• Home
  • Publications
  • Bio
  • Education
  • Teaching & Mentoring
  • In the Media
  • More
    • Home
    • Publications
    • Bio
    • Education
    • Teaching & Mentoring
    • In the Media
  • Home
  • Publications
  • Bio
  • Education
  • Teaching & Mentoring
  • In the Media
Hanan Hindy

Hanan Hindy

Hanan HindyHanan Hindy

Experience

Dec. 2021- Present

Sept. 2018 - Jan. 2021

Sept. 2018 - Jan. 2021

Lecturer (Assistant Professor), Computer Science Department, Faculty of Computer and Information Sciences, Ain Shams University, Egypt.

Sept. 2018 - Jan. 2021

Sept. 2018 - Jan. 2021

Sept. 2018 - Jan. 2021

Division of Cyber Security, Abertay University, Dundee, Scotland, UK.

Dec. 2016 – Dec 2021

Mar. 2013 – Dec. 2016

Mar. 2013 – Dec. 2016

Assistant Lecturer, Computer Science Department, Faculty of Computer and Information Sciences, Ain Shams University, Egypt.

Mar. 2013 – Dec. 2016

Mar. 2013 – Dec. 2016

Mar. 2013 – Dec. 2016

Teaching Assistant, Computer Science Department, Faculty of Computer and Information Sciences, Ain Shams University, Egypt.

BSc & MSc Projects Mentoring

2021-2022

  • Real-Time Fire and Weapons Detection Surveillance System - Smart Cities Hackathon 
    • Mohamed Adel, Nourhan Mahmoud, Abdelrahman Mohamed, Ahmed Medhat, and Mohamed Samy 
    • Top 1 on Smart Surveillance track and Top 2 overall.  
  • Gamified Cybersecurity Educator - BSc (hons)
    • Omar Ahmed , Abdelrahman Mohamed, Ahmed Essam El-Deen, David Moheb, and Omar Magdy 
  • Arabic Machine Reading Comprehension - BSc (hons) 
    • Mariam Zeyada, Youssef Mahmoud, and Zeyad Fahim
  • ArSL Tutor- BSc (hons)
    • Ahmed Ayman, Amany Salah, Mohamed Mostafa, and Moumen Hamada 
    • Won 1st place in ASU-Innovates 2022 Competition
  • Image Restoration & Enhancement- BSc (hons)  
    • Moataz Abdelnasser, Mahmoud Halool , Mahmoud Refaat, and Youssef Mohy ElDin

2018 - 2019

  • Enhanced Intrusion Detection with Deep Learning: A Practical Analysis - BSc (hons)
    • Jeroen van Saane
  • Cyber-Security Deception - BSc (hons)
    • Gayan Jayasekera
  • Machine Learning approach for Security Deception - MSc Project 
    • Lt. Thibaud Lefebre & Lt. Simon Locke
  • Anti-advanced Persistent Threat - MSc Project 
    • Rohith Kalvala

2017 - 2018

  • Automated Vulnerability Detection for Android Applications  - BSc (hons) 
    • Amr Ashraf, Nouran Abdeen, Menna Tullah Magdy & Amgad ElDessouki
  • Single Image Super-Resolution  - BSc (hons)   
    • Mustafa Zaki, Mohammed Waleed, Amr Ayman & Amr Morsy
  • Developer Assistant - BSc (hons)  
    • Menna Allah Assem, Yara Yasser, Marina Ehabm Mahmoud Abdel Gawad & Paula Beshay

2016 - 2017

  • Indoor Mobile Robot for Package Delivery - BSc (hons)  
    •  Abdullah Al Zoabi, David Atef, Farah Bakkari, Fatma Habib & Mohamed Samer 

2015 - 2016

  • Twitter Target-dependent Sentiment Analysis  - BSc (hons)  
    • Ahmed Kamal, Ahmed Ibrahim & Dina Hassanin
  • Photo Ranking and Selection System - BSc (hons)  
    • Ahmed Ameen, Ali Essam, Mohamed Hagrad & Ahmed Samir

