Mohsen
Hajsalehi Sichani
E-mail:
Hajsalehi@alum.sharif.edu, mohsenhs82@yahoo.com
|
Education History
B.S. Software Engineering, Najafabad Azad University, Najafabad, Isfahan, 2006
M.S. Information Technology-Network and Telecommunications, Sharif University of Technology,
International Branch, 2008 (GPA=A+ , Top 10%). |
Technical skills
* C,C++,C#
* ASP.net
PHP
* SQL Server
SNMP,MRTG,ASN
v1,2,3,MIBbrowsers
NS-2, NS-3
Qualnet
* Data Mining
programs such as WEKA, SPSS, and RapidMiner
Matlab
(image processing toolbox & Neural Net toolbox)
* CCNA
CWNA
CWSP
* Linux
JAVA
Python
*MS Windows
Server
*=Means having much more experiences
|
Work Experience
Network Administrator, Lenjan agriculture (Jahad Keshaqvarzi Lenjan),
2010-So far
Programmer, Hoshmand Gostar Esfahan Corporation, 2007-So far
Wireless Network admin, Rasam Pey Corporation, 2009-2010
|
Projects
1. Implementing RoboSoftware with c#, Selenium, AutoIt with the ability to
connect to site, login, doing some configuration changing, downloading and
saving downloaded objects with appropriate names.
2. Designing and implementing different online shops with ability of online
payment with C#, SQL, ASP.NET
3. Designing and implementing different E-Learning sites with C#, SQL, ASP.NET
4. Designing and implementing a web site for distributing, stock calculator
and … for different kinds of dung (Fertilizers) with C#, SQL, ASP.NET
5. Designing and implementing several web sites for company introduction with
C#, SQL, ASP.NET, Joomla, and DotNetNuke.
|
Courses Thought
Computer Graphics
Software Engineering
Computer Networks
Lab of Computer Networks
Computer System Architecture
Multimedia Systems
Lab of Web Designing
Web Designing
Computer Networks
Computer Programming with C/C++/C#
|
Publication
Conference
Papers A new analysis of RC4, a data mining approach (j48),International Conference on Security and Cryptography, ICETE Conference, SECRYPT 2009, Milan, Italy, Mohsen Hajsalehi Sichani, Ali Movaghar, Download PDF.
Big step refinement laws,The 13th
IEEE Joint International Computer Science and Information Technology Conference
Sponsored by IEEE, JICSIT 2011, Chongqing, China, Saeed Khalafinejad & Mohsen Hajsalehi Sichani
Chapter book
Regression, Knowledge Oriented Applications in Data Mining, InTech publication, 2011,
Chapter 22, Pages 353-372, Mohsen
Hajsalehi Sichani & Saeed Khalafinejad, Availed at :http://www.intechopen.com/articles/show/title/regression
|
Language Proficiency
English
|
Research Interests VANET
Security of VANET
SQL injection
IDS
Wireless ad hoc networks
Security of wireless networks
Security of Wireless Protocols
|
Academic Theses
B.sc. thesis: Implementing an E-learning site with ASP.NET and C# with ability to create groups of students, groups of teachers, Online exams, …….
M.Sc. thesis: Nowadays wireless
technology is widespread all over the world and there is a competition among
companies to provide the most secure and high range wireless networks for their
customers.
This thesis focuses on the security of wireless ad hoc networks.
There are lots of different encryption algorithms for securing wireless ad hoc networks.
Some of the most important are:
WEP, TKIP, WPA, WPA2.
All other encryption methods of wireless ad hoc networks are derived from these methods.
This thesis focuses on WEP and WPA2.
For both algorithms, a literature review is conducted, a new approach to cracking is suggested,
and tested on real data, and the future works are mentioned.
For WEP, which is an acronym of Wired Equivalent Privacy, a new approach is used that proves
that WEP is not a secure algorithm and shows that this algorithm is not a
shuffle algorithm although these vulnerabilities have been proven
in different ways through years.
For WPA2, which is an acronym of Wi-Fi Protected Access, its main encryption algorithm which is AES and is an acronym of Advanced Encryption Standard is discussed and a new approach is used which in real situation can break each bit of AES with the success rate of more than 70 percent. It should be mentioned that so far AES is not officially broken and is known as the most secure encryption algorithm of ad hoc networks by National Institute of Standards and Technology of America (NIST).
|