Hisham Kholidy, PH.D., CEH

   *  Professor and Director of the Cybersecurity Program, Computer Science Department, Northern Illinois University (NIU)

      *  Director of NIU’s Center of Excellence in Cybersecurity and Future Networks (CECFN): https://cecfn.niu.edu

   kholidy (at) niu.edu

      *       https://scholar.google.com/citations?hl=en&user=IxEh8VkAAAAJ&view_op=list_works&sortby=pubdate

      *       https://www.cs.niu.edu/about/faculty-and-staff/kholidy/

 

 

     SHORT PROFILE

 

► Ph.D. in Computer Science, joint program (Galileo Galilei Doctorate School at Univ. of Pisa in Italy and the University of Arizona (UArizona), Tucson, AZ).

► 10 years of administrative experience at several universities, chairing the computer science department, cybersecurity department, the Student Success and Academic Affairs Committee, and IT and research faculty committees.

► 6 years of professional IT experience at several software companies such as IBM and Vodafone in developing large-scale networks and security applications.

► Lead PI/Co-PI/Senior Personnel of several research projects with a total fund of 4 million dollars including a nearly $1.1 million contract from the AFRL which is the largest single-investigator award ever received at the SUNY Poly.

► More than 100 published papers in high-quality journals and conferences including 3 best paper awards (sole author) and several information security patents published by the USPTO (US Patent and Trademark Office).

► Experienced Penetration Tester with a demonstrated history of working in the computer security industry. Strong consulting professional with CEH certification.

► Solid understanding and hands-on experience of 5G, Cloud Computing, Machine Learning, Autonomic Computing, Cyber Physical Systems, and IoT from cybersecurity and resiliency analysis and design perspectives.

► More than 20 years of research experience at Univ. of Arizona, Mississippi State Univ., Univ. of Nevada in Reno, SUNY Polytechnic Institute, University of Pisa in Italy, Qatar University in Qatar, and Fayoum and Helwan Universities in Egypt.

► More than 10 years of Teaching experience at SUNY Polytechnic Institute (Assistant Prof.), Fayoum Univ. (Assistant Prof.), Mississippi State Univ. (Postdoc), Univ. of Nevada (Postdoc).

► 2024, 2023, 2022, 2021, 2020 Visiting Faculty Research Award by the Air Force Research Lab (AFRL), Rome, NY, USA.

► 2023, 2022, 2021 AFRL Extension Award.

► 2024 SUNY Poly Presidential Award in Excellence Research and Services.

► 2021, 2023 SUNY Poly Dean’s Excellence Research Award and Certificate of Excellence in Research by SUNY Poly and Fayoum University.

► PhD-Plus Certificate of Research Business Plan and Entrepreneurs by Pisa Univ., Italy.

► Best Presentation and Demo award in the OSM-MR Hackfest 2021 and 2nd rank with my student team in the 2022 international 5G core ETSI OSM Hackfest.

► IEEE Senior Member.

► Highly committed to excellence in administration, teaching, and quality research.

 

      RESEARCH INTERESTS

Ø  Cybersecurity and Information Assurance.

-      5G Systems Security.

-      High-Performance Systems including Grid and Cloud Computing Systems Security.

-      Quantum Computing Security.

-      Autonomous Vehicles Security

-      CPS, Smart Grid, IoT, and SCADA Systems Security.

-      Big Data Analytics Security.

Ø  Machine Learning and Autonomic Computing.

Ø  Software Composition for Cloud and Distributed Systems.

 

      Awards Recognitions and Achievements

         2024 AFRL Visiting Faculty Research Award (VFRA). Fund amount: $21,363.

         Lead PI of the AFRL/RI’s BAA # FA8750-21-S-7001. Fund amount: $1,073,453 from 1/15/2023 to 1/15/2026 (36 months). Funded by AFRL. https://sunypoly.edu/news/news-release-dr-hisham-kholidy-receives-11-million-contract-air-force-research-lab-improve.html

         A Cooperative Research and Development Agreement (CRADA) with AFRL that includes transferring Erickson 5G equipment of $566.895 to setup SUNY Poly facilities to develop the first of its kind “5G Open Testbed” that will enable SUNY Poly/AFRL/Navy/UArizona /Virginia Tech (VT).

         Subcontract Award ($80,000). Project name “Building Enablers for Multi Industry Sectors Collaborative Federated Open Platforms & Assets, as a Foundation for Cross-Industry End-to-End Services Innovation and Delivery AGILITY in the 5G & Beyond Era”, From 09/01/2023 to 08/31/2025. Korea Institute for Advancement of Technology (KIAT) grant funded by the Ministry of Trade, Industry and Energy (MTIE) in South Korea, Project No., P0019809.

         Co-PI of “Autonomous Cyber Resilience of 5G Open Architecture” with Nile University (Egypt). Funded by the Office of Naval Research Global (ONR Global). fund amount: $420,120 from 1/15/2024 to 1/15/2027 (36 months).

         Hisham Kholidy, “An Autonomous Security Framework for Assessing and Mitigating Risks in the Next Generation 5G Mobile Networks”, June 2019. Funded by New York State Seed Grant Award. Role: Lead PI, fund amount: $25,000.

