Dr. ​Abdelrahman Desoky

r. Abdelrahman Desoky is a scientist and an ambitious Computer Engineering Doctorate with over seventeen years experience in the computer field.

Biography

Dr. Desoky is an experienced educator at both the graduate and undergraduate level. Furthermore, he has industrial expertise in developing full life cycle systems such as software, hardware, security, and telecommunications/networks.

Dr. Desoky received a Doctoral Degree (Ph.D.) from the University of Maryland and a Master of Science (M.Sc.) from the George Washington University; both degrees are in Computer Engineering. His Doctoral Dissertation is entitled “Nostega: A Novel Noiseless Steganography Paradigm.” The paradigm explores the topic of noiseless steganography, which refers to the science and art of covert communications. Nostega provides a way to secure information in static stage and during data transmission to a legitimate recipient. His M.Sc. degree concentrated on Computer Architecture and Networks. His research is entitled “Security Architecture for Computers and Networks.”

Dr. Desoky believes that education never stops regardless of the highest degree one holds. Therefore, he is committed to pursue knowledge at all times. Some of his hobbies are chess, watching nature, ping pong, soccer, and he is a bird enthusiast. He writes also poems and enjoys painting abstract and classic art. He acquired his skills from his wonderful parents, self-study, courses, etc. Dr. Desoky is determined that a healthy lifestyle, eating healthy and exercising, is imperative to a healthy mind that enables innovation.

Learn more about Dr. Desoky at http://desoky.com.

Education

  • Ph.D. in Computer Engineering, The University of Maryland, Baltimore County (UMBC), Department of Computer Science & Electrical Engineering, 2009. 

    Doctoral Dissertation: “Nostega: A Novel Noiseless Steganography Paradigm”. The paradigm explores the topic of noiseless steganography, which refers to the science and art of covert communications. Nostega provides a way to secure information in static stage and during data transmission to a legitimate recipient. 
  • M.Sc. in Computer Engineering, The George Washington University (GWU), Department of Electrical and Computer Engineering, 2004. 
  • M.Sc. Concentration: Computer Architecture and Networks Research: “Security Architecture for Computers and Networks”

Research Interests

  • Cyber Security
  • Stenography
  • Cryptography
  • Secure Authentication
  • Information Assurance/Security
  • Cyber Physical Systems
  • Computational Linguistics
  • Natural Language Processing
  • Natural Language Generation
  • Automatic Summarization
  • Machine Translation
  • Artificial Intelligence
  • Expert systems
  • Data Mining
  • Local Area Networks
  • Wireless Network
  • Wireless Sensor Network
  • Operating Systems
  • Computer Architecture
  • Digital Design
  • VLSI
  • Computer-Aided Design and Test
  • High Performance Computing
  • Parallel Computer Architecture
  • Embedded Systems Programming
  • Telecommunications
  • Robotics
  • Smart Grid
  • Computer Gaming
  • Cloud Computing
  • Bioinformatics
  • Computational Biology
  • Systems Biology
  • Agriculture
  • Biology
  • Chemistry
  • Health Issues
  • Veterinary Medicine
  • All Other Related Topics

Experience

  • Associate Professor (Tenure), The Claflin University, Department of Computer Science & Engineering and Cyber Security, 2015-Present
  • The West Virginia University, Visiting Research Assistant Professor, Department of Computer Science and Electrical Engineering, 2015-Present
  • The Loyola University Maryland, Department of Computer Science, Affiliated Professor, 2014-Present
  • The Fairmont State University, Assistant Professor, Department of Computer Science & Computer Security Program, 2014-2015
  • The Academia Planet, CEO: Computer Science Topics, Computer Engineering Topics, Multidisciplinary Related Topics, and Administrative Academic Social Networks, 2009-Present
  • Independent Consultant & Researcher & Instructor and Teaching/Tutoring: Computer Science and Computer Engineering classes/topics, 1992-Present
  • The University of Maryland, Baltimore County (UMBC), Department of Computer Science & Electrical Engineering: Ph.D. Researcher & Teaching/Tutoring Computer Science and Computer Engineering classes/topics, 2004-2009
  • The University of Maryland, Baltimore County (UMBC), Department of Computer Science & Electrical Engineering: Teaching Assisting/Instructor and Tutoring Computer Science and Computer Engineering classes/topics, 2004-2005
  • The University of Maryland, Baltimore County (UMBC), Department of Computer Science & Electrical Engineering: Research Assisting and Teaching/Tutoring Computer Science and Computer Engineering classes/topics, 2005-2006
  • The George Washington University (GWU), Department of Electrical and Computer Engineering:M.Sc.Researcher & Student Support Specialist (Teaching/Tutoring) Computer Science and Computer Engineering classes/topics, 2003-2004
  • The City University of New York, The City College of New York (CUNY/CCNY): Student Support Specialist (Teaching/Tutoring) Computer Science classes/topics, 1998-1999

