Levent Ertaul Faculty Profile

Photo of Levent Ertaul

Levent  Ertaul

Professor, CS Chair

Department of Computer Science

  • E-mail: levent.ertaul@csueastbay.edu
  • Phone: (510) 885-3356
  • Office: SF 569
  • Office Hours: TuTh 4:30pm -5:30pm ZOOM
  • Vitae:
  • Home Page:
    Note: CSUEB does not pre-approve, monitor, or edit personal pages. Faculty members are solely responsible for their content, and are expected to conform to the policy guidelines of CSUEB.

Research:  Cyber Security & Privacy, Cyber War, Hacking Technoligies, Cyber Security Policies, Computer Networks Security, Cryptology, Wireless Security, Cloud Security, International Governance of Cyber Space

Cyber Security & Privacy, Cyber War, Hacking Technoligies, Cyber Security Policies, Computer Networks Security, Cryptology, Wireless Security, Cloud Security, International Governance of Cyber Space

  • PhD. University of Sussex, 1994
  • MSc. Hacettepe University, 1989
  • BSc EENG Anadolu University, 1984

Not teaching this semester.

2023   L. Ertaul, A. Chauhan,  IoT Security: Implementation of Xtea, Simon/Speck Lightweight Block Ciphers’, The 2023 World Congress in Computer Science, Computer Engineering and Applied Computing (CSCE'23), The 2023 International Conference on Security and Management (SAM'23), July, Las Vegas, 2023

2022    G. Saldamli, A.S. Papetla, A. Sedasivan, A. Deshmukh, S. Madanambeti, L. Ertaul, " Drug Recommendation and Tracking using Blockchain and Machine Learning',The 2022 World Congress in Computer Science, Computer Engineering and Applied Computing (CSCE'22), The 2022 International Conference on Security and Management (SAM'22), July, Las Vegas, 2022

2021   Gokay, Saldamli, Joseph Jojo, Gunakara Nayak Mitra, Mathur Sushant, Jayapraksh Sidharth, Levent Ertaul, "Secure Location-Based Contact Tracing for COVID-19", The 2021 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'21), The 2021 International Conference on Security and Management (SAM'21 ), July, Las Vegas, 2021. 

2021    Gokay Saldamli, Doshi  Nishit,  Gadapa Vishal, Parikh Jainish, Patel Mihir, Levent Ertaul, "Analysis of Machine Learning as a Service", The 17th International Conference on Grid, Cloud, & Cluster Computing, GCC'21: July 26-29, 2021, USA

2020   Gokay Saldamli, Aditya Doshatti, Darshil Kapadia, Devashish Nyati,Maulin Bodiwala, and Levent Ertaul, "", The 16th International Conference on Grid, Cloud, & Cluster Computing, GCC'20: July 27-30, 2020, USA

2020  Varick L. Erickson, Pragya Varshney, Levent Ertaul, "A Project-Based Approach to Teaching IoT ", The 16th International Conference on Frontiers in Education:Computer Science & Computer Engineering (STEM, ABET, ...), FECS'20: July 27-30, 2020, USA

2020   Gokay Saldamli, Kavitha Karunakaran, Vidya Kodihalli Vijaykumar, Weiyang Pan, Siddesh Puttarevaiah and Levent Ertaul, "", Second International Workshop on Blockchain Applications and Theory (BAT2020), Paris France, April 20-23

2019    L. Ertaul, P. Chudinov, B. Morales, “IoT Security: Authenticated Lightweight Key Exchange (ALIKE)”, The 2019 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'19), The 18th Int'l Conf on Wireless Networks (ICWN'19), July, Las Vegas, 2019.

2019    G. Saldamli, L. Ertaul and A. M. Shankaralingappa. ”.”, The 5th IEEE International Workshop on Internet of Things: Networking Applications and Technologies (IoTNAT’19), June 10–13, Rome, Italy.

2019    G. Saldamli, S. S. Deshpande, K. Jawalekar, P. Gholap, L. Ertaul and L. Tawalbeh. ””,  The 5th IEEE International Workshop on Internet of Things: Networking Applications and Technologies (IoTNAT’19), June 10–13, Rome, Italy.

2019    G. Saldamli, H. Sanjeeva, K. Siddalingaapa, R. V. Murugesan and L. Ertaul. ”.”, The 10th IEEE International Conference on Information and Communication Systems (ICICS’19), June 11– 13, Jordan

2019    G. Saldamli, L. Ertaul, K Dholakia and U Sanikommu. ”An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server.” , The 2019 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'19), The 2019 International Conference on Security and Management (SAM'19), July, Las Vegas, 2019.

2019    G. Saldamli, L. Ertaul and Mayur Gala. ”Privacy-preserving Contacts Compare for Social Networks.”, The 2019 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'19), The 18th Int'l Conf on Wireless Networks (ICWN'19), July, Las Vegas, 2019.              

2018    L. Ertaul, M. Mousa,Applying the Kill Chain and Diamond Models to Microsoft Advanced Threat Analytics”, The 2018 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'18), The 2018 International Conference on Security and Management (SAM'18), July, Las Vegas, 2018.

2018    G. Saldamli, L. Ertaul, B. Kodirangaiah,Post-Quantum Cryptography on IoT: Merkle’s Tree Authentication”, The 2018 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'18), The 17th Int'l Conf on Wireless Networks (ICWN'18), July, Las Vegas, 2018

2018    G. Saldamli, L. Ertaul, K. M. A. Menon,Analysis of McEliece Post Quantum Cryptosystem on Raspberry Pi 3”, The 2018 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'18), The 2018 International Conference on Security and Management (SAM'18), July, Las Vegas, 2018.

2017   BOOK: K. Daimi, G. Francia, L. Ertaul, E. El-Sheikh,  L. Hernandez, “”, June 2017.

2017   L. Ertaul, A. Woodall, "", The 2017 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'17), The 2017 International Conference on Security and Management (SAM'17), July, Las Vegas, 2017.

2017   L. Ertaul, S. K. Rajegowda, "", The 2017 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'17), The 2017 International Conference on Security and Management (SAM'17), July, Las Vegas, 2017.

2017   L. Ertaul, K. Venkatachalam,"", The 2017 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'17), The 16th Int'l Conf on Wireless Networks (ICWN'17), July, Las Vegas, 2017.

2017   L. Ertaul, “”, , Vol. 17,  No. 3, pp. 117-123 March.

2016   L. Ertaul, I. Thanki, "", WORLDCOMP 2016, International Conference on Security and Management SAM'16, July, Las Vegas, 2016.

