CYBER SECURITY ARCHITECT

 

 

HIGHER EDUCATION and QUALIFICATIONS

 

Spring, 1994               PhD Degree from the University of Sussex, UK. Completed Thesis on  Computer Networks Security.

 

Spring, 1987               MSc (Hons.) Electrical and Electronics Engineering from Hacettepe University, Turkey. Specialised in Secure Communications; Completed Thesis on Electronic Warfare (Spread Spectrum Communication Systems).

 

Autumn, 1984             BSc (Hons.) Electrical and Electronics Engineering from the Anatolian University, Turkey. Specialised in Communications; Completed Thesis on SSB communication systems.

 

 

RESEARCH INTERESTS

 

Computer Networks Security: Authentication Techniques, PKI, Intrusion Detection and Penetration Techniques.

Cryptology: Fast Software and Hardware Implementation of Cryptologic Algorithms, Hommorphic encryption schemes.

ATM Networks: Modeling Security Mechanisms for ATM Networks.

Wireless Networks: Modeling Novell Security Mechanisms and Authentication techniques for Mobile Environments.

Security in Ad Hoc networks ( Data confidentiality in Ad Hoc networks, Threshold cryptology, Secure routing)

Security in Wireless Sensor Networks (WSN) (Data confidentiality, application of Homomorphic encryption schemes)

Software Security (Code obfuscation techniques)

Mobile Agents: New Security Models for Mobile Agents in Internet Environment.

E-Commerce: Techniques and standards for E-Commerce and their Security Problems.

Enterprise Security Planning ( Zachman framework, mobile government)

Network and Information Security Management: (Risk Analysis, Vulnerability Analysis, Threat Analysis, Exposure Analysis)

Security in Cloud Computing

Security in VANETs

Cyber Security & Privacy

 

 

EXPERIENCE

 

2013- Current            California State University, East Bay, Hayward, CA, USA

Position:                      Prof. Dr. Responsible for teaching and research about computer Networks, various computer and communications security topics.

 

2017-Summer             Lawrence Livermore National Laboratory (LLNL), Livermore, CA, USA

Position:                      Summer Faculty: Global Security/ Z Program.

 

2016-Summer             Lawrence Livermore National Laboratory (LLNL), Livermore, CA, USA

Position:                      Summer Faculty: CyberDefenders Program.

 

2015-Summer             Lawrence Livermore National Laboratory (LLNL), Livermore, CA, USA

Position:                      Summer Faculty: CyberDefenders Program.

 

2014-Summer             Lawrence Livermore National Laboratory (LLNL), Livermore, CA, USA

Position:                      Summer Faculty: CyberDefenders Program.

 

2013-Summer             Lawrence Livermore National Laboratory (LLNL), Livermore, CA, USA

Position:                      Summer Faculty: CyberDefenders Program.

 

2008-2013                  California State University, East Bay, Hayward, CA, USA

Position:                      Assoc. Prof. Dr. Responsible for teaching and research about computer Networks, various computer and communications security aspects.

 

2002-2008                  California State University, East Bay, Hayward, CA, USA

Position:                      Asst. Prof. Dr. Responsible for teaching and research about computer Networks, various computer and communications security aspects.

                                    

2001-2002                  rTrust Technologies & Oregon State University, Corvallis, OR, USA

Position:                      Computer Security Architect. Responsible for developing ECC (Elliptic Curve Cryptology) based SSL protocols. Teaching WEB Security aspects in OSU-ECE department.

                                       

1999 – 2001                HAVELSAN Co. Ankara, Turkey

Position :                     Project Manager. Manager of the National Military Message Handling System (MMHS).Responsible for planning and managing the project. This includes finance, sub-contractor management, customer relations, identification of project resources, cost estimation and quality assurance (ISO 9001, AQAP150, MIL-STD498) aspects  and personnel management. Technically, responsible for the design and deployment of X.400 based messaging system, X.500 based directory system, X.509 based PKI, SecWEB and a DMS for Turkish military. ($15 Million)

 

1998 – 2000                Turkish Telecom, Ankara

Position:                      Internet & Security Consultant. Responsible for the management and security of Turkish Internet Backbone (TURNET)

 

1997 – 1999                Havelsan Co., Ankara        

Position:                      Comp. Security Consultant. Responsible for developing a firewall system for computer networks. ($4 Million)

 

1996- 1999                 TYİH, Turkiye Yüksek İhtisas Hospital, Ankara.

Position:                      Consultant Manager of the Computer Center. Responsible for Computer Networks of the hospital.

 

1996 – 1997                ENSA Group of Companies, Ankara

Position:                      Consultant Manager of the International Trade Department. Responsible for international tenders related to education and computers training equipment.

 

1988 - 1989                Teknim Inc., Ankara.

Position :                     Research and Development Eng (consultant). Responsible for research and development of secure computer communication devices as part of a team.

 

1985-2001                  Hacettepe University

Position:                      Asst. Prof. Dr. Responsible for teaching and Research about computer Networks, various computer and communications security aspects. Projects that are completed.

                                               

·        A VLSI implementation of DES, IDEA and RSA security algorithms. Received $25.000 from state planning department (DPT)

·        Smart Card Developments. Received $25.000 from Hacettepe University.

·        Cryptanalysis of Turkish alphabet. Received $4000  from  Hacettepe University

·        Security in ATM Networks

·        GSM Security

·        Security of Mobile Agents

·        Software implementation of Cryptologic Algorithms

 

1984 - 1985                Ortas Inc., Ankara.

