Mitra Alidoosti | Network Security and Privacy | Editorial Member

Dr. Mitra Alidoosti | Network Security and Privacy | Editorial Member 

Dr. Mitra Alidoosti | IUST | Iran

Dr. Mitra Alidoosti is a computer engineering researcher specializing in web application security, network security, and business-layer vulnerability analysis, contributing extensively to the advancement of dynamic security testing methods. Her work focuses on detecting complex logical vulnerabilities such as race conditions, session puzzling, and business-layer DoS attacks through innovative black-box and dynamic analysis approaches. She has authored multiple ISI and ISC-indexed publications in reputable journals, addressing web resiliency, semantic security testing, and SIP vulnerability assessment, along with several conference papers on secure protocol design, web penetration testing, and multi-step vulnerability detection. Her expertise spans penetration testing, secure architectural design, and process mining for web applications, supported by deep experience in security frameworks, protocol analysis, and automated testing tools. With 97 citations, an h-index of 5, and an i10-index of 2, she continues to contribute significant research in strengthening the security and reliability of complex web and communication systems.

Profiles: Google Scholar

Featured Publications: 

Mirjalili, M., Nowroozi, A., & Alidoosti, M. (2014). A survey on web penetration test. Advances in Computer Science: An International Journal, 3(6), 107–121.

Alidoosti, M., Nowroozi, A., & Nickabadi, A. (2020). Evaluating the web-application resiliency to business-layer DoS attacks. ETRI Journal, 42(3), 433–445.

Alidoosti, M., & Nowroozi, A. (2020). BLProM: A black-box approach for detecting business-layer processes in the web applications. Journal of Computing and Security (JCS), 6(2), 65–80.

Alidoosti, M., Asgharian, H., & Akbari, A. (2013). Security framework for designing SIP scanner. In 2013 21st Iranian Conference on Electrical Engineering (ICEE) (pp. 1–5).

Alidoosti, M., Nowroozi, A., & Nickabadi, A. (2022). Semantic web Racer: Dynamic security testing of the web application against race condition in the business layer. Expert Systems with Applications, 195, 116569.

Sathiyandrakumar Srinivasan | Network Security | Editorial Board Member

Mr. Sathiyandrakumar Srinivasan | Network Security | Editorial Board Member

Mr. Sathiyandrakumar Srinivasan | V2 Technologies Inc | United States

Mr. Sathiyandrakumar Srinivasan is an active researcher associated with the Kalasalingam Academy of Research and Education. His scholarly contributions span  research publications, supported by 140 Scopus citations from 19 citing documents, reflecting measurable impact within his research domain. His work demonstrates consistent engagement with emerging scientific problems and collaborative scholarship,  With an h-index of 7, his research outputs show developing influence and continued citation growth, indicating early yet meaningful contributions to the field. His publications, documented within Scopus, highlight his involvement in contemporary academic investigations and his ability to contribute to multi-author, interdisciplinary studies. Overall, his research trajectory positions him as a steadily growing scholar whose work continues to gain recognition through increasing citations and academic reach.

Profile: Scopus | Google Scholar 

Featured Publications : 

Raman, R., Kantari, H., Gokhale, A. A., Elangovan, K., Meenakshi, B., … (2024). Agriculture yield estimation using machine learning algorithms. 2024 International Conference on Automation and Computation (AUTOCOM), 187-191.

Srinivasan, S., Deepalakshmi, P. (2023). Enhancing the security in cyber-world by detecting the botnets using ensemble classification based machine learning. Measurement: Sensors, 25, 100624.

Srinivasan, S., Saravanan, T. R., Ithayan, J. V., Ganesh, E. N., Devi, A. S. (2023). Unleashing the potential of IoT in tackling ocean pollution: A data-driven approach for marine ecosystem conservation. 2023 Second International Conference on Smart Technologies for Smart Nation, 31.

Lakshmi, V. V., Giriprasad, S., Vimal, S. P., Kantari, H., Meenakshi, B., … (2024). Wind power forecasting with support vector machines using sparrow search algorithm. 2024 2nd International Conference on Computer, Communication and Control, 29.

Srinivasan, S., Raman, R., Thacker, C. B., Shrivastava, A. (2023). Smart crosswalk management with vehicle-to-pedestrian communication. 2023 International Conference on Sustainable Communication Networks and Applications, 25.

