Waleed A. Alrodhan Alshalan | |
---|---|
وليد الروضان الشعلان | |
Born | 1981 (age 42–43) Al-Jawf, Saudi Arabia |
Occupation(s) | Author and Researcher |
Academic background | |
Education | King Saud University (B.Sc. in Computer Sciences, 2002) Royal Holloway, University of London (M.Sc. (distinction), 2005; PhD, 2011) |
Thesis | Privacy and Practicality of Identity Management Systems (2010) |
Doctoral advisor | Chris J Mitchell |
Waleed A. Alrodhan (born 1981, in Al-Jawf Province)[ citation needed ] is a Saudi author and researcher. [1]
Alrodhan attended King Saud University, where he pursued a Bachelor of Science in Computer Science. After graduation, he attended Royal Holloway, University of London, [2] from which he earned a Master of Science with distinction (2005) and a Doctor of Philosophy in Information Security (2011). [3]
He was appointed as the Dean of the College of Computer Sciences and Information at Al-Imam Muhammad Ibn Saud Islamic University by Saudi Arabia's Minister of Education, H.E. Dr. Ahmad Al-Essia. [4] Since September 2016, Waleed Alrodhan has been serving as dean of Imam Muhammad bin Saud Islamic University's College of Computer and Information Sciences. [3] [5]
{{cite journal}}
: CS1 maint: DOI inactive as of November 2024 (link)Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g., electronic or physical, tangible, or intangible. Information security's primary focus is the balanced protection of data confidentiality, integrity, and availability while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process.
Fuzzball routers were the first modern routers on the Internet. They were DEC PDP-11 computers loaded with the Fuzzball software written by David L. Mills. The name "Fuzzball" was the colloquialism for Mills's routing software. The software evolved from the Distributed Computer Network (DCN) that started at the University of Maryland in 1973. It acquired the nickname sometime after it was rewritten in 1977.
Abdulaziz bin Muhammad Al Saud was the second ruler of the Emirate of Diriyah. He was the eldest son of Muhammad bin Saud and the son-in-law of Muhammad bin Abdul Wahhab. Abdulaziz ruled the Emirate from 1765 until 1803. He was nicknamed by his people as the savior of his time due to his fearless activities.
Diriyah, formerly romanized as Dereyeh and Dariyya, is a town and governorate in Saudi Arabia. Located on the northwestern outskirts of the Saudi capital, Riyadh. Diriyah was the original home of the Saudi royal family, and served as the capital of the Emirate of Diriyah under the first Saudi dynasty from 1727 to 1818. Today, the town is the seat of the Diriyah Governorate, which also includes the villages of Uyayna, Jubayla, and Al-Ammariyyah, among others—and is part of Ar Riyad Province.
The Gödel Prize is an annual prize for outstanding papers in the area of theoretical computer science, given jointly by the European Association for Theoretical Computer Science (EATCS) and the Association for Computing Machinery Special Interest Group on Algorithms and Computational Theory. The award is named in honor of Kurt Gödel. Gödel's connection to theoretical computer science is that he was the first to mention the "P versus NP" question, in a 1956 letter to John von Neumann in which Gödel asked whether a certain NP-complete problem could be solved in quadratic or linear time.
Faisal bin Turki Al Saud was the second ruler of the Second Saudi State and seventh head of the House of Saud.
The Emirate of Nejd or Imamate of Nejd, also known as the second Saudi state was existing between 1824 and 1891 in Nejd, the regions of Riyadh and Ha'il of what is now Saudi Arabia. Saudi rule was restored to central and eastern Arabia after the Emirate of Diriyah, the first Saudi state, having previously been brought down by the Ottoman Empire's Egypt Eyalet in the Ottoman–Wahhabi War (1811–1818).
Saud bin Faisal Al Saud, also known as Imam Saud, (1833—1875) was the ruler of the Second Saudi State in 1871 and 1873–75. He joined alliances with foreign tribes and revolted against his half-brother Abdullah. His rule was short-lived and Abdullah overthrew him. Saud gained power again in 1873 but died two years later. His reign was notable for the infighting in the House of Saud which he initiated.
Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. Packages are released for Linux and Windows.
A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder. The name was suggested in or before 2002 by Brian Zill at Microsoft Research. The term pseudospoofing had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".
An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A subject's sensitive information can be considered as leaked if an adversary can infer its real value with a high confidence. This is an example of breached information security. An Inference attack occurs when a user is able to infer from trivial information more robust information about a database without directly accessing it. The object of Inference attacks is to piece together information at one security level to determine a fact that should be protected at a higher security level.
A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a fingerprinting algorithm. A browser fingerprint is information collected specifically by interaction with the web browser of the device.
GroupLens Research is a human–computer interaction research lab in the Department of Computer Science and Engineering at the University of Minnesota, Twin Cities specializing in recommender systems and online communities. GroupLens also works with mobile and ubiquitous technologies, digital libraries, and local geographic information systems.
Ran Raz is a computer scientist who works in the area of computational complexity theory. He was a professor in the faculty of mathematics and computer science at the Weizmann Institute before becoming a professor of computer science at Princeton University.
ProVerif is a software tool for automated reasoning about the security properties of cryptographic protocols. The tool has been developed by Bruno Blanchet and others.
Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.
Muhammad bin Saud Al Muqrin, also known as Ibn Saud, was the emir of Diriyah and is considered the founder of the First Saudi State and the Saud dynasty, named after his father, Saud bin Muhammad Al Muqrin. His reign lasted between 1727 and 1765.
Elena Ferrari is a Professor of Computer Science and Director of the STRICT Social Lab at the Università degli Studi dell’Insubria, Varese, Italy. Ferrari was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2013 for contributions to security and privacy for data and applications. She has been named one of the “50 Most Influential Italian Women in Tech” in 2018. She was elected as an ACM Fellow in 2019 "for contributions to security and privacy of data and social network systems".
Valerie Barr is an American computer scientist, and is the Margaret Hamilton Distinguished Professor of Computer Science at Bard College. She formerly held the Jean Sammet endowed chair in the department of Computer Science at Mount Holyoke College in South Hadley, Massachusetts. She is known for her work with women in computing.
Keystroke inference attacks are a class of privacy-invasive technique that allows attackers to infer what a user is typing on a keyboard.
{{cite web}}
: CS1 maint: DOI inactive as of November 2024 (link){{cite journal}}
: CS1 maint: DOI inactive as of November 2024 (link)This article needs additional or more specific categories .(August 2024) |