Position :                     Software Eng. Responsible for developing computer games for commercial use.

 

 

COURSES TAUGHT at  California State University, EAST BAY, USA

 

Undergraduate Level

 

CS1020 Introduction to Computer Systems

CS3590 Data Communications and Networking

CS3898 Cooperative Education

CS4525 Principles of Network Security

CS4526 Principles of Wireless, Mobile, Grid, Cloud and Pervasive Computing Security
CS4527 Network Security Management

CS4560 Operating Systems

CS4900 Independent Study

CS4590 Computer Networks

CS4594 Broadband Networks and Communications

MATH 950 Intermediate Algebra

 

Graduate Level

 

CS6000 Research Methods

CS6520 Cryptology and Data Security

CS6525 Security in Computer Networks

CS6526 Security in Wireless, Mobile, Grid, Cloud and Pervasive Computing

CS6527 Network Security Management

CS6585 Distributed Systems & Client/Server Systems

CS6594 Broadband Networks and Communications

CS6899 Project (174 students)

CS6900 Independent Study (Total 41 students incl CS4900 + 1 Honor (Biology))

CS6909 Departmental Thesis (8 students)

 

 

ONLINE-HYBRID COURSES TAUGHT at California State University, EAST BAY, USA

 

Undergraduate Level – Graduate Level

 

CS3590 Data Communications and Networking

CS4525-CS6525  Principles of Network Security

CS4526-CS6526  Principles of Wireless, Mobile, Grid, Cloud and Pervasive Computing Security

CS4594-CS6594  Broadband Networks and Communications

CS6520 Cryptology and Data Security

 

 

NEW COURSES PROPOSED at California State University, EAST BAY, USA

 

ONLINE-HYBRID

 

CS3590 Data Communications and Networking

CS4525-CS6525  Principles of Network Security

CS4526-CS6526  Principles of Wireless, Mobile, Grid, Cloud and Pervasive Computing Security

CS4594-CS6594  Broadband Networks and Communications

CS6520 Cryptology and Data Security

 

IN-PERSON

 

CS4591-CS6591 Cloud Computing

CS4527-CS6527 Network Security Management

CSXXX Offensive Security (Hands-On Hacking Techniques)

CSXXX Cyber Security (GE)

 

COURSES TAUGHT at  Hacettepe University, TR

 

Undergraduate Level

 

ELE107 Introduction to Computer Systems

ELE214 Electronics Lab I

ELE313 Electronics Lab II

ELE324 Telecommunications I

ELE326 Telecommunications I Lab

ELE331 Logic System Design

ELE333 Logic System Design Lab

ELE336 Microprocessor Architecture and Programming

ELE338 Microprocessor Architecture and Programming Lab

ELE425 Telecommunications II (Digital Communications)

ELE427 Telecommunications II (Digital Communications) Lab

 

ELE401 Graduation Project I

ELE402 Graduation Project II

 

Graduate Level

 

ELE741 Computer Networks and OSI

ELE742 Security in Computer Networks

 

Departmental Thesis (MSc)

Departmental Thesis (PhD)

 

COURSES TAUGHT at  Gazi University, TR

 

Undergraduate Level

 

EE321 Telecommunications I

EE323 Telecommunications I Lab

 

COURSES TAUGHT at Sussex University, UK

 

Undergraduate Level

 

H7055 Microprocessors and Programming

 

 

PROFESSIONAL DEVELOPMENT ACTIVITIES

 

Courses/Trainings Attended

 

Global Politics of Internet Security (10 weeks), LLNL, 2017

 

International Law Applicable to CyberWar, Tallinn Manual 2. (10 weeks), Lawrence Livermore National Laboratory, LLNL, 2017

 

International Efforts to Control Cyber Space (10 weeks), Lawrence Livermore National Laboratory, LLNL, 2016

 

Legal, Policy and Technical Realities of Cyber Security, (10 weeks), Lawrence Livermore National Laboratory, LLNL, 2016

 

CYBERWAR - Diplomacy in the Digital Era (10 weeks), Lawrence Livermore National Laboratory , LLNL, 2015

 

International Affairs in Digital Era (1 week), Lawrence Livermore National Laboratory, LLNL, 2015

 

Cyber Security Aspects of Nuclear Security (2 weeks), Lawrence Livermore National Laboratory, LLNL, 2015

 

Global Positing System (GPS) (1 week), Lawrence Livermore National Laboratory, LLNL, 2015

 

DRONES- Legal and Technical Aspects (2 weeks), Lawrence Livermore National Laboratory, LLNL, 2015

 

Ethical Hacking (10 weeks), Lawrence Livermore National Laboratory, LLNL, 2014

 

Kali Linux (5 weeks), Lawrence Livermore National Laboratory, LLNL, 2014

 

Computer Forensics (5 weeks), Lawrence Livermore National Laboratory, LLNL, 2014

 

Reverse Engineering, U.S. Cyber Challenge Northern California Cybersecurity Summer Boot Camp, San Jose State University, SJSU, 2014

 

Ethical Hacking (10 weeks), Lawrence Livermore National Laboratory, LLNL, 2013

 

Computer Forensics (10 weeks), Lawrence Livermore National Laboratory, LLNL, 2013

 

Elliptic Curve Cryptology, ECC, (1 week) Oregon State University, Department of Mathematics, 2002

 

 

GIVEN SEMINARS

 