Zhijie Fan | Network Security Situation Awareness | Best Researcher Award

Prof. Zhijie Fan | Network Security Situation Awareness | Best Researcher Award

Professor at The Third Research Institute of the Ministry of Public Security | China

Prof. Zhijie Fan is a distinguished cybersecurity scholar and professor at The Third Research Institute of the Ministry of Public Security in Shanghai, China. With over a decade of dedicated research in cyberspace and information security, his work spans IoT security, SDN network security, cyber threat intelligence, and security mechanism design for large-scale data systems. Recognized for his outstanding contributions, he has received multiple national and provincial honors, including the Second Prize of the Ministry of Public Security Scientific and Technological Progress Award and the Shanghai Science and Technology Progress Award.

Professional Profile:

Education: 

Prof. Fan earned his Ph.D. in Cyberspace Security from Tongji University, Shanghai, following a Master’s degree in Computer Science and Technology from Zhejiang University, Hangzhou, and a Bachelor’s degree in Electronics and Information Engineering from Xi’an University of Architecture and Technology. He also completed a part-time Postdoctoral Fellowship in IoT Security at Fudan University, Shanghai and a visiting researcher program in SDN Network Security at the University of Ottawa, Canada.

Experience:

Prof. Fan has served as a Professor at The Third Research Institute of the Ministry of Public Security, focusing on information and cyber security. He has led and contributed to numerous national and provincial research projects, including the National Key R&D Programs of China, the Shanghai Talent Development Fund, and major Ministry of Public Security technology initiatives. His leadership extends beyond research into mentoring young scholars and contributing to security standards and policies at both the regional and national levels.

His distinguished career is marked by prestigious honors, including being named Special Expert by the Shanghai Science and Technology Commission, Academic Leader of Xuhui District, Shanghai, and Special Researcher at the People’s Public Security University of China.

Research Interest:

Prof. Zhijie Fan’s research is deeply rooted in advancing the field of cyber and information security, with a strong emphasis on developing innovative and scalable solutions to address modern security challenges. His core expertise spans IoT security and smart device protection, ensuring the resilience and privacy of interconnected systems, and Software Defined Networking (SDN) security, where he focuses on strengthening the integrity and defense of network infrastructures. He has made significant contributions to cybersecurity situation awareness, leveraging advanced models such as ResMLP and LSTM networks for intelligent threat detection and response. Additionally, Prof. Fan has conducted pioneering work in video surveillance and identity recognition, creating robust methods that integrate static and dynamic identification features for enhanced security applications. His research also addresses large-scale unified log data collection and cross-domain security mechanisms, enabling comprehensive monitoring and coordinated protection across diverse platforms. Central to his work is the integration of AI-driven cyber defense techniques, including graph embedding models, which contribute to the development of next-generation intelligent defense frameworks.

Publications Top Noted:

  • Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection
    Year: 2024 | Cited: 12

  • Improved Message Mechanism-Based Cross-Domain Security Control Model in Mobile Terminals
    Year: 2024 | Cited: 9

  • Video Surveillance Camera Identity Recognition Method Fused With Multi-Dimensional Static and Dynamic Identification Features
    Year: 2023 | Cited: 21

  • Research on Key Method of Cyber Security Situation Awareness Based on ResMLP and LSTM Network
    Year: 2023 | Cited 18

  • A Bayesian Graph Embedding Model for Link-Based Classification Problems
    Year: 2022 | Cited 45

Conclusion:

Prof. Zhijie Fan’s groundbreaking work in cyber threat intelligence and network security situation awareness positions him as a leading figure in global cybersecurity research. His integration of AI techniques with scalable defense mechanisms addresses urgent modern challenges in IoT, SDN, and large-scale log data security. With an impressive portfolio of national honors and high-impact research contributions, he exemplifies the qualities of a Best Researcher Award recipient. Moving forward, his expertise and leadership will continue to shape the future of intelligent cybersecurity systems at both national and international levels.

Assoc. Prof. Dr. Muharrem Tuncay Gençoğlu | Cybersecurity | Best Researcher Award

Assoc. Prof. Dr. Muharrem Tuncay Gençoğlu | Cybersecurity | Best Researcher Award

Assoc. Prof. Dr. Muharrem Tuncay Gençoğlu | Fırat University | Turkey

📌 Assoc. Prof. Dr. Muharrem Tuncay Gençoğlu is a distinguished researcher in Applied Mathematics, Cryptology, and Cybersecurity. He holds dual PhDs—one in Applied Mathematics from Fırat University (Türkiye) and another in Cryptology from Vector Sciences Academy (Azerbaijan). With expertise in cybersecurity, cryptographic systems, and artificial intelligence, he has worked with institutions like Fırat University, National Defense University, and Ahmet Yesevi University. His research spans random number generation, blockchain, and quantum computing, and he has published extensively in international journals. A member of multiple prestigious associations, he is actively involved in COST projects and TÜBİTAK-funded research.

