أ.م.د. بابان احمد محمود امين

Image

الأسم الثلاثي: بابان أحمد محمود

البريد الالكتروني: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.

الشهادة: دكتوراه 

اللقب العلمي: أستاذ مساعد

الاختصاص العام: هندسة حاسبات

الاختصاص الدقيق: أمنية الشبكات

الجهة المانحة للشهادة (الجامعة، الكلية، القسم): جامعة كنتاكي - كلية الهندسة - قسم علوم الحاسوب

تاريخ الحصول على الشهادة: 16/12/2016

الروابط العلمية:

1- https://scholar.google.com/citations?user=ticje48AAAAJ&hl=en&oi=ao
2- https://www.researchgate.net/profile/Baban_Mahmood

 

الدورات  التي تم المشاركة فيها:

1- SQL Server 2005 and Database Design 2009
2- Networking (CCNA1)
3- Networking (CCNA2)
4- Introduction to Oracle 9i: SQL
5- Fundamentals of Database administration I Oracle 9i
6- Fundamentals of Database administration II Oracle 9i

البحوث المنشورة:

1- Position Based and Hybrid Routing Protocols for Mobile Ad Hoc Networks: A Survey

Wireless Personal Communications An International Journal: SPRINGER VOL. 81, NUMBER 1, MARCH 2015
2- GRB: Greedy Routing Protocol with Backtracking for Mobile Ad-Hoc Networks

International Conference TH 2015 IEEE 12 on Mobile Ad Hoc and Sensor Systems (MASS)
3- Hybrid On-demand Greedy Routing Protocol with Backtracking for Mobile Ad-Hoc Networks

IFIP Wireless and Mobile th 2016 9 Networking Conference (WMNC)
4- SAriadne: A Secure Source Routing Protocol to Prevent Hidden-Channel Attacks

International Conference on th 2016 IEEE 12 Wireless and Mobile Computing, Networking and Communications (WiMob)
5- A Secure Framework for Sharing Electronic Health Records over Clouds

2016 IEEE International Conference on Serious Games and Applications for Health (SeGAH),
6- A Secure Framework For Medical Information Exchange (MI-X) Between Healthcare Providers

2016 IEEE International Conference on Healthcare Informatics
7- GRB: Greedy Routing Protocol with Backtracking for Mobile Ad-Hoc Networks

INTERNATIONAL JOURNAL OF NEXT- GENERATION COMPUTING (IJNGC) (2018)
8- Hybrid On-demand Greedy Routing Protocol with Backtracking for Mobile Ad-Hoc Networks –extended version

INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS Vol. 16, No. 1, pp. 24-52. Jan. 2020
9- Secure message transmission scheme in wireless sensor networks

Bulletin of Electrical Engineering and Informatics Vol. 10 No. (3), pp. 1514-1523, 2021

10- An Extensive Analysis of the Ad Hoc Network

Proceedings of the 6th International Conference on Engineering & MIS 2020, pp.1-9

11- A Secure Source Routing Protocol for Mobile Ad Hoc Networks

International Journal of Next-Generation Computing

12- A secure and energy saving protocol for wireless sensor networks

Bulletin of Electrical Engineering and Informatics Vol. 10 No (6), pp. 3353-3360 ,2021

13- An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks

Indonesian Journal of Electrical Engineering and Computer Science Vol. 21 No. (2), pp.1193-1200, Feb. 2021
14- Assured data deletion in cloud computing: security analysis and requirements

Indonesian Journal of Electrical Engineering and Computer Science, Vol. 28, No. (2), pp.1174–1183, 2022

أوقات الدوام

حالة الطقس في مدينة كركوك