Cyber Security and Privacy - “Are We All Living in Glass Houses? Can I Get Some Privacy Please?”, Sonoma State University, 2017 (invited)

 

Cyber Security and Privacy - “Are We All Living in Glass Houses? Can I Get Some Privacy Please?”, CSCE'17 - The 2017 World Congress in Computer Science, Computer Engineering, & Applied Computing, Las Vegas, NV, 2017 (invited)

 

Cyber Security and Privacy - “How can I Protect Myself in Cyber Space”, San Jose City College (JSCC), Work Force Institute, San Jose, CA, 2017 (invited)

 

CYBER SECURITY & PRIVACY in Mobile Wireless Environments, mobileGoverment World Summit, Brighton, England, 2017 (invited)

 

IoT Security: The Block Chain, The Bitcoin Technology, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2017

 

Malicious PDF documents and Digital Forensics, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2017

 

Digital Signatures & X509 Digital Certificates, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2017

 

Secure Messaging and Public Key Cryptography, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2017

 

Secure Messaging and Symmetric Key Cryptography, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2017

 

Cyber Security and Privacy - “Are We All Living in Glass Houses? Can I Get Some Privacy Please?”, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2017

 

Cyber Security and Privacy Awareness - “How can I Protect Myself in Cyber Space”, California State University EASTBAY, National Cyber Security Awareness Month, CA, 2016.(presentation in .pdf)

 

Future of Cyber Security Education (Panel Discussion). 2016 World Congress in Computer Science, Computer Engineering, and Applied Computing, WORLDCOMP’16, Las Vegas, NV, 2016

 

Cyber Security Education Curriculum/Pathways, (Panel Discussion), Silicon Valley-San Francisco Bay Region Cybersecurity Educators’ Symposium, Sunnyvale, CA, 2015

 

Reverse Engineering with IDA Pro, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

 

Mobile Device Forensics with Autopsy, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

 

Bluetooth Hacking Techniques, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

 

Bluetooth Security - Authentication and Confidentiality, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

 

Bluetooth Security - Security Modes, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

 

X509 Digital Certificates, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

 

Cryptography, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

 

Data Security, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

 

Cyber Security & Privacy “Are We All Living in Glass Houses? Can I Get Some Privacy Please? ” California State University EASTBAY, National Cyber Security Awareness Month, CA, 2015

 

Cyber Security & Privacy “Are We All Living in Glass Houses? Can I Get Some Privacy Please? ” Middlebury Institute of International Studies at Monterey (MIIS), MIIS Cyber Initiative, Monterey, CA, 2015 (Invited)

 

Cyber Security: Cyber Security Education, Cyber Bullying and Privacy (Panel Discussion), 2015 World Congress in Computer Science, Computer Engineering, and Applied Computing, WORLDCOMP’15, Las Vegas, NV, 2015

 

Protecting Yourself in CyberSpace – Secure Cloud Storage and Secure WiFi configurations, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

 

Protecting Yourself in CyberSpace – Password Management and Password Security, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

 

Protecting Yourself in CyberSpace – Deleting Data Securely, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

 

Protecting Yourself in CyberSpace – File Encryption, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

 

Protecting Yourself in CyberSpace – HDD and Mobile Device Protection, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

 

Protecting Yourself in CyberSpace - E-mail Security, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

 

Protecting Yourself in CyberSpace - Vulnerabilities of Cyber Space, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

 

Cyber Security for High School Students, California State University, East Bay, Hayward, CA, 2015 ( THIS IS AN INTERNATIONAL SEMINAR)

 

The US Constitution and Privacy in Cyber Security, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

 

International Governance and the Internet, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

 

Identity and Attribution in Cyber Space, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

 

Protecting yourself in Cyber Space, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

 

Malicious Software-Viruses, Botnets and Logic Bombs Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

 

Cyber Space Vulnerabilities, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

 

How Cyber Space Works, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

 

Cyber Security Discussions - STUXNET, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

 

Bluetooth Hacking Techniques, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

 

Security in Bluetooth, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

 

Security in VoIP, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

 

Security in Grid & Cloud Computing, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

 

Security in Wireless Sensor Networks (WSNs), Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

 

Security in Mobile Ad Hoc Networks (MANETs), Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

 

Security in Wireless Networks (WPA1 and WPA2 with PSK and TKIP) & Wireless Hacking Techniques, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

 

Security in Wireless Networks (WEP) & Wireless Hacking Techniques, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

 

Cyber Security Curriculum Development for a BSc program in Computer Science, Dominican University, San Rafael, CA, 2012 (invited)

 

A Practice in using E_Portfolio, WIKI, Discussion Board and TURNITIN in a Higher Education Course Taught at Distance, CDSIA2011, 4th Symposium in Curriculum Development in Security and Information Assurance (CDSIA) , San Jose State University, San Jose, CA, 2011

 

A Practice in using E_Portfolio, WIKI, Discussion Board and TURNITIN in a Higher Education Course Taught at Distance, CSU East Bay,  3 Nov, Hayward, CA, 2011

 

Security Services in Wireless AdHoc Networks (Conference Key Note Speech), VII Coloquio Nacional De Codigos, Criptografia y Areas Relacionadas, La Universidad Autonoma del Estado de Mexico, 7-9 June, Toluca, Mexico, 2006

 

Security of Mobile Ad-Hoc Networks (MANETs) and Threshold Cryptography, VII Coloquio Nacional De Codigos, Criptografia y Areas Relacionadas, La Universidad Autonoma del Estado de Mexico , 7-9 June, Toluca Mexico, 2006 (invited)

