Administrative offices will be closed on Wednesday, June 19, in observance of the Juneteenth Independence Day.

Dr. Ben Ayed is a Sr. Security Analyst with many years of experience in the Information Technology sector. Dr. Ben Ayed has been teaching Cyber Security classes since 2014. In his spare time, Dr. Ben Ayed enjoys reading about history and watching documentaries. He also likes to camp and hang out with friends whenever possible.

Doctor of Computer Science, Colorado Technical University, 2017.
Master of Science in Cyber Security and Information Assurance, National University, 2014.
Bachelor of Science in Computer Information Systems, Bellevue University, 2012.

M. Dawson, A. Vassilakos, A. Ben Ayed (2021). Strengthening University Computing Programs to Meet National Security Needs. 2021 WEEF/GEDC (2021)
A. B. Ayed, P. Taveras, T. BenYounes (2020). Blockchain and IoT: A Proposed Security Framework. 17th International Conference on Information Technology : New Generations (ITING 2020).
A. B. Ayed, M. A. Belhajji (2020). Trade Route: An Anonymous P2P online Exchange Market using Blockchain Technology. The 2020 International Conference on Integrated Science in Digital Age (ICIS 2020).
A. B. Ayed, M. A. Belhajji (2020). Blockchain Technology: Applications and Threats. Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications.
A. B. Ayed (2017). A Conceptual Secure Blockchain-Based Electronic Voting System. International Journal of Network Security & Its Applications. Vol (9)(3).
A. B. Ayed (2017). Permission Request Pattern Recognition in Android Malware Applications. International Journal of Strategic Information Technology and Applications. Vol (8)(1).
A. B. Ayed (2017). Android Security: Permission Request Analysis Using Self-Organizing Maps in Android Malware Applications. ProQuest Thesis Publishing.
A. B. Ayed (2017). Nature of Cyber Crimes and Legislation in the Republic of Tunisia. International Journal of Advanced Research in Computer Engineering & Technology. Vol. 6(3).
A. B. Ayed (2016). Permission Based Malware Analysis for Android Applications Using Self-Organizing Maps. Journal of Theoretical and Applied Information Technology. Vol. 85(1).
A. B. Ayed (2015). A literature Review on Android Permission System. International Journal of Advanced Research in Computer Engineering & Technology. Vol. 4(4).

  • Blockchain
  • Cybersecurity