Rafid sayhood Abdulaziz (Assistant Lecturer)
MSc in Information Security
Deanship -
Education for Pure Sciences
rafid.alhashimy@uoanbar.edu.iq
<p><strong>Workplace: University of Anbar- College of Education for Pure Science<br /> Academic title: Assistant Lecturer<br /> General specialty: Computer science<br /> Subspecialty: Information Security<br /> first employment date: 6/25/2009<br /> E-mail: rafid.alhashimy@uoanbar.edu.iq<br /> Marital status: Married<br /> <span style="color:#3498db"><u>Practical experiences</u></span><br /> (Blue Team) Cyber Security <br /> Security Operations Center (SOC) <br /> Security Information and Event Management (SIEM) <br /> Digital Forensics <br /> Linux Systems <br /> Cloud Computing <br /> Virtual Machines <br /> Network Management </strong><br /> </p>
<table cellspacing="0" class="Table" style="border-collapse:collapse; border:none"> <tbody> <tr> <td style="border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:1px solid black; width:41px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="color:#4472c4">N</span></span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:1px solid black; width:281px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="color:#4472c4">Research Title</span></span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:1px solid black; width:144px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="color:#4472c4">magazine</span></span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:1px solid black; width:157px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="color:#4472c4">date of publication</span></span></strong></span></span></p> </td> </tr> <tr> <td style="border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; width:41px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="color:#4472c4">1</span></span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:281px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt">Developing a Secret Sharing Scheme Depending on Magic Cube and Linear Lagrange Interpolation Mathematical Basis</span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:144px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt">REVISTA - AUS Journal, Scopus</span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:157px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt">2019</span></strong></span></span></p> </td> </tr> <tr> <td style="border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; width:41px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="color:#4472c4">2</span></span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:281px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt">Conditional Secure Reconstruction of Embedded Secret Approach in Folded Magic Cube with Six Dimensions</span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:144px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt">REVISTA - AUS Journal, Scopus</span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:157px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt">2019</span></strong></span></span></p> </td> </tr> <tr> <td style="border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; width:41px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="color:#4472c4">3</span></span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:281px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt">A New Secret sharing Scheme Based on Hermite Interpolation and Folded Magic Cube Rules</span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:144px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt">Springer</span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:157px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt">2022</span></strong></span></span></p> </td> </tr> <tr> <td style="border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; width:41px"> <p style="text-align:center"> </p> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="color:#4472c4">4</span></span></strong></span></span></p> <p style="text-align:center"> </p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:281px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt">An Efficient Secret Sharing Scheme Based on Newton’s Divided Difference Interpolation & Magic Cube Properties</span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:144px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="LTR" style="font-size:12.0pt"><span style="color:#222222">AIP Conference Proceedings</span></span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:157px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="RTL" style="font-size:14.0pt">2022</span></strong></span></span></p> </td> </tr> <tr> <td style="border-bottom:1px solid black; border-left:1px solid black; border-right:1px solid black; border-top:none; width:41px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt"><span style="color:#4472c4">5</span></span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:281px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt">Using Gradient Descent to an Optimisation Algorithm that Uses the Optimal Value of Parameters (Coefficients) for a Differentiable Function</span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:144px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span dir="LTR" style="font-size:12.0pt"><span style="color:#222222">International Journal of Communication Networks and Information Security</span></span></strong></span></span></p> </td> <td style="border-bottom:1px solid black; border-left:none; border-right:1px solid black; border-top:none; width:157px"> <p style="text-align:center"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:12.0pt">2023</span></strong></span></span></p> </td> </tr> </tbody> </table>
# | المادة | اسم المحاضرة | المرحلة | التحميل | مشاهدة |
---|