▪ Multidisciplinary background including computer science, electrical engineering, quality management, and project management.
▪ Experience and leadership positions in academic, business, and (inter)cultural domains.
▪ Strong communication and soft skills.
▪ Dual citizen fluent three languages.
Referee for International Research Papers
2007 to Present
Reviewing papers on wireless communication for national and international conferences and journals.
Visiting Assistant Professor
August 2012 to May 2013
•Evaluating Software for Security (CIS 4615)
•Computer Security Policies and Disaster Recovery (CIS 4365)
•Information Systems Intrusion Detection (CIS 4364)
•General Computer Security Administration (CIS 4360)
•Web Access and System Design (COP 3855)
•Introduction to Computer Hardware Organization (with lab) (CDA 3101)
•Computer Applications for Business (CGS 1100)
Learning Management Systems: MyITLab and Blackboard.
Operations Research Analyst
July 2011 to July 2012
As a member of the senior management team responsible for collecting data and analyzing enterprise processes in order to improve the processes as well as to develop and implement new policies. Also acted as Quality Manager, Project Manager, and Network Administrator.
January 2011 to July 2011
•Systems Analysis and Development (CIS 210)
•Introduction to Information Systems (CIS 105)
•Fundamentals of Mathematics (online course) (MAT 104)
Learning Management Systems: e-College, MyITLab, MyMathLab, and Blackboard.
August 2006 to December 2010
Investigation of wireless networks and development of secure communication mechanisms for Wireless Sensor Networks.
August 2007 to August 2010
•Programming II (CPSC 2376)
•Programming I (CPSC 1375)
•Computer Literacy (CPSC 1370)
•Introduction to Computer Science Lab (CPSC 1175)
Learning Management Systems: WebCT and Blackboard.
Various Positions at DHL Headquarter, Germany
February 1993 to July 2006
Worked in the areas of Information Assurance, Quality Management, Project Management, Personnel Management, Facility Management, Safety and Security in Warehouse and Offices, and Implementation of laws and regulations into administrational and operational processes. In addition to work experience, visited and held seminars on some of these topics.
I was involved in both, planning and putting into operation of new facilities as well as in the expansion and downsizing of existing facilities.
Music Instructor, Band Leader and Freelance Musician
January 1990 to July 2005
Taught Music Theory, Instruments, and Vocal Training.
Organized and performed at a variety of events, such as concerts and festivals. This included planning, delegation, and controlling.
February 2004 to February 2005
Designed, built, and operated a networking lab for the research of Multiprotocol Label Switching (MPLS) on Linux.
February 2003 to July 2003
“MPEG-4 Systems Survey” project. (T-Systems is a branch of the German Telecom).
August 2002 to February 2003
Assembly and testing of printed circuit board modules for EWSD (Electronic Dialing System Digital).
Quality Control Inspector
August 1990 to August 1991
Inspected circuit boards at various stages; design, print, assembly, soldering, and function testing.
Ph.D. in Integrated Computing
2006 to 2010
Master of Science in Computer Technology and Telecommunication
2001 to 2006
Bachelor of Science in Electrical Engineering
1996 to 2001
January 2001 to July 2001
University of Applied Sciences, Darmstadt, Germany (Hochschule Darmstadt)
▪ International Multimedia Laws
▪ International Commerce
January 2000 to July 2000
Applied the five phases of Project management (initiating, planning and design,
executing, monitoring and controlling, and closing) to a project using the
software Microsoft Project.
September 1998 to May 1999
German Association for Quality
(Deutsche Gesellschaft fuer Qualitaet (DGQ))
▪ Quality Management Systems and Internal Audit
▪ Applications of Quality Management Systems
▪ Statistical Methods for Decision Finding
▪ TQM and Improvement of Enterprise Processes
ACM (Association for Computing Machinery)
July 2007 to Present
School of Computer Engineering, Germany
August 2001 to May 2003
Graduate Student Representative in college-wide committee that made decisions on admission requirements, syllabi, exams and other college regulations.
Heart to Heart Anatolia
March 2010 to Present
A nonprofit organization for public benefit and charitable purposes. Founding member, member of Board of Directors, and volunteer.
Association for German-Turkish Friendship, Germany
1990 to 2006
Founding member and volunteer with various leadership positions; also active as speaker, host, and musician.
Arkansas Institute for Performance Excellence
July 2011 to August 2012
Examiner in the “Arkansas Governor’s Quality Award” program, which has been selected nationwide as #1 in four of six categories.
Friends of Turkey in Arkansas
July 2006 to Present
Nonprofit organization for cultural exchange. Member.