         2024 AFRL Visiting Faculty Research Award (VFRA). Fund amount: $21,363.

         2023 AFRL Visiting Faculty Research Award (VFRA). Fund amount: $21,363.

         2023 AFRL Extension Award. Fund amount: $10,000.

         2022 AFRL VFRA. Fund amount: $18,540.

         2022 AFRL Extension Award. Fund amount: $10,000.

         2021 AFRL VFRA. Fund amount: $18,540.

         2021 AFRL Extension Award. Fund amount: $10,000.

         2020 AFRL VFRA. Fund amount: $18,540.

         “Assessing and managing ICT security risks of industrial controls systems for oil and natural gas production and transmission”, funded by National Research Fund, June 2016. Fund amount: $600K. Role: Co-PI.

         “Fault-Adaptive Performance Management of Enterprise Computing Systems”, funded style='letter-spacing:-.7pt'> by National Research Fund , 2013, fund amount: $870 K. Role: Senior Personnel.

         “Economic Models for QoS Optimization of Composite Cloud Services” funded by the National Research Fund, January 2015. Fund amount: $900K. Role: Senior Personnel.

         Hisham Kholidy, “Cloud Computing Security: An Intrusion Detection System for Cloud Computing Systems”, fund by Galileo Galilei Doctoral School and the Italian Government, from January 2013. Role: Lead PI, fund amount: 20k euro.

         Hisham Kholidy, “Enhancing Grid computing Security” Funded by the Center of Excellence in Information Assurance (COEIA) in King Saud Univ., Saudi Arabia, August 2008. Role: Lead PI, fund amount: $20K.

         2023 and 2021 SUNY Poly Dean’s Excellence Research Award.

         Best Paper Award. Paper details: Hisham A. Kholidy “A Smart Network Slicing Provisioning Framework for 5Gbased IoT Networks”, The 10th IEEE International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2023). San Antonio, Texas, USA. October, 2023.

         Best presentation award, The OSM-MR Hackfest Hackathon event, Sept. 2021.

         The 2nd rank in the 2022 international 5G core ETSI OSM Hackfest (with a team of my undergraduate and graduate students).

         Certified Ethical Hacker (CEH) certification, EC-Council, July 2020.

         Best Researcher Award by the International Scientist Awards on Engineering, Science, and Medicine, the VDGOOD International Conf. Committee, October 2020.

         1st place in recognition of the outstanding quality poster titled: “A Novel Zero Trust Architecture for the New 5G Federated Network” presented at the SUNY Poly Project Showcase, Spring 2022.

         Best Paper Award. Paper details: Hisham A. Kholidy, “Towards a Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis”, IEEE Int. Conference on Computer Applications &Information Security (ICCAIS), Riyadh, Saudi Arabia, May 1-3, 2019.

         Best Poster Award for a poster entitled 5G Network Slicing Utilizing Blockchain Technology”, won an honorable mention in the computer science category of the SUNY showcase in May 2019.

         2018, 2019, 2021, 2022, and 2023 SUNY Poly Undergraduate Research Program (SURP) Awards.

         A patent entitled "A Data-Driven Semi-Global Alignment Technique for Masquerade Detection in Stand-Alone and Cloud Computing Systems", was published by the USPTO. Nov. 2018.

         Certificate of Distinguished Research Quality, Fayoum University in Egypt. Nov. 2016.

         Best Lecturer Award, Fayoum University in Egypt. Nov. 2016.

         Certificate of Excellence in Research and Teaching, Fayoum Univ. in Egypt, Nov. 2014.

         A scholarship to conduct research at the University of Arizona in College of Electrical and Computer Engineering (ECE) as a part of my Ph.D. program. The scholarship was funded by Galileo Galilei Doctorate School to collaborate with the ECE research team and conduct joint supervision, January 2012.

         In February 2012, I founded the 1st Egyptian Winter School in Grid and Cloud Computing “EGWSGC2012”. I trained a group of master’s and Ph.D. researchers on practical Cloud and Grid computing tools to be used in their research.

         PhD-Plus certificate of Research Business Plan and Entrepreneurs, Pisa Univ., Italy, 2011.

         In July 2010, a short scholarship by Ulm University in Günzburg in Germany to attend XtreemOS Summer School for Grid and Cloud systems.

         In February 2010, a short scholarship by the National e-Science Centre of Edinburgh Univ. in the UK to attend the International Winter School in Grid Computing (IWSGC).

         August 2009, a full PhD scholarship by Galileo Galilei Doctorate School, Univ. of Pisa in Italy.

         July 2009, a patent was published by the United States Patent and Trademark Office (USPTO) with the title "Accelerating Stream Cipher Operations Using Single and Grid Systems", ref. KSU.0136PTUS, under number 12924978.

         In June 2009, awarded a research project by the Center of Excellence in Information Assurance (CoEIA), King Saud University for Enhancing Grid Computing Security.

         May 2008, a scholarship by MALAYSIAN TECHNICAL COOPERATION PROGRAMME to study some practical parts during my master's degree.

         April 2005, the first Rank in the National ITI (Information Technology Institute) competition for Programming, database, and web development.

         September 2003, ETS certification (Educational Testing Services) from ETS American Dept.

Publications                                    

Ø Published Patents:

1) Hisham A. Kholidy, “Accelerating Stream Cipher Operations using Single and Grid Systems, US Patent and Trademark Office (USPTO), April 2012, US 20120089829 A1.

2) Hisham A. Kholidy, Fabrizio Baiardi,  A. Azab, "A Data-Driven Semi-Global Alignment Technique For Masquerade Detection in Stand-Alone and Cloud Computing Systems", granted on January 2019, US 20170019419 A1.

