Presenting at ELEGANT Project – Jordan

Just attended ELEGANT project workshop in Jordan and presented two sessions at Princess Sumaya University for Technology. The project is about Enhancing Teaching, Learning and Graduate Employability through University-Enterprise Cooperation and runs between EU & Middle East. The aim was to strengthen the employability skills of graduates and to share best practices in order to develop new forms of industry-oriented education for ICT curricula.
Special thanks to Prof. Abdel-Hamid Soliman and Prof. Walid Abu Salameh for the invite and feedback.
Project Website:

Jobs Jobs Jobs

Happy to let you know that our academic team for #sulcomputing is expanding quickly, and we are soon to advertise 4 vacancies (Grade 7/8) to fit our Cybersecurity and Computer Science BSc as well as MSc delivery to start ASAP … candidates should be holding their PhD (or close to completion) in Cybersecurity/Computer Science (or related subjects) and be very enthusiastic to teach and teamwork on our futuristic campus … 4 teaching areas as below are of our interest at the moment … please email me at [email protected] if you are interested/have any queries and we can arrange an informal chat prior to jobs ads being formally released … and please direct this to anyone who you think might be interested … areas of expertise we are after (but not limited to):

  • Skills Group 1: Web Development, OS Security, OS Internals & Biometrics, JavaScript, Linux
  • Skills Group 2: Software Development, Data Bases & Data Structures, Python, C#, SQL
  • Skills Group 3: Server-side Programming, Mobile Applications Development, PHP, Android Studio, XCode IDE
  • Skills Group 4: Network Security, Advanced Topics in Cybersecurity, Edge Computing, Raspberry Pi, Python

Revision Videos for My Undergrad Students

For Introduction To Networks (ITN), please see: ITN1- Topics: Explore the Network + Network OS + Network Protocols + Network Access + Ethernet, ITN2- Topics: Network Layer + IP Addressing, ITN3- Topics: IP Addressing + Subnetting + Transport + Application Layer + Build Network, ITN4- Topics: Routing Concepts + Static Routing + Dynamic Routing.

For Advanced Networks (AN), please watch: AN1- Routing Basics + EIGRP, AN2- EIGRP + OSPF + BGP, AN3- Switching Fundamentals.

For Research Paper assignment, please first watch this.

رتبه بندی دانشگاههای خارج از کشور

در آخرین سطح بندی دانشگاههای انگلستان از طرف اداره کل دانش آموختگان وزارت علوم، مدرک دانشجویان ایرانی که بعد از سپتامبر 2020 در دانشگاههای ساری، بورنموث، برونل به تحصیل می پردازند در سطح دانشگاهی ممتاز طبقه بندی و چنانچه در دانشگاه استفردشایر پذیرفته شوند، در رده دانشگاه خوب قرار می گیرند

A new journal paper!

Happy to announce that our new journal paper on IoT Security was just published in Elsevier, see below for more info:

Authors: Mohammad Heydari, Alexios Mylonas, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa, Surjit Singh,
Title: Known unknowns: Indeterminacy in authentication in IoT,
Journal: Future Generation Computer Systems, Volume 111, 2020, Pages 278-287, ISSN 0167-739X,
Abstract: The Internet of Things (IoT), comprising a plethora of heterogeneous devices, is an enabling technology that can improve the quality of our daily lives, for instance by measuring parameters from the environment (e.g., humidity, temperature, weather, energy consumption, traffic, and others) or our bodies (e.g., health data). However, as with any technology, IoT has introduced a number of security and privacy challenges. Indeed, IoT devices create, process, transfer and store data, which are often sensitive, and which must be protected from unauthorized access. Similarly, the infrastructure that links with IoT, as well as the IoT devices themselves, is an asset that needs to be protected. The focus of this work is examining authentication in IoT. In particular, in this work we conducted a state-of-the-art review of the access control models that have been proposed, including both traditional access control models and emerging models that have recently been proposed and are tailored for IoT. We identified that the existing models cannot cope with indeterminacy, an inherent characteristic of IoT, which hinders authentication decisions. In this context, we studied the two known components of indeterminacy, i.e., uncertainty and ambiguity, and proposed a new model that handles indeterminacy in authentication in IoT environments.
Keywords: Internet of Things; Authentication; Uncertainty; Ambiguity; Access control