Activities and Honors

Reviewer with numerous prominent research journals and conferences.

Recent Publications

SELECTED PUBLICATIONS:

BOOKS:

  • Desoky, A. “Noiseless Steganography: The Key to Covert Communications," CRC Press, Information Security Publisher/Taylor & Francis (February 16, 2012),

ISBN: 1439846219

ISBN: 9781439846216

 

JOURNALS:

  • Desoky, A., "Innocipher: A Novel Innocent-Cipher-Based Cryptography Paradigm – High Level Of Security For Fooling The Enemy," Information Security Journal, (In Press).
  • Desoky, A., "Jokestega: Automatic Joke Generation Based Steganography," International Journal of Security and Networks, Vol.7, No.3, pp.148 – 160, 2012.
  • Desoky, A., "Edustega: An Education-Centric Steganography Methodology," International Journal of Security and Networks, Vol. 6, No. 2/3, pp. 153-173, 2011.
  • Desoky, A., "Sumstega: Summarization-Based Steganography Methodology," International Journal of Information and Computer Security, Vol. 4, No. 3, pp. 234 - 263, 2011.
  • Desoky, A., "Headstega: E-Mail-Headers-Based Steganography Methodology," International Journal of Electronic Security and Digital Forensics, Vol. 3, No. 4, pp. 289 - 310, 2010.
  • Desoky, A., "Comprehensive Linguistic Steganography Survey," International Journal of Information and Computer Security, Vol. 4, No. 2, pp. 164-197, 2010.
  • Desoky, A., "NORMALS: Normal Linguistic Steganography Methodology," Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 3, pp. 145-171, July 2010.
  • Desoky, A., "Matlist: Mature Linguistic Steganography Methodology," Journal of Security and Communication Networks, Vol. 4, No. 6, pp. 697-718, 2011.
  • Desoky, A., "Listega: List-Based Steganography Methodology," International Journal of Information Security, Springer-Verlag, Vol. 8, No. 4, pp. 247-261, April 2009.
  • Desoky, A., and Younis, M., "Chestega: Chess Steganography Methodology," Journal of Security and Communication Networks, Vol. 2, Issue 6, pp. 555 - 566, March 2009.
  • Desoky, A. “Notestega: Notes-Based Steganography Methodology,” Information Security Journal: A Global Perspective, Vol. 18, No 4, pp. 178-193, January 2009.
  • Desoky, A., "Nostega: A Novel Noiseless Steganography Paradigm," Journal of Digital Forensic Practice, Vol. 2, No. 3, pp. 132-139, July 2008.
  • Desoky, A., and Younis, M., "Graphstega: Graph Steganography Methodology," Journal of Digital Forensic Practice, Vol. 2, No. 1, pp. 27-36, January 2008.

 

CONFERENCES:

  • Peng Meng, Yun-Qing Shi, Liusheng Huang, Zhili Chen, Wei Yang, and Abdelrahman Desoky, “LinL: Lost in n-best list,” in the Proceedings of 13th Information Hiding Conference, pp. 329-341, May 2011.
  • Desoky, A., et al., "Auto-Summarization-Based Steganography," in the Proceedings of the 5th IEEE International Conference on Innovations in Information Technology, pp. 608 - 612, December 2008.

SYMPOSIUMS:

  • Desoky, A., ”Hardware Security Methodology (HSM) for Computers and Networks”STOS 2003 Symposium Event (Secure Trusted Operating System Consortium) at The George Washington University. (Invited Speaker, 2003).

Abdeirahman Desoky
Dr. ​Abdelrahman Desoky
Associate Professor of Computer Engineering
  • School of Natural Sciences & Mathematics
Contact
JST 304
803-535-5672