 

Today & Tomorrow: IEEE 802.11 WLAN Security, CSU East Bay, Hayward, CA, 2006

 

Today & Tomorrow: IEEE 802.11 WLAN Security, EURO mGOV 2005, Brighton, UK, 2005 (invited)

 

Security of Mobile Agents, CSU East Bay, Hayward, CA, 2002

 

Security of Mobile Agents (Chameleon Agents), Oregon State University, OR, 2002

 

Security in Computer Networks and Cryptology, Headquarters of Turkish Police Forces, 2002

 

WEB Security (SSL, Firewalls), Oregon State University, OR, 2001

 

Security in Computer Networks and Cryptology, Turkish General Staff (TGS), 2000

 

Security in Computer Networks and Cryptology, Turkish General Staff (TGS), 2000

 

Military Message Handling System (MMHS), North Atlantic Treaty Organization (NATO) Military Message Handling Systems Work Group (MMHSWG),  Istanbul, 2000

 

Turkish Military Message Handling System (MMHS) (MEDAS), North Atlantic Treaty Organization (NATO), Joint Warrior Interoperability Demonstration (JWID), MONS BELGIUM, 2000

 

Turkish Military Message Handling System (MMHS) (MEDAS), Unified Efforts, North Atlantic Treaty Organization (NATO) 2000

 

Security in Computer Networks (1 week), Turkish Telecom, 2000

 

Security in Computer Networks: Digital Signatures, E-Commerce Board of Turkey, 2000

 

Computer Networks (1 week), Turkish Telecom, 2000

 

ATM Networks (1 week), Turkish Telecom, 2000

 

ATM Networks (1 week), Turkish Telecom, 2000

 

Security in Computer Networks (1 week), Turkish Telecom, 1999

 

Security in Computer Networks (1 week), Turkish Telecom, 1999

 

Computer Networks (1 week), Turkish Telecom, 1999

 

Security in Computer Networks and Cryptology, Havelsan Co, 1997

 

Security in Computer Networks and Cryptology, Havelsan Co, 1996

 

Security in Computer Networks, Haccettepe University, 1994

 

An Internet Security Access Control Scheme (ISACS), Middle East Technical University, 1994

 

An Internet Security Access Control Scheme (ISACS), Hacettepe University, 1994

 

Intel 8085 Microprocessor Programming, (1 week),  Eregli Iron and Steel Ind., 1988

 

Intel 8085 Microprocessor Programming, (1 week),  Eregli Iron and Steel Ind., 1987

 

 

 

CONFERENCE PRESENTATIONS

 

Performance Analysis of CLEFIA, PICCOLO, TWINE Lightweight Block Ciphers in IoT Environment, CSCE'17 - The 2017 World Congress in Computer Science, Computer Engineering, & Applied Computing, The 16th Int'l Conference on Security and Management (SAM'17), July, Las Vegas, 2017

 

IoT Security: Performance Evaluation of Grain, MICKEY, and Trivium - Lightweight Stream Ciphers, CSCE'17 - The 2017 World Congress in Computer Science, Computer Engineering, & Applied Computing, The 16th Int'l Conference on Security and Management (SAM'17), July, Las Vegas, 2017

 

Security of Software Defined Networks (SDN), CSCE'17 - The 2017 World Congress in Computer Science, Computer Engineering, & Applied Computing, The 16th Int'l Conference on Wireless Networks (ICWN'17), July, Las Vegas, 2017

 

EasyAuth - Implementation of a Multi-Factor Authentication Scheme Based on Sound, Fingerprint and One Time Passwords (OTP), WORLDCOMP2016, International Conference on Security and Management SAM'16, July, Las Vegas, 2016

 

Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms, The 2016 International Conference on Wireless Networks, ICWN16, July, Las Vegas, 2016

 

Implementation of EAX Mode of Operation Within a Real-time  Android Chatting Application, The 2016 International Conference on Wireless Networks, ICWN16, July, Las Vegas, 2016

 

Performance Comparison of AES-CCM and AES-GCM Authenticated Encryption Modes, WORLDCOMP2016, International Conference on Security and Management SAM'16, July, Las Vegas, 2016

 

Implementation of Authenticated Encryption Algorithm Offset Code Book (OCB), The 2016 International Conference on Wireless Networks, ICWN16, July, Las Vegas, 2016

 

Storing Credit Card Information Securely using Shamir Secret Sharing in a Multi-Provider Cloud Architecture, WORLDCOMP2015, International Conference on Security and Management SAM'15, July, Las Vegas, 2015

 

A Comparison of HMAC-based and AES-based FFX mode of Operation for Format-Preserving Encryption, WORLDCOMP2015,  International Conference on Security and Management SAM'15,  July, Las Vegas, 2015

 

Implementation of Oblivious Bloom Intersection in Private Set Intersection Protocol (PSI), International Conference on Security & Management SAM’14, July, Las Vegas, 2014

 

Privacy-Aware Proximity Based Service using Hide & Crypt Protocol: Implementation, WORLDCOMP2013, International Conference on Security and Management SAM'13, July, Las Vegas, 2013

 

Private Proximity Testing For Location Based Services, WORLDCOMP2013, International Conference on Security and Management SAM'13, July, Las Vegas, 2013

 

