Measurement Application of Open Source Software in Education

Knowledge based expert systems D H A N A N J A Y K A L B A N D E

Educator s e-portfolio in the Modern University

Word Segmentation of Off-line Handwritten Documents

Test Effort Estimation Using Neural Network

SELF-STUDY QUESTIONNAIRE FOR REVIEW of the COMPUTER SCIENCE PROGRAM

Software Development: Programming Paradigms (SCQF level 8)

Three Strategies for Open Source Deployment: Substitution, Innovation, and Knowledge Reuse

MABEL ABRAHAM. 710 Uris Hall Broadway mabelabraham.com New York, New York Updated January 2017 EMPLOYMENT

Welcome to. ECML/PKDD 2004 Community meeting

Personal Information. Work Information. Work History. Hans-Petter Halvorsen, M.Sc. Date of Birth:

DYNAMIC ADAPTIVE HYPERMEDIA SYSTEMS FOR E-LEARNING

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

Evaluation of Usage Patterns for Web-based Educational Systems using Web Mining

Transcription:

Awad A Younis Mussa Ph.D. Lecturer Department of Computer Science Georgia State University OBJECTIVES Address: Department of Computer Science, P.O.Box 5060, Atlanta, GA 30302-5060 Email: amussa@cs.gsu.edu LinkedIn: www.linkedin.com/in/awadyounis Mobile: (970) 581-5094 Teaching to share my knowledge and experience with students and help them become lifelong learners and achieve their career goals. Conducting research in the area of software engineering and cyber security with the focus on developing techniques to support the assessment and development of high software security and resilience and exploring new effective teaching strategies and curricular approaches to teaching and introducing undergraduate and graduate students to cybersecurity. TEACHING AND RESEARCH INTERESTS The classes concertation I had in my bachelor and two master degrees and my academic and industry experiences equip me to guide students and teach them the following foundational classes: computer science foundation, introduction to programming using (C, Java or Python), algorithms and data structure, computer organization and programming (Z80, X86, SPARC), object-oriented problem solving (C++ and Java), system programming, operating systems, system security, and web development. My research background gives me the background to teach the following core and graduate classes: software engineering, object-oriented design, cyber security, computer networks, software product and process evaluation, secure software engineering. I am also open to learn and teach other classes. I am interested in different areas of software engineering and cyber security. My main research focus is on software security metrics and measurement, empirical software security and engineering, software resilience, software design and testing. I am also interested in software engineering and security of the internet of things, self-adaptive software, and other topics in the fields are also welcome. Exploring new effective teaching strategies and curricular approaches to teaching and introducing undergraduate and graduate students to cybersecurity is part of my focus too. EDUCATION 2012 2016 Ph.D. Computer Science, Fort Collins, Colorado, USA Thesis title: Quantifying the Security Risk of Discovering and Exploiting Software Vulnerabilities. Concertation: Software Security Models and Metrics 2009 2012 Master of Computer Science, Fort Collins, Colorado, USA Concertation: Software Engineering & Information Assurance 2006 2008 Master of Science in Computer Science University of Madras, Chennai, India Thesis title: Improving Web-Based Chat Application Interactivity, Speed, Functionality, and Usability using Ajax Technology. 1997 2001 Bachelor of Science in Computer Science Garyounis University, Benghazi, Libya Thesis title: Building Artificial Neural Network to Recognize Hind Written Signature using Hopfield Algorithm PROFESSIONAL EXPERIENCE August 2016 present: Lecturer, Georgia State University, Atlanta, GA, USA. Responsibilities: Preparing and teaching the material (180 students in Fall, 160 students in Spring) with full responsibility as a lecturer Advising and mentoring ungraduated and graduate students Courses teaching: CSC3210: Computer Organization and Programming (Fall 2016 [SPARC], Spring 2017 [Intel]) January 2014 May 2016: Graduate Teaching Assistant,, Fort Collins, CO, USA. Responsibilities: Preparing and teaching the material for on-campus and distance students in recitation sessions and labs

