Hisham Kholidy, PH.D., CEH
Professor and Director of the Cybersecurity Program, Computer Science Department, Northern Illinois University (NIU)
Director of NIU’s Center of Excellence in Cybersecurity and Future Networks (CECFN): https://cecfn.niu.edu
kholidy (at) niu.edu
https://scholar.google.com/citations?hl=en&user=IxEh8VkAAAAJ&view_op=list_works&sortby=pubdate
https://www.cs.niu.edu/about/faculty-and-staff/kholidy/
SHORT PROFILE
► Ph.D. in Computer Science, joint program (Galileo Galilei Doctorate School at Univ. of Pisa in Italy and the University of Arizona (UArizona), Tucson, AZ).
► 10 years of administrative experience at several universities, chairing the computer science department, cybersecurity department, the Student Success and Academic Affairs Committee, and IT and research faculty committees.
► 6 years of professional IT experience at several software companies such as IBM and Vodafone in developing large-scale networks and security applications.
► Lead PI/Co-PI/Senior Personnel of several research projects with a total fund of 4 million dollars including a nearly $1.1 million contract from the AFRL which is the largest single-investigator award ever received at the SUNY Poly.
► More than 100 published papers in high-quality journals and conferences including 3 best paper awards (sole author) and several information security patents published by the USPTO (US Patent and Trademark Office).
► Experienced Penetration Tester with a demonstrated history of working in the computer security industry. Strong consulting professional with CEH certification.
► Solid understanding and hands-on experience of 5G, Cloud Computing, Machine Learning, Autonomic Computing, Cyber Physical Systems, and IoT from cybersecurity and resiliency analysis and design perspectives.
► More than 20 years of research experience at Univ. of Arizona, Mississippi State Univ., Univ. of Nevada in Reno, SUNY Polytechnic Institute, University of Pisa in Italy, Qatar University in Qatar, and Fayoum and Helwan Universities in Egypt.
► More than 10 years of Teaching experience at SUNY Polytechnic Institute (Assistant Prof.), Fayoum Univ. (Assistant Prof.), Mississippi State Univ. (Postdoc), Univ. of Nevada (Postdoc).
► 2024, 2023, 2022, 2021, 2020 Visiting Faculty Research Award by the Air Force Research Lab (AFRL), Rome, NY, USA.
► 2023, 2022, 2021 AFRL Extension Award.
► 2024 SUNY Poly Presidential Award in Excellence Research and Services.
► 2021, 2023 SUNY Poly Dean’s Excellence Research Award and Certificate of Excellence in Research by SUNY Poly and Fayoum University.
► PhD-Plus Certificate of Research Business Plan and Entrepreneurs by Pisa Univ., Italy.
► Best Presentation and Demo award in the OSM-MR Hackfest 2021 and 2nd rank with my student team in the 2022 international 5G core ETSI OSM Hackfest.
► IEEE Senior Member.
► Highly committed to excellence in administration, teaching, and quality research.
RESEARCH INTERESTS
Ø Cybersecurity and Information Assurance.
- 5G Systems Security.
- High-Performance Systems including Grid and Cloud Computing Systems Security.
- Quantum Computing Security.
- Autonomous Vehicles Security
- CPS, Smart Grid, IoT, and SCADA Systems Security.
- Big Data Analytics Security.
Ø Machine Learning and Autonomic Computing.
Ø Software Composition for Cloud and Distributed Systems.
Awards Recognitions and Achievements
•
2024 AFRL Visiting
Faculty Research Award (VFRA). Fund amount: $21,363.
•
Lead PI of the AFRL/RI’s BAA # FA8750-21-S-7001. Fund amount: $1,073,453
from 1/15/2023 to 1/15/2026 (36 months). Funded
by AFRL. https://sunypoly.edu/news/news-release-dr-hisham-kholidy-receives-11-million-contract-air-force-research-lab-improve.html
•
A Cooperative Research and Development Agreement (CRADA) with AFRL that includes transferring Erickson 5G equipment of
$566.895 to setup SUNY Poly facilities to develop the first of its kind “5G
Open Testbed” that will enable SUNY Poly/AFRL/Navy/UArizona
/Virginia Tech (VT).
•
Subcontract Award ($80,000).
Project name “Building Enablers for Multi Industry Sectors Collaborative
Federated Open Platforms & Assets, as a Foundation for Cross-Industry
End-to-End Services Innovation and Delivery AGILITY in the 5G & Beyond
Era”, From 09/01/2023 to 08/31/2025. Korea Institute for Advancement of
Technology (KIAT) grant funded by the Ministry of Trade, Industry and Energy
(MTIE) in South Korea, Project No., P0019809.
•
Co-PI of “Autonomous Cyber
Resilience of 5G Open Architecture” with Nile University (Egypt). Funded by the
Office of Naval Research Global (ONR Global). fund amount: $420,120 from 1/15/2024 to 1/15/2027 (36 months).
•
Hisham Kholidy,
“An Autonomous Security Framework for Assessing and Mitigating
Risks in the Next Generation 5G Mobile Networks”, June 2019. Funded
by New York State Seed
Grant Award. Role: Lead PI, fund
amount: $25,000.
•
2024 AFRL Visiting
Faculty Research Award (VFRA). Fund amount: $21,363.
•
2023 AFRL Visiting
Faculty Research Award (VFRA). Fund amount: $21,363.
•
2023 AFRL Extension
Award. Fund amount:
$10,000.
•
2022 AFRL VFRA. Fund amount: $18,540.
•
2022 AFRL Extension
Award. Fund amount:
$10,000.