2016    L. Ertaul, M. Kaur, V. A. K. R Gudise, “”, The 2016 International Conference on Wireless Networks, ICWN16, July, Las Vegas, 2016.

2016    L. Ertaul, N. V. Konda, D. G Ramasamy, “”, The 2016 International Conference on Wireless Networks, ICWN16, July, Las Vegas, 2016. 

2016    L. Ertaul, A. Mudan, N. Sarfaraz, “”, WORLDCOMP 2016, International Conference on Security and Management SAM'16, July, Las Vegas, 2016.

2016    L. Ertaul, S. K L, N. Sanka,Implementation of Authenticated Encryption Algorithm Offset Code Book (OCB)”, The 2016 International Conference on Wireless Networks, ICWN16, July, Las Ve gas, 2016.

2015    G. Saldamli, Y. J. Baek, L. Ertaul, “”, , Vol. 15  No. 5 pp. 44-49, May.

 2015    L. Ertaul, W. M. Baptista, R. Maram, “”, WORLDCOMP2015, The 2015 International Conference on Security and Management SAM'15,  July, Las Vegas.

 2015    L. Ertaul, J. H. Yang, G. Salsamli, “” , Vol. 15  No. 5  pp. 1-11, May.

 2015    L. Ertaul, J. N. Shah, S. Ammar, “”, WORLDCOMP2015, The 2015 International Conference on Security and Management SAM'15,  July, Las Vegas.

 2015    L. Ertaul, Saleha Shakoor, “”, ,VOL. 15  No. 3  pp. 1-10, March.

 2014    L. Ertaul, A. M. Mehta, T. K. Wu, “Proceedings of the 2014 Internatioanl Conference on Security & Management SAM’14, July, Las Vegas.

 2013    L. Ertaul, B. F. Imagnu, S. Kilaru, “”, WORLDCOMP2013, The 2013 International Conference on Security and Management SAM'13,  July, Las Vegas.

 2013    L. Ertaul, A Balluru, A. Perumalsamy, “”, WORLDCOMP2013, The 2013 International Conference on Security and Management SAM'13,  July, Las Vegas.

 2013    L. Ertaul, N. Shaikh, S. Kotipalli, “”, WORLDCOMP2013, The 2013 International Conference on Security and Management SAM'13,  July, Las Vegas.

 2013    Y. Martirosyan, L. Ertaul, “”, M.Sc. Thesis, California State University East Bay, February.

 2012    L. Ertaul, Y. Martirosyan, “”, Proceedings of the 2012 Internatioanl Conference on Security & Management SAM’12, July, Las Vegas.

 2012    L. Ertaul, V. Rathod, “ ”, Proceedings of the 2012 Internatioanl Conference on Security & Management SAM’12, July, Las Vegas.

 2011    L. Ertaul, S.Vandana, K. Gulati, G. Saldamli,“, Proceedings of  Security and Management SAM’11, July, Las Vegas.

 2011    L. Ertaul, A. R. Pasham, H. Patel,  “, Proceedings of  Security and Management SAM’11, July, Las Vegas.

 2011    L. Ertaul, A. Movasseghi, S. Kumar,  “, Proceedings of  Security and Management SAM’11, July, Las Vegas

 2011    L. Ertaul, A. Movasseghi, S. Kumar,  “, Proceedings of  Security and Management SAM’11, July, Las Vegas.

 2011    L. Ertaul, J. Hao, “, Proceedings of  Security and Management SAM’11, July, Las Vegas.

 2010    L.Ertaul, S. Singhal, G. Saldamli, “ ”, WORLDCOMP2010, The 2010 International Conference on Security and Management SAM'10,  July, Las Vegas.

 2010    L.Ertaul, S. Natte, G. Saldamli,” ”, WORLDCOMP2010, The 2010 International Conference on Wireless Networks ICWN'10, July, Las Vegas.

 2010    L. Ertaul, S. Chelivendri, G. Saldamli, “”, WORLDCOMP2010, The 2010 International Conference on Security and Management SAM'10,  July, Las Vegas.

 2010    B. Karaoglan, L. Ertaul, “”, , No:6(102), ISSN 1392 – 1215, June

 2010    B. Karaoglan, L. Ertaul, “”, annual conference, 28-30 June,Palagna, Lithuania.

 2009    L. Ertaul, D. Ibrahim, “”, The 2009 International Conference on Security and Management SAM'09,  July, Las Vegas.

 2009    L. Ertaul, S. Mullapudi, ”, The 2009 International Conference on Wireless Networks ICWN'09, July, Las Vegas.

 2009    L. Ertaul, O. Catambay, ”, The 2009 International Conference on Security and Management SAM'09,  July, Las Vegas.

 2009    L. Ertaul, M. Ganta,”,The 2009 International Conference on Wireless Networks ICWN'09, July, Las Vegas.

 2008    L. Ertaul, J. H. Yang, ”, The 2008  Applied Cryptology and Network Security (ACNS08), July, Las Vegas.

 2008    L. Ertaul, E. Celebi, M. Gozutok, “, The 2008  Applied Cryptology and Network Security (ACNS08), July, Las Vegas.

 2008    J. H. Yang, L. Ertaul, ”, M.Sc Thesis, 91短视频, May.

 2007    L. Ertaul, Vaidehi, ””, , VOL. 7  No. 11  pp. 132-141, November.

 2007    L. Ertaul, Vaidehi, “”, The 2007 International Conference on Wireless Networks, ICWN'07, June, Las Vegas

 2007    Vaidehi, L. Ertaul, ”” MSc. Thesis 91短视频, October.

 2007    L. Ertaul, N. Chavan, ””, The 2007 International Conference on Security & Management, SAM'07, June, Las Vegas

  2007    E. Cuervo1, F. Henriquez, D. Arroyo, L. Ertaul, “” The 2007 International Conference on Applied Cryptography & Network Security, ACNS07, June, Las Vegas.

 2007    G. Silva1, F. Henriquez, N. Cortes , L. Ertaul, “”, The 2007 International Conference on Security & Management, SAM'07, June, Las Vegas

 2007    J. Panda, L.Ertaul, “”, M.Sc. Thesis, 91短视频, June ()

 2007    L. Ertaul, N. Chavan, “”, , VOL.7 No.4, page 48-61 April .

 2006    L.Ertaul, Vaidehi, “”, The 2006 International Conference on Security & Management, SAM'06, June, Las Vegas

 2006    L. Ertaul, J. Panda, “”, The 2006 International Conference on Security & Management, SAM'06, June, Las Vegas

 2006    L. Ertaul, B. Kasim, ”The 2006 International Conference on Wireless Networks, ICWN'06, June Las Vegas

 2005    L. Ertaul, R. Sudarsanam, “”, Proceedings of EURO mGOV 2005 (The First European Mobile Government Conference), July, University of Sussex, Brighton, UK.