Implementation of Boneh Protocol 3 in Location Based Services (LBS) to Provide Proximity Service, WORLDCOMP2013, The 2013 International Conference on Security and Management SAM'13,  July, Las Vegas, 2013

 

Implementation of a WEB Application for Evaluation of WEB Application Security Scanners, International Conference on Security & Management SAM’12, July, Las Vegas, 2012

 

The Zachman Framework, the Owner’s Perspective & Security,  International Conference on Security & Management SAM’12, July, Las Vegas, 2012

 

Enterprise Security Planning using the Zachman Framework – Builder’s Perspective,  Security and Management SAM’11, July, Las Vegas, 2011

 

Enterprise Security Planning using Zachman Framework: Designer’s Perspective, Security and Management SAM’11, July, Las Vegas, 2011

 

Enterprise Security Planning with TOGAF-9, Security and Management SAM’11, July, Las Vegas, 2011

 

A Strategy for Information Security:TOGAF, Security and Management SAM’11, July, Las Vegas, 2011

 

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF), Security and Management SAM’11, July, Las Vegas, 2011

 

Security Challenges in Cloud Computing, WORLDCOMP2010, The 2010 International Conference on Security and Management SAM'10, July, Las Vegas. 2011

 

Security Evaluation of CDMA2000, WORLDCOMP2010, the 2010 International Conference on Wireless Networks ICWN'10, July, Las Vegas, 2010

 

Security Issues for Mobile Government, WORLDCOMP2010, the 2010 International Conference on Security and Management SAM'10, July, Las Vegas, 2010

 

The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations, The 2009 International Conference on Wireless Networks ICWN'09, July, Las Vegas, 2009

 

Today and Tomorrow: IEEE 802.11 WLAN Security, the 2009 International Conference on Security and Management SAM'09, July, Las Vegas, 2009

 

Security in Wireless Sensor Networks - A Study, the 2009 International Conference on Wireless Networks ICWN'09, July, Las Vegas, 2009

 

Implementation of Domingo Ferrer’s a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN), The 2008 Applied Cryptology and Network Security (ACNS08), July, Las Vegas, 2008

 

Implementation of Montgomery Multiplication Algorithms in Machine Languages, the 2008 Applied Cryptology and Network Security (ACNS08), July, Las Vegas, 2008

 

Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs), The 2007 International Conference on Wireless Networks, ICWN'07, June, Las Vegas, 2007

 

Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Network, the 2006 International Conference on Security & Management, SAM'06, June, Las Vegas, 2006

 

Mobile Agent Security, the 2006 International Conference on Security & Management, SAM'06, June, Las Vegas, 2006

 

GSM Security II, the 2006 International Conference on Wireless Networks, ICWN'06, June Las Vegas, 2006

 

Security Planning Using Zachman Framework for Enterprises, EURO mGOV 2005 (The First European Mobile Government Conference), July, University of Sussex, Brighton, UK, 2005

 

Enterprise Security Planning (ESP), EURO mGOV 2005 (The First European Mobile Government Conference), July, University of Sussex, Brighton, UK, 2005

 

GSM Security, the 2005 International Conference on Wireless Networks, ICWN’05, June, Las Vegas, 2005

 

Novel Obfuscation Algorithms for Software Security, the 2005 International Conference on Software Engineering Research and Practice, SERP’05, June, Las Vegas, 2005

 

Security Access Control Scheme (SACS) for Computer Networks’, BAS96, the First Symposium on Computer Networks, Istanbul, Turkey, May, 1996

 

A Solution to the Re-Blocking Problem in the Implementation of Improved Internet Security Access Control Scheme (IISACS), BAS96, the First Symposium on Computer Networks, Istanbul, Turkey, May, 1996

 

Distribution and Management of Secret Sequence Numbers for Large Computer Networks in an Internet Security Access Control Scheme, the 9th Int. Symp. on Computer and Information Sciences, November, Turkey, Antalya, 1994

 

Improved Session Initiation Authentication Protocols in Internet Access Control Scheme, the 2nd Int. Conf. on Computer Communications and Networks, San Diego, California, USA, June, 1993.

 

Performance of Improved Session Initiation Authentication (SIA) Protocols, 5th Bangor Symp. on Communications, Bangor, England, June, 1993

 

A TCP/IP Implementation of an Internet Security Access Control Scheme, 4th Bangor Symp. on Communications, Bangor, England, May, 1992

 

 

CHAIRED CONFERENCE SESSIONS

 

The 2017 Int'l Conference on Security and Management (SAM'17), SESSION 7-SAM:    SECURITY APPLICATIONS

 

The 2017 Int'l Conference on Security and Management (SAM'17), SESSION 5- SAM:    COMPUTER SECURITY I

 

The 2016, International Conference on Security and Management SAM'16, SESSION 7-SAM: SECURITY EDUCATION + INFORMATION ASSURANCE + HARDWARE SECURITY

 

The 2016, International Conference on Security and Management SAM'16, SESSION 4-SAM: PANEL: FUTURE OF CYBERSECURITY EDUCATION

 

The 2016 International Conference on Wireless Networks (ICWN'16), SESSION 2-ICWN: AD-HOC NETWORKS AND APPLICATIONS + ENCRYPTION METHODS

 

The 2015 International Conference on Security and Management SAM'15, SESSION 6-SAM: CRYPTOGRAPHIC TECHNOLOGIES + HARDWARE SECURITY

 

The 2015 International Conference on Security and Management SAM'15, SESSION 5-SAM SECURITY APPLICATIONS

 

