Waleed A. Alrodhan

Last updated

Waleed A. Alrodhan Alshalan
وليد الروضان الشعلان
Dr.waleed alshalaan personal photo.jpg
Born1981 (age 4243)
Al-Jawf, Saudi Arabia
Occupation(s)Author and Researcher
Academic background
Education King Saud University (B.Sc. in Computer Sciences, 2002)
Royal Holloway, University of London (M.Sc. (distinction), 2005; PhD, 2011)
Thesis Privacy and Practicality of Identity Management Systems  (2010)
Doctoral advisorChris J Mitchell

Waleed A. Alrodhan (born 1981, in Al-Jawf Province)[ citation needed ] is a Saudi author and researcher. [1]

Contents

Biography

Alrodhan attended King Saud University, where he pursued a Bachelor of Science in Computer Science. After graduation, he attended Royal Holloway, University of London, [2] from which he earned a Master of Science with distinction (2005) and a Doctor of Philosophy in Information Security (2011). [3]

He was appointed as the Dean of the College of Computer Sciences and Information at Al-Imam Muhammad Ibn Saud Islamic University by Saudi Arabia's Minister of Education, H.E. Dr. Ahmad Al-Essia. [4] Since September 2016, Waleed Alrodhan has been serving as dean of Imam Muhammad bin Saud Islamic University's College of Computer and Information Sciences. [3] [5]

Publications

Books

Non-fiction

  • Alrodhan, Waleed (2011). Privacy and Practicality of Identity Management Systems: Academic Overview. VDM Verlag. ISBN   978-3-639-38025-5.

Novels

  • Alshalan, Waleed (2014). Bob Isn't My Uncle. Madarek, UAE. ISBN   9789948496977.
  • Alshalan, Waleed (2018). Laith the First: The Unknown King of England. Tashkeell, KSA. ISBN   9786038317525.
  • Alshalan, Waleed (2021). Leonardo Davin Ci: The Story of the Most Mysterious Book in the History. Tashkeell, KSA. ISBN   9786038317259.
  • Alshalan, Waleed Alshalan (2023). 42: the Answer to the Ultimate Question of Life, The Universe, and Everything. Tashkeell, KSA. ISBN   9786038386187.

Papers in journals

Papers in refereed conferences

Related Research Articles

Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g., electronic or physical, tangible, or intangible. Information security's primary focus is the balanced protection of data confidentiality, integrity, and availability while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process.

Fuzzball routers were the first modern routers on the Internet. They were DEC PDP-11 computers loaded with the Fuzzball software written by David L. Mills. The name "Fuzzball" was the colloquialism for Mills's routing software. The software evolved from the Distributed Computer Network (DCN) that started at the University of Maryland in 1973. It acquired the nickname sometime after it was rewritten in 1977.

Abdulaziz bin Muhammad Al Saud was the second ruler of the Emirate of Diriyah. He was the eldest son of Muhammad bin Saud and the son-in-law of Muhammad bin Abdul Wahhab. Abdulaziz ruled the Emirate from 1765 until 1803. He was nicknamed by his people as the savior of his time due to his fearless activities.

<span class="mw-page-title-main">Diriyah</span> Town in Saudi Arabia, capital of the first Saudi state and Emirate of Diriyah

Diriyah, formerly romanized as Dereyeh and Dariyya, is a town and governorate in Saudi Arabia. Located on the northwestern outskirts of the Saudi capital, Riyadh. Diriyah was the original home of the Saudi royal family, and served as the capital of the Emirate of Diriyah under the first Saudi dynasty from 1727 to 1818. Today, the town is the seat of the Diriyah Governorate, which also includes the villages of Uyayna, Jubayla, and Al-Ammariyyah, among others—and is part of Ar Riyad Province.

<span class="mw-page-title-main">Gödel Prize</span> Computer science award

The Gödel Prize is an annual prize for outstanding papers in the area of theoretical computer science, given jointly by the European Association for Theoretical Computer Science (EATCS) and the Association for Computing Machinery Special Interest Group on Algorithms and Computational Theory. The award is named in honor of Kurt Gödel. Gödel's connection to theoretical computer science is that he was the first to mention the "P versus NP" question, in a 1956 letter to John von Neumann in which Gödel asked whether a certain NP-complete problem could be solved in quadratic or linear time.

Faisal bin Turki Al Saud was the second ruler of the Second Saudi State and seventh head of the House of Saud.