•
2021 AFRL VFRA. Fund amount: $18,540.
•
2021 AFRL Extension
Award. Fund amount:
$10,000.
•
2020 AFRL VFRA. Fund amount: $18,540.
•
“Assessing and managing ICT security risks of
industrial controls systems for oil and natural gas production and
transmission”, funded by National Research Fund, June 2016. Fund amount: $600K. Role: Co-PI.
•
“Fault-Adaptive Performance
Management of Enterprise Computing Systems”, funded
style='letter-spacing:-.7pt'> by National
Research Fund , 2013, fund amount: $870 K. Role: Senior Personnel.
•
“Economic Models for QoS Optimization of Composite
Cloud Services” funded by the National Research Fund, January 2015. Fund amount: $900K. Role: Senior Personnel.
•
Hisham
Kholidy, “Cloud Computing Security: An Intrusion Detection System for Cloud Computing Systems”, fund by Galileo
Galilei Doctoral School and the Italian Government, from January 2013. Role: Lead PI, fund amount: 20k euro.
•
Hisham Kholidy, “Enhancing Grid computing Security”
Funded by the Center of Excellence in Information Assurance (COEIA) in King
Saud Univ., Saudi Arabia, August 2008. Role:
Lead PI, fund amount: $20K.
•
2023 and 2021 SUNY Poly Dean’s
Excellence Research Award.
•
Best Paper Award. Paper details: Hisham
A. Kholidy “A Smart Network Slicing Provisioning Framework for 5Gbased IoT
Networks”, The 10th IEEE International Conference on Internet of Things:
Systems, Management and Security (IOTSMS 2023). San Antonio, Texas, USA.
October, 2023.
•
Best presentation award, The OSM-MR
Hackfest Hackathon event, Sept. 2021.
•
The 2nd rank
in the 2022 international 5G core ETSI OSM Hackfest (with a
team of my undergraduate and graduate students).
•
Certified Ethical Hacker (CEH)
certification, EC-Council, July
2020.
•
Best Researcher Award by the International Scientist Awards
on Engineering, Science, and Medicine,
the VDGOOD International Conf. Committee, October 2020.
•
1st place in
recognition of the outstanding quality poster titled: “A Novel Zero Trust
Architecture for the New 5G Federated Network” presented at the SUNY Poly
Project Showcase, Spring 2022.
•
Best Paper Award. Paper details: Hisham A. Kholidy, “Towards a Scalable Symmetric Key
Cryptographic Scheme: Performance Evaluation and Security Analysis”, IEEE
Int. Conference on Computer Applications &Information Security (ICCAIS),
Riyadh, Saudi Arabia, May 1-3, 2019.
•
Best Poster Award for a poster entitled “5G
Network Slicing Utilizing Blockchain Technology”, won an honorable mention in the computer science
category of the SUNY
showcase in May 2019.
•
A patent entitled "A
Data-Driven Semi-Global Alignment
Technique for Masquerade Detection in Stand-Alone and
Cloud Computing Systems", was published by the USPTO. Nov. 2018.
•
Certificate of Distinguished Research
Quality, Fayoum University in Egypt.
Nov. 2016.
•
Best
Lecturer Award, Fayoum University in Egypt. Nov. 2016.
•
Certificate of Excellence
in Research and Teaching, Fayoum Univ. in Egypt, Nov. 2014.
•
A scholarship to
conduct research at the University of Arizona in College of Electrical and Computer
Engineering (ECE) as a part of my Ph.D. program. The scholarship was funded by
Galileo Galilei Doctorate School to collaborate with the ECE research team and
conduct joint supervision, January 2012.
•
In February 2012, I founded the 1st Egyptian Winter School in Grid and Cloud Computing “EGWSGC2012”.
I trained a group of master’s and Ph.D. researchers on practical Cloud and Grid
computing tools to be used in their research.
•
PhD-Plus certificate of
Research Business Plan and Entrepreneurs, Pisa Univ., Italy, 2011.
•
In July 2010, a short
scholarship by Ulm University in Günzburg in Germany to
attend XtreemOS Summer School for Grid and Cloud systems.
•
In February 2010, a short scholarship by the National e-Science Centre of Edinburgh Univ.
in the UK to attend the International Winter School in Grid Computing
(IWSGC).
•
August 2009, a full
PhD scholarship by Galileo Galilei Doctorate School, Univ. of Pisa in
Italy.
•
July 2009, a patent
was published by the United States Patent and Trademark Office (USPTO)
with the title "Accelerating Stream Cipher Operations Using Single and Grid
Systems", ref. KSU.0136PTUS, under number 12924978.
•
In June 2009,
awarded a research project
by the Center
of Excellence in Information
Assurance (CoEIA), King Saud University for Enhancing Grid Computing
Security.
•
May 2008, a
scholarship by MALAYSIAN TECHNICAL COOPERATION PROGRAMME to study some
practical parts during my master's degree.
•
April 2005, the first Rank in the National
ITI (Information Technology Institute) competition for Programming, database,
and web development.
•
September 2003, ETS
certification (Educational Testing Services) from ETS American Dept.
Publications
Ø Published Patents:
1) Hisham A. Kholidy, “Accelerating Stream Cipher Operations using Single and Grid Systems”, US Patent and Trademark Office (USPTO), April 2012, US 20120089829 A1.
2) Hisham A. Kholidy, Fabrizio Baiardi, A. Azab, "A Data-Driven Semi-Global Alignment Technique For Masquerade Detection in Stand-Alone and Cloud Computing Systems", granted on January 2019, US 20170019419 A1.