The 2015 International Conference on Security and Management SAM'15, SESSION 4-SAM: PANEL: SECURITY PANEL DISCUSSION

 

The 2013 International Conference on Security and Management SAM'13, SESSION 13-SAM: NETWORK SECURITY

 

The 2013 International Conference on Security and Management SAM'13, SESSION 4-SAM: CRYPTOGRAPHIC TECHNOLOGIES I

 

The 2012 International Conference on Security & Management SAM’12, SESSION 8-SAM: CRYPTOGRAPHIC TECHNOLOGIES + INFORMATION ASSURANCE & SECURITY

 

The 2008 International Conference on Security and Management SAM'08, SESSION 13-SAM: CRYPTOGRAPHY

 

The 2008 Applied Cryptology and Network Security (ACNS08), SESSION 7-SAM: SPECIAL TRACK ON APPLIED CRYPTOLOGY AND NETWORK SECURITY

 

The 2007 International Conference on Security and Management SAM'07, SESSION 4-SAM: SECURITY & PRIVACY

 

The 2007 International Conference on Security and Management SAM'07, SESSION 3-SAM: SECURITY ISSUES

 

The 2007 International Conference on Wireless Networks (ICWN'07), SESSION 4-ICWN: WIRELESS

 

The 2006 International Conference on Security & Management, SAM'06, SESSION 8-SAM: ENCRYPTION AND KEY MANAGEMENT

 

The 2006 International Conference on Wireless Networks (ICWN'06), SESSION 13-ICWN: WIRELESS

 

IASTED International Conference on Software Engineering and Applications (SEA 2004), Nov., MIT Cambridge.  TRACK: SECURITY and PROTECTION

 

 

UNIVERSITY SERVICES (INTERNAL - EXTERNAL)

 

2016-2017 CoS Research Task Force (CS representative)

2016-2017 CS RTP Committee (chair)

2016-2017 CS Grad Committee

2016-2017 New Faculty Mentor

2016  College of Science Representative at Bay Area Council Cyber Security

2016  College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

 

 

2015-2016 CSU East Bay Diversity Program (Hiring), CS representative in UC Berkley

2015-2016 CSU East Bay Hearing Panel of  Grade Appeal and Academic Grievance (formerly Fairness) Committee

2015-2016 CS Grad Committee

2015-2016 CS Hiring Committee

2015-2016 CS RTP Committee (chair)

2015  College of Science Representative at Bay Area Council Cyber Security

2015  College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

2015 CS Department representative at CDSIA2015, 8th Symposium in Curriculum Development in Security and Information Assurance (CDSIA)

 

2014-2015 CSU East Bay Blackboard Committee

2014-2015 CS RTP Committee

2014-2015 CS Hiring Committee

2014-2015 CS Grad Networks Program Committee

2014  College of Science Representative at Bay Area Council Cyber Security

2014  College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

2014 Department representative at CDSIA2014, 7th Symposium in Curriculum Development in Security and Information Assurance (CDSIA)

 

2013-2014 CS Hiring Committee

2013-2014 CS RTP Committee

2013-2014 CS Grad Networks Program Committee

2013-2014 CS Infrastructure Committee

2013  College of Science Representative at Bay Area Council Cyber Security

2013  College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

2013 CS Department representative at CDSIA2013, 6th Symposium in Curriculum Development in Security and Information Assurance (CDSIA

2012-2013 Corporate and Foundation Relations and Major Gifts, University Advancement ( CSU EB Cyber Security Program)

 

2012-2013 CS Grad Networks Program Committee

2012-2013 CS Infrastructure Committee

2012-2013 Colloquium Committee

2012  College of Science Representative at Bay Area Council Cyber Security

2012  College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

2012 CS Department representative at CDSIA2012, 5th Symposium in Curriculum Development in Security and Information Assurance (CDSIA)

 

2011 CSU East Bay Magazine, interview (spring issue)

2011-2012 CSU East Bay The Search Committee for the Coordinator of the Online Campus Development

2011-2012 Corporate and Foundation Relations and Major Gifts, University Advancement ( CSU EB Cyber Security Program)

2011-2012 CS Grad Networks Program Committee

2011-2012 CS Infrastructure Committee

2011  College of Science Representative at Bay Area Council Cyber Security

2011 College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

2011 CS Department representative at CDSIA2011, 4th Symposium in Curriculum Development in Security and Information Assurance (CDSIA)

 

2010-2001 Student Grade Complaint Committee Hearing Panel

2010-2011 CSU East Bay Sexual Harassment Committee

2010-2011 College of Science, CS representative in five year review committee

2010-2011 CS Graduate Networks Program Committee

2010-2011 CS Infrastructure Committee

2010-2011 CS Graduate Committee

2010  College of Science Representative at Bay Area Council Cyber Security

2010 College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

2010 CS Department representative at CDSIA2010, 3rd Symposium in Curriculum Development in Security and Information Assurance (CDSIA)

 

2009-2010 CSU East Bay Sexual Harassment Committee

2009-2010 CSU East Bay Non-Grade Related Student Complaint Committee

2009-2010 CS Graduate Networks Program Committee

2009-2010 CS Infrastructure Committee

2009-2010 CS Graduate Committee

2009 College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

2009 CS Department representative at CDSIA2009, 2th Symposium in Curriculum Development in Security and Information Assurance (CDSIA)

 

2008-2009 CS Graduate Networks Program Committee

2008-2009 CS Research Lab Committee

 