 2005    L. Ertaul, T. Braithwaite, B. L. Bellman, “”, Proceedings of EURO mGOV 2005 (The First European Mobile Government Conference), July, University of Sussex, Brighton, UK.

 2005    L. Ertaul, S. Venkatesh, “”, Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP’05, June, Las Vegas

 2005    L. Ertaul, B. Kasim, “”, Proceedings of the 2005 International Conference on Wireless Networks, ICWN’05, June, Las Vegas

 2005    L. Ertaul, N. Chavan, “”, 2005 International Conference on Wireless Networks, Communications, and Mobile Computing, Wirelesscom 2005, MobiWac 2005, June 2005, Maui, Hawaii

 2005    L. Ertaul, W. Lu, “”, , May 2005, University of Waterloo, Ontario, CA

 2005    L. Ertaul, A. Akyol, “E-Commerce and Security”, Journal of Institute of Social Sciences, ONERI, Jan, 2005.

 2004    S. Venkatesh, L. Ertaul, “”, M.Sc. Thesis, 91短视频, December

 2004    L. Ertaul, S. Venkatesh, “”, Proc. of IASTED International Confrerence on Software Engineering and Applications (SEA 2004), Nov. 2004, MIT Cambridge, USA. Download JHide tool kit

 2001   L. Ertaul, M. Afyonluoglu, “Personal Computer Security” BAS 2001, Proc. of the 6th Symposium on Computer Networks, Cyprus.

 2000   L. Ertaul , B. Yilmaz “Software Implementation of the SkipJack Algorithm” ISCIS XV, Proceedings of the 15th International Sciences, October , Istanbul

 2000    L. Ertaul, L. Ozalp “Survey and Evaluation of Security Products” Internal Report, Hacettepe University, September, 2000

 2000    L. Ertaul, A. Tekin “Security of Mobile Agents” ISCIS XV, Proceedings of the 15th International Sciences, October, Istanbul

 2000    L. Ertaul, A.Z. Alkar, H.S. Gecim, R. Sonmez, “ A VLSI Implemantation of DES and Triple DES with Pipelining Technique” MUG Conference, Portland, Oregon, USA , October.

 2000    L. Ertaul, B. Kasım “ Evaluation of GSM Security” BAS’2000, Proc. of the 5th Symposium on Computer Networks, Ankara.

 2000    A. Botan , L. Ertaul “An Investigation of ATM Forum Security Spesifications and a Multi-Layer ATM Security Model for TCP/IP over ATM (MLASM-t)” PhD Thesis, Hacettepe University, September

 1999    L. Ertaul, B. Kasım, M. Gözütok, İ.C. Baykal, T. Köprülü “Software Optimization Methods for the Implementation of RC2, RC4 and RC5 Security Algorithms”  Proc. of the Fourth Symposium on Computer Networks, İstanbul, May.

 1999     L. Ertaul, S. Gökçebag, T. Koprulu, M. Gozutok, "Authentication of a Unix User on Windows NT Server ", ISCIS XIV, Proceedings of The Fourteenth International Sciences, October, Kusadasi.

 1999     L. Ertaul, S. Ceylan, " Speed Optimized Software Implementation of Blowfish in ANSI C ", ISCIS XIV, Proceedings of The Fourteenth International Sciences, October , Kusadasi.

 1998    L. Ertaul, A. Işıklı, “The Evalution of Firewall Authentication Protocols”, BAS98, Proc. of the Third Symposium on Computer Networks, İzmir, June

 1998   L. Ertaul, M. Gözütok, C. Baykal, T. Köprülü, “An RSA Implementation in Software”, BAS98, Proc. of the Third Symposium on Computer Networks, İzmir June.

 1998    L. Ertaul, C. Baykal, M. Gözütok, T. Köprülü, "Speed Optimized Implementation of IDEA in ANSI C", BAS'98, Proc. of the Third Symposium on Computer Networks, Izmir, June.

 1998     L. Ertaul, T. Köprülü, S. Kondakci, H. Çaglar, Ö. Ergül, C. Baykal, M. Gözütok , A. Genç, S.Güven, K. Ince, "INTERCEPTOR: Design of a Firewall", BAS'98, Proc. of the Third Symposium on Computer Networks, Izmir, June. (in Turkish)

 1998     L. Ertaul, T. Göksu, "Yer Degistirmeli, Aktarmali ve Dizi sifreleyiciler için Türkçenin Yapisal Özelliklerini Kullanan bir Kriptoanaliz", BAS'98, Proc. of the Third Symposium on Computer Networks, Izmir, June. (in Turkish)

 1996    L. Ertaul, ‘Security Access Control Scheme (SACS) for Computer Networks’, BAS96, Proc. of the First Symposium on Computer Networks, Istanbul, May.

 1996    L. Ertaul, ‘A Solution to the Re-Blocking Problem in the Implementation of Improved Internet Security Access Control Scheme (IISACS)’, BAS96, Proc. of the First Symposium on Computer Networks, Istanbul, May.

 1996    L. Ertaul, ‘A Software Implementation of an Internet Security Access Control Scheme (ISACS) Through TCP/IP Protocols’, Ph.D. Thesis, University of Sussex, England.

 1994   L. Ertaul, M.J. English, F.S.F. Poon, ‘Distribution and Management of Secret Sequence Numbers for Large Computer Networks in an Internet Security Access Control Scheme’, Proc. of the 9th Int. Symp. on Computer and Information Sciences, November, Antalya.

 1993   L. Ertaul, M.J. English, F.S.F. Poon, ‘Improved  Session Initiation Authentication Protocols in Internet Access Control Scheme’, Proc. of the 2nd Int. Conf. on Computer Communications and Networks, San Diego, California, USA, June.

 1993    L.Ertaul, M.J. English, F.S.F. Poon, ‘Performance of Improved Session Initiation Authentication (SIA) Protocols’, Proc. of 5th Bangor Symp. on Communications, Bangor, England, June.

 1992    L. Ertaul, M.J. English, F.S.F. Poon, ‘Improvements to Internet Access Control Security Scheme’, I.E.E. Electronics Letters, Vol:28, No:13, page 1250-1251, June.

 1992    L. Ertaul, M.J. English, F.S.F. Poon, ‘A TCP/IP Implementation of an Internet Security Access Control Scheme’, Proc. of 4th Bangor Symp. on Communications, Bangor, England, May.