 

   Sole Author Journal Papers:

1.     Hisham Kholidy, Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method”, Sensors 2022, 22, 9.

https://doi.org/10.3390/s22010009. (IF: 3.576).

2.     Hisham Kholidy, Detecting impersonation attacks in cloud computing environments using a centric user profiling approach”, Future Generation Computer Systems, Volume 117, issue 17, Pages 299-320, ISSN 0167-739X, https://doi.org/10.1016/j.future.2020.12.009, (IF: 7.307). April 2021, https://www.sciencedirect.com/science/article/pii/S0167739X20330715

3.     Hisham Kholidy, Autonomous Mitigation of Cyber Risks in Cyber-Physical Systems”, Future Generation Computer Systems, Volume 115, 2021, Pages 171-187, ISSN 0167-739X, (IF: 7.307) DOI: https://doi.org/10.1016/j.future.2020.09.002 https://www.sciencedirect.com/science/article/pii/S0167739X19320680

4.     Hisham A. Kholidy, An Intelligent Swarm based Prediction Approach for Predicting Cloud Computing User Resource Needs”, the Computer Communications Journal, Feb 2020 (IF: 5.047). https://authors.elsevier.com/tracking/article/details.do?aid=6085&jid=COMCOM&surname=Kholidy

5.     Hisham A. Kholidy, Correlation Based Sequence Alignment Models for Detecting Masquerades in Cloud Computing”, IET Information Security Journal, DOI: 10.1049/iet-ifs.2019.0409, Sept. 2019 (IF: 1.51) https://digital- library.theiet.org/content/journals/10.1049/iet-ifs.2019.0409

 

·      Collaborative Journal Papers:

1.     Boualem, A., Ayaida, M., de Runz, C., Hisham A. Kholidy et al. Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunicationCluster Comput 27, 13777–13793 (2024). https://doi.org/10.1007/s10586-024-04554-9

2.     Mustafa, F.M., Hisham A. Kholidy., Sayed, A.F. et al. Optical fiber fronthaul segment in open radio access 5G networks: enhanced performance utilizing AFBG. Opt Quant Electron 56, 1014 (2024). https://doi.org/10.1007/s11082-024-06875-w

3.     Boualem, A., De Runz, C., Ayaida, M., Hisham A. Kholidy. Probabilistic intrusion detection based on an optimal strong K-barrier strategy in WSNs. Peer-to-Peer Netw. Appl. (2024). https://doi.org/10.1007/s12083-024-01634-w

4.     I. Elgarhy, M. M. Badr, M. Mahmoud, M. M. Fouda, M. Alsabaan and Hisham A. Kholidy, "Clustering and Ensemble Based Approach For Securing Electricity Theft Detectors Against Evasion Attacks", in IEEE Access, January 2023, doi: 10.1109/ACCESS.2023.3318111. (IF: 3.55).

5.     Mustafa, F.M., Hisham A. Kholidy, Sayed, A.F. et al. “Backward pumped distributed Raman amplifier: enhanced gain”, Optical Quantum Electron 55, 772 (2023). https://doi.org/10.1007/s11082-023-05066-3 (IF: 3.0).

6.     Alahmadi TJ, Rahman AU, Alkahtani HK, Hisham A. KholidyEnhancing Object Detection for VIPs Using YOLOv4_Resnet101 and Text-to-Speech Conversion Model”, Multimodal Technologies and Interaction. 2023; 7(8):77. https://doi.org/10.3390/mti7080077 (IF: 3.17).

7.     Alkhowaiter, M.; Hisham A. Kholidy.; Alyami, M.A.; Alghamdi, A.; Zou, C, “Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach”. Sensors 2023, 23, 6287. https://doi.org/10.3390/s23146287 (IF: 3.9).

8.     Badr, Mahmoud M., Mohamed I. Ibrahem, Hisham A. Kholidy, Mostafa M. Fouda, and Muhammad Ismail. 2023. "Review of the Data-Driven Methods for Electricity Fraud Detection in Smart Metering Systems" Energies 16, no. 6: 2852. 2023 (IF: 3.25). https://doi.org/10.3390/en16062852

9.     A Jakaria, M. Rahman, M. Asif, A. Khalil, Hisham Kholidy, M. Anderson, S. Drager, "Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives," in IEEE Transactions on Network and Service Management, 2022, doi: 10.1109/TNSM.2022.3216804. (IF: 4.75). https://ieeexplore.ieee.org/document/9928375?source=authoralert

10.  Mustafa, F.M., Hisham Kholidy., Sayed, A.F. et al., Enhanced dispersion reduction using apodized uniform fiber Bragg grating for optical MTDM transmission systems”. Optical and Quantum Electronics 55, 55 (December 2022). https://doi.org/10.1007/s11082-022-04339-7 . (IF: 2.79).

11.  Hisham A. Kholidy, Abdelkarim Erradi, VHDRA: A Vertical and Horizontal Dataset Reduction Approach for Cyber-Physical Power-Aware Intrusion Detection Systems”, SECURITY AND COMMUNICATION NETWORKS Journal (IF: 1.968), March 7,

2019. vol. 2019, 15 pages. https://doi.org/10.1155/2019/6816943.

12.  Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Fabrizio Baiardi, "A risk mitigation approach for autonomous cloud intrusion response system", in Journal of Computing, Springer, DOI: 10.1007/s00607-016-0495-8, June 2016. (IF: 2.42).