Professional Profile:

Google Scholar

Suitability for Best Researcher Award

Assoc. Prof. Dr. Muharrem Tuncay Gençoğlu is a highly deserving candidate for the Best Researcher Award due to his groundbreaking contributions to Applied Mathematics, Cryptology, and Cybersecurity. His dual PhDs and extensive work with academic and defense institutions highlight his expertise and leadership in these critical fields.

Education & Experience

  • Ph.D. in Applied Mathematics – Fırat University (2013)
  • Ph.D. in Cryptology – Vector Sciences Academy, Azerbaijan
  • M.Sc. in Applied Mathematics – Fırat University (1995)
  • B.Sc. in Mathematics – Fırat University (1992)
  • B.Sc. in Mathematical Engineering – Istanbul Technical University (1997)
  • B.Sc. in Computer Engineering – Texas A&M University (2017)
  • International Relations (English, Ongoing) – Anadolu University
  • Senior Associate Professor – Fırat University (2015-Present)
  • Lecturer & Researcher – National Defense University (2017-Present)
  • Lecturer – Ahmet Yesevi University
  • Postdoctoral Researcher – Technical University of Berlin (2014)
  • Head of Department & Teacher – Private Sector (1988-2004)
  • Chairman of the Board – TEB Eğitim Hizmetleri (2004-2010)

Professional Development

📚 Dr. Gençoğlu has actively contributed to cybersecurity, cryptographic modeling, and artificial intelligence. He has received specialized training in ISO 27001 Information Security, Cyber-Terrorism, and Cyber Defense. As an academic advisor, he has guided over 50 master’s theses, including current research on cryptocurrency analysis using deep learning. He has led major TÜBİTAK-funded projects and is a member of international research groups like COST Actions. His collaborations with global cybersecurity organizations showcase his dedication to strengthening data security and cryptographic resilience.

Research Focus

🔬 Dr. Gençoğlu’s research spans applied mathematics, cybersecurity, cryptology, and artificial intelligence. His TÜBİTAK 1002 project explored random number generation through chemical reactions, a crucial innovation in cryptographic security 🔢. His work in blockchain, quantum cryptography, and network security addresses threat modeling, privacy preservation, and cyber intelligence 🔐. As a principal investigator in CHIST-ERA Distributed Systems, he contributes to privacy-enhancing cryptographic techniques. His contributions in COST Actions on mathematical modeling, quantum networks, and biological computation further cement his role as a leader in future-proof cryptographic systems.

Awards & Honors

🏆 Awards & Recognitions:

  • TÜBİTAK 1002 Grant – Project on Random Number Generation using Chemical Reactions 🏅
  • COST Action Leadership – Contributions to CA18232, CA21109, CA21169 🌍
  • Researcher in Distributed AI LabTechnical University of Berlin (2014) 🤖
  • ISO 27001 Information Security Certification – IRCA-IPC 🛡️
  • Cybersecurity & Cyber-Terrorism Certifications – Various Institutions 🔓

Publication Top Notes:

  • 🔬 Use of quantum differential equations in sonic processesApplied Mathematics and Nonlinear Sciences,  (Cited by: 62)
  • 🔐 Importance of Cryptography in Information SecurityIOSR Journal of Computer Engineering (IOSR-JCE),  (Cited by: 43)
  • 🧠 Numerical simulations to the nonlinear model of interpersonal relationships with time fractional derivativeAIP Conference Proceedings,  (Cited by: 43)
  • 🔓 Cryptanalysis of a new method of cryptography using Laplace transform hyperbolic functionsCommunications in Mathematics and Applications,  (Cited by: 24)
  • 🔢 Use of integral transform in cryptologyScience and Engineering Journal of Fırat University,  (Cited by: 18)
  • 🏫 Ortaokul öğrencilerinin bilgi güvenliği farkındalığıSavunma Bilimleri Dergisi,  (Cited by: 10)

Prof. Zaid Abduljabbar | Network Security Award | Best Researcher Award

Prof. Zaid Abduljabbar | Network Security Award | Best Researcher Award

Prof. Zaid Abduljabbar, University of Basrah, Iraq

Prof. Zaid Abduljabbar is a distinguished researcher in the field of computer science, renowned for his groundbreaking work in privacy-preserving technologies and secure data sharing. With a solid educational background including a Ph.D. from Huazhong University of Science & Technology, and extensive research experience showcased through presentations at prestigious IEEE and ACM conferences, he continues to push the boundaries of knowledge. His contributions to SCI Journals like “Journal of Applied Sciences” and “Security and Communication Networks” have garnered widespread recognition, including the prestigious Best Paper Award at the 11th International Conference on Green, Pervasive and Cloud Computing (GPC’16) for his paper “Towards Secure Private Image Matching”.