 1987   L. Ertaul, ‘Spread Spectrum Haberleşme Sistemi Modellemesi’, Hacettepe University Press.

 1987   L. Ertaul, ‘Modelling of Spread Spectrum Communications Sysytem (DS-QPSK)’, TMMOB Elektrik Mühendisliği, Vol: 32.

 1986    L. Ertaul, T. Cifcibasi, “Microprocessors and their Industrial Applications” Lecture Notes,  SEGEM Ankara & Ereğli, 103 pages

GIVEN SEMINARS

Cyber Security-Privacy - , CSU EAST BAY, LIBRARY FACULTY LECTURE SERIES, Oct 24th, 2023

Cyber Security-Privacy - "How Can I Protect Myself in Cyber Space? Can I Get Some Privacy Please? , Oct. 21st, 2023 (invited)

 Cyber Security-Privacy - "How Can I Protect Myself in Cyber Space? Can I Get Some Privacy Please?", KEYNOTE SPEAKER, ICR23 - ), MADRID, SPAIN, Sept 4-6, 2023 (invited)

Cyber Security and Privacy - " Cyber Security, Cyberwar, Hacking, Privacy, and Governmental/Personal Data Breaches?", KEYNOTE SPEAKER, , Las Vegas, NV, 2023

Cyber Security and Privacy - "How Can I Protect Myself in Cyber Space? Can I Get Some Privacy Please?", KEYNOTE SPEAKER, (invited)

Cyber Security and Privacy -"How Can I Protect Myself in Cyber Space? Can I Get Some Privacy Please", INVITED SPEECH, Cankaya University, 25th Anniversary, March 8, 2022, Turkey

Cyber Security and Privacy - "How Can I Protect Myself in Cyber Space? Can I Get Some Privacy Please?", KEYNOTE SPEAKER, , Las Vegas, NV, 2021 (invited)

Cyber Security and Privacy- P.S. It's CS! Cybersecurity, 91短视频, CA, 2021

Cyber Security and Privacy-"How to Protect Yourself in Cyber Space", California State University EAST BAY, National Cyber Security Awareness Month, CA, 2019.

Cyber Security and Privacy - “Are We All Living in Glass Houses? Can I Get Some Privacy Please?”, KEYNOTE SPEAKER, (invited)

Cyber Security and Privacy- “How to Protect Yourself in Cyber Space”, California State University EASTBAY, National Cyber Security Awareness Month, CA, 2018.

Cyber Security and Privacy - “Are We All Living in Glass Houses? Can I Get Some Privacy Please?”, KEYNOTE LECTURE, (invited) 

Cyber Security and Privacy - “Are We All Living in Glass Houses? Can I Get Some Privacy Please?”, KEYNOTE SPEAKER, (invited)

 Cyber Security and Privacy - “Are We All Living in Glass Houses? Can I Get Some Privacy Please?”, Faces of STEM Workshops, CSUEB 2018

, Sonoma State University, 2017 (invited)

, , Las Vegas, NV, 2017 (invited)

Cyber Security and Privacy - “How can I Protect Myself in Cyber Space”, San Jose City College (JSCC), Work Force Institute, San Jose, CA, 2017 (invited)

, , Brighton, England, 2017 (invited)

IoT Security: The Block Chain, The Bitcoin Technology, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2017

Malicious PDF documents and Digital Forensics, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2017

Digital Signatures & X509 Digital Certificates, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2017

Secure Messaging and Public Key Cryptography, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2017

Secure Messaging and Symmetric Key Cryptography, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2017

Cyber Security and Privacy - “Are We All Living in Glass Houses? Can I Get Some Privacy Please?”, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2017

Cyber Security and Privacy Awareness - “How can I Protect Myself in Cyber Space”, California State University EASTBAY, National Cyber Security Awareness Month, CA, 2016.(presentation in .pdf)

Future of Cyber Security Education . 2016 World Congress in Computer Science, Computer Engineering, and Applied Computing, WORLDCOMP’16, Las Vegas, NV, 2016

Cyber Security Education Curriculum/Pathways, (Panel Discussion), Silicon Valley-San Francisco Bay Region Cybersecurity Educators’ Symposium, Sunnyvale, CA, 2015

Reverse Engineering with IDA Pro, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

Mobile Device Forensics with Autopsy, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

Bluetooth Hacking Techniques, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

Bluetooth Security - Authentication and Confidentiality, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

Bluetooth Security - Security Modes, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

X509 Digital Certificates, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

Cryptography, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

Data Security, Lawrence Livermore National Laboratory (LLNL), Livermore CA, 2016

Cyber Security & Privacy “Are We All Living in Glass Houses? Can I Get Some Privacy Please? ” California State University EASTBAY, National Cyber Security Awareness Month, CA, 2015

Cyber Security & Privacy “Are We All Living in Glass Houses? Can I Get Some Privacy Please? ” Middlebury Institute of International Studies at Monterey (MIIS), MIIS Cyber Initiative, Monterey, CA, 2015 (Invited)

Cyber Security: Cyber Security Education, Cyber Bullying and Privacy (Panel Discussion), 2015 World Congress in Computer Science, Computer Engineering, and Applied Computing, WORLDCOMP’15, Las Vegas, NV, 2015

Protecting Yourself in CyberSpace – Secure Cloud Storage and Secure WiFi configurations, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

Protecting Yourself in CyberSpace – Password Management and Password Security, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

Protecting Yourself in CyberSpace – Deleting Data Securely, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

Protecting Yourself in CyberSpace – File Encryption, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

Protecting Yourself in CyberSpace – HDD and Mobile Device Protection, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

Protecting Yourself in CyberSpace - E-mail Security, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

Protecting Yourself in CyberSpace - Vulnerabilities of Cyber Space, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2015

Cyber Security for High School Students, 91短视频, Hayward, CA, 2015 ( THIS IS AN INTERNATIONAL SEMINAR)

The US Constitution and Privacy in Cyber Security, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

International Governance and the Internet, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

Identity and Attribution in Cyber Space, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

Protecting yourself in Cyber Space, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

Malicious Software-Viruses, Botnets and Logic Bombs Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

Cyber Space Vulnerabilities, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

How Cyber Space Works, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

Cyber Security Discussions - STUXNET, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2014

Bluetooth Hacking Techniques, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

Security in Bluetooth, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

Security in VoIP, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

Security in Grid & Cloud Computing, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

Security in Wireless Sensor Networks (WSNs), Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

Security in Mobile Ad Hoc Networks (MANETs), Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

