حسين خالد عبد الرزاق محمد الملا (مدرس مساعد)
دكتوراه في علوم حاسبات
تدريسي
مركز الحاسبة الإلكترونية -
المراكز العلمية
hussein.k.almulla@uoanbar.edu.iq
<p style="text-align:left"> </p> <p style="text-align:left"> </p> <p> </p> <p> موقع لعمل : مركز الحاسبة الالكترونية</p> <p> التخصص العام : علوم الحاسوب</p> <p> التخصص الدقيق :- هندسة البرامجيات</p> <p> الدرجة العلمية : مدرس مساعد</p> <p> </p>
<p style="margin-left:24px; text-align:left"> </p> <p style="margin-left:24px; text-align:left"><span style="font-size:14px"><span style="font-family:Arial,Helvetica,sans-serif"><strong>Hussein Almulla</strong>, Gregory Gay. Learning How to Search: Generating Exception-Triggering Tests Through Adaptive Fitness Function Selection. Empirical Software Engineering Journal. To appear, 2021</span></span></p> <p style="text-align:left"> </p> <p style="margin-left:24px; text-align:left"><span style="font-size:14px"><span style="font-family:Arial,Helvetica,sans-serif"><strong>Hussein Almulla</strong>, Gregory Gay. Generating Diverse Test Suites for Gson Through Adaptive Fitness Function Selection. Proceedings of 12th Symposium on Search-Based Software Engineering, Challenge Solutions Track (SSBSE’20). Bari, Italy, September 2020. </span></span></p> <p style="text-align:left"> </p> <p style="margin-left:24px; text-align:left"><span style="font-size:14px"><span style="font-family:Arial,Helvetica,sans-serif"><strong>Hussein Almulla</strong>, Gregory Gay. Learning How to Search: Generating Exception-Triggering Tests Through Adaptive Fitness Function Selection. Proceedings of the 13th IEEE International Conference on Software Testing, Verification, and Validation (ICST’20). Porto, Portugal, March 2020.</span></span></p> <p style="text-align:left"> </p> <p style="margin-left:24px; text-align:left"><span style="font-size:14px"><span style="font-family:Arial,Helvetica,sans-serif">Alireza Salahirad, <strong>Hussein Almulla</strong>, Gregory Gay. Choosing The Fitness Function for the Job: Automated Generation of Test Suites that Detect Real Faults. Wiley Software Testing, Verification and Reliability. Volume 29, Issue 4-5. June-August, 2019</span></span></p> <p style="text-align:left"> </p> <p style="margin-left:24px; text-align:left"><span style="font-size:14px"><span style="font-family:Arial,Helvetica,sans-serif">Omar A. Dawood, Mohammed Khalaf, Falath M. Mohammed and <strong>Hussein Almulla</strong>. “Design a Compact Non-linear S-Box with Multiple-Affine Transformations.” <em>ACRIT</em> (2019).</span></span></p> <p style="margin-left:24px; text-align:left"> </p> <p style="margin-left:24px; text-align:left"><span style="font-size:14px"><span style="font-family:Arial,Helvetica,sans-serif">Omar A. Dawood, <strong>Hussein Almulla</strong> and S. Khan. “Sleeping Encryption Unit in the Integrated Air Defense Systems.” (2019)</span></span></p> <p style="text-align:left"> </p> <p style="margin-left:24px; text-align:left"><span style="font-size:14px"><span style="font-family:Arial,Helvetica,sans-serif"><strong>Hussein Almulla</strong>, Alireza Salahirad, Gregory Gay. Using Search-Based Test Generation to Discover Real Faults in Guava. Proceedings of the 9th Symposium on Search-Based Software Engineering, Challenge Track (SSBSE’17). Paderborn, Germany, September 2017</span></span></p> <p style="text-align:left"> </p> <p style="margin-left:24px; text-align:left"><span style="font-size:14px"><span style="font-family:Arial,Helvetica,sans-serif"><strong>Hussein Khalid Abd-alrazzaq</strong>. “Improvement Public Key Kerberos Using Identity-Based Signcryption.” (2013)</span></span></p> <p style="text-align:left"> </p> <p style="margin-left:24px; text-align:left"><span style="font-size:14px"><span style="font-family:Arial,Helvetica,sans-serif"><strong>Hussein Khalid Abd-Alrazzaq</strong>. "Extended Sakai-Kasahara Identity-Based Encryption Scheme to Signcryption Scheme." <em>International Journal of Computer Science and Information Security</em> 10, no. 6 (2012): 57.