Victormills Iyieke | Computer and Security | Best Researcher Award

Mr. Victormills Iyieke | Computer and Security | Best Researcher Award

Mr. Victormills Iyieke, Coventry University, United Kingdom

Mr. Victormills Iyieke is a Chartered Engineer with a strong background in automotive cybersecurity and system architecture. He holds a PhD in Automotive Cybersecurity Engineering from Coventry University and has over 10 years of experience in the automotive industry. Currently, he works as a System Architecture Engineer at Renault Group, specializing in OTA updates and cybersecurity. He has contributed to major projects with companies like EDAG Engineering, Jaguar Land Rover, and Aston Martin. His expertise includes ISO standards, MBSE, and secure software updates. Outside work, he enjoys meeting new people and exploring new adventures. πŸš—πŸ”πŸ› οΈ

 

Publication Profile

Orcid


Education and Qualifications

Mr. Victormills Iyieke has a robust educational background in engineering and management. He is currently pursuing a PhD in Secured-by-Design (Automotive Cybersecurity Engineering) at Coventry University (2020-2024). He holds a Master of Science (MSc) in International Business and Management from the University of Bedfordshire (2011-2012) and a Bachelor of Science (BSc) in Electrical and Electronics Engineering from the European University of Lefke (2006-2010). Additionally, Mr. Iyieke is certified by the International Software Testing Qualifications Board (ISTQB) in 2016. πŸŽ“πŸ”’πŸ“š

 

Career Experience

Mr. Victormills Iyieke has extensive experience in system architecture, automotive cybersecurity, and embedded systems. Since November 2022, he has worked as a System Architecture Engineer at Renault Group (via Capgemini Engineering), focusing on OTA updates and cybersecurity. His role involves creating offboard system architectures, managing cryptographic materials, and utilizing MBSE for OTA campaigns. Mr. Iyieke has also worked as a Doctorate Student Researcher at Coventry University, assessing secured automotive safety-critical components. Previously, he held positions at EDAG Engineering Limited, Jaguar Land Rover, Volkswagen Group, Bentley Motors, and Aston Martin Lagonda, specializing in system integration, software updates, and functional testing. πŸ’ΌπŸ”§πŸš—

 

Training & Skills

Mr. Victormills Iyieke has received extensive training in advanced engineering tools and methodologies. He is proficient in RMDV (DOORS and RTC), SysML, and system modeling using Rhapsody and Enterprise Architecture. His expertise includes FMEA (Failure Mode and Effect Analysis) and AUTOSAR integration. Mr. Iyieke is skilled in using Vector tools such as CANoe and CANalyzer for system testing and analysis. He excels in engaging stakeholders, working with engineers and managers to define and respond to change requests. His system thinking and creativity are key in aligning platform managers and teams for advanced electrical architecture planning. πŸ’‘πŸ”§πŸ“Š

 

Research Focus

Mr. Victormills Iyieke’s research primarily focuses on automotive cybersecurity and secure communication systems for modern vehicles. His work emphasizes Over-the-Air (OTA) updates, ensuring their security through Security-by-Design principles. He is also involved in remote monitoring and teleoperation of autonomous vehicles, exploring innovative solutions for secure vehicle operations and data integrity. His expertise spans vehicle network security, cyber-physical systems, and secure software updates in automotive systems. His research contributes to enhancing vehicle safety and security in the rapidly advancing field of autonomous and connected vehicles. πŸš—πŸ”πŸ’»πŸ“‘

 

Publication Top Notes

  • An Adaptable Security-by-Design Approach for Ensuring a Secure Over the Air (Ota) Update in Modern Vehicles. (2024)
  • An Adaptable Security by Design Approach for Ensuring a Secured Remote Monitoring Teleoperation (RMTO) of an Autonomous Vehicle. (2023)

Jing Li | Cybersecurity | Best Researcher Award

Dr. Jing Li | Cybersecurity | Best Researcher Award

Dr. Jing Li, University Technology Malaysia, China

πŸŽ“ Dr. Jing Li is pursuing his PhD in Computer Science at University Technology Malaysia (UTM) since 2021. He holds a Master’s in Information Management from ZheJiang University and a Bachelor’s in Computer Science from China JiLiang University. With over 15 years in the ICT industry, he specializes in networking, cybersecurity, and IoT. His research interests span IoT security, digital forensics, big data, and machine learning. Dr. Li has authored several publications in prestigious journals and is an active member of IEEE. He is also proficient in AI-based scientific research tools

Publication profile

Scopus

Education πŸŽ“

Dr. Jing Li is currently pursuing his PhD in Computer Science at University Technology Malaysia (UTM), where he also holds an International Doctoral Scholarship. He earned his Master’s degree in Information Management from ZheJiang University and a Bachelor’s in Computer Science from China JiLiang University, Hangzhou.