Security in Wireless Networks (WPA1 and WPA2 with PSK and TKIP) & Wireless Hacking Techniques, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

Security in Wireless Networks (WEP) & Wireless Hacking Techniques, Lawrence Livermore National Laboratory (LLNL), Livermore, CA, 2013

Cyber Security Curriculum Development for a BSc program in Computer Science, Dominican University, San Rafael, CA, 2012 (invited)

A Practice in using E_Portfolio, WIKI, Discussion Board and TURNITIN in a Higher Education Course Taught at Distance, CDSIA2011, 4th Symposium in Curriculum Development in Security and Information Assurance (CDSIA) , San Jose State University, San Jose, CA, 2011

A Practice in using E_Portfolio, WIKI, Discussion Board and TURNITIN in a Higher Education Course Taught at Distance, CSU East Bay,  3 Nov, Hayward, CA, 2011

Security Services in Wireless AdHoc Networks (Conference Key Note Speech), VII Coloquio Nacional De Codigos, Criptografia y Areas Relacionadas, La Universidad Autonoma del Estado de Mexico, 7-9 June, Toluca, Mexico, 2006

Security of Mobile Ad-Hoc Networks (MANETs) and Threshold Cryptography, VII Coloquio Nacional De Codigos, Criptografia y Areas Relacionadas, La Universidad Autonoma del Estado de Mexico , 7-9 June, Toluca Mexico, 2006 (invited)

Today & Tomorrow: IEEE 802.11 WLAN Security, CSU East Bay, Hayward, CA, 2006

Today & Tomorrow: IEEE 802.11 WLAN Security, EURO mGOV 2005, Brighton, UK, 2005 (invited)

Security of Mobile Agents, CSU East Bay, Hayward, CA, 2002

Security of Mobile Agents (Chameleon Agents), Oregon State University, OR, 2002

Security in Computer Networks and Cryptology, Headquarters of Turkish Police Forces, 2002

WEB Security (SSL, Firewalls), Oregon State University, OR, 2001

Security in Computer Networks and Cryptology, Turkish General Staff (TGS), 2000

Security in Computer Networks and Cryptology, Turkish General Staff (TGS), 2000

Military Message Handling System (MMHS), North Atlantic Treaty Organization (NATO) Military Message Handling Systems Work Group (MMHSWG),  Istanbul, 2000

Turkish Military Message Handling System (MMHS) (MEDAS), North Atlantic Treaty Organization (NATO), Joint Warrior Interoperability Demonstration (JWID), MONS BELGIUM, 2000

Turkish Military Message Handling System (MMHS) (MEDAS), Unified Efforts, North Atlantic Treaty Organization (NATO) 2000

Security in Computer Networks (1 week), Turkish Telecom, 2000

Security in Computer Networks: Digital Signatures, E-Commerce Board of Turkey, 2000

Computer Networks (1 week), Turkish Telecom, 2000

ATM Networks (1 week), Turkish Telecom, 2000

ATM Networks (1 week), Turkish Telecom, 2000

Security in Computer Networks (1 week), Turkish Telecom, 1999

Security in Computer Networks (1 week), Turkish Telecom, 1999

Computer Networks (1 week), Turkish Telecom, 1999

Security in Computer Networks and Cryptology, Havelsan Co, 1997

Security in Computer Networks and Cryptology, Havelsan Co, 1996

Security in Computer Networks, Haccettepe University, 1994

An Internet Security Access Control Scheme (ISACS), Middle East Technical University, 1994

An Internet Security Access Control Scheme (ISACS), Hacettepe University, 1994

Intel 8085 Microprocessor Programming, (1 week),  Eregli Iron and Steel Ind., 1988

Intel 8085 Microprocessor Programming, (1 week),  Eregli Iron and Steel Ind., 1987

 

 

CONFERENCE PRESENTATIONS

IoT Security: Authenticated Lightweight Key Exchange (ALIKE), The 2019 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'19), The 18th Int'l Conf on Wireless Networks (ICWN'19), July, Las Vegas, 2019

Privacy-preserving Contact Comparison for Social Networks, The 2019 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'19), The 18th Int'l Conf on Wireless Networks (ICWN'19), July, Las Vegas, 2019

An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server, The 2019 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'19), The 2019 International Conference on Security and Management (SAM'18), July, Las Vegas, 2019.

Applying the Kill Chain and Diamond Models to Microsoft Advanced Threat Analytics, The 2018 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'18), The 2018 International Conference on Security and Management (SAM'18), July, Las Vegas, 2018.

Post-Quantum Cryptography on IoT: Merkle’s Tree Authentication, The 2018 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'18), The 17th Int'l Conf on Wireless Networks (ICWN'18), July, Las Vegas, 2018

Analysis of McEliece Post Quantum Cryptosystem on Raspberry Pi 3, The 2018 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'18), The 2018 International Conference on Security and Management (SAM'18), July, Las Vegas, 2018.

Performance Analysis of CLEFIA, PICCOLO, TWINE Lightweight Block Ciphers in IoT Environment, CSCE'17 - The 2017 World Congress in Computer Science, Computer Engineering, & Applied Computing, The 16th Int'l Conference on Security and Management (SAM'17), July, Las Vegas, 2017

IoT Security: Performance Evaluation of Grain, MICKEY, and Trivium - Lightweight Stream Ciphers, CSCE'17 - The 2017 World Congress in Computer Science, Computer Engineering, & Applied Computing, The 16th Int'l Conference on Security and Management (SAM'17), July, Las Vegas, 2017

Security of Software Defined Networks (SDN), CSCE'17 - The 2017 World Congress in Computer Science, Computer Engineering, & Applied Computing, The 16th Int'l Conference on Wireless Networks (ICWN'17), July, Las Vegas, 2017

EasyAuth - Implementation of a Multi-Factor Authentication Scheme Based on Sound, Fingerprint and One Time Passwords (OTP), WORLDCOMP2016, International Conference on Security and Management SAM'16, July, Las Vegas, 2016

Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms, The 2016 International Conference on Wireless Networks, ICWN16, July, Las Vegas, 2016

Implementation of EAX Mode of Operation Within a Real-time  Android Chatting Application, The 2016 International Conference on Wireless Networks, ICWN16, July, Las Vegas, 2016

Performance Comparison of AES-CCM and AES-GCM Authenticated Encryption Modes, WORLDCOMP2016, International Conference on Security and Management SAM'16, July, Las Vegas, 2016

Implementation of Authenticated Encryption Algorithm Offset Code Book (OCB), The 2016 International Conference on Wireless Networks, ICWN16, July, Las Vegas, 2016