13.  Hisham A. Kholidy, Fabrizio Baiardi, Salim Hariri, “DDSGA: A Data-Driven Semi- Global Alignment Approach for Detecting Masquerade Attacks”, in IEEE Transactions on Dependable and Secure Computing, DOI 10.1109/TDSC.2014.2327966, May 2014. (ISI Impact factor: 6.791).

14.  Hisham A. Kholidy, Hala Hassan, Amany Sarhan, Abdelkarim Erradi, Sherif Abdelwahed, "QoS Optimization for Cloud Service Composition Based on Economic Model", Book Chapter on the Internet of Things. User-Centric IoT, 2015, Volume 150 ISBN : 978- 3-319-19655-8

15.  Atta-ur Rahman, Maqsood Mahmud, Tahir Iqbal, Hisham Kholidy, Linah Saraireh, et al “Network anomaly detection in 5G networks”, The Mathematical Modelling of Engineering Problems journal, April 2022, Volume 9, Issue 2, Pages 397-404. DOI 10.18280/mmep.090213

16.  Hisham A Kholidy., et al. “A Survey Study For the 5G Emerging Technologies", Acta Scientific Computer Sciences 5.4 (2023): 63-70.

17.  Hisham A. Kholidy, Fabrizio Baiardi, Salim Hariri, Esraa M. ElHariri, Ahmed M. Youssouf, and Sahar A. Shehata, “A Hierarchical Cloud Intrusion Detection System: Design and Evaluation”, in International Journal on Cloud Computing: Services and Architecture (IJCCSA), November 2012. DOI 10.5121/ijccsa.2012.2601

18.  Hisham A. Kholidy, Alghathbar Khaled s., “Adapting and accelerating the Stream Cipher Algorithm RC4 using Ultra Gridsec and HIMAN and use it to secure HIMAN Data”, Journal of Information Assurance and Security (JIAS), vol. 4 (2009)/ issue 4,pp 274, tot.pag 283, 2009. http://www.mirlabs.org/jias/vol4-issue6.html

IV. Selected Conference Papers:

·      Sole Author Conferences Papers:

1.     (Best Paper Award). Hisham A. Kholidy, “A Novel Blockchain Approach for Continuously Authenticating UAVs to Achieve Zero Trust Principles in 5G-enabled UAVs”, The Nordic e-Infrastructure Collaboration (NeIC 2024), Tallinn, Estonia May 27 – 29, 2024.

2.     (Best Paper Award). Hisham A. Kholidy, “A Smart Network Slicing Provisioning Framework for 5Gbased IoT Networks”, The 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2023). San Antonio, Texas, USA. October, 2023.

3.     (Best Paper Award) Hisham A. Kholidy, “Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis”, IEEE International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, May 1-3, 2019. https://ieeexplore.ieee.org/document/8769482.

4.     Hisham A. Kholidy, "A Study for Access Control Flow Analysis With a Proposed Job Analyzer Component based on Stack Inspection Methodology", the 2010 10th International Conference on Intelligent Systems Design and Applications (ISDA), pp 1442-1447, Cairo, Egypt, vol. IEEE Catalog Number: CFP10394-CDR, 2010.

5.     Hisham A. Kholidy, "HIMAN-GP: A Grid Engine Portal for controlling access to HIMAN Grid Middleware with performance evaluation using processes algebra", The 2nd International Conference on Computer Technology and Development ICCTD, pp 163-168, Cairo, 2010.

·      Collaborative Conferences Papers:

1.     M. M. Badr, M. Baza, A. Rasheed, Hisham Kholidy, S. Abdelfattah and T. S. Zaman, "Comparative Analysis between Supervised and Anomaly Detectors Against Electricity Theft Zero-Day Attacks," 2024 International Telecommunications Conference (ITC-Egypt), Cairo, Egypt, 2024, pp. 706-711, doi: 10.1109/ITC-Egypt61547.2024.10620537.

2.     Hisham Kholidy, A. Berrouachedi, E. Benkhelifa and R. Jaziri, "Enhancing Security in 5G Networks: A Hybrid Machine Learning Approach for Attack Classification," 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Giza, Egypt, 2023, pp. 1-8, doi: 10.1109/AICCSA59173.2023.10479294.

3.     H. A. Kholidy, Keven Disen; Andrew Karam; Elhadj Benkhelifa; Mohammad A. Rahman, et al., "Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native Architectures," 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Giza, Egypt, 2023, pp. 1-8, doi: 10.1109/AICCSA59173.2023.10479308.

4.     I. Almazyad, S. Shao, S. A. Boualem, A. Berrouachedi, M. Ayaida, H. Kholidy and E. Benkhelifa, "A New Hybrid Cipher based on Prime Numbers Generation Complexity: Application in Securing 5G Networks," 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Giza, Egypt, 2023, pp. 1-8, doi: 10.1109/AICCSA59173.2023.10479316.

5.     I. Almazyad, S. Shao, S. Hariri and H. A. Kholidy, "Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis, and Evaluation," 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Giza, Egypt, 2023, pp. 1-7, doi: 10.1109/AICCSA59173.2023.10479312.

6.     A. A. Abushgra, H. A. Kholidy, A. Berrouachedi and R. Jaziri, "Innovative Routing Solutions: Centralized Hypercube Routing Among Multiple Clusters in 5G Networks," 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Giza, Egypt, 2023, pp. 1-7, doi: 10.1109/AICCSA59173.2023.10479277.