Grading homework, tests, midterm and final exams Supervising and evaluating students class projects CS155: Introduction to UNIX (Undergraduate level) CS270: Computer Organization (Undergraduate level) CS457: Computer Networks and the Internet (Undergraduate and graduate level) CS530: Fault-Tolerant Computing (Graduate level) CS514: Software Product and Process Evaluation (Graduate level) May 2011 August 2011: Graduate Teaching Assistant, Instructor,, Fort Collins, CO, USA Prepared and taught the material for on-campus students with full responsibility as an instructor Graded the homework, tests, and midterm and final exams Assisted students in the Lab CS155: Introduction to UNIX CS156/157: Introduction to C Programming March 2008 September 2008: Software Engineer, Energy Audit System, Focus Tech Media, Chennai, India. Software Engineer: System Analysis & Design Requirement gathering and Analysis Application Design: Architecture Design, Component Design, Interface Design and Creation System Design: Network Design, Operating System design Preparing and writing technical documentations. Extensively provided optimal solutions at critical levels of the Project. Preparing and revising courses contents of the Training Division Project description: This application has been mainly developed to significantly control the loss of the energy by leading to the source. It also serves to make sophisticated energy-related calculations and rapidly create a focused energy-efficiency reports September 2003 June 2006: 1) Lecturer, Alfaaiq National University, Ajdabia, Libya Prepared and taught the material for students with full responsibility as a lecturer Introduction to Computer Introduction to programming Introduction to Pascal Language Introduction to C Language Computer Networking Introduction to Operating Systems Information System Analysis Multimedia Systems Introduction to Artificial Intelligence Software Engineering Designing a Multimedia Program to Teach Students Visual Basic 6.0 and Flash MX Designing and Publishing a website for Alfaaiq University Creating an Online Library system

Creating a Database System for Enrolment and Examination Department in Al-Gelaa Intermediate School 2) Lecturer (Part time), Garyounis University, Teacher Training Faculty, Ajdabia, Libya Prepared and taught the material for students with full responsibility as a lecturer Organization of Computer System Analysis Programming in Pascal System Programming Operating System Data Structure Automating the operations in the branch of General Department for Passports and Naturalization. Automating the operations of the Subscribers Unit in the Commercial Services Department of the Public Post-Office Company. 3) Head of Computer Science Department (Part time: 2005-2006), Garyounis University, Teacher Training Faculty, Ajdabia, Libya Preparing departmental course schedules Conducting department meetings and establishing specific work groups. Writing reports requested by administration Conducting necessary departmental correspondence. Staffs admissions activities. January 2001 December 2001: Instructor, Alfaaiq Institute for High Computer Science Diploma, Ajdabia, Libya Prepared and taught the material for students with full responsibility as an Instructor Introduction to Computer Introduction to programming Introduction to Pascal Language Computer Design I Introduction to C Computer Organization Computer Networking Operating Systems Information System Analysis Computer Maintains System Programming Creating Database System for Scholastic Health Department in Ajdabia District Creating Database System for Reception Department in Ajdabia Academic Center E-commerce and its usage in Libya Building Intranet Network by using MS-IIS. Building Artificial Neural Network to Recognize Finger Print