Model Based Vulnerability Assessment of Wireless Communication Paths
Performance Evaluation of End-to- End Message Dispersion Mechanism for Wireless Sensor Networks
Security and Attacks in Wireless Sensor Networks
Al, M., Yoshigoe, K., "Security and Attacks in Wireless Sensor Networks."
Network Security, Administration and Management: Advancing Technology and Practice. IGI Global, 2011. (pp. 183-216). doi:10.4018/978-1-60960-777-7.ch010, and
Management Association, USA, Information Resources. "Wireless Technologies: Concepts, Methodologies, Tools and Applications." IGI Global, 2012. (pp. 1811-1846. doi:10.4018/978-1-61350-101-6
Wireless Integration, Design, Modeling, and Analysis of Nanosensors, Networks, and Systems: A Systems Engineering Approach
Mohan, S., Al, M. et al., “Wireless Integration, Design, Modeling, and Analysis of Nanosensors, Networks, and Systems: A Systems Engineering Approach,” Proceedings of SPIE Conferences on Nanosensors, Biosensors, and Info-Tech Sensors and Systems, The International Society for Optical Engineering, San Diego, CA, March 2009.
Adaptive Confidentiality Mechanism for Hierarchical Wireless Sensor Networks
Al, M., Yoshigoe, K., "Adaptive Confidentiality Mechanism for Hierarchical Wireless Sensor Networks," IEEE GLOBECOM Workshop on Wireless Mesh and Sensor Networks, New rleans, LA, November 2008.
Attack Probabilities on Single Path and Multi Path Communication in Wireless Sensor Networks
Al, M., Yoshigoe, K., "Attack Probabilities on Single Path and Multi Path Communication in Wireless Sensor Networks," Poster presented at NSF EPSCoR Wireless Nano-Bio-Info-Tech Sensor Symposium, Little Rock, AR, August 2008.
A Secure and Energy-Efficient Key Generation Mechanism for Wireless Sensor Networks
Al, M., Yoshigoe, K., "A Secure and Energy-Efficient Key Generation Mechanism for Wireless Sensor Networks," International Conference on Parallel and Distributed Techniques and Applications (PDPTA), pp. 587-593, Las Vegas, Nevada, July 2008.
Facebook, Instagram users told to provide government-issued ID
January 30, 2013
“Facebook, Instagram users told to provide government-issued ID; Expert says any information online is at risk of being hacked”, based on news that Facebook started asking for government IDs; aired on January 30, 2013, news coverage on TV Channel 4 of WJXT, http://www.news4jax.com/news/Facebook-Instagram-users-told-to-provide-government-issued-ID/-/475880/18310804/-/axww9fz/-/index.html.
How to spot hackers
February 20, 2013
“How to spot hackers”, based on The New York Times article from February 18, 2013, “Chinese Army Unit Is Seen as Tied to Hacking Against U.S.”; aired on February 20, 2013, Morning Show (life), TV Channel 4 of WJXT, http://www.news4jax.com/How-to-spot-hackers/-/475982/18999324/-/idpxk/-/index.html.
JEA systems back online after cyber attack
February 20, 2013
“JEA systems back online after cyber attack”, based on a cyber-attack on JEA (municipal utility service Electric-Water-Sewer) on February 19, 2013; aired on February 20, 2013, news coverage on TV Channel 4 of WJXT, http://www.news4jax.com/news/JEA-systems-back-online-after-cyber-attack/-/475880/19001212/-/dcrw6xz/-/index.html.
Privacy vs Security
June 7, 2013
“Privacy VS Security”, based on the involvement of the National Security Administration in collecting information about phone and internet use in the U.S. and abroad; aired on June 7, 2013, news coverage on Channel 4 of WJXT, http://www.news4jax.com/news/Privacy-VS-security/-/475880/20477686/-/cfyiuoz/-/index.html.
Not limited to but including Cyber Security, Information Assurance, Computer/ Network/ Information Security, Computer Forensics, Cryptography, IT Security Risk Management, Security Policies, Disaster Recovery, Wireless Sensor Networks, Computer Hardware, Operating Systems, Management Information Systems, Software Engineering, Information Systems Analysis and Design, Computer Architecture, Networking, Telecommunication Principles, E-Business, Mathematics, Project Management, and Quality Management.
Not limited to but including IT Risk Management, Computer and Network Security, Information Assurance, Wireless Sensor Networks, and Design and Analysis of Routing Mechanisms.
academic, analysis, assessment, association, assurance, audit, business continuity, communication, computer, control, cyber security, decisions, design, development, engineering, faculty, founder, German, hardware, industry, information, initiative, international, leadership, management, modeling, network, organization, policies, project, quality, recovery, research, risk, science, security, systems, TCP/IP, technology, testing, Turkish, volunteer, vulnerability, wireless sensor networks.