</span></span></p> <p style="margin-left:24px; text-align:left"><span style="font-size:14px"><span style="font-family:Arial,Helvetica,sans-serif"><strong>Hussein Khalid Abd-alrazzq</strong>, Mohammad S. Ibrahim, and Omar Abdulrahman Dawood. "Secure internet voting system based on public key kerberos." <em>IJCSI Int. J. Comput. Sci</em> 9 (2012): 2.</span></span></p> <p style="text-align:left"> </p> <p style="margin-left:24px; text-align:left"><span style="font-size:14px"><span style="font-family:Arial,Helvetica,sans-serif">Sufyan T. Faraj, and <strong>Hussein Khalid Abd-alrazzaq</strong>. "Email Security Using Two Cryptographic Hybrids of Mediated and Identity-Based Cryptography." <em>i-Manager's Journal on Software Engineering</em> 6, no. 3 (2012): 1.</span></span></p> <p style="margin-left:24px; text-align:left"><span style="font-size:14px"><span style="font-family:Arial,Helvetica,sans-serif">Sufyan T. Faraj Al-Janabi, and <strong>Hussein Khalid Abd-Alrazzaq</strong>. "Combining mediated and identity-based cryptography for securing e-mail." In <em>International Conference on Digital Enterprise and Information Systems</em>, pp. 1-15. Springer, Berlin, Heidelberg, 2011.</span></span></p>
<p> </p> <p><span style="font-size:16px"><u><strong>الشهادات الاكاديمية</strong></u></span></p> <p>دكتوراه في علوم الحاسوب/هندسة البرامجيات - كلية الهندسة والحوسبة - جامعة كارولاينا الجنوبية - الولايات المتحدة الامريكيه -2021</p> <p>ماجستير في الادارة الهندسية - كلية الهندسة والحوسبة - جامعة كارولاينا الجنوبية - الولايات المتحدة الامريكيه -2019</p> <p>ماجستير في علوم الحاسوب/ امنية - كلية الحاسوب وتكنلوجيا المعلومات - جامعة الانبار - 2011</p> <p><strong>بكالوريوس علوم نظم المعلومات – </strong>كلية الحاسوب وتكنلوجيا المعلومات<strong> – جامعة الانبار – العراق 2008</strong></p> <p> </p> <p><span style="font-size:16px"><u><strong>ِالشهادات الاحترافية</strong></u></span></p> <p style="text-align:left">PMI Project Management Professional (PMI-PMP), Project Management Institute, 2021</p> <p style="text-align:left">PMI Agile Certified Practitioner (PMI-ACP), Project Management Institute, 2020</p> <p style="text-align:left">AWS Certified Solutions Architect – Associate, Amazon Web Service 2020</p> <p style="text-align:left">AWS Certified Developer, Amazon Web Service 2019</p> <p style="text-align:left">Certified Ethical Hacker (CEH), EC-Council 2019</p> <p style="text-align:left">Professional Scrum Master I (PSM I), Scrum.org 2019</p> <p style="text-align:left">MCSA: SQL 2016 Database Development, Microsoft 2019</p> <p style="text-align:left">ASTQB/ISTQB-Certified Tester Foundation Level, International Software Testing Qualification Board 2018</p> <p style="text-align:left">Cyber Securities Studies, University of South Carolina 2017</p> <p><span style="font-size:16px"><u><strong>التدريب</strong></u></span></p> <p style="text-align:left">Emerging Leaders Program, The BB&T Leadership Institute-Columbia 2020</p> <p style="text-align:left">Developing on AWS, Amazon Web Service-Houston 2019</p> <p style="text-align:left">Certified Ethical Hacker (CEH), TrainingCamp-Virginia 2019</p> <p> </p> <p> </p> <p> </p>
لا توجد بيانات عن الإشراف.
<p> </p> <p><span style="font-size:16px"><u><strong>الخبرات العملية</strong></u></span></p> <p> </p> <p> </p> <p style="text-align:left">Software security engineer - Softdocs, Apr 2021 – Sept 2021</p> <p style="text-align:left">System developer - South Carolina Department of Revenue, Sep 2019 – Apr 2021</p> <p style="text-align:left">Software developer - ASSET Intelligent Infrastructure, Nov 2018 - Mar 2019</p> <p style="text-align:left">Research assistant - Department of Computer Science and Engineering, University of South Carolina, Feb 2017 - Dec 2020</p> <p style="text-align:left">Instructor - College of Administration and Economic, University of Anbar, Dec 2011 – Dec 2013</p> <p style="text-align:left">Software developer - E-archive department, University of Anbar, Sep 2012 – Dec 2013</p> <p style="text-align:left">Instructor - College of Law and Political Sciences - University of Anbar, Jan 2012 – June 2012</p>