March 2000 September 2000: Software engineer, Database System for Student and Examination Record, PIE Technology & Training Sdn. Bhd., Kuala Lumpur, Malaysia. Software Engineer: Analysis, Design, and Implementation Project description: Maintain information about the students and retrieving students information and managing their classes AWARDS AND HONORS Anita Read Graduate Award for exceptional dedication to education and excellence in teaching, Department of Computer Science,, Colorado, USA, 2014 2015. Graduate Assistantship, Department of Computer Science,, 2014-2016. Best Academic Performance throughout the academic years 2006-2008 from Hindustan College of Art & Science, University of Madras, Chennai, India. Ph.D. Scholarship from Higher Education, Libyan Government, March 2009 to March 2014. I was awarded this scholarship because I earned my Master of Science in Computer Science from University of Madras, Chennai, India with First Class with Distinction and Best Academic Performance and 100% Attendance for the two academic years. PUBLICATIONS: Google Scholar Conferences: Awad A Younis, Minwoo Lee, Yashwant K. Malaiya, and Indrajit Ray. Measuring and Analyzing Time-To-Vulnerability Disclosure. The 7TH ACM Conference on Data and Application Security and Privacy (CODASPY), 2017, under review. Awad A Younis, Yashwant K. Malaiya, and Indrajit Ray. Evaluating CVSS Base Score Using Vulnerability Rewards Programs. In the proceedings of the 31st International Conference on Systems Security and Privacy Protection (IFIP SEC), 2016, pp. 62-75. Awad A Younis, Yashwant K. Malaiya, Charles Anderson, and Indrajit Ray. To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Function with an Existing Exploit. The 6TH ACM Conference on Data and Application Security and Privacy (CODASPY), 2016, pp. 97-104. Awad A. Younis and Yashwant K. Malaiya. Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System. The 2015 IEEE International Conference on Software Quality, Reliability and Security, 2015, pp. 252-261. Awad A. Younis and Yashwant K. Malaiya. Using Software Structure to Predict Vulnerability Exploitation Potential. The 8th IEEE International Conference on Software Security and Reliability, 2014, pp. 13-18. Awad A. Younis, Yashwant K. Malaiya, and Indrajit Ray. Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability", IEEE High Assurance Systems Engineering Symposium (HASE'14), 2014, pp.1-8. Awad A. Younis and Yashwant K. Malaiya. Relationship between Attack Surface and Vulnerability Density: A Case Study on Apache HTTP Server ", The 2012 International Conference on Internet Computing (ICOMP'12), 2012, pp. 197-203. A. A. Younis, H. Joh, and Y. K. Malaiya. "Modeling Learningless Vulnerability Discovery using a Folded Distribution", The 2011 International Conference on Security and Management (SAM'11), 2011, pp. 617-623. Journals: Awad A. Younis, Yashwant K. Malaiya, and Indrajit Ray. CVSS Base Score: An Empirical Quantitative Evaluation, Computers and Security Journal, 2017, Under review. Awad A. Younis, Yashwant K. Malaiya, and Indrajit Ray. Assessing vulnerability exploitability risk using software properties, Software Quality Journal: 1-44, Mar 2015.

PROFESSIONAL ACTIVITIES Program committee member for the IEEE 4th International Conference on Future Internet of Things and Cloud (Security, Privacy and Trust track), 2016. Reviewer for the Conference on Data and Application Security and Privacy (CODASPY) 2016. Reviewer for the Conference on ICT Systems Security and Privacy Protection (IFIP SEC) 2016. CONFERENCE TALKS Modeling Learningless Vulnerability Discovery using a Folded Distribution, the International Conference on Security and Management (SAM'11), Las Vegas, NV, USA, July 2011. Relationship between Attack Surface and Vulnerability Density: A Case Study on Apache HTTP Server, the International Conference on Internet Computing (ICOMP12), Las Vegas, NV, USA, July 2012. Using Software Structure to Predict Vulnerability Exploitation Potential, The 8th International Conference on Software Security and Reliability, San Francisco, CA, USA, July 2014. To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Function with an Existing Exploit, Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March, 2016. PROFESSIONAL SKILLS Platform: Linux/Unix, Microsoft Windows Programming Language: C, C++, JAVA, C#, Python, Assembly (Z80, X86, SPARC). Machine Learning: scikit-learn, Weka Statistical Analysis of Data: R and XLSTAT Web Language: ASP.NET, HTML, CSS, JavaScript Database: Oracle, MySQL Software Modelling: UML, OCL, Alloy-MIT, MS-Visio LANGUAGES Arabic: Native Language English: Near native. REFERENCES Yashwant.K. Malaiya malaiya@cs.colostate.edu Charles W. Anderson anderson@cs.colostate.edu Indrajit Ray indrajit@cs.colostate.edu James M. Bieman bieman@cs.colostate.edu