Professional Experience πŸ’Ό

Dr. Li has held roles including Technical Co-founder at Hangzhou Yunmei Technology Co., Ltd., Product Architect at ArcSoft (Hangzhou) Technology Co., Ltd., and Software Engineer at Aerohive Networks, inc. His expertise spans networking, cybersecurity, IoT, and machine learning.

Research Focus

Dr. Jing Li’s research focuses on enhancing IoT security through advanced machine learning techniques. His work primarily explores feature selection and reduction methods for improving intrusion detection systems in IoT environments. Through critical reviews and comparative studies, Dr. Li aims to optimize classification models, contributing significantly to the fields of cybersecurity and digital forensics. His research, published in prestigious journals like the Journal of Big Data and Intelligent Systems with Applications, underscores his expertise in applying AI-driven solutions to mitigate IoT security risks. Dr. Li’s efforts are pivotal in advancing the understanding and implementation of robust security measures in interconnected systems. πŸ”’

Publication Top Notes

Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning

Enhancing IoT security: A comparative study of feature reduction techniques for intrusion detection system

A critical review of feature selection methods for machine learning in IoT security

Menatalla Abououf | Event Detection Award | Best Researcher Award

Mrs. Menatalla Abououf | Event Detection Award | Best Researcher Award

Mrs. Menatalla Abououf, Khalifa University, United Arab Emirates

Menatalla Abououf is a Research Engineer at Khalifa University’s Center for Cyber-Physical Systems in Abu Dhabi, UAE. With a Master’s degree in Electrical and Computer Engineering, she has over five years of experience in cyber security research, teaching, and curriculum development. Her expertise spans software and hardware, including AI, IoT, and blockchain. She’s published in esteemed journals, presented at conferences, and received awards for her contributions to IoT data monetization and more. Fluent in English and Arabic, Menatalla is known for her adaptability, leadership, and commitment to advancing technology. πŸŒŸπŸ”’πŸ”¬

 

Publication Profile

Education and QualificationΒ 

πŸ‘©β€πŸ’Ό Mrs. Menatalla Abououf brings over five years of versatile experience as a researcher, lab engineer, and teaching assistant, specializing in areas like Penetration Testing, Digital Forensics, and Advanced Operating Systems. Her extensive technical expertise spans both software and hardware domains, encompassing HPC, Kali Linux, Matlab, Python, C++, Assembly, Verilog, HTML, and CSS. Committed to advancing cybersecurity, she delivers training courses in related topics and pursues research in artificial intelligence, cyber security, crowdsensing/sourcing, internet of things, and blockchain. With a Master’s degree in Electrical and Computer Engineering and a Bachelor’s degree in Electrical and Electronic Engineering, both from Khalifa University, she maintains a stellar academic record with a GPA of 3.96 and 3.89, respectively. πŸŽ“

 

Professional ExperienceΒ 

πŸ‘©β€πŸ’Ό Menatalla Abououf has amassed a rich professional portfolio, showcasing her expertise and dedication across various roles. As a Research Engineer at the Center for Cyber-Physical Systems, Khalifa University, she spearheads research on privacy and security in cyber-physical systems, while also serving as a pivotal figure in the Information Security department, contributing as a teaching assistant and lab engineer. Her commitment extends beyond academia, as seen in her role as a Trainer at the Cyber Security Academy, where she imparts knowledge and fosters practical skills in cybersecurity. Additionally, her contributions to curriculum development with the Ministry of Education reflect her commitment to shaping future generations. Her multifaceted roles as a Project Manager, Teaching Assistant, and Expert Judge underscore her versatility and leadership in various capacities within the educational and technological landscape. 🌐

 

Achievements

πŸ† Menatalla Abououf’s achievements reflect her consistent dedication to academic excellence and professional growth. She received the prestigious IET Networks Premium Award for her outstanding paper on ‘Monetization of IoT data using smart contracts,’ showcasing her innovative contributions to the field. Her academic journey was marked by accolades such as the Khalifa University Scholarship and being designated a Top 20 student, President’s List, and Dean’s List awardee, demonstrating her exceptional academic performance. Additionally, her participation in competitions like the Khalifa University Programming Contest and Gulf Programming Contest highlights her prowess in problem-solving and programming. These achievements, coupled with her non-academic awards and professional certifications, underscore her commitment to excellence. πŸŽ“

Research Focus

πŸ” Menatalla Abououf’s research focus revolves around leveraging advanced technologies, particularly in artificial intelligence and machine learning, to address critical challenges in cyber-physical systems, mobile crowd sensing, and IoT monetization. Her work spans various domains, including privacy and security enhancement in cyber-physical systems, anomaly detection in IoT devices, and behavior-based recruitment models in mobile crowd sourcing. Through her publications and contributions to prestigious conferences, she has demonstrated a deep understanding of these areas and a commitment to advancing knowledge in the field. Her interdisciplinary approach underscores her versatility and dedication to tackling complex issues at the intersection of technology and society. 🌐