7.     R. Bohn, A. Battou, B. Choi, R. Chaparadza, S. Song, T. Zhang, T. Choi, Hisham A. Kholidy, M. Park, S. Go, “NIST Multi-Domain Knowledge Planes for Service Federation for 5G & Beyond Public Working Group: Applications to Federated Autonomic/Autonomous Networking”, in the IEEE Future Networks World Forum (FNWF), 13–15 November 2023 // Baltimore, MD, USA.

8.     I. Elgarhy, A. El-toukhy, M. Badr, M. Mahmoud, M. Fouda, M. Alsabaan, Hisham A. Kholidy, “Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks”, in the IEEE 21st Consumer Communications & Networking Conference (CCNC), 6-9 January 2024.

9.     M. C. Zouzou, E. Benkhelifa, Hisham A. Kholidy and D. W. Dyke, "Multi-Context-aware Trust Management framework in Social Internet of Things (MCTM-SIoT)," 2023 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS), Valencia, Spain, 19-22 June 2023, pp. 99-104, doi: 10.1109/ICCNS58795.2023.10193510.

10.  Hisham A. Kholidy, Andrew Karam, James Sidoran, et al. “Toward Zero Trust Security in 5G Open Architecture Network Slices”, IEEE Military Conference (MILCOM), CA, USA, November 29, 2022. https://edas.info/web/milcom2022/program.html

11.  Hisham A. Kholidy, Andrew Karam, Jeffrey H. Reed, Yusuf Elazzazi, "An Experimental 5G Testbed for Secure Network Slicing Evaluation", the 2022 IEEE Future Networks World Forum (FNWF), Montreal, Canada, October 2022. https://fnwf.ieee.org/wp- content/uploads/sites/339/2022/10/AcceptedPaperScheduleV0.1.pdf

12.  Hisham A. Kholidy, Riaad Kamaludeen “An Innovative Hashgraph-based Federated Learning Approach for Multi Domain 5G Network Protection”, the 2022 IEEE Future Networks World Forum (FNWF), Montreal, Canada, October 2022. https://fnwf.ieee.org/wp-content/uploads/sites/339/2022/10/AcceptedPaperScheduleV0.1.pdf

13.  Hisham A. Kholidy, Salim Hariri, Toward an Experimental Federated 6G Testbed: A Federated leaning Approach”, the 19th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2022), Abu Dhabi, UAE December 5th

- December 7th, 2022

 

14.  Hisham Kholidy, Andrew Karam, James L. Sidoran, Mohammad A. Rahman, "5G Core Security in Edge Networks: A Vulnerability Assessment Approach", the 26th IEEE Symposium on Computers and Communications (The 26th IEEE ISCC), Athens, Greece, September 5-8, 2021. https://ieeexplore.ieee.org/document/9631531

15.  N. I. Haque, M. Ashiqur Rahman, D. Chen, Hisham Kholidy, "BIoTA: Control-Aware Attack Analytics for Building Internet of Things," 2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON), 2021, pp. 1-9, doi: 10.1109/SECON52354.2021.9491621.

16.  Samar SH. Haytamy, Hisham A. Kholidy, Fatma A. Omara, “Integrated Cloud Services Dataset”, Springer, Lecture Note in Computer Science, ISBN 978-3-319-94471-5, https://doi.org/10.1007/978-3-319-94472-2. 14th World Congress on Services, 18-30. Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA.

17.  Hisham A. Kholidy, Ali Tekeoglu, Stefano Lannucci, Shamik Sengupta, Qian Chen, Sherif Abdelwahed, John Hamilton, “Attacks Detection in SCADA Systems Using an Improved Non- Nested Generalized Exemplars Algorithm", the 12th IEEE International Conference on Computer Engineering and Systems (ICCES 2017), published in February 2018.

18.  Stefano Iannucci, Hisham A. Kholidy Amrita Dhakar Ghimire, Rui Jia, Sherif Abdelwahed, Ioana Banicescu, “A Comparison of Graph-Based Synthetic Data Generators for Benchmarking Next-Generation Intrusion Detection Systems”, IEEE Cluster, Sept 5 2017, Hawaii, USA.

19.  Qian Chen, Hisham A. Kholidy, Sherif Abdelwahed, John Hamilton, "Towards Realizing a Distributed Event and Intrusion Detection System", the International Conference on Future Network Systems and Security (FNSS 2017), Gainesville, Florida, USA, 31 August 2017.

20.  Hisham A. Kholidy, Abdelkarim Erradi, “A Cost-Aware Model for Risk Mitigation in Cloud Computing Systems”, 12th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Marrakech, Morocco, November, 2015.

21.  Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, “Attack Prediction Models for Cloud Intrusion Detection Systems”, in the International Conference on Artificial Intelligence, Modelling and Simulation (AIMS2014), Madrid, Spain, November 2014.

22.  Hisham A. Kholidy, Ahmed M. Yousouf, Abdelkarim Erradi, Hisham A. Ali, Sherif Abdelwahed, "A Finite Context Intrusion Prediction Model for Cloud Systems with a Probabilistic Suffix Tree", in the 8th European Modelling Symposium on Mathematical Modelling and Computer Simulation, Pisa, Italy, October 2014.