<span class="mw-page-title-main">Emirate of Nejd</span> 1824–1891 state in Arabia Peninsula

The Emirate of Nejd or Imamate of Nejd, also known as the second Saudi state was existing between 1824 and 1891 in Nejd, the regions of Riyadh and Ha'il of what is now Saudi Arabia. Saudi rule was restored to central and eastern Arabia after the Emirate of Diriyah, the first Saudi state, having previously been brought down by the Ottoman Empire's Egypt Eyalet in the Ottoman–Wahhabi War (1811–1818).

Saud bin Faisal Al Saud, also known as Imam Saud, (1833—1875) was the ruler of the Second Saudi State in 1871 and 1873–75. He joined alliances with foreign tribes and revolted against his half-brother Abdullah. His rule was short-lived and Abdullah overthrew him. Saud gained power again in 1873 but died two years later. His reign was notable for the infighting in the House of Saud which he initiated.

<span class="mw-page-title-main">Aircrack-ng</span> Software suite

Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. Packages are released for Linux and Windows.

A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder. The name was suggested in or before 2002 by Brian Zill at Microsoft Research. The term pseudospoofing had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".

An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A subject's sensitive information can be considered as leaked if an adversary can infer its real value with a high confidence. This is an example of breached information security. An Inference attack occurs when a user is able to infer from trivial information more robust information about a database without directly accessing it. The object of Inference attacks is to piece together information at one security level to determine a fact that should be protected at a higher security level.

A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a fingerprinting algorithm. A browser fingerprint is information collected specifically by interaction with the web browser of the device.

<span class="mw-page-title-main">GroupLens Research</span> Computer science research lab

GroupLens Research is a human–computer interaction research lab in the Department of Computer Science and Engineering at the University of Minnesota, Twin Cities specializing in recommender systems and online communities. GroupLens also works with mobile and ubiquitous technologies, digital libraries, and local geographic information systems.

<span class="mw-page-title-main">Ran Raz</span>

Ran Raz is a computer scientist who works in the area of computational complexity theory. He was a professor in the faculty of mathematics and computer science at the Weizmann Institute before becoming a professor of computer science at Princeton University.

ProVerif is a software tool for automated reasoning about the security properties of cryptographic protocols. The tool has been developed by Bruno Blanchet and others.

Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.

Muhammad bin Saud Al Muqrin, also known as Ibn Saud, was the emir of Diriyah and is considered the founder of the First Saudi State and the Saud dynasty, named after his father, Saud bin Muhammad Al Muqrin. His reign lasted between 1727 and 1765.

Elena Ferrari is a Professor of Computer Science and Director of the STRICT Social Lab at the Università degli Studi dell’Insubria, Varese, Italy. Ferrari was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2013 for contributions to security and privacy for data and applications. She has been named one of the “50 Most Influential Italian Women in Tech” in 2018. She was elected as an ACM Fellow in 2019 "for contributions to security and privacy of data and social network systems".

Valerie Barr is an American computer scientist, and is the Margaret Hamilton Distinguished Professor of Computer Science at Bard College. She formerly held the Jean Sammet endowed chair in the department of Computer Science at Mount Holyoke College in South Hadley, Massachusetts. She is known for her work with women in computing.

Keystroke inference attacks are a class of privacy-invasive technique that allows attackers to infer what a user is typing on a keyboard.

References

  1. "dblp: Waleed A. Alrodhan". dblp.org. Retrieved 15 July 2024.
  2. "Waleed A Alrodhan". ACM Digital Library. Association for Computing Machinery. doi:10.1145/contrib-81351591390 (inactive 2 November 2024). Retrieved 31 October 2024.{{cite web}}: CS1 maint: DOI inactive as of November 2024 (link)
  3. 1 2 "Who's Who: Waleed Al-Rodhan, dean at Imam Muhammad bin Saud Islamic University". Arab News. 24 July 2021. Retrieved 15 July 2024.
  4. "Computer Sciences College Dean Appointed by Minister".
  5. "Waleed A. Alrodhan's research while affiliated with Imam Muhammad bin Saud Islamic University and other places".
  6. Alrodhan, Waleed A.; Mitchell, Chris J. (2009). "Improving the Security of CardSpace". EURASIP Journal on Information Security. 2009: 1–8. doi: 10.1155/2009/167216 (inactive 1 November 2024). ISSN   1687-4161.{{cite journal}}: CS1 maint: DOI inactive as of November 2024 (link)