Security Risk Management, Governance and Control
Cooperative Training
Southern Arkansas University
Magnolia, Arkansas , United States of America
Louisiana Tech University
Ruston, Louisiana , United States of America
9/1/2017 - 8/31/2020
Ruston, Louisiana,United States of America
5/1/2018 - 7/31/2018
CenturyLink
Monroe, Louisiana,United States of America
9/1/2018 - 8/31/2020
8/1/2020 - 7/31/2021
University of Wisconsin Green Bay
Green Bay, Wisconsin,United States of America
10/1/2020 - 7/31/2021
1/1/2021 - 7/30/2021
University of Wisconsin Extended Campus
8/13/2021 - 11/30/2024
North Carolina Agricultural and Technical State University
Greensboro, North Carolina,United States of America
10/1/2021 - 11/30/2024
8/1/2023 - 11/30/2024
IEEE Young Professionals - Member
IEEE - Senior Member
IEEE Communications Society - Member
IEEE Power & Energy Society - Ambassador of Northeastern Wisconsin Section, (PES) DAY 2021
2025-01-01
Navigating cybersecurity training: A comprehensive review
From Inception to Innovation: A Comprehensive Review and Bibliometric Analysis of IoT-Enabled Fire Safety Systems
Lightweight image encryption using integer reversible discrete Dual-Hahn transform on embedded systems
Advanced Persistent Threats and Wireless Local Area Network Security: An In-Depth Exploration of Attack Surfaces and Mitigation Techniques
Beyond Firewall: Leveraging Machine Learning for Real-Time Insider Threats Identification and User Profiling
Smart shelves: transforming retail stocking with internet of things and machine learning
Deep Learning Models for Detecting Cheating in Online Exams
Cancelable Multi-Branch Deep Learning Framework for Privacy-Preserving ECG Biometric Authentication
Key Derivation: A Dynamic PBKDF2 Model for Modern Cryptographic Systems
Lightweight Reversible Data Hiding System for Microcontrollers Using Integer Reversible Meixner Transform
2024-01-01
Advancing Privacy Research: A Novel Realistic Persona-Based Dataset
Leveraging machine learning for wi-fi-based environmental continuous two-factor authentication
Comprehensive survey: Biometric user authentication application, evaluation, and discussion
2023-01-01
Distinguishing human-written and ChatGPT-generated text using machine learning
Secure mobile payment architecture enabling multi-factor authentication
Securing IoT-based healthcare systems against malicious and benign congestion
Basics of modern computer systems
Optimizing smart home performance and user convenience with RSSI-based proximity detection
Zero-effort two-factor authentication using Wi-Fi radio wave transmission and machine learning
2022-01-01
Malware and Average Individual
Iot devices proximity authentication in ad hoc network environment
2021-01-01
Analysis of the design requirements for remote internet-based e-voting systems
A survey on user authentication factors
Zero-effort indoor continuous social distancing monitoring system
COVID-19 zero-interaction school attendance system, in 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)
Comparative analysis of underwater positioning and navigation systems
Ci2fa: Continuous indoor two-factor authentication based on trilateration system
Utilizing Wi-Fi access points for unmanned aerial vehicle localization for building indoor inspection
Secure and fraud proof online payment system for credit cards
Machine learning for location prediction using rssi on Wi-Fi 2.4 GHz frequency band
2020-01-01
Two Methods for Authentication Using Variable Transmission Power Patterns
Enforcing Location-based Access Policies Using the Existing IEEE 802.11 Infrastructure
A weighting system to build physical layer measurements maps by crowdsourcing data from smartphones
Architecture for continuous authentication in location-based services
0EISUA: zero effort indoor secure user authentication
A weighting system for building RSS maps by crowdsourcing data from smartphones
Bf2fa: Beacon frame two-factor authentication
A cheat-proof system to validate GPS location data
Ts2fa: Trilateration system two factor authentication
0ei2fa: Zero effort indoor two factor authentication
Research Interest: Cybersecurity, AI for Cybersecurity, Digital Authentication, IoT Security, and AI & IoT Applications.