Sole Author Journal Papers:
1. Hisham Kholidy, “Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method”, Sensors 2022, 22, 9.
https://doi.org/10.3390/s22010009. (IF: 3.576).
2. Hisham Kholidy, “Detecting impersonation attacks in cloud computing environments using a centric user profiling approach”, Future Generation Computer Systems, Volume 117, issue 17, Pages 299-320, ISSN 0167-739X, https://doi.org/10.1016/j.future.2020.12.009, (IF: 7.307). April 2021, https://www.sciencedirect.com/science/article/pii/S0167739X20330715
3.
Hisham Kholidy, “Autonomous Mitigation of Cyber Risks in Cyber-Physical Systems”, Future Generation Computer Systems, Volume
115, 2021, Pages
171-187, ISSN 0167-739X, (IF: 7.307) DOI: https://doi.org/10.1016/j.future.2020.09.002 https://www.sciencedirect.com/science/article/pii/S0167739X19320680
4. Hisham A. Kholidy, “An Intelligent Swarm based Prediction Approach for Predicting Cloud Computing User
Resource Needs”, the Computer Communications Journal, Feb 2020 (IF: 5.047). https://authors.elsevier.com/tracking/article/details.do?aid=6085&jid=COMCOM&surname=Kholidy
5.
Hisham A. Kholidy, “Correlation
Based Sequence Alignment Models for Detecting Masquerades in Cloud Computing”,
IET Information Security Journal, DOI: 10.1049/iet-ifs.2019.0409, Sept. 2019
(IF: 1.51) https://digital- library.theiet.org/content/journals/10.1049/iet-ifs.2019.0409
1.
Boualem, A., Ayaida,
M., de Runz, C., Hisham A. Kholidy et
al. Sm-vsn-3c: a new Starlings model-based virtual sensor networks for
coverage, connectivity, and data ccommunication. Cluster
Comput 27, 13777–13793 (2024). https://doi.org/10.1007/s10586-024-04554-9
2.
Mustafa, F.M., Hisham A. Kholidy., Sayed, A.F. et al.
Optical fiber fronthaul segment in open radio access 5G networks: enhanced
performance utilizing AFBG. Opt Quant Electron 56,
1014 (2024). https://doi.org/10.1007/s11082-024-06875-w
3.
Boualem, A., De Runz,
C., Ayaida, M., Hisham A. Kholidy. Probabilistic
intrusion detection based on an optimal strong K-barrier strategy in
WSNs. Peer-to-Peer Netw. Appl. (2024).
https://doi.org/10.1007/s12083-024-01634-w
4.
I. Elgarhy, M. M. Badr, M. Mahmoud,
M. M. Fouda, M. Alsabaan
and Hisham A. Kholidy, "Clustering and Ensemble Based Approach For Securing Electricity Theft Detectors Against Evasion
Attacks", in IEEE Access, January 2023, doi: 10.1109/ACCESS.2023.3318111. (IF: 3.55).
5. Mustafa, F.M., Hisham
A. Kholidy, Sayed, A.F. et al. “Backward pumped distributed
Raman amplifier: enhanced gain”, Optical Quantum Electron 55, 772
(2023). https://doi.org/10.1007/s11082-023-05066-3 (IF: 3.0).
6. Alahmadi TJ, Rahman AU, Alkahtani
HK, Hisham A. Kholidy “Enhancing Object Detection for VIPs Using
YOLOv4_Resnet101 and Text-to-Speech Conversion Model”, Multimodal
Technologies and Interaction. 2023; 7(8):77. https://doi.org/10.3390/mti7080077 (IF: 3.17).
7.
Alkhowaiter, M.; Hisham A. Kholidy.; Alyami, M.A.; Alghamdi, A.; Zou, C, “Adversarial-Aware
Deep Learning System Based on a Secondary Classical Machine Learning
Verification Approach”. Sensors 2023, 23, 6287. https://doi.org/10.3390/s23146287 (IF: 3.9).
8. Badr, Mahmoud M.,
Mohamed I. Ibrahem, Hisham A. Kholidy, Mostafa
M. Fouda, and Muhammad Ismail. 2023. "Review of
the Data-Driven Methods for Electricity Fraud Detection in Smart Metering
Systems" Energies 16, no. 6: 2852. 2023 (IF: 3.25).
https://doi.org/10.3390/en16062852
9. A
Jakaria, M. Rahman,
M. Asif, A. Khalil, Hisham Kholidy, M. Anderson, S. Drager,
"Trajectory Synthesis for a UAV
Swarm Based on Resilient Data Collection Objectives," in IEEE Transactions on Network and Service Management, 2022,
doi: 10.1109/TNSM.2022.3216804. (IF: 4.75). https://ieeexplore.ieee.org/document/9928375?source=authoralert
10.
Mustafa,
F.M., Hisham
Kholidy., Sayed, A.F. et
al., “Enhanced dispersion reduction using apodized
uniform fiber Bragg grating for optical MTDM transmission systems”. Optical and Quantum
Electronics 55, 55 (December 2022). https://doi.org/10.1007/s11082-022-04339-7 . (IF: 2.79).
11. Hisham A. Kholidy, Abdelkarim Erradi, “VHDRA: A Vertical and Horizontal Dataset Reduction Approach for
Cyber-Physical Power-Aware Intrusion Detection Systems”, SECURITY AND COMMUNICATION NETWORKS Journal
(IF: 1.968), March 7,
2019. vol. 2019, 15 pages. https://doi.org/10.1155/2019/6816943.