2007-2008 CSU East Bay Senate

2007-2008 CS Graduate Networks Program Committee

2007-2008 CS Scholarship Committee

2007-2008 CS Research Lab Committee

 

2006-2007 CSU East Bay Senate (Elected)

2006-2007 CSU East Bay Committee on Research

2006-2007 CSU Easy Bay Non-Grade Related Student Complaint Committee

2006-2007 College of Science Election Committee

2006-2007 CS Scholarship Committee

2006-2007 CS Research Committee

2006-2007 CS Telecommunication Program Committee

2006-2007 CS Graduate Committee

 

2005-2006 CSU East Bay Committee on Research (served as secretary during spring quarter 2005)

2005-2006 CSU Easy Bay Non-Grade Related Student Complaint Committee

2005-2006 CS Research Lab Committee

2005-2006 CS Telecommunication Program Committee

2005-2006 CS Graduate Committee

 

2004-2005 CSU East Bay Committee on Research (Elected)

2004-2005 CSU Easy Bay Non-Grade Related Student Complaint Committee (Elected)

2004-2005 CS Research Lab Committee

2004-2005 CS Telecommunications Program Committee

2004-2005 CS Undergraduate Curriculum Committee

 

2003-2004 CS Undergraduate Curriculum Committee

2003-2004 CS Telecommunications Program Committee

2003-2004 CS Research Lab Committee

2003-2004 CS Colloquium Committee

2003 Participated in Interdepartmental Faculty Mentoring Program

 

2002 Participated in Developing Proposals for RFP`s

2002 Visited current lecturers to improve their instructions December

 

 

AWARDS & HONORS RECEIVED

 

Achievement Award for Research Contributions to the Field of Network Security from 2017 World Congress in Computer Science, Computer Engineering, and Applied Computing CSCE 2017, USA

 

Achievement Award for Research Contributions to the Field of Network Security from 2016 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP’16, USA

 

Achievement Award for Research Contributions to the Field of Network Security from 2015 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP’15, USA

 

Achievement Award for Research Contributions to the Field of Network Security from 2014 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP’14, USA

 

Achievement Award for Research Contributions to the Field of Network Security from 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP’13, USA

 

A thank you letter from Berkeley Turkish School (BTS), 2016

 

A thank you letter from CSU East Bay Office of Diversity, 2015

 

A thank you letter from University Honors Program for my commitment of time, energy, and academic expertise to work with honor students 2013

 

Certificate of Appreciation from CSUEB Accessibility Services, 2012

 

Certificate of Appreciation (10 Years) from IEEE Communication Society 2010

 

Outstanding Achievement Award  from Turkish General Staff (TGS), 2001

 

Outstanding Achievement Award  from Havelsan Co., 2001

 

 

 

GRANTS RECEIVED

 

Lawrence Livermore National Laboratory (LLNL), 2017 Summer Fellowship, Global Security Principal Directorate / Z program

 

Lawrence Livermore National Laboratory (LLNL), 2016 Summer Fellowship, Computation Directorate / Institute for Scientific Computing Research Division / Cyber Defenders Program

 

Lawrence Livermore National Laboratory (LLNL), 2015 Summer Fellowship, Computation Directorate / Institute for Scientific Computing Research Division / Cyber Defenders Program

 

Lawrence Livermore National Laboratory (LLNL), 2014 Summer Fellowship, Computation Directorate / Institute for Scientific Computing Research Division / Cyber Defenders Program

 

Lawrence Livermore National Laboratory (LLNL), 2013 Summer Fellowship, Computation Directorate / Institute for Scientific Computing Research Division / Cyber Defenders Program

 

Online & Hybrid Course Quality Transformation Grant, 2016, $4500

 

Juniper your university (JYU) Campus Laboratory Equipment Grant Program. $10.000

 

CSUEB Faculty Research Grant,” Application Security: Software Protection”, $5000

 

CSUEB New Faculty support Grant,” Secure Mobile Agents against Cyber-Security” $5000

 

Oregon State University (OSU), Visiting Professor, 2001

 

National Military Message Handling System (MMHS). Received ($15Million) from TGS (Turkish General Staff)(Havelsan)

 

Turkish Telecom TURNET Management.  Received  $10.000

 

First National Firewall System for Computer Networks. Received ($4 Million) from TUBITAK (Havelsan).

 

TYİH, Turkiye Yüksek İhtisas Hospital, Computer Center Management. Received $20.000 from TYIH

 

ENSA Group of Companies, Electronic and Textile labs for Universities. Received $5000

 

ENSA Group of Companies, Technical Document Translation for Electronics Labs. Received $5000

 

A VLSI implementation of DES, IDEA and RSA security algorithms. Received $25.000 from state planning department (DPT)

 

Smart Card Developments. Received $25.000 from Hacettepe University.

