ورود - عضویت
در صورتی که هنوز عضو سایت نشده اید، از طریق عضویت اقدام نمائید! close
امروز: شنبه ١٦ آذر ١٣٩٨
خانه
مجتبی علیزاده
آخرین مدرک تحصیلی: دکترا
رشته تحصیلی: کامپیوتر گرایش امنیت شبکه
رتبه علمی: استادیار
گروه آموزشی: گروه آموزشی کامپیوتر
دانشکده: مرکز آموزش عالی الشتر
ایمیل دانشگاهی: alizadeh.mo-at-lu.ac.ir
ایمیل غیر دانشگاه: malizadeh-at-ieee.org
وبسایت شخصی:
سوابق علمی و تحصیلی
  1. کارشناسی ارشد (کامپیوتر - گرایش امنیت) - دانشگاه UTM

  2. دکتری ( کامپیوتر -گرایش امنیت شبکه) Malaysia-Japan International Institute of Technology (UTM and Kyushu University collaboration)

  3. پسا دکتری (پژوهشکده ارتباطات و فناوری اطلاعات ایران - مرکز تحقیقات مخابرات ایران) تحت حمایت بنیاد ملی نخبگان ایران

مقالات علمی پژوهشی
  1. Authentication in Mobile Cloud Computing: A Survey. Journal of Network and Computer Applications, 61, 59-80.

  2. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks". PLoS ONE, 10(11), e0142716.

  3. An Experimental Analysis on Cloud-based Mobile Augmentation in Mobile Cloud Computing. IEEE Transactions on Consumer Electronics, 60(1), 146-154.

  4. Trusted Computing Strengthens Cloud Authentication. The Scientific World Journal, 2014, 17.

  5. The moderating effect of hospital size on inter and intra-organizational factors of Hospital Information System adoption. Technological Forecasting and Social Change, 134, 124-149.

  6. The application of internet of things in healthcare: a systematic literature review and classification. Universal Access in the Information Society, 17(2).

  7. Understanding the characteristics of financial time series through neural network and SVM approaches. International Journal of Electronic Finance, 9(3), 202-216.

  8. An evaluation model for the implementation of hospital information system in public hospitals using multi-criteria-decision-making (MCDM) approaches. International Journal of Engineering & Technology, 7(1), 1-18.

  9. Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". Paper presented at the 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN).

  10. Multi-level Model for the Adoption of Hospital Information System: A Case on Malaysia. Journal of Soft Computing and Decision Support Systems, 3(1), 61-74.

  11. Designing Precision Fuzzy Controller for Load Swing of an Overhead Crane. Neural Computing and Applications, 26(7), 1555-1560.

  12. Security Analysis Method of Recognition-Based Graphical Password. Jurnal Teknologi, 72(5), 57-62.

  13. Paint-doctored JPEG image forensics based on blocking artifacts. Paper presented at the 2015 International Conference and Workshop on Computing and Communication (IEMCON), Vancouver, Canada.

  14. Authentication Protocols in PMIPv6 Using Non-tamper Resistant Smart Card. Paper presented at the Third Japan Egypt Conference for Electronics, Communication and Computers, Fukuoka, Japan.

  15. Security and Privacy Criteria to Evaluate Authentication Mechanisms in Proxy Mobile IPv6. Jurnal Teknologi, 72(5), 27-30.

  16. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks". PLoS ONE, 10(11), e0142716

  17. Anonymity and Untraceability Assessment of Authentication Protocols in Proxy Mobile IPv6. Jurnal Teknologi, 72(5), 31-34.

  18. Exploring Potential Factors in Total Hospital Information System Adoption. Journal of Soft Computing and Decision Support Systems, 2(1), 52-59.

  19. DNACK: False Data Detection Based on Negative Acknowledgment and Digital Signature on Mobile Ad-hoc Network. Wireless Personal Communications, 83(1), 1-15.

  20. Feature Ranking Through Weights Manipulations for Artificial Neural Networks-Based Classifiers. Paper presented at the Fifth International Conference on Intelligent Systems, Modelling and Simulation, Langkawi, Malaysia.

  21. Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy Ant Colony Optimization. International Journal of Distributed Sensor Networks, 2014, 1-17.

  22. easibility of Implementing Multi-factor Schemes Mobile Cloud Computing Authentication. Paper presented at the Fifth International Conference on Intelligent Systems, Modelling and Simulation, Langkawi, Malaysia.

  23. Evaluating the Critical Factors for Electronic Medical Record Adoption Using Fuzzy Approaches. International Journal of Innovation and Scientific Research, 9(2), 268-284.

  24. Identifying Benefits and Risks Associated with Utilizing Cloud Computing. The International Journal of Soft Computing and Software Engineering [JSCSE], 3(3), 416-421.

  25. Electronic Voting Systems for European Union Countries. Journal of Next Generation Information Technology, 4(5), 16-26. doi:10.4156/jnit.vol4.issue5.3

  26. Information Security Awareness Behavior : A Conceptual Model for Cloud. International Journal of Computers & Technology, 10(1), 1186-1191

  27. An Enhanced RFID Confidentiality Protection Model Based on Trusted Authentication. International Journal of Advancements in Computing Technology, 5(2013), 61-70.

