Skip to main content

Dr. Wasim AlHamdani

Dr. Wasim AlHamdani
Title:
Professor
Office:
Gatliff Building
Phone:
606.539.5503
Bio:

Education:
Ph.D. Computer Science University of East Anglia, Norwich, UK (1985)
M.Sc., Computer Science, Loughborough University of Technology, Loughborough, UK (1981)
B.Sc. Mathematics, University of Basrah, Iraq (1976)

Bio:
Wasim AlHamdani’s general research interests are Cyber Security, Cryptography, and Cyber Security Management. His current research areas include Information Security Mathematical Modeling, Cyber Security Resilient Architecture Design, Ontologies with Cybersecurity, and Ethics with Cryptography use. He is currently a Cyber Security Curriculum Adviser for two international universities. His hobby is reading.

Publications/Presentations/Lectures:
Wasim A AlHamdani, Ph.D.  “Resilient Cybersecurity Architecture”
15th International Conference on Cyber Warfare and Security - ICCWS 2020, 12-13 March 2020    Norfolk, VA, USA
Dr. Alhamdani co-authors in a research paper titled “Voice Biometric Identity Authentication Model for IoT Devices”, Published in International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 9, No.2. 2020
AlHamdani, W. A. (2019). Adopting the Cybersecurity Curriculum Guidelines to develop a Secondary and Major Academic discipline in Cybersecurity Postsecondary Education. CYBERSECURITY EDUCATION, RESEARCH, & PRACTICE.
Wasim A AlHamdani, Ph.D.  Online Cheating: A Prevention Procedure
14th International Conference on Foundations of Computer Science (FCS'18: July 30 - August 2, 2018, Las Vegas, USA)
AlHamdani, W. A. (2018). Resilient Access Control Model. Journal of Applied Security Research, 12:4, 478-496, DOI: 10.1080/19361610.2017.1354273.
AlHamdani, W. A. (2018). Online Cheating: A Prevention Procedure. 14th International Conference on Foundations of Computer Science (FCS'18: July 30 - August 2, 2018,). Las Vegas, USA): https://csce.ucmss.com/cr/main/papersNew/LFSCSREApapers/FCS4234.pdf.
AlHamdani, W. A. (2016). Teaching Cryptography Using Design Thinking Approach. Journal of Applied Security Research Volume 11, Issue 1.
AlHamdani, W. A. (2015,). Authentication Model for Enterprise Resource Planning Network. In G. M.-S. Alaa H. Al-Hamami, Handbook of Research on Threat Detection and Countermeasures in Network Security (Chapter 5) (p. 14). igi-global.
AlHamdani, W. A. (2014). SECURE E-LEARNING AND CRYPTOGRAPHY. In P. E. Kirk P.H. Sullivan, Cases on Professional Distance Education Degree Programs and Practices: Successes, Challenges, and Issues (p. 39). igi-global.
AlHamdani, A. L. (2014). Network Risk Assessment base on Multi-core Processor Architecture. Proceedings of the 2014 Information Security Curriculum Development Conference. Kennesaw: ACM.
AlHamdani, M. M. (2014). Secure Key Management in Cloud Computing. InfoSec '14: Proceedings of the 2014 Information Security Curriculum Development Conference. Kennesaw, USA: ACM.

Link: https://scholar.google.com/citations?user=WxTuFGQAAAAJ&hl=en