 

Cryptanalysis of Turkish alphabet. Received $4000  from  Hacettepe University

 

 

AFFILIATIONS

 

Associate Member of I.E.E.E

 

Associate Member of I.E.E.E Computer Society

 

Associate Member of I.E.E.E Communication Society

 

Member of ACM

 

Member of  IACR (International Association for Cryptologic Research)

 

 

 

OTHER DETAILS

 

Nominated  George and Miriam Philips 2016-2017 Outstanding Professor Award, 2017

 

 

Invented a security protocol “L4NE”, based on composite functions for Location Based Services (LBS), 2017

 

Invented an ECC based stream cipher  ERTAUL” Crypto Algorithm, 2005

 

 

Organized 2nd Annual HackCSUEB HACKATHON at CSU East Bay, 2017 (Pictures) (12 Hours), YouTube

 

Organized 1st  Annual HackCSUEB HACKATHON at CSU East Bay, 2015 (Pictures) (24 hours)

 

Regional Alliances and Multistakeholder Partnerships to Stimulate (RAMPS) Cybersecurity Education and Workforce Development. National Institute of Standards and Technology (NIST) and United States Department of Commerce (DoC) Grand. Partnering with Merritt Community College and Lawrence Livermore National Lab (LLNL) 2016

 

 

CS Editorial Board Member of AJUR (American Journal of Undergraduate Research), 2017

 

 

Participated in National Cyber League (NCL) competition as team CSUEB0FEB9’s coach, 2016

 

Participated in National Cyber League (NCL) competition as team 0FEB6’s coach, 2015

 

Participated in National Cyber League (NCL) competition as a coach, 2014

 

 

 

Participated in Monarch of the Hill - Capture the Flag (CTF) Hacking Competition, Los Alamos National Laboratories (LANL), 2016

 

Participated in Capture the Flag (CTF) Hacking Competition, Los Alamos National Laboratories (LANL), 2015

 

Participated in Tracer FIRE - Capture the Flag (CTF) Competition, Sandia National Laboratories (SNL), 2014

 

Participated in Raspberry Pi Challenge: Cyber Craft - Capture the Flag (CCCTF) Competition, Lawrence Livermore National Laboratories (LLNL), 2016

 

Participated in Raspberry Pi Challenge: Capture the Flag (CTF) Competition, Lawrence Livermore National Laboratories (LLNL), 2015

 

Participated in Raspberry Pi Challenge: Capture the Flag (CTF) Competition, Lawrence Livermore Laboratories (LLNL), 2014

 

Participated in Raspberry Pi Challenge: Capture the Flag (CTF) Competition, Lawrence Livermore Laboratories (LLNL), 2013

 

 

Technical Program Committee Member, Mobile Government, The World Summit, 2016

 

Technical Program Committee Member, The First Euro Conference on Mobile Government (The EURO, mGOV 2005)

 

Technical Program Committee Member, CYBER 2017, The First International Conference on Advances in Cyber-Technologies and Cyber-Systems, 2017

 

Technical Program Committee Member, CYBER 2016, The First International Conference on Advances in Cyber-Technologies and Cyber-Systems, 2016

 

 

Levent Ertaul on the news: Interviewed with EastBay Today , Why Fighting Cybercrime Is So Hard, May 2017

 

Levent Ertaul on the NEWS,  2015

 

Levent Ertaul on the news: Interviewed with Eastbay Magazine, “Regional Businesses tap University for Cybersecurity training”, Spring 2011.

 

 

Program Committee Member, The IEEE Region 10 Symposium (TENSYMP 2015)

 

 

Program Committee Member, IoTPTS, Workshop on IoT Privacy, Trust, and Security (part of 12th ACM Symposium on Information, Computer and Communications Security), 2017

 

Program Committee Member, IoTPTS, Workshop on IoT Privacy, Trust, and Security (part of 11th ACM Symposium on Information, Computer and Communications Security), 2016

 

Program Committee Member, IoTPTS, Workshop on IoT Privacy, Trust, and Security (part of 10th ACM Symposium on Information, Computer and Communications Security), 2015

 

 

Program Committee Member, SAM’17, The 2017 International Conference on Security and Management (Part of WORLDCOMP'17 - The 2017 World Congress in Computer Science, Computer Engineering, and Applied Computing)

 

Program Committee Member, SAM’16, The 2016 International Conference on Security and Management (Part of WORLDCOMP'16 - The 2016 World Congress in Computer Science, Computer Engineering, and Applied Computing)

 

Program Committee Member, SAM’15, The 2015 International Conference on Security and Management (Part of WORLDCOMP'15 - The 2015 World Congress in Computer Science, Computer Engineering, and Applied Computing)

 

Program Committee Member, SAM’14, The 2014 International Conference on Security and Management (Part of WORLDCOMP'14 - The 2014 World Congress in Computer Science, Computer Engineering, and Applied Computing)

 

Program Committee Member, SAM’13, The 2013 International Conference on Security and Management (Part of WORLDCOMP'13 - The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing)

 

Program Committee Member, SAM’12, The 2012 International Conference on Security and Management (Part of WORLDCOMP'12 - The 2012 World Congress in Computer Science, Computer Engineering, and Applied Computing)

 

Program Committee Member, SAM’09, The 2009 International Conference on Security and Management (Part of WORLDCOMP'09 - The 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing)

 

 

Established Information Security Working Group (ISWG), 2004

 

 

Holder of North Atlantic Treaty Organization (NATO) ‘SECRET LEVEL’ Clearance

 

 

Organized, on behalf of Havelsan Co, the North Atlantic Treaty Organization (NATO) Military Message Handling Systems Work Group (MMHSWG) meeting,  Istanbul, 2000

 

 

Joined NATO JWIDJoint Warrior Interoperability Demonstration, North Atlantic Treaty Organization (NATO), SHAPE, Mons, Belgium, 2000

 

Joined Unified Efforts Demonstration, Ankara, Turkey, 2000.

 

 

Invited to SHOW Radio for security discussion as an security expert, Turkey, 1998

 

Member of Modern Sailing Academy & Club, Sausalito, CA