12. Hisham A. Kholidy, Abdelkarim Erradi,
Sherif Abdelwahed, Fabrizio Baiardi, "A risk
mitigation approach for autonomous cloud intrusion response system", in Journal of Computing, Springer, DOI: 10.1007/s00607-016-0495-8,
June 2016. (IF: 2.42).
13. Hisham A. Kholidy, Fabrizio Baiardi,
Salim Hariri, “DDSGA: A Data-Driven Semi-
Global Alignment Approach for Detecting
Masquerade Attacks”, in IEEE Transactions on Dependable and Secure
Computing, DOI 10.1109/TDSC.2014.2327966,
May 2014. (ISI
Impact factor: 6.791).
14. Hisham A. Kholidy,
Hala Hassan, Amany Sarhan,
Abdelkarim Erradi, Sherif Abdelwahed, "QoS Optimization for Cloud
Service Composition Based on Economic Model", Book Chapter on the Internet
of Things. User-Centric IoT, 2015, Volume 150 ISBN
: 978- 3-319-19655-8
15. Atta-ur Rahman, Maqsood Mahmud, Tahir Iqbal, Hisham Kholidy, Linah Saraireh, et al “Network anomaly detection in 5G networks”, The Mathematical Modelling of Engineering Problems journal, April 2022, Volume 9, Issue 2, Pages 397-404. DOI 10.18280/mmep.090213
16. Hisham A Kholidy., et al. “A Survey Study For the 5G Emerging Technologies", Acta Scientific Computer Sciences 5.4 (2023): 63-70.
17. Hisham A. Kholidy,
Fabrizio Baiardi, Salim Hariri, Esraa M. ElHariri, Ahmed M. Youssouf, and Sahar A. Shehata, “A Hierarchical Cloud Intrusion Detection System: Design and Evaluation”, in International Journal on Cloud Computing: Services and Architecture (IJCCSA), November 2012. DOI 10.5121/ijccsa.2012.2601
18. Hisham A. Kholidy, Alghathbar Khaled s., “Adapting
and accelerating the Stream Cipher Algorithm RC4 using Ultra Gridsec and HIMAN and use it to secure HIMAN Data”, Journal
of Information Assurance
and Security (JIAS),
vol. 4 (2009)/ issue 4,pp 274, tot.pag 283, 2009. http://www.mirlabs.org/jias/vol4-issue6.html
1. (Best
Paper Award). Hisham
A. Kholidy, “A Novel Blockchain Approach for Continuously Authenticating
UAVs to Achieve Zero Trust Principles in 5G-enabled UAVs”, The Nordic
e-Infrastructure Collaboration (NeIC 2024),
Tallinn, Estonia May
27 – 29, 2024.
2. (Best
Paper Award). Hisham
A. Kholidy, “A Smart Network Slicing Provisioning Framework for 5Gbased
IoT Networks”, The 10th International Conference on Internet of Things:
Systems, Management and Security (IOTSMS 2023). San Antonio, Texas, USA.
October, 2023.
3. (Best
Paper Award) Hisham A. Kholidy,
“Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation
and Security Analysis”, IEEE International
Conference on Computer Applications & Information Security
(ICCAIS), Riyadh, Saudi Arabia, May 1-3,
2019. https://ieeexplore.ieee.org/document/8769482.
4. Hisham A. Kholidy, "A Study for Access Control Flow Analysis With a Proposed Job Analyzer Component based on Stack Inspection Methodology", the 2010 10th International Conference on Intelligent Systems Design and Applications (ISDA), pp 1442-1447, Cairo, Egypt, vol. IEEE Catalog Number: CFP10394-CDR, 2010.
5. Hisham A. Kholidy, "HIMAN-GP: A Grid Engine Portal for controlling access to HIMAN Grid Middleware with performance evaluation using processes algebra", The 2nd International Conference on Computer Technology and Development ICCTD, pp 163-168, Cairo, 2010.
1. M. M. Badr, M. Baza, A. Rasheed, Hisham Kholidy, S. Abdelfattah and
T. S. Zaman, "Comparative Analysis between Supervised and Anomaly
Detectors Against Electricity Theft Zero-Day Attacks," 2024
International Telecommunications Conference (ITC-Egypt), Cairo, Egypt,
2024, pp. 706-711, doi:
10.1109/ITC-Egypt61547.2024.10620537.
2. Hisham Kholidy, A. Berrouachedi,
E. Benkhelifa and R. Jaziri, "Enhancing Security
in 5G Networks: A Hybrid Machine Learning Approach for Attack
Classification," 2023 20th
ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Giza, Egypt, 2023, pp. 1-8, doi: 10.1109/AICCSA59173.2023.10479294.
3. H. A. Kholidy, Keven Disen;
Andrew Karam; Elhadj Benkhelifa;
Mohammad A. Rahman, et al., "Secure the 5G and Beyond
Networks with Zero Trust and Access Control Systems for Cloud Native
Architectures," 2023 20th
ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Giza, Egypt, 2023, pp. 1-8, doi: 10.1109/AICCSA59173.2023.10479308.
4. I. Almazyad, S. Shao, S. A. Boualem,
A. Berrouachedi, M. Ayaida,
H. Kholidy and E. Benkhelifa, "A New
Hybrid Cipher based on Prime Numbers Generation Complexity: Application in
Securing 5G Networks," 2023 20th ACS/IEEE International Conference on
Computer Systems and Applications (AICCSA), Giza, Egypt, 2023, pp. 1-8, doi: 10.1109/AICCSA59173.2023.10479316.
