م.د. وليد خالد حسن ذيب الجميلي (مدرس)

دكتوراه في Cloud Computing Security and Privacy

تكنولوجيا المعلومات - علوم الحاسوب وتكنولوجيا المعلومات
waleed.hassan@uoanbar.edu.iq

ScopusGoogle ScholarResearch GateORCIDPublons


معلومات عامة

<p style="text-align:left"><span style="font-size:16px"><span style="font-family:Times New Roman,Times,serif"><strong>Waleed Khalid Hassan</strong>&nbsp;received his <strong>B.Sc.</strong> and <strong>M.Sc. </strong>degrees in Computer Science from the College of Computer Science and Information Technology, University of Anbar, Iraq,&nbsp;in 2002 and 2010, respectively. In 2020, he received his Ph.D. degree in Computer Science from the <strong>School of Computing</strong>, <strong>University of Buckingham</strong>, <strong>United Kingdom</strong>. Security and Privacy of Cloud computing, Identity-Based Encryption, Fuzzy Identity-Based Encryption, and OLAP are the core of his research interest<a href="https://drive.google.com/file/d/1YlGtTXZjg8vfV2kugZ6e06BIXZ3Hc-L5/view?usp=sharing"><img alt="" src="https://drive.google.com/file/d/1YlGtTXZjg8vfV2kugZ6e06BIXZ3Hc-L5/view?usp=sharing" /></a></span></span></p>

البحوث العلمية

<p style="text-align:left"><span style="font-size:12pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><u><span style="color:black">Enhancement OLAP via Fragmentation&nbsp;</span></u></span></span></p> <p style="margin-left:-9px; text-align:left"><span style="font-size:12pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><strong><span style="font-size:10.5pt">Waleed K. Hassan, </span></strong><span style="font-size:11.0pt">IFRSA International Journal of Data Warehousing &amp; Mining |Vol1|issue 2|Nov 2011</span>&nbsp;</span></span></p> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><u><span style="color:black"><a href="javascript:void(0)" style="color:blue; text-decoration:underline"><span style="color:black">OLAP Techniques for Approximation and Mining Query Answering</span></a></span></u></span></span></p> <p style="margin-left:-9px; text-align:left"><span style="font-size:12pt"><span style="font-family:&quot;Times New Roman&quot;,serif">MM Hamd, <strong>WK Hassan,</strong> AL-Rafidain Journal of Computer Sciences and Mathematics 7 (3), 201-212</span></span></p> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><u><a href="javascript:void(0)" style="color:blue; text-decoration:underline"><span style="color:#000000">Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment</span></a></u></span></span></p> <p style="margin-left:-9px; text-align:left"><span style="font-size:12pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><strong>WK Hassan,</strong> H Al-Assam, Mobile Multimedia/Image Processing, Security, and Applications 2017 102</span></span></p> <p style="text-align:left"><span style="font-size:12pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><u><span style="color:black"><a href="javascript:void(0)" style="color:blue; text-decoration:underline"><span style="color:black">Automated biometric authentication with cloud computing</span></a></span></u></span></span></p> <p style="margin-left:-9px; text-align:left"><span style="font-size:12pt"><span style="font-family:&quot;Times New Roman&quot;,serif">H Al-Assam, <strong>W Hassan,</strong> S Zeadally, Biometric-Based Physical and Cybersecurity Systems, 455-475</span></span>&nbsp;</p> <div> <p style="text-align:left">&nbsp;</p> </div> <p style="text-align:left">&nbsp;</p>

المحاضرات العلمية


# المادة اسم المحاضرة المرحلة التحميل مشاهدة