🌐 Professional Profile:

Google Scholar

Education:

  • Bachelor of Science in Computer Science, University of Basrah, College of Science, Iraq (1997-09 to 2001-07)
  • Master of Science in Computer Science/Artificial Intelligence, University of Basrah, College of Science, Iraq (2004-09 to 2006-07)
  • Ph.D. in Computer applied technology, Huazhong University of Science & Technology, School of Computer Science and Technology, China (2014-02 to 2017-01)

Research Experience:

  • Presented papers at various conferences including IEEE and ACM conferences, covering topics such as privacy-preserving image retrieval, secure data sharing, and parallel pipeline rendering.
  • Published papers in SCI Journals like “Journal of Applied Sciences” and “Security and Communication Networks”, covering topics such as private image matching, encrypted image retrieval, and secure web browsing.
  • Received the best paper award at the 11th International Conference on Green, Pervasive and Cloud Computing (GPC’16) for the paper titled “Towards Secure Private Image Matching”.

Awards:

  • Best Paper Award at the 11th International Conference on Green, Pervasive and Cloud Computing (GPC’16) for the paper “Towards Secure Private Image Matching”.

Publication Top Notes:

  1. Title: Provably secure and fast color image encryption algorithm based on s-boxes and hyperchaotic map
    • Citations: 69
    • Year: 2022
  2. Title: An effective image retrieval based on optimized genetic algorithm utilized a novel SVM-based convolutional neural network classifier
    • Citations: 68
    • Year: 2019
  3. Title: Millets and millet technology
    • Citations: 38
    • Year: 2021
  4. Title: Audio steganography with enhanced LSB method for securing encrypted text with bit cycling
    • Citations: 34
    • Year: 2022
  5. Title: LEACH-T: LEACH clustering protocol based on three layers
    • Citations: 33
    • Year: 2016

 

 

 

 

Prof. Hao Tian | Communication security | Best Researcher Award

Prof. Hao Tian | Communication security | Best Researcher Award

Prof. Hao Tian, Hubei Key Laboratory of Digital Finance Innovation, China

Prof. Hao Tian received the Ph.D. degrees in Cartography and Geographic information Engineering from Wuhan University, Wuhan, China, in 2014. He currently works as a professor in the School of Information Engineering, Hubei University of Economics, Wuhan. His main research directions are machine learning, computational intelligence, semantic technology, etc. In recent years, he has hosted and participated in 12 scientific research projects such as the National Natural Science Foundation and the Hubei Provincial Natural Science Foundation.

🌐 Professional Profile:

Orcid

🎓 Education:

Ph.D. in Cartography and Geographic Information Engineering, Wuhan University, 2014

🔍 Research Interests:

Hao Tian’s primary research interests lie in machine learning, computational intelligence, and semantic technology.

🔬 Research Accomplishments:

He has an extensive research portfolio, having hosted and participated in 12 scientific research projects, including those funded by the National Natural Science Foundation and the Hubei Provincial Natural Science Foundation.

📚 Publications:

Hao Tian has authored 2 academic monographs and published over 30 papers in prestigious domestic academic journals such as “Applied Energy”, “IEEE Transactions on Geoscience and Remote Sensing”, and “Process Safety and Environmental Protection”. His contributions have been recognized with ESI Highly Cited awards three times and he has a selected ESI Hot Paper to his credit.

Scopus Metrics:

  • 📝 Publications: 14 documents indexed in Scopus.
  • 📊 Citations: A total of 188 citations for his publications, reflecting the widespread impact and recognition of Prof. Hao Tian’s research within the academic community.

Publication Top Notes:

  1. Title: Hemisphere-separated Cross-connectome Aggregating Learning via VAE-GAN for Brain Structural Connectivity Synthesis
    • Journal: IEEE Access
    • Year: 2023
  2. Title: Bi-objective optimization and environmental assessment of SOFC-based cogeneration system: performance evaluation with various organic fluids
    • Journal: Process Safety and Environmental Protection
    • Year: 2023
  3. Title: Blend of flue gas from a methane-fueled gas turbine power plant and syngas from biomass gasification process to feed a novel trigeneration application: Thermodynamic-economic study and optimization
    • Journal: Energy
    • Year: 2023
  4. Title: Hybrid Memetic Pretrained Factor Analysis-Based Deep Belief Networks for Transient Electromagnetic Inversion
    • Journal: IEEE Transactions on Geoscience and Remote Sensing
    • Year: 2022