direct edit

Mohammed Noraden Alsaleh

Assistant Professor

Information Assurance

School of Information Security and Applied Computing

202H Roosevelt Hall

(734) 487-3736

malsaleh@emich.edu

Education

  • Ph.D. in Computing and Information Systems, University of North Carolina at Charlotte, 2018.
  • B. S. in Computer Engineering, Jordan University of Science and Technology, 2007.
Mohammed Noraden Alsaleh

Professional Summary

Interests and Expertise

  • Network Security and Resilience.
  • Automated Malware Analysis.
  • Security Incident Response Automation.
  • Formal Methods for Cybersecurity.

Courses

  • IA 150 – Networking I.
  • IA 400 – Malware Analysis and Reverse Engineering.

Selected Publications

  • Mohammed Noraden Alsaleh, Ehab Al-Shaer, and Qi Duan. “Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques.” International Conference on Security and Cryptography, 2018.
  • Mohammed Noraden Alsaleh, Ehab Al-Shaer, and Ghaith Husari. "ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration." Journal of Network and Systems Management 25, no. 4 (2017): 759-783.
  • Burcham, Morgan, Mahran Al-Zyoud, Jeffrey C. Carver, Mohammed Alsaleh, Hongying Du, Fida Gilani, Jun Jiang et al. "Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers." In Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, pp. 13-23. ACM, 2017.
  • Mohammed Noraden Alsaleh, and Ehab Al-Shaer. "Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks." In Proceedings of the ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016.
  • Yaser Jararweh, Moath Jarrah, Zakarea Alshara, Mohammed Noraden Alsaleh, and Mahmoud Al-Ayyoub. "Cloudexp: A comprehensive cloud computing experimental framework." Simulation Modelling Practice and Theory 49 (2014): 180-192.
  • Mohammed Noraden Alsaleh, and Ehab Alsaleh Al-Shaer. "Security configuration analytics using video games." In IEEE Conference on Communications and Network Security (CNS), 2014.

Selected Presentations

Professional Memberships and Affiliations

Grants

Awards and Patents

Additional Information