23.  Hisham A. Kholidy, A. Erradi, S. Abdelwahed, “Online Risk Assessment and Prediction Models For Autonomic Cloud Intrusion Prevention Systems”, in the “11th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Doha, Qatar, November 2014.

24.  Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Abdulrahman Azab, “A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems", in the 12th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), Dalian, China, August 2014.

25.  Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Fabrizio Baiardi, “A Hierarchical, Autonomous, and Forecasting Cloud IDS”, the 5th Int. Conference on Modeling, Identification and Control (ICMIC2013), Cairo, Aug31-Sept 1-2, 2013.

26.  Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Fabrizio Baiardi, “HA- CIDS: A Hierarchical and Autonomous IDS for Cloud Environments”, Fifth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN) Madrid, Spain, June 2013.

27.  Hisham A. Kholidy, Fabrizio Baiardi, "CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks", the 9th International Conference on Information Technology: New Generations (ITNG), Las Vegas, Nevada, USA, 2012.

28.  Hisham A. Kholidy, Fabrizio Baiardi, "CIDS: A framework for Intrusion Detection in Cloud Systems", The 9th International Conf. on Information Technology: New Generations (ITNG), Las Vegas, Nevada, USA, 2012.

29.  Hisham A. Kholidy, Chatterjee N., "Towards Developing an Arabic Word Alignment Annotation Tool with Some Arabic Alignment Guidelines", the 2010 10th International Conference on Intelligent Systems Design and Applications (ISDA), pp 778-783, Cairo, Egypt, vol. IEEE Catalog Number: CFP10394-CDR, 2010.

30.  Hisham A. Kholidy, Khaled S. Algathber, "A New Accelerated RC4 Scheme using "Ultra Gridsec" and "HIMAN", 5th Int. Conference on Information Assurance and Security, Aug 2009, China.

31.  Hisham A Kholidy, A. Azab, S. Deif, "Enhanced ULTRA GRIDSEC: Enhancing High- Performance Symmetric Key Cryptography Schema Using Pure Peer-to-Peer Computational Grid Middleware (HIMAN)", IEEE-ICPCA (the 3rd Int. Conf. on Pervasive Computing and Applications, 06-08 Oct 2008.

32.  A. Azab, Hisham A Kholidy, "An Adaptive Decentralized Scheduling Mechanism for Peer-to-Peer Desktop Grids", International Conference on Computer Engineering & Systems Nov 2008.

33.  Mostafa-Sami M., Safia H D., Hisham A Kholidy, "ULTRAGRIDSEC: Peer-to-Peer Computational Grid Middleware Security Using High-Performance Symmetric Key Cryptography" in IEEE-ITNG (5th Int. Conf. On Information Technology-New Generations), LasVegas, Nevada, USA, 7-9 April 2008.

V.         Posters, Demos, and Presentations:

1.     Hisham Kholidy, “Cybersecurity Evolution: Innovations, Trends, and Future Frontiers””, Workshop , keynote at the Nordic e-Infrastructure Collaboration (NeIC 2024), Tallinn, Estonia, May 28, 2024.

2.     Hisham Kholidy, “End-to-End Services Federation AGILITY in the 5G & Beyond Networks”, Workshop Naval Research Global (ONR Global). Palma de Mallorca, Spain 22-24 September 2023.

3.     Hisham Kholidy, “A Smart Network Slice Orchestrator for the 5G and Beyond Networks”, AFRL VFRP 2023 Presentation.

4.     Hisham Kholidy, “Toward Zero Trust Security in 5G Open Architecture Network Slices”, AFRL VFRP 2022 Presentation.

5.     Mohammed Abuzamak and Hisham Kholidy Zero Trust Architecture for the New 5G Open Federated Network”, SUNY Poly Showcase event 2022. 1st place in recognition of the outstanding quality of the poster.

6.     Wendel Balbuena, Hisham A. Kholidy Emerging Topics in the Next Generation 5G/6G Networks: A practical Overview”, SUNY POLY SURP 2022.

7.     Hisham Kholidy, Michael Stein, Mohammed Abuzamak, Wendell Balbuena, and Yusuf Elazzazi, On-boarding Magma 1.7 5G Core with OSM”, International Hackfest #13, June 2022. (Second Rank in the Hackfest).

8.     Hisham Kholidy, “Multi-Layer Attack Graph Analysis in the 5G Edge Network”, Technical Talk for AFRL VFRA. August 2021.

9.     Hisham Kholidy, "5G Core Security in Edge Networks: A Vulnerability Assessment Approach", A presentation for the 26th IEEE Symposium on Computers and Communications (IEEE ISCC 2021), Athens, Greece, September 8, 2021.

10.     Hisham Kholidy, “Vulnerability Assessment in the 5G Core Networks”, (Poster, Presentation, and Demo) the Air Force Research Lab (AFRL), Rome, NY, USA, July 2021.

11.  Hisham Kholidy, “Ksniff as a Kubernetes-integrated packet sniffer”, (best presentation and demo award) Sept. 2021. OSM-MR11 Hackfest.

12.  Hisham Kholidy, “Vulnerability Assessment in the 5G Core Networks”, (Poster, Presentation, and Demo) the AFRL, Rome, NY, USA, July 2021.