Storing Credit Card Information Securely using Shamir Secret Sharing in a Multi-Provider Cloud Architecture, WORLDCOMP2015, International Conference on Security and Management SAM'15, July, Las Vegas, 2015

A Comparison of HMAC-based and AES-based FFX mode of Operation for Format-Preserving Encryption, WORLDCOMP2015,  International Conference on Security and Management SAM'15,  July, Las Vegas, 2015

Implementation of Oblivious Bloom Intersection in Private Set Intersection Protocol (PSI), International Conference on Security & Management SAM’14, July, Las Vegas, 2014

Privacy-Aware Proximity Based Service using Hide & Crypt Protocol: Implementation, WORLDCOMP2013, International Conference on Security and Management SAM'13, July, Las Vegas, 2013

Private Proximity Testing For Location Based Services, WORLDCOMP2013, International Conference on Security and Management SAM'13, July, Las Vegas, 2013

Implementation of Boneh Protocol 3 in Location Based Services (LBS) to Provide Proximity Service, WORLDCOMP2013, The 2013 International Conference on Security and Management SAM'13,  July, Las Vegas, 2013

Implementation of a WEB Application for Evaluation of WEB Application Security Scanners, International Conference on Security & Management SAM’12, July, Las Vegas, 2012

The Zachman Framework, the Owner’s Perspective & Security,  International Conference on Security & Management SAM’12, July, Las Vegas, 2012

Enterprise Security Planning using the Zachman Framework – Builder’s Perspective,  Security and Management SAM’11, July, Las Vegas, 2011

Enterprise Security Planning using Zachman Framework: Designer’s Perspective, Security and Management SAM’11, July, Las Vegas, 2011

Enterprise Security Planning with TOGAF-9, Security and Management SAM’11, July, Las Vegas, 2011

A Strategy for Information Security:TOGAF, Security and Management SAM’11, July, Las Vegas, 2011

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF), Security and Management SAM’11, July, Las Vegas, 2011

Security Challenges in Cloud Computing, WORLDCOMP2010, The 2010 International Conference on Security and Management SAM'10, July, Las Vegas. 2011

Security Evaluation of CDMA2000, WORLDCOMP2010, the 2010 International Conference on Wireless Networks ICWN'10, July, Las Vegas, 2010

Security Issues for Mobile Government, WORLDCOMP2010, the 2010 International Conference on Security and Management SAM'10, July, Las Vegas, 2010

The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations, The 2009 International Conference on Wireless Networks ICWN'09, July, Las Vegas, 2009

Today and Tomorrow: IEEE 802.11 WLAN Security, the 2009 International Conference on Security and Management SAM'09, July, Las Vegas, 2009

Security in Wireless Sensor Networks - A Study, the 2009 International Conference on Wireless Networks ICWN'09, July, Las Vegas, 2009

Implementation of Domingo Ferrer’s a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN), The 2008 Applied Cryptology and Network Security (ACNS08), July, Las Vegas, 2008

Implementation of Montgomery Multiplication Algorithms in Machine Languages, the 2008 Applied Cryptology and Network Security (ACNS08), July, Las Vegas, 2008

Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs), The 2007 International Conference on Wireless Networks, ICWN'07, June, Las Vegas, 2007

Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Network, the 2006 International Conference on Security & Management, SAM'06, June, Las Vegas, 2006

Mobile Agent Security, the 2006 International Conference on Security & Management, SAM'06, June, Las Vegas, 2006

GSM Security II, the 2006 International Conference on Wireless Networks, ICWN'06, June Las Vegas, 2006 

Security Planning Using Zachman Framework for Enterprises, EURO mGOV 2005 (The First European Mobile Government Conference), July, University of Sussex, Brighton, UK, 2005

Enterprise Security Planning (ESP), EURO mGOV 2005 (The First European Mobile Government Conference), July, University of Sussex, Brighton, UK, 2005

GSM Security, the 2005 International Conference on Wireless Networks, ICWN’05, June, Las Vegas, 2005

Novel Obfuscation Algorithms for Software Security, the 2005 International Conference on Software Engineering Research and Practice, SERP’05, June, Las Vegas, 2005

Security Access Control Scheme (SACS) for Computer Networks’, BAS96, the First Symposium on Computer Networks, Istanbul, Turkey, May, 1996

A Solution to the Re-Blocking Problem in the Implementation of Improved Internet Security Access Control Scheme (IISACS), BAS96, the First Symposium on Computer Networks, Istanbul, Turkey, May, 1996

Distribution and Management of Secret Sequence Numbers for Large Computer Networks in an Internet Security Access Control Scheme, the 9th Int. Symp. on Computer and Information Sciences, November, Turkey, Antalya, 1994

Improved Session Initiation Authentication Protocols in Internet Access Control Scheme, the 2nd Int. Conf. on Computer Communications and Networks, San Diego, California, USA, June, 1993.

Performance of Improved Session Initiation Authentication (SIA) Protocols, 5th Bangor Symp. on Communications, Bangor, England, June, 1993

A TCP/IP Implementation of an Internet Security Access Control Scheme, 4th Bangor Symp. on Communications, Bangor, England, May, 1992

 

 

CHAIRED CONFERENCE SESSIONS

, SESSION 3-SAM: SECURITY EDUCATION

, SESSION 5-ICWN:   WIRELESS NETWORKS, MOBILITY, SENSOR NETWORKS, AND APPLICATIONS

, SESSION 9-SAM: NETWORK AND HARDWARE SECURITY

SESSION 7-SAM:    SECURITY APPLICATIONS

, SESSION 5- SAM:    COMPUTER SECURITY I

, SESSION 7-SAM: SECURITY EDUCATION + INFORMATION ASSURANCE + HARDWARE SECURITY

, SESSION 4-SAM: PANEL: FUTURE OF CYBERSECURITY EDUCATION 

SESSION 2-ICWN: AD-HOC NETWORKS AND APPLICATIONS + ENCRYPTION METHODS

, SESSION 6-SAM: CRYPTOGRAPHIC TECHNOLOGIES + HARDWARE SECURITY 

, SESSION 5-SAM SECURITY APPLICATIONS

, SESSION 4-SAM: PANEL: SECURITY PANEL DISCUSSION

, SESSION 13-SAM: NETWORK SECURITY

, SESSION 4-SAM: CRYPTOGRAPHIC TECHNOLOGIES I

, SESSION 8-SAM: CRYPTOGRAPHIC TECHNOLOGIES + INFORMATION ASSURANCE & SECURITY

, SESSION 13-SAM: CRYPTOGRAPHY

, SESSION 7-SAM: SPECIAL TRACK ON APPLIED CRYPTOLOGY AND NETWORK SECURITY

, SESSION 4-SAM: SECURITY & PRIVACY

, SESSION 3-SAM: SECURITY ISSUES

, SESSION 4-ICWN: WIRELESS

, SESSION 8-SAM: ENCRYPTION AND KEY MANAGEMENT

, SESSION 13-ICWN: WIRELESS

, Nov., MIT Cambridge.  TRACK: SECURITY and PROTECTION

 