5. I. Almazyad, S. Shao, S. Hariri and H. A. Kholidy, "Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis, and Evaluation," 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Giza, Egypt, 2023, pp. 1-7, doi: 10.1109/AICCSA59173.2023.10479312.
6. A. A. Abushgra, H. A. Kholidy, A. Berrouachedi
and R. Jaziri, "Innovative Routing Solutions: Centralized Hypercube
Routing Among Multiple Clusters in 5G Networks," 2023 20th ACS/IEEE International Conference on Computer
Systems and Applications (AICCSA), Giza, Egypt, 2023, pp. 1-7, doi:
10.1109/AICCSA59173.2023.10479277.
7. R. Bohn, A. Battou, B. Choi, R. Chaparadza, S.
Song, T. Zhang, T. Choi, Hisham A. Kholidy, M. Park, S. Go, “NIST
Multi-Domain Knowledge Planes for Service Federation for 5G & Beyond Public
Working Group: Applications to Federated Autonomic/Autonomous Networking”, in
the IEEE Future Networks World Forum (FNWF), 13–15 November 2023 // Baltimore,
MD, USA.
8. I. Elgarhy, A. El-toukhy, M. Badr,
M. Mahmoud, M. Fouda, M. Alsabaan,
Hisham A. Kholidy, “Secured Cluster-Based Electricity Theft Detectors
Against Blackbox Evasion Attacks”, in the IEEE 21st Consumer Communications
& Networking Conference (CCNC), 6-9 January 2024.
9.
M. C. Zouzou, E. Benkhelifa, Hisham A. Kholidy and D. W. Dyke,
"Multi-Context-aware Trust Management framework in Social Internet of
Things (MCTM-SIoT)," 2023 International
Conference on Intelligent Computing, Communication, Networking and Services
(ICCNS), Valencia, Spain, 19-22 June 2023, pp. 99-104, doi:
10.1109/ICCNS58795.2023.10193510.
10. Hisham A. Kholidy,
Andrew Karam, James Sidoran, et al. “Toward Zero
Trust Security in 5G Open Architecture Network Slices”, IEEE Military
Conference (MILCOM), CA, USA, November
29, 2022. https://edas.info/web/milcom2022/program.html
11. Hisham A. Kholidy, Andrew
Karam, Jeffrey H. Reed, Yusuf Elazzazi, "An
Experimental 5G Testbed for Secure Network Slicing Evaluation", the
2022 IEEE Future Networks World Forum (FNWF), Montreal, Canada, October 2022. https://fnwf.ieee.org/wp-
content/uploads/sites/339/2022/10/AcceptedPaperScheduleV0.1.pdf
12. Hisham A. Kholidy, Riaad Kamaludeen “An Innovative Hashgraph-based Federated Learning Approach for Multi
Domain 5G Network Protection”, the 2022 IEEE Future Networks World Forum
(FNWF), Montreal, Canada, October 2022. https://fnwf.ieee.org/wp-content/uploads/sites/339/2022/10/AcceptedPaperScheduleV0.1.pdf
13. Hisham A. Kholidy, Salim Hariri, “Toward an Experimental Federated 6G Testbed: A Federated leaning Approach”, the 19th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2022), Abu Dhabi, UAE December 5th
- December 7th, 2022
14.
Hisham Kholidy, Andrew Karam, James L. Sidoran,
Mohammad A. Rahman, "5G Core Security
in Edge Networks: A Vulnerability Assessment Approach", the 26th IEEE Symposium on Computers and Communications (The 26th IEEE ISCC),
Athens, Greece, September 5-8, 2021. https://ieeexplore.ieee.org/document/9631531
15. N. I. Haque, M. Ashiqur Rahman, D. Chen, Hisham Kholidy, "BIoTA: Control-Aware Attack Analytics for Building Internet of Things," 2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON), 2021, pp. 1-9, doi: 10.1109/SECON52354.2021.9491621.
16. Samar SH. Haytamy, Hisham A. Kholidy, Fatma A. Omara, “Integrated Cloud Services Dataset”, Springer, Lecture Note in Computer Science, ISBN 978-3-319-94471-5, https://doi.org/10.1007/978-3-319-94472-2. 14th World Congress on Services, 18-30. Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA.
17. Hisham A. Kholidy, Ali Tekeoglu, Stefano Lannucci, Shamik Sengupta, Qian Chen, Sherif Abdelwahed, John Hamilton, “Attacks Detection in SCADA Systems Using an Improved Non- Nested Generalized Exemplars Algorithm", the 12th IEEE International Conference on Computer Engineering and Systems (ICCES 2017), published in February 2018.
18. Stefano Iannucci, Hisham A. Kholidy Amrita Dhakar Ghimire, Rui Jia, Sherif Abdelwahed, Ioana Banicescu, “A Comparison of Graph-Based Synthetic Data Generators for Benchmarking Next-Generation Intrusion Detection Systems”, IEEE Cluster, Sept 5 2017, Hawaii, USA.
19. Qian Chen, Hisham A. Kholidy, Sherif Abdelwahed, John Hamilton, "Towards Realizing a Distributed Event and Intrusion Detection System", the International Conference on Future Network Systems and Security (FNSS 2017), Gainesville, Florida, USA, 31 August 2017.
20. Hisham A. Kholidy, Abdelkarim Erradi, “A Cost-Aware Model for Risk Mitigation in Cloud Computing Systems”, 12th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Marrakech, Morocco, November, 2015.
21. Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, “Attack Prediction Models for Cloud Intrusion Detection Systems”, in the International Conference on Artificial Intelligence, Modelling and Simulation (AIMS2014), Madrid, Spain, November 2014.
22. Hisham A. Kholidy, Ahmed M. Yousouf, Abdelkarim Erradi, Hisham A. Ali, Sherif Abdelwahed, "A Finite Context Intrusion Prediction Model for Cloud Systems with a Probabilistic Suffix Tree", in the 8th European Modelling Symposium on Mathematical Modelling and Computer Simulation, Pisa, Italy, October 2014.
23. Hisham A. Kholidy, A. Erradi, S. Abdelwahed, “Online Risk Assessment and Prediction Models For Autonomic Cloud Intrusion Prevention Systems”, in the “11th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), Doha, Qatar, November 2014.
24. Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Abdulrahman Azab, “A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems", in the 12th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), Dalian, China, August 2014.
25. Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Fabrizio Baiardi, “A Hierarchical, Autonomous, and Forecasting Cloud IDS”, the 5th Int. Conference on Modeling, Identification and Control (ICMIC2013), Cairo, Aug31-Sept 1-2, 2013.
26. Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Fabrizio Baiardi, “HA- CIDS: A Hierarchical and Autonomous IDS for Cloud Environments”, Fifth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN) Madrid, Spain, June 2013.
27. Hisham A. Kholidy, Fabrizio Baiardi, "CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks", the 9th International Conference on Information Technology: New Generations (ITNG), Las Vegas, Nevada, USA, 2012.
28. Hisham A. Kholidy, Fabrizio Baiardi, "CIDS: A framework for Intrusion Detection in Cloud Systems", The 9th International Conf. on Information Technology: New Generations (ITNG), Las Vegas, Nevada, USA, 2012.
29. Hisham A. Kholidy, Chatterjee N., "Towards Developing an Arabic Word Alignment Annotation Tool with Some Arabic Alignment Guidelines", the 2010 10th International Conference on Intelligent Systems Design and Applications (ISDA), pp 778-783, Cairo, Egypt, vol. IEEE Catalog Number: CFP10394-CDR, 2010.
30. Hisham A. Kholidy, Khaled S. Algathber, "A New Accelerated RC4 Scheme using "Ultra Gridsec" and "HIMAN", 5th Int. Conference on Information Assurance and Security, Aug 2009, China.
31. Hisham A Kholidy, A. Azab, S. Deif, "Enhanced ULTRA GRIDSEC: Enhancing High- Performance Symmetric Key Cryptography Schema Using Pure Peer-to-Peer Computational Grid Middleware (HIMAN)", IEEE-ICPCA (the 3rd Int. Conf. on Pervasive Computing and Applications, 06-08 Oct 2008.
32. A. Azab, Hisham A Kholidy, "An Adaptive Decentralized Scheduling Mechanism for Peer-to-Peer Desktop Grids", International Conference on Computer Engineering & Systems Nov 2008.
33. Mostafa-Sami M., Safia H D., Hisham A Kholidy, "ULTRAGRIDSEC: Peer-to-Peer Computational Grid Middleware Security Using High-Performance Symmetric Key Cryptography" in IEEE-ITNG (5th Int. Conf. On Information Technology-New Generations), LasVegas, Nevada, USA, 7-9 April 2008.
1. Hisham Kholidy, “Cybersecurity Evolution: Innovations, Trends, and Future Frontiers””, Workshop , keynote at the Nordic e-Infrastructure Collaboration (NeIC 2024), Tallinn, Estonia, May 28, 2024.
2. Hisham Kholidy, “End-to-End Services Federation AGILITY in
the 5G & Beyond Networks”, Workshop Naval Research Global (ONR Global).
Palma de Mallorca, Spain 22-24 September 2023.
3. Hisham Kholidy, “A Smart Network Slice Orchestrator for the
5G and Beyond Networks”, AFRL VFRP 2023 Presentation.
4. Hisham Kholidy, “Toward Zero Trust Security in 5G Open Architecture Network Slices”, AFRL VFRP 2022 Presentation.
5. Mohammed Abuzamak and Hisham Kholidy
“Zero Trust Architecture for the New 5G
Open Federated Network”, SUNY Poly Showcase event 2022. 1st place in recognition of the outstanding
quality of the poster.
6. Wendel Balbuena, Hisham A. Kholidy “Emerging Topics in the Next Generation 5G/6G Networks: A practical Overview”, SUNY POLY SURP 2022.
7. Hisham Kholidy, Michael Stein, Mohammed Abuzamak, Wendell Balbuena, and Yusuf Elazzazi, “On-boarding Magma 1.7 5G Core with OSM”, International Hackfest #13, June 2022. (Second Rank in the Hackfest).
8. Hisham Kholidy, “Multi-Layer Attack Graph Analysis in the 5G Edge Network”, Technical Talk for AFRL VFRA. August 2021.
9. Hisham Kholidy, "5G Core Security in Edge Networks: A Vulnerability Assessment Approach", A presentation for the 26th IEEE Symposium on Computers and Communications (IEEE ISCC 2021), Athens, Greece, September 8, 2021.
10. Hisham Kholidy, “Vulnerability Assessment in the 5G Core Networks”, (Poster, Presentation, and Demo) the Air Force Research Lab (AFRL), Rome, NY, USA, July 2021.
11. Hisham Kholidy, “Ksniff as a Kubernetes-integrated packet sniffer”, (best presentation and demo award) Sept. 2021. OSM-MR11 Hackfest.