13.  Ernis Sehovic, Hisham Kholidy, “5G Edge Security Testbed at ACRL Lab at SUNY Poly, SUNY POLY SURP 2021.

14.  Djodan Maviaki, Debarshee Ghosh, Sanita Hadziahmetovic, and Hisham Kholidy, 5G Network Slicing Utilizing Blockchain Technology”, SUNY Poly Showcase event, won the Best Poster Award and an honorable mention in the computer science category of the showcase, May 2019.

14.  Bruce Steel, Hisham Kholidy, “Modeling Attack Warfare in Cyber-physical Systems Using a Competitive Markov Model”, SUNY SURP Poster Sessions, August 2019.

15.  Mohammed Arshad, Patel Tirth, Hisham Kholidy, “Deception Technology: A Method to Reduce the Attack Exposure Time of a SCADA System”, https://dspace.sunyconnect.suny.edu/handle/1951/70148,

16.  Akshay Bhoite, Diwash Basnet, Hisham Kholidy, “Risk Evaluation for Campus Area Network”, https://dspace.sunyconnect.suny.edu/handle/1951/70162

 

 

VI.    Preprints

1.     Hisham A. Kholidy. Dynamic Network Slicing Orchestration in Open 5G Networks using Multi-Criteria Decision Making and Secure Federated Learning Techniques, 08 August 2024, PREPRINT (Version 1) available at Research Square [https://doi.org/10.21203/rs.3.rs-4745968/v1]

2.     Adda Boualem, Hacène Fouchal, Marwane Ayaida et al. Diagnose and Classification of Infectious and Diseases using Nano Sensors Network in Nanofluids: Theoretical and Modeling Study, 24 May 2024, PREPRINT (Version 1) available at Research Square [https://doi.org/10.21203/rs.3.rs-4414269/v1]

3.     Malkoc, M., & Kholidy, H. A. (2023). 5G Network Slicing: Analysis of Multiple Machine Learning Classifiers. ArXiv. /abs/2310.01747.

4.     Fathy M. Mustafa, Hisham A. Kholidy, Ahmed F. Sayed et al. Distributed Backward Pumped Raman Amplifier Gain Enhancement: New Approaches, 06 April 2023, available at Research Square [https://doi.org/10.21203/rs.3.rs-2770728/v1]

5.     Grippo, T., & Kholidy, H. A. (2022). Detecting Forged Kerberos Tickets in an Active Directory Environment. arXiv. https://doi.org/10.48550/arXiv.2301.00044

6.     Zielinski, D., & Kholidy, H. A. (2022). An Analysis of Honeypots and their Impact as a Cyber Deception Tactic. arXiv. https://doi.org/10.48550/arXiv.2301.00045

7.     Kholidy, H. A., & Abuzamak, M. (2022). 5G Network Management, Orchestration, and Architecture: A Practical Study of the MonB5G project. arXiv. https://doi.org/10.48550/arXiv.2212.13747

8.     Abuzamak, M., & Kholidy, H. (2022). UAV Based 5G Network: A Practical Survey Study. arXiv. https://doi.org/10.48550/arXiv.2212.13329

9.     Kholidy, H. A., Rahman, M. A., Karam, A., & Akhtar, Z. (2022). Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing Platform. arXiv. https://doi.org/10.48550/arXiv.2201.00484

10.  Kholidy, H. A. (2021). State Compression and Quantitative Assessment Model for Assessing Security Risks in the Oil and Gas Transmission Systems. arXiv. https://doi.org/10.48550/arXiv.2112.14137

11.  Kholidy, H. A. (2021). A Triangular Fuzzy based Multicriteria Decision Making Approach for Assessing Security Risks in 5G Networks. arXiv. https://doi.org/10.48550/arXiv.2112.13072

12.  Haque, N. I., Rahman, M. A., Chen, D., & Kholidy, H. (2021). BIoTA Control-Aware Attack Analytics for Building Internet of Things. arXiv. https://doi.org/10.48550/arXiv.2107.14136

13.  Kholidy, H. A. (2020). Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems. Department of Computer and Network Security, College of Engineering, SUNY Polytechnic Institute. http://hdl.handle.net/20.500.12648/1605

VII.         Under Review Journals Papers:

1.     Hisham A. Kholidy, “SAF: A Security Awareness Framework for Detecting Attacks in the Oil and Gas Transmission SCADA Systems”, Electronic Journal, October 2023.

2.     Hisham A. Kholidy, "Secure Federated Learning for Zero Trust Security in 6G Networks”, IEEE IoT, August 28, 2023.

3.     Hisham A. Kholidy, A Federated Learning Security Awareness Framework for Oil and Gas Transmission SCADA Systems”, IEEE Transactions on Industrial Informatics, August 15, 2023.

4.     Hisham A. Kholidy, A Probabilistic Machine Learning Framework for Risk Analysis and Mitigation in the Critical Intelligrid Systems”, IEEE Canadian Journal of Elect. and Comp. Engineering, July 25, 2023.