2014 - 2015

  • Musical Chord Recognition - BSc (hons) 
    • Hazem AbuMostafa & Hossam Khalil 
  • Augmented Reality Translator - BSc (hons) 
    • Islam Ahmed, David Magdy, Ibrahim Monir, Mervat Anwar & Kamal AbdAlkader

Undergraduate Courses - Ain Shams University (Lecturer)

SEC303 Fundamentals of Computer Forensics

AIT326 Internet of Things Systems Security and the Cloud

AIT326 Internet of Things Systems Security and the Cloud

This aim of this course is to give an overview of Computer Forensics. Students will learn how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. The course specifically covers topics of digital forensic processes, hardware forensics, digital forensic tools, forensic readiness, networks forensics, live forensics, professionalism and ethics. 


Textbook:  

Joakim Kävrestad. "Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applications”, ISBN 978-3-030-38953-6. 2nd edition. 2020 https://doi.org/10.1007/978-3-030-38954-3 

AIT326 Internet of Things Systems Security and the Cloud

AIT326 Internet of Things Systems Security and the Cloud

AIT326 Internet of Things Systems Security and the Cloud

This   course gives students a theoretical and practical grounding in Internet of  Things (IoT), covering IoT systems architecture, hardware platforms, embedded   programming and debugging, networking paradigms for IoT, IoT security, secure   operation, cloud integration, and simple data analytics.


Textbook:

Chantzis F. et. al. (2021) Practical IoT Hacking. The Definitive Guide to Attacking the Internet of Things.

CIS270 Data Structures

CIS270 Data Structures

CIS270 Data Structures

This course enables students to understand and implement common data structures and learn to manipulate those data structures using C++. 

HUM113 Report Writing

CIS270 Data Structures

CIS270 Data Structures

This course familarise students technical writing skills needed especially for computer science field. Studetns learn to write business letters, memos and emails. Moreover, they are introduced to reporting in software houses as well as  practice different soft skills required for various jobs. 

Undergraduate Courses - Abertay University

CMP109 Computer Networking 1

 An undergraduate module, teaching the foundation of communication and computer networking, concepts and protocols.

CMP 101 Computer Hardware Architecture and Operating Systems

An undergraduate module that introduces the core ideas of computer architecture for students studying the subject of computing.

Undergraduate Courses - Ain Shams University (TA)

CHW 464 Computer Security

CSC 340 Algorithms Analysis and Design

CSC 340 Algorithms Analysis and Design

In this course, students understand the basic concepts of computer security. Classical techniques are first presented (like Play Fair, Hill Cipher, ... etc.), then we move to Data Encryption Standard (DES) and Advanced Encryption Standard (AES). 

Also, Public-Key cryptography and Key Exchange methodologies are explained. Students are asked to implement some of the presented algorithms. 

I initiated having  a unit test project to automate and auto-grade the delivery of the projects. 

Programming Language used: C# and Python. 

CSC 340 Algorithms Analysis and Design

CSC 340 Algorithms Analysis and Design

CSC 340 Algorithms Analysis and Design

In this course, students understand the basic concepts of analysis using Big-Oh notations. Also, design paradigms are explained (Divide and Conquers, Dynamic programming and Greedy algorithms). At the end of the course, students are asked to implement a project to show how efficient algorithms can differ from naïve ones. For example, projects can be implementing RSA algorithm using Karatsuba Multiplication and Big Integers or Image quantization using K-Means and so on.   

Programming Language used: C++, C# and Java.

CSW 355 Operating System Principals

CSW 355 Operating System Principals

CSW 355 Operating System Principals

 

In this course, Kernel mail modules are explained to students mai

nly CPU Scheduling, Memory Management and Shared Resources handling. Through the course students implement memory management module in a simple but real operating system. 

Programming Language used: C.

CSW 353 Assembly Language

CSW 355 Operating System Principals

CSW 355 Operating System Principals

 In this course, Assembly language based on Intel386 processor

is explained to students to help them and guide them understand low level concepts.  


Copyright © 2018 Hanan Hindy - All Rights Reserved.