Img

Research

  • Journal Articles

    -Mitigating Ransomware
      ISSA April 2022
    -Voice Authentication
      ISSA March 2020
    -A Need for Credentials
      Digital Forensics 2019
    -Net Neutrality: What is it?
      ISSA January 2019
    -Espionage Act of 1917
      ISSA November 2018
    -Digital Forensics Credentialing
      ISACA October 2018
    -Net Neutrality Debate
      ISSA July 2018
    -US Voting System
      IEEE April 2018
    -BYOD Framework
      Elsevier June 2015
    -BYOD Effects
      ISSA September 2013
    -Teaching Web 2.0 Topics
      ACM September 2009

  • Conferences

    -Techno Security
      ('18, '21, '22, '23) (Presented)
    -PMI
      (2019) (Presented)
    -ACJS
      (2018) (Presented)
    -ACM SigITE
      (2009) (Presented)
    -Open Source Digital Forensics
      (2018, 2019)
    -Black Hat
      (2017, 2018)
    -ISSA
      (2017, 2018)
    -CyberMaryland
      (2017, 2018)
    -ISACA
      (2013, 2014, 2017)
    -IEEE
      (2013, 2014)

  • Presentations

    Dr. Zahadat has presented many topics to a wide audience ranging from college and university students to faculty/staff of universities and top engineers and managers in governments as well as the private sector.

    Topics include certifications (CISSP, Security+, CASP, CEH, CHFI, CAP, CCNA, MCSE, etc.) as well as specialty ones such as Mobile Security, Social Network Security, Hacking, Data Mining, Programming, and Risk Management.

  • Topics

    Areas of experience include security measures, hacking, database management, data warehousing, data mining and visualization, programming, networking technologies, scripting, web technologies, cloud technologies, virtualization, and systems engineering.

    Technology proficiencies include Linux, Windows Server, AD, Digital Forensics, Kali, Python, Java, ASP.NET, Visual C#, Visual Basic, php, web development, Data Mining, Visualization, Cisco, DNS, and TCP/IP, to mention a few.