     SYNERGISTIC ACTIVITIES

 

1.     General Chair of the 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), December 2023: https://aiccsa.net/AICCSA2023/committee/

2.     Guest Editor of a special issue with the title Special Issue " Harnessing Machine Learning and AI in Cybersecurity”, Electronic Journal, August 2022. https://www.mdpi.com/journal/sensors/special_issues/ML_AI_cybersecurity

3.     Guest Editor of a special issue with the title Special Issue "Emerging Security Topics in Next Generation 5G Networks" in Electronic Journal, June 2021. https://www.mdpi.com/journal/electronics/special_issues/security_next_generatoin_5g

4.     TPC member for IEEE GLOBCOM 2023.

5.     Reviewer for the IEEE Admission & Advancement (A&A) Review Panels to review senior member applications.

6.     Reviewer for the information security track, Cluster Computing Journal, August 2020.

7.     Reviewer for the information security track, the Future Generation Computer Systems, February 2020.

8.     Technical Program Committee (TPC) member, Int. Workshop on Self-Protecting Systems, April 2019

9.     Organizer and Co-Chair of the Cybersecurity Track at the ICCMIT conference in VIENNA, AUSTRIA March 26-28, 2019.

10.  Reviewer for the IEEE Transactions on Information Forensics and Security, Jan 2019.

11.  Reviewer for Computer and Security Journal, (Impact factor: 2.65) January 2019.

12.  Lead Guest Editor of a special issue in the Security and Communication Networks Journal (Impact factor: 1.376), July 2018.

13.  Reviewer for the information security track, Cluster Computing Journal, 2017.

14.  Reviewer for the distributed system track, Journal of Supercomputing, 2016.

15.  Reviewer for the IEEE Transactions on Cloud Computing (IF: 7.92), March 2016.

16.  Publication Chair for the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), 2014.

17.  TPC for the 12th Int. Conf. on Service-Oriented Computing (ICSOC), July 2014.

18.  Track chair for the Security and Privacy track in the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), 2014.

19.  TPC member for the Security, Privacy, Confidentiality, and Cloud Networking Track in the 3rd IEEE International Conference on Cloud Networking (IEEE CloudNet), 2014.

20.  Founded the Egyptian Winter school in Grid and Cloud Computing(EGWSGC), 2012.

21.  Track chair for the Information & Communication track in the 2nd International Conference on Computer Technology and Development (ICCTD), 2010.

22.  The organizer of a Cloud Computing seminar at Fayoum University in Egypt, July 2014.

 

 Example of Developed Software

1-     An Attack Classification Technique for the Cyber-Physical Power Systems using an Improved NON-NESTED GENERALIZED EXEMPLARS Algorithm.

https://sunypoly.edu/research/centers-programs/acrl/research.html.html

2-     A Security Framework for Countering Cyber-Adversary in Critical Infrastructures.

https://sunypoly.edu/research/centers-programs/acrl/research.html/span>.html

3-     A Cloud Intrusion Detection System (CIDS) to detect attacks in SaaS, PaaS, and IaaS. http://www.di.unipi.it/~hkholidy/projects/cids/index.html

4-     A cloud Intrusion detection dataset (CIDD).

http://www.di.unipi.it/~hkholidy/projects/cidd/index.html

5-     An intelligent prediction framework for forecasting Cloud consumer resource needs.

6-     An Intelligent biometric fingerprint and smart card reader Software for King Saud University.

7-     A Grid Resource Allocator System for Our Computational Grid Computing System (HIMAN).  

8-     Authentication, Authorization, and Encryption schemes to secure the data passing through "HIMAN".

9-     An E-learning web site for a community college at King Saud University.

10-  Several Examination software.

Training and Certifications

 

1-     NSF CAREER Workshop, “Proposal Writing Lectures Series”, Albany, NY.

2-     GIAC Certified Incident Handler (GCIH) by SANS Institute.

3-     DegreeWorks Workshop that explains how to academically advise students online. Suny Polytechnic Institute, Utica, NY.

4-     Blackboard Webinars in May 2019 at Suny Polytechnic Institute, Utica, NY.

5-     Research Writing Skills, University of Nevada, Reno.

6-     Professional English for research writing, Pisa University in Italy.

7-     Effective Classroom Management Strategies and Ideas for Teachers, by Erasmus IFOM- Teacher training courses and Vocational placement, Italy.

8-     Use of Technology in Teaching, University Code of Ethics, Competing of Research Funds, Research Ethics, Effective Presentation Skills. Faculty and Leadership Development Center (FLDC) at Fayoum University, Egypt.

9-     Cisco Certified Network Associate (CCNA) by Cisco Academy. 

10-  Network and Information Security, an internship granted by the Malaysian Technical Cooperation Program (MTCP) at Multimedia University in Melaka, Malaysia.

11-  MCPD (Microsoft Certified Professional Developer).

a. C#       b. SQL    c. ASP d. XML and Web Services.

12-  Advanced Network Security, an IBM Training Center, Egypt.

13-  Web Service Composition and Services Oriented Computing, Qatar University.

14-  Cloud Computing and High-Performance Systems, Pisa University.

     Open Source Platforms, Programming Languages and Cybersecurity Tools

Mastered the following programs and tools:

1. Telecommunication Open Source Systems and tools: Open5GCore, Open-Source MANO, and FlexRan.
2. High-Performance Systems: (1) Cloud Computing frameworks: (Microsoft Private Cloud, Eucalyptus, Condor Cloud version, and Open Stack Cloud). (2) Grid Computing. (Condor, Globus, Unicore, and SETI@HOME).
3. Cybersecurity Tools: SNORT, OSSEC, OSSIM, Metasploit, and several open-source security packages.
4. Programming Languages: V. Studio Dot Net, Java, Python, JavaScript, PhP, and C++.
5. Intelligent Languages: Prolog Language.
6. Database Tools: SQL, MySQL.
7. Operating Systems: UNIX Solaris, Windows Server, and Linux Systems.