 

AWARDS RECEIVED

AWARD, 2023 

CISCO INSTRUCTOR EXPERT EXCELLENCE AWARD, 2022

from , Turkey, 2022 

CISCO INSTRUCTOR EXPERT EXCELLENCE AWARD, 2021

 

and for Sharing his Expertise with the Research Community as Keynote Speaker from American Counsel of Science and Education: 2019 World Congress in Computer Science, Computer Engineering, and Applied Computing CSCE 2019, USA

from American Counsel of Science and Education: 2019 World Congress in Computer Science, Computer Engineering, and Applied Computing CSCE 2019, USA

from CSU Eastbay, Office of Diversity, 2018

from American Counsel of Science and Education: 2018 World Congress in Computer Science, Computer Engineering, and Applied Computing CSCE 2018, USA

Achievement Award for Research Contributions to the Field of Network Security from 2017 World Congress in Computer Science, Computer Engineering, and Applied Computing CSCE 2017, USA

Achievement Award for Research Contributions to the Field of Network Security from 2016 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP’16, USA

Achievement Award for Research Contributions to the Field of Network Security from 2015 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP’15, USA

Achievement Award for Research Contributions to the Field of Network Security from 2014 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP’14, USA

Achievement Award for Research Contributions to the Field of Network Security from 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP’13, US 

A thank you letter from Berkeley Turkish School (BTS), 2016

A thank you letter from CSU East Bay Office of Diversity, 2015

A thank you letter from University Honors Program for my commitment of time, energy, and academic expertise to work with honor students 2013 

Certificate of Appreciation from CSUEB Accessibility Services, 2012

Certificate of Appreciation (10 Years) from IEEE Communication Society 2010 

Outstanding Achievement Award  from Turkish General Staff (TGS), 2001 

Outstanding Achievement Award  from Havelsan Co., 2001

 

GRANTS RECEIVED

CSUEB A2E2 Grant 2020, $65.000

CSUEB A2E2 Grant 2019, $33.000

Lawrence Livermore National Laboratory (LLNL), 2017 Summer Fellowship, Global Security Principal Directorate / Z program 

Lawrence Livermore National Laboratory (LLNL), 2016 Summer Fellowship, Computation Directorate / Institute for Scientific Computing Research Division / Cyber Defenders Program

Lawrence Livermore National Laboratory (LLNL), 2015 Summer Fellowship, Computation Directorate / Institute for Scientific Computing Research Division / Cyber Defenders Program

Lawrence Livermore National Laboratory (LLNL), 2014 Summer Fellowship, Computation Directorate / Institute for Scientific Computing Research Division / Cyber Defenders Program

Lawrence Livermore National Laboratory (LLNL), 2013 Summer Fellowship, Computation Directorate / Institute for Scientific Computing Research Division / Cyber Defenders Program

Online & Hybrid Course Quality Transformation Grant, 2016, $4500

Juniper your university (JYU) Campus Laboratory Equipment Grant Program. $10.000

CSUEB Faculty Research Grant,” Application Security: Software Protection”, $5000

CSUEB New Faculty support Grant,” Secure Mobile Agents against Cyber-Security” $5000

Oregon State University (OSU), Visiting Professor, 2001

National Military Message Handling System (MMHS). Received ($15Million) from TGS (Turkish General Staff)(Havelsan)

Turkish Telecom TURNET Management.  Received  $10.000

First National Firewall System for Computer Networks. Received ($4 Million) from TUBITAK (Havelsan).

TYİH, Turkiye Yüksek İhtisas Hospital, Computer Center Management. Received $20.000 from TYIH

ENSA Group of Companies, Electronic and Textile labs for Universities. Received $5000

ENSA Group of Companies, Technical Document Translation for Electronics Labs. Received $5000

A VLSI implementation of DES, IDEA and RSA security algorithms. Received $25.000 from state planning department (DPT)

Smart Card Developments. Received $25.000 from Hacettepe University.

Cryptanalysis of Turkish alphabet. Received $4000  from  Hacettepe University

 

 

 

2023-2024 CS DEPARTMENT CHAIR

2023-2024 CSUEB UAS/UAV Drone Committee Member

2023-2024 California Cybersecurity 4 Year Education Program Workgroup

2023-2024 College of Science Representative at Bay Area Council Cyber Security

2023-2024 College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS) 2022-2023 CS DEPARTMENT CHAIR 2022-2023 CSUEB UAS/UAV Drone Committee (Chair)

2022-2023 California Cybersecurity 4 Year Education Program Workgroup

2022-2023 California State University Quantum Information Science Workgroup

2022-2023 College of Science Representative at Bay Area Council Cyber Security

2022-2023 College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

2021-2022 CS DEPARTMENT CHAIR

2021-2022 California Cybersecurity 4 Year Education Program Workgroup

2021-2022 California State University Quantum Information Science Workgroup

2021-2022 College of Science Representative at Bay Area Council Cyber Security

2021-2022 College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

 

2020-2021 CS DEPARTMENT CHAIR

2020-2021 California Cybersecurity 4 Year Education Program Workgroup

2020-2021 California State University Quantum Information Science Workgroup

2020-2021 College of Science Representative at Bay Area Council Cyber Security

2020-2021 College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

 

2019-2020 CS DEPARTMENT CHAIR

2019-2020 CSU EB PROFESSIONAL LEAVE COMMITTEE

2019-2020 California Cybersecurity 4 Year Education Program Workgroup

2019-2020 California State University Quantum Information Science Workgroup

2019-2020 College of Science Representative at Bay Area Council Cyber Security

2019-2020 College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

2019-2020 Mentor (CSUEB CUBES)

2019-2020   (XCSUEBF2019) competition as team coach

Advising: CS

 

2018-2019 CS RTP Committee (chair)

2018-2019 CS Grad Committee

2018-2019 MSc thesis committee member.