12. Hisham Kholidy, “Vulnerability Assessment in the 5G Core Networks”, (Poster, Presentation, and Demo) the AFRL, Rome, NY, USA, July 2021.
13. Ernis Sehovic, Hisham Kholidy, “5G Edge Security Testbed at ACRL Lab at SUNY Poly“, SUNY POLY SURP 2021.
14. Djodan Maviaki, Debarshee Ghosh, Sanita Hadziahmetovic, and Hisham Kholidy, “5G Network Slicing Utilizing Blockchain Technology”, SUNY Poly Showcase event, won the Best Poster Award and an honorable mention in the computer science category of the showcase, May 2019.
14. Bruce Steel, Hisham Kholidy, “Modeling Attack Warfare in Cyber-physical Systems Using a Competitive Markov Model”, SUNY SURP Poster Sessions, August 2019.
15. Mohammed Arshad, Patel Tirth, Hisham Kholidy, “Deception Technology: A Method to Reduce the Attack Exposure Time of a SCADA System”, https://dspace.sunyconnect.suny.edu/handle/1951/70148,
16. Akshay Bhoite, Diwash Basnet, Hisham Kholidy, “Risk Evaluation for Campus Area Network”, https://dspace.sunyconnect.suny.edu/handle/1951/70162
1. Hisham A. Kholidy. Dynamic Network Slicing Orchestration in Open 5G Networks using Multi-Criteria Decision Making and Secure Federated Learning Techniques, 08 August 2024, PREPRINT (Version 1) available at Research Square [https://doi.org/10.21203/rs.3.rs-4745968/v1]
2. Adda Boualem, Hacène Fouchal, Marwane Ayaida et al. Diagnose and Classification of Infectious and Diseases using Nano Sensors Network in Nanofluids: Theoretical and Modeling Study, 24 May 2024, PREPRINT (Version 1) available at Research Square [https://doi.org/10.21203/rs.3.rs-4414269/v1]
3. Malkoc, M., & Kholidy, H. A. (2023). 5G Network Slicing: Analysis of Multiple Machine Learning Classifiers. ArXiv. /abs/2310.01747.
4. Fathy M. Mustafa, Hisham A. Kholidy, Ahmed F. Sayed et al. Distributed Backward Pumped Raman Amplifier Gain Enhancement: New Approaches, 06 April 2023, available at Research Square [https://doi.org/10.21203/rs.3.rs-2770728/v1]
5. Grippo, T., & Kholidy, H. A. (2022). Detecting Forged Kerberos Tickets in an Active Directory Environment. arXiv. https://doi.org/10.48550/arXiv.2301.00044
6. Zielinski, D., & Kholidy, H. A. (2022). An Analysis of Honeypots and their Impact as a Cyber Deception Tactic. arXiv. https://doi.org/10.48550/arXiv.2301.00045
7. Kholidy, H. A., & Abuzamak, M. (2022). 5G Network Management, Orchestration, and Architecture: A Practical Study of the MonB5G project. arXiv. https://doi.org/10.48550/arXiv.2212.13747
8. Abuzamak, M., & Kholidy, H. (2022). UAV Based 5G Network: A Practical Survey Study. arXiv. https://doi.org/10.48550/arXiv.2212.13329
9. Kholidy, H. A., Rahman, M. A., Karam, A., & Akhtar, Z. (2022). Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing Platform. arXiv. https://doi.org/10.48550/arXiv.2201.00484
10. Kholidy, H. A. (2021). State Compression and Quantitative Assessment Model for Assessing Security Risks in the Oil and Gas Transmission Systems. arXiv. https://doi.org/10.48550/arXiv.2112.14137
11. Kholidy, H. A. (2021). A Triangular Fuzzy based Multicriteria Decision Making Approach for Assessing Security Risks in 5G Networks. arXiv. https://doi.org/10.48550/arXiv.2112.13072
12. Haque, N. I., Rahman, M. A., Chen, D., & Kholidy, H. (2021). BIoTA Control-Aware Attack Analytics for Building Internet of Things. arXiv. https://doi.org/10.48550/arXiv.2107.14136
13. Kholidy, H. A. (2020). Cloud-SCADA Penetrate: Practical Implementation for Hacking Cloud Computing and Critical SCADA Systems. Department of Computer and Network Security, College of Engineering, SUNY Polytechnic Institute. http://hdl.handle.net/20.500.12648/1605
1. Hisham A. Kholidy, “SAF:
A Security Awareness Framework for Detecting Attacks in the Oil and Gas
Transmission SCADA Systems”, Electronic Journal, October 2023.
2. Hisham A. Kholidy, "Secure Federated Learning for Zero Trust Security in 6G Networks”, IEEE IoT, August 28, 2023.
3. Hisham A. Kholidy, “A Federated Learning Security Awareness Framework for Oil and Gas Transmission SCADA Systems”, IEEE Transactions on Industrial Informatics, August 15, 2023.
4. Hisham A. Kholidy, “A Probabilistic Machine Learning Framework for Risk Analysis and Mitigation in the Critical Intelligrid Systems”, IEEE Canadian Journal of Elect. and Comp. Engineering, July 25, 2023.
