Safwan M. Hussein 

Safwan M. Hussein 
Cell Phone 009647501290013
Location Tishk International University Erbil Branch Address 100 Meter Street and Mosul Road Erbil KRG IRAQ
Specialty Computer Networking
Pronouns He / Him / His

Safwan M. Hussein 

Vice Dean of Faculty Engineering

Position: Vice Dean, Faculty of Engineering
Faculty : Engineering.
Researchgate | Google Scholar CV

BackgroundResearchPublicationsCourses
Education (PhD, MSc/MA, BSc/BA)
PH.D (COMPUTER)
Teaching philosophy

I believe that teaching is more than covering content, and assessment is more than accurate recall. The main purpose of teaching is to educate for meaning and understanding, moreover teaching is not punch a clock to start or end the day.

Two important skills that students should learn from classrooms are learning-by-doing and inter-disciplinary skills. Learning theory emphasizes that students learn better by experiencing what they learn. Students gain a deeper understanding if they are exposed to problems that are relevant to the real world. Learning is enhanced if students actually apply their knowledge. In addition, the pervasiveness of information and communication technology, and increasing complexity of global infrastructure has made it necessary for students to learn inter-disciplinary skills that they can apply in solving real world problems. In today’s world, providing sustainable solutions in computer engineering space demands knowledge not only of fundamentals of computer science, but also of fields such as economics, sociology, and psychology. Inter-disciplinary skills also enable students to appreciate work in other disciplines and be able to work in teams with members from different fields.

Previous positions

Lecturer

Research interests
  1. Network Security
  2. Cyber Security
  3. V2X
Supervision
Journals

Hussein, Yousif Ismail Mohammed  Safwan Mawlood. (2015). Modeling and Simulation of Industrial SCARA Robot Arm International Journal of Engineering and Advanced Technology (IJEAT) 4(4).

Proceedings
  • M. Hussein, "Performance Evaluation of Intrusion Detection System Using Anomaly and Signature Based Algorithms to Reduction False Alarm Rate and Detect Unknown Attacks," 2016 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, 2016, pp. 1064-1069. doi: 10.1109/CSCI.2016.0203 keywords: {security of data;intrusion detection system;anomaly based algorithms;signature based algorithms;false alarm rate reduction;Internet;IDS;knowledge discovery data mining;KDD CUP 99 dataset;WEKA program},URL: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7881496&isnumber=7881293
  • M. Hussein and B. A. Qassem, "Evaluate the video conference transmission security in Skype and Google talk through firewall environment," 2013 Second International Conference on Informatics & Applications (ICIA), Lodz, 2013, pp. 82-86. doi: 10.1109/ICoIA.2013.6650234

keywords: {firewalls;teleconferencing;video communication;video conference transmission security;Skype;Google talk;firewall environment;DDoS attacks;network attacks;data transmission;quality image transmission; communication;;Standards;Protocols;Video Conferences;Skype;Google Talk;ITU-TH.323;H.264;DDoS},

URL: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6650234&isnumber=6650219

  • M. Hussein, F. H. M. Ali and Z. Kasiran, "Evaluation effectiveness of hybrid IDS using Snort with Naïve Bayes to detect attacks," 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP), Bangkok, 2012, pp. 256-260.

doi: 10.1109/DICTAP.2012.6215386

keywords: {alarm systems;data mining;Internet;security of data;hybrid IDS evaluation effectiveness;snort;attack detection;Internet;intrusion detection system;anomaly attacks;integrated signature;knowledge discovery data mining;KDD CUP 99 dataset;Waikato environment for knowledge analysis;WEKA;false alarm rate;J48graft;Naive Bayes algorithm;Intrusion detection;Accuracy;Classification algorithms;Computers;Data mining;Algorithm design and analysis;Intrusion Detection Systems;signature based detection;anomaly based detection;hybrid;snort;naïve bayes},

URL: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6215386&isnumber=6215333

  • M. J. D. Safwan Mawlood Hussein, and Tomas Cerny, Ed., Security Challenges in Smart City Applications. USA: CSREA Press ©, 2018, p.^pp. Pages.
2020-2021
  1. Computer Networks II
  2. Computer Networks I
2018-2019
  1. CMPE 354  Computer Networks II
  2. CMPE 353 Computer Networks I
2017-2018
  1. CMPE 435/A Computer Security
  2. CMPE 424/A Advanced Wireless Networks
  3. CMPE 354  Computer Networks II
  4. CMPE 353 Computer Networks I