  28. A Prospective Study of Mobile Cloud Computing. International Journal of Advancements in Computing Technology (IJACT), 5(11), 198-209.

  29. Implementation and Evaluation of Lightweight Encryption Algorithms Suitable for RFID. Journal of Next Generation Information Technology, 4(1), 65-77.

  30. A Brief Review of Mobile Cloud Computing Opportunities. Research Notes in Information Science, 12, 155-160.

  31. Multi-factor Authentication Methods for Mobile Cloud Computing. Paper presented at the The MJIIT-JUC Joint International Symposium 2013, Hiratsuka, JAPAN.

  32. Challenges and Opportunities of Mobile Cloud Computing. Paper presented at the 2013 9th International Wireless Communications and Mobile Computing Conference (Iwcmc), Italy.

  33. Associated Risks of Cloud Computing for SMEs. Open International Journal of Informatics, 1, 37-45.

  34. Code analysis of Lightweight Encryption Algorithms Using in RFID Systems to Improve Cipher Performance. Paper presented at the 2012 IEEE Conference on Open Systems (ICOS), Kuala Lumpur, Malaysia.

  35. Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFID. Paper presented at the Recent Researches in Communications and Computers, Kos Island, Greece.

  36. A Survey on Attacks in RFID Networks. Open International Journal of Informatics, 1, 15-24

سایر مقالات چاپ شده
پایان نامه ها
  1. پایان نامه دکتری: A Secure and Anonymous Authentication Scheme for Seamless Handover in Proxy Mobile IPv6

  2. پایان نامه کارشناسی ارشد: Security and Performance Benchmarking of Lightweight Encryption Algorithms for Secure RFID Systems

شرکت در همایش ها، ارائه مقاله به صورت سخنرانی، پوستر و...
  1. The 5th International Conference on Intelligent Systems, Modelling and Simulation (ISMS2014), Langkawi, Malaysia, January 27-29, 2014

  2. 2012 IEEE Conference on Open Systems (ICOS2012), Kuala Lumpur, Malaysia, 21-24 October 2012

  3. WSEAS Conference on Recent Researches in Communications and Computers, Kos Island, Greece, 14-17 July, 2012

  4. The 9th International Wireless Communications & Mobile Computing Conference (IWCMC 2013), Sardinia, Italy, 1-5 July, 2013

  5. Third Japan Egypt Conference for Electronics, Communication and Computers, Fukuoka, Japan, 16-18 March, 2015

  6. The 6th International Conference and Workshop on Computing and Communication, Vancouver, Canada, 15-17 Oct, 2014

  7. 1st International Conference on Telematics and Future Generation Networks, Kuala Lumpur, Malaysia, 16-18 March, 2015

  8. The 20th Conference on Innovations in Clouds, Internet and Networks (ICIN), Paris, France, March 7-9, 2017

کتب منتشر شده
    افتخارات کسب شده
    1. بنیاد ملی نخبگان - دریافت تسهیلات گذراندن دوره پسا دکتری

    2. دریافت بورسیه کامل از وزارت علوم ژاپن جهت گذراندن دوره دکتری

    3. کسب عنوان دانش آموخته برتر دوره دکترا (The Best Postgraduate Student Award) - از Malaysia-Japan International Institute of Technology

    4. دریافت بورسیه تحصیلی از موسسه ژاپنی Japan Student Services Organization (JASSO) - JASSO

    5. دریافت گواهی Certificate of Excellence دوره دکترا

    6. دریافت گواهی Merit Thesis Award بر اساس پایان نامه دکتری

    7. دریافت گواهی Outstanding Reviewer از مجله Journal of Network and Computer Applications Achieved - Elsevier

    8. دریافت گواهی Recognized Reviewer از مجله Journal of Network and Computer Applications Achieved - Elsevier

    پروژه ها و طرح های پژوهشی
    1. مدیریت هویت دیجیتالی در اینترنت اشیاء - پژوهشکده امنیت - پژوهشگاه ارتباطات و فناوری اطلاعات - 1395

    2. اخذ خدمات در زمینه حوادث و پیشگیری از تهدیدات و آسیب پذیری های فضای تولید و تبادل اطلاعات - سازمان فناوری اطلاعات ایران - دانشگاه لرستان - 1396

    3. راه اندازی اولین آزمایشگاه امنیت شبکه استان لرستان - دانشگاه لرستان - سال 1396

    4. راه اندازی اولین آزمایشگاه شبکه های بی سیم (وایرلس) در استان - دانشگاه لرستان - سال 1396

    5. راه اندازی اولین مرکز MSSP (مرکز پایش متمرکز امنیت سایبری) در ایران - دانشگاه لرستان - سال 1397

    سوابق تدریس دانشگاهی و غیر دانشگاهی
    1. دروس رشته کامپیوتر - دانشگاه لرستان - از سال 1394 تا کنون

    2. سوابق اجرایی
      1. رئیس مرکز تخصصی آپا دانشگاه لرستان (مرکز امنیت سایبری) 95 تا کنون

      جزوات دانشگاهی
      علاقه مندی ها
      1. Network Security, Information Security, User Authentication, Digital Forensics

      2. امنیت شبکه، امنیت اطلاعات، احراز هویت کاربر، ادله دیجیتالی

      اطلاعات تکمیلی