SYNERGISTIC ACTIVITIES
1. General Chair of the 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), December 2023: https://aiccsa.net/AICCSA2023/committee/
2. Guest Editor of a special issue with the title Special Issue " Harnessing Machine Learning and AI in Cybersecurity”, Electronic Journal, August 2022. https://www.mdpi.com/journal/sensors/special_issues/ML_AI_cybersecurity
3. Guest Editor of a special issue with the title Special Issue
"Emerging Security Topics in Next Generation 5G Networks" in
Electronic Journal, June 2021. https://www.mdpi.com/journal/electronics/special_issues/security_next_generatoin_5g
4. TPC member for IEEE GLOBCOM 2023.
5. Reviewer for the IEEE Admission & Advancement (A&A) Review Panels to review senior member applications.
6. Reviewer for the information security track, Cluster Computing Journal, August 2020.
7. Reviewer for the information security track, the Future Generation Computer Systems, February 2020.
8. Technical Program Committee (TPC) member, Int. Workshop on Self-Protecting Systems, April 2019
9. Organizer and Co-Chair of the Cybersecurity Track at the ICCMIT conference in VIENNA, AUSTRIA March 26-28, 2019.
10. Reviewer for the IEEE Transactions on Information Forensics and Security, Jan 2019.
11. Reviewer for Computer and Security Journal, (Impact factor: 2.65) January 2019.
12. Lead Guest Editor of a special issue in the Security and Communication Networks Journal (Impact factor: 1.376), July 2018.
13. Reviewer for the information security track, Cluster Computing Journal, 2017.
14. Reviewer for the distributed system track, Journal of Supercomputing, 2016.
15. Reviewer for the IEEE Transactions on Cloud Computing (IF: 7.92), March 2016.
16. Publication Chair for the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), 2014.
17. TPC for the 12th Int. Conf. on Service-Oriented Computing (ICSOC), July 2014.
18. Track chair for the Security and Privacy track in the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), 2014.
19. TPC member for the Security, Privacy, Confidentiality, and Cloud Networking Track in the 3rd IEEE International Conference on Cloud Networking (IEEE CloudNet), 2014.
20. Founded the Egyptian Winter school in Grid and Cloud Computing(EGWSGC), 2012.
21. Track chair for the Information & Communication track in the 2nd International Conference on Computer Technology and Development (ICCTD), 2010.
22. The organizer of a Cloud Computing seminar at Fayoum University in Egypt, July 2014.
Example of Developed Software
1- An Attack Classification Technique for the Cyber-Physical Power Systems using an Improved NON-NESTED GENERALIZED EXEMPLARS Algorithm.
https://sunypoly.edu/research/centers-programs/acrl/research.html.html
2- A Security Framework for Countering Cyber-Adversary in Critical Infrastructures.
https://sunypoly.edu/research/centers-programs/acrl/research.html/span>.html
3- A Cloud Intrusion Detection System (CIDS) to detect attacks in SaaS, PaaS, and IaaS. http://www.di.unipi.it/~hkholidy/projects/cids/index.html
4- A cloud Intrusion detection dataset (CIDD).
http://www.di.unipi.it/~hkholidy/projects/cidd/index.html
5- An intelligent prediction framework for forecasting Cloud consumer resource needs.
6- An Intelligent biometric fingerprint and smart card reader Software for King Saud University.
7- A Grid Resource Allocator System for Our Computational Grid Computing System (HIMAN).
8- Authentication, Authorization, and Encryption schemes to secure the data passing through "HIMAN".
9- An E-learning web site for a community college at King Saud University.
10- Several Examination software.
Training and Certifications
1- NSF CAREER Workshop, “Proposal Writing Lectures Series”, Albany, NY.
2- GIAC Certified Incident Handler (GCIH) by SANS Institute.
3- DegreeWorks Workshop that explains how to academically advise students online. Suny Polytechnic Institute, Utica, NY.
4- Blackboard Webinars in May 2019 at Suny Polytechnic Institute, Utica, NY.
5- Research Writing Skills, University of Nevada, Reno.
6- Professional English for research writing, Pisa University in Italy.
7- Effective Classroom Management Strategies and Ideas for Teachers, by Erasmus IFOM- Teacher training courses and Vocational placement, Italy.
8- Use of Technology in Teaching, University Code of Ethics, Competing of Research Funds, Research Ethics, Effective Presentation Skills. Faculty and Leadership Development Center (FLDC) at Fayoum University, Egypt.
9- Cisco Certified Network Associate (CCNA) by Cisco Academy.
10- Network and Information Security, an internship granted by the Malaysian Technical Cooperation Program (MTCP) at Multimedia University in Melaka, Malaysia.
11- MCPD (Microsoft Certified Professional Developer).
a. C# b. SQL c. ASP d. XML and Web Services.
12- Advanced Network Security, an IBM Training Center, Egypt.
13- Web Service Composition and Services Oriented Computing, Qatar University.
14- Cloud Computing and High-Performance Systems, Pisa University.
Open Source Platforms, Programming Languages and Cybersecurity Tools
Mastered the following programs and tools:
1. Telecommunication Open Source Systems and tools: Open5GCore, Open-Source MANO, and FlexRan.
2. High-Performance Systems: (1) Cloud Computing frameworks: (Microsoft Private Cloud, Eucalyptus, Condor Cloud version, and Open Stack Cloud). (2) Grid Computing. (Condor, Globus, Unicore, and SETI@HOME).
3. Cybersecurity Tools: SNORT, OSSEC, OSSIM, Metasploit, and several open-source security packages.
4. Programming Languages: V. Studio Dot Net, Java, Python, JavaScript, PhP, and C++.
5. Intelligent Languages: Prolog Language.
6. Database Tools: SQL, MySQL.
7. Operating Systems: UNIX Solaris, Windows Server, and Linux Systems.