2018-2019 Nursing Department member of PTR committee

2018-2019 CTF Coach

2018-2019 Organized CYBERFIRE Capture the Flag Competition (CTF)

2018-2019 competition as team coach

2018 -2019 College of Science Representative at Bay Area Council Cyber Security

2018 -2019 College of Science Representative at CSU Council for Emergency Management and Homeland Security (CEMHS)

NBC News, , interview 2023

KRON4 News, BAY AREA, interview 2023

, Cyberattacks: Hayward Hacked, interview 2023

Bay Are News Group (East Bay Times), , interview 2023

The Mercury News, Crime and Public Safety, , interview 2023

, interview, 2023

Advisory Board member of Smith Center for Private Enterprise Studies, 2023

Media Training, CNN, 2022

Program Committee Member ICR'22 - International Conference on Innovations in Computing Research, 2022

Program Committee Member, SVCC 2023 (Silicon Valley Cybersecurity Conference), 2023

Program Committee Member, SVCC 2022 (Silicon Valley Cybersecurity Conference), 2022

Program Committee Member, SVCC 2021 (Silicon Valley Cybersecurity Conference), 2021

Program Committee Member, SVCC 2020 (Silicon Valley Cybersecurity Conference), 2020

, interview, 2021

, interview, 2021

Member of Organizing Committee: , June 21

, interview, 2019

ABC7 News 6pm, NATIONAL SECURITY, GRINDR, CHINA interview, 2019

()

, interview, 2019

ABC7 News, FACEBOOK SECURITY BREACH, interview 2018

, interview, 2018

, 2018

ABC7 News 6pm, FACEBOOK TESTIMONY, interview, 2018

ABC7 News 5pm, FACEBOOK TESTIMONY, 2018

FOX (KTVU2) News, FACEBOOK HACKING , 2018

 Organized CYBERFIRE Capture the Flag Competition (CTF) in CSU East Bay, 2018

Invited to join CGSR Workshop: Cyberspace, Information Strategy, and International Security, Feb 27-28, 2018

NBC News, UBER HACKING interview, 2017

Nominated  , 2017

Invented a security protocol “L4NE”, based on composite functions for Location Based Services (LBS), 2017

Invented an ECC based stream cipher  “ERTAUL” Crypto Algorithm, 2005

Organized 2nd Annual HackCSUEB HACKATHON at CSU East Bay, 2017 () (12 Hours),

Organized 1st  Annual HackCSUEB HACKATHON at CSU East Bay, 2015 ( (24 hours)

Regional Alliances and Multistakeholder Partnerships to Stimulate (RAMPS) Cybersecurity Education and Workforce Development. National Institute of Standards and Technology (NIST) and United States Department of Commerce (DoC) Grand. Partnering with Merritt Community College and Lawrence Livermore National Lab (LLNL) 2016

CS Editorial Board Member of (American Journal of Undergraduate Research), 2017

Participated in competition as team ’s coach, 2016

Participated in competition as team 0FEB6’s coach, 2015

Participated in competition as a coach, 2014 

Participated in Competition, Los Alamos National Laboratories (LANL), 2016

Participated in Competition, Los Alamos National Laboratories (LANL), 2015

Participated in ) Competition, Sandia National Laboratories (SNL), 2014

Participated in Raspberry Pi Challenge: Cyber Craft - Capture the Flag (CCCTF) Competition, Lawrence Livermore National Laboratories (LLNL), 2016

Participated in Raspberry Pi Challenge: Capture the Flag (CTF) Competition, Lawrence Livermore National Laboratories (LLNL), 2015

Participated in Raspberry Pi Challenge: Capture the Flag (CTF) Competition, Lawrence Livermore Laboratories (LLNL), 2014

Participated in Raspberry Pi Challenge: Capture the Flag (CTF) Competition, Lawrence Livermore Laboratories (LLNL), 2013

Technical Program Committee Member, , 2016

Technical Program Committee Member, The First Euro Conference on Mobile Government (The EURO, mGOV 2005)

Technical Program Committee Member, , The First International Conference on Advances in Cyber-Technologies and Cyber-Systems, 2017

Technical Program Committee Member, The First International Conference on Advances in Cyber-Technologies and Cyber-Systems, 2016

Levent Ertaul on the news: Interviewed with , Why Fighting Cybercrime Is So Hard, May 2017

Levent Ertaul on the 2015

Levent Ertaul on the news: Interviewed with , “Regional Businesses tap University for Cybersecurity training”, Spring 2011.

Program Committee Member, The IEEE Region 10 Symposium ( 2015)

Program Committee Member, , Workshop on IoT Privacy, Trust, and Security (part of 12th ACM Symposium on Information, Computer and Communications Security), 2017

Program Committee Member, , Workshop on IoT Privacy, Trust, and Security (part of 11th ACM Symposium on Information, Computer and Communications Security), 2016

Program Committee Member, IoTPTS, Workshop on IoT Privacy, Trust, and Security (part of 10th ACM Symposium on Information, Computer and Communications Security), 2015

Program Committee Member, , The 2017 International Conference on Security and Management (Part of WORLDCOMP'17 - The 2017 World Congress in Computer Science, Computer Engineering, and Applied Computing)

Program Committee Member, , The 2016 International Conference on Security and Management (Part of WORLDCOMP'16 - The 2016 World Congress in Computer Science, Computer Engineering, and Applied Computing)

Program Committee Member, , The 2015 International Conference on Security and Management (Part of WORLDCOMP'15 - The 2015 World Congress in Computer Science, Computer Engineering, and Applied Computing)

Program Committee Member, , The 2014 International Conference on Security and Management (Part of WORLDCOMP'14 - The 2014 World Congress in Computer Science, Computer Engineering, and Applied Computing)

Program Committee Member, , The 2013 International Conference on Security and Management (Part of WORLDCOMP'13 - The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing)

Program Committee Member, , The 2012 International Conference on Security and Management (Part of WORLDCOMP'12 - The 2012 World Congress in Computer Science, Computer Engineering, and Applied Computing)

Program Committee Member, , The 2009 International Conference on Security and Management (Part of WORLDCOMP'09 - The 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing)

Established ), 2004

Holder of North Atlantic Treaty Organization (NATO) ‘SECRET LEVEL’ Clearance

Organized, on behalf of Havelsan Co, the North Atlantic Treaty Organization (NATO) Military Message Handling Systems Work Group (MMHSWG) meeting,  Istanbul, 2000

Joined NATO , North Atlantic Treaty Organization (NATO), SHAPE, Mons, Belgium, 2000

Joined Unified Efforts Demonstration, Ankara, Turkey, 2000.

Invited to SHOW Radio for security discussion as an security expert, Turkey, 1998

Member of Modern Sailing Academy & Club, Sausalito, CA