 

Publication Top Notes

πŸ“ Monetization of IoT data using smart contracts | Cited by: 137 | Year: 2019 πŸ’‘

πŸ“Gale-shapley matching game selectionβ€”A framework for user satisfactionΒ | Cited by: 65 | Year: 2018 πŸ’‘

πŸ“ Multi-worker multi-task selection framework in mobile crowd sourcingΒ | Cited by: 56 | Year: 2019 πŸ’‘

πŸ“ Machine learning in mobile crowd sourcing: A behavior-based recruitment model | Cited by: 18 | Year: 2021 πŸ’‘

πŸ“A misbehaving-proof game theoretical selection approach for mobile crowd sourcingΒ | Cited by: 15 | Year: 2020 πŸ’‘

πŸ“ Self-supervised online and lightweight anomaly and event detection for IoT devices | Cited by: 12 | Year: 2022 πŸ’‘

πŸ“ How artificial intelligence and mobile crowd sourcing are inextricably intertwined | Cited by: 10 | Year: 2020 πŸ’‘

πŸ“ Monetization of IoT data using smart contracts. IET Netw 8: 32–37 | Cited by: 3 | Year: 2019 πŸ’‘

πŸ“ Impact of misbehaving devices in mobile crowd sourcing systems| Cited by: 2 | Year: 2023 πŸ’‘

πŸ“ Explainable AI for Event and Anomaly Detection and Classification in Healthcare Monitoring Systems | Cited by: 2 | Year: 2022 πŸ’‘

 

Chin-Ling Chen | Security Award | Outstanding Scientist Award

Prof Chin-Ling Chen | Security Award | Outstanding Scientist Award

Prof Chin-Ling Chen, Chaoyang University of Technology, Taiwan

Chin-Ling Chen, Ph.D., is a distinguished professor πŸŽ“ at Chaoyang University of Technology, Taiwan. With a background in Applied Mathematics πŸ“Š, he served as a senior engineer at Chunghwa Telecom Co., Ltd. before transitioning to academia. Chen’s research spans Blockchain, Cryptography, and Network Security πŸ›‘οΈ. He has authored over 180 articles in prestigious international journals, holds 12 patents πŸ“œ, and is recognized as one of the World’s Top 2% Scientists by Stanford University 🌐. An avid contributor, he serves on the editorial boards of seven SCI/Scopus indexed journals and has reviewed over 480 scholarly articles.

 

Publication profile:

Scopus

Google Scholar

Education and Experience:

Chin-Ling Chen earned his Ph.D. in Applied Mathematics from National Chung Hsing University, Taiwan in 2005. With a career spanning from 1979 to 2005, he served as a senior engineer at Chunghwa Telecom Co., Ltd.

Academic Achievements:

Currently a distinguished professor at Chaoyang University of Technology, Taiwan, Chen’s diverse research interests range from Blockchain to Medical Safety Service. He has authored over 180 articles in SCI/SSCI international journals and holds 12 patents. Recognized for his contributions, he received the distinguished researcher award annually from 2006 to 2023. Chen is also esteemed as one of the World’s Top 2% Scientists by Stanford University and serves on the editorial boards of seven prestigious international journals indexed by SCI/Scopus. πŸ†πŸ“š

Research Focus:

Chin-Ling Chen’s research focus encompasses a wide array of cutting-edge topics in information security and emerging technologies. From pioneering work on RFID system conformation and authentication schemes for IoT-based medical care systems to blockchain-based data aggregation and group authentication in electronic medical systems πŸ›‘οΈ, his contributions are both innovative and impactful. With expertise spanning from mobile device integration of biometric authentication to secure electronic medical record authorization systems, Chen’s research endeavors to advance the realms of privacy protection, network security, and healthcare technology, ultimately enhancing the security and efficiency of modern digital ecosystems. 🌐

Publication Top Notes:

  1. Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection πŸ“– Cited by: 157, Year: 2009
  2. An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system πŸ“– Cited by: 128, Year: 2017
  3. An extended chaotic maps-based key agreement protocol with user anonymity πŸ“– Cited by: 113, Year: 2012
  4. Mobile device integration of a fingerprint biometric remote authentication scheme πŸ“– Cited by: 93, Year: 2012
  5. A privacy authentication scheme based on cloud for medical environment πŸ“– Cited by: 71, Year: 2014
  6. A secure medical data exchange protocol based on cloud environmentπŸ“– Cited by: 66, Year: 2014
  7. A traceable and privacy-preserving authentication for UAV communication control systemπŸ“– Cited by: 61, Year: 2020
  8. A secure and traceable E-DRM system based on mobile deviceπŸ“– Cited by: 55, Year: 2008