| 
                
                 
                     
                    Mohsen 
                    Hajsalehi Sichani    
                    E-mail: 
                    Hajsalehi@alum.sharif.edu, mohsenhs82@yahoo.com 
                       | 
        
                
                Education History
                    B.S. Software Engineering, Najafabad Azad University, Najafabad, Isfahan, 2006
                
                    M.S. Information Technology-Network and Telecommunications, Sharif University of Technology, 
                    International Branch, 2008 (GPA=A+ , Top 10%).  | 
        
| 
                
                 
 
                    Technical skills 
                     
                    * C,C++,C# 
                    * ASP.net 
                    PHP 
                    * SQL Server 
                    SNMP,MRTG,ASN 
                    v1,2,3,MIBbrowsers 
                    NS-2, NS-3 
                    Qualnet 
                    * Data Mining 
                    programs such as WEKA, SPSS, and RapidMiner 
                    Matlab 
                    (image processing toolbox & Neural Net toolbox) 
                    * CCNA 
                    CWNA 
                    CWSP 
                    * Linux
                     
                    JAVA 
                    Python 
                    *MS Windows 
                    Server 
                      
                    *=Means having much more experiences 
                     
                       | 
        
| 
                
                 
 
                    Work Experience 
                    Network Administrator, Lenjan agriculture (Jahad Keshaqvarzi Lenjan), 
                    2010-So far 
                    Programmer, Hoshmand Gostar Esfahan Corporation, 2007-So far 
                    Wireless Network admin, Rasam Pey Corporation, 2009-2010 
                       | 
        
| 
                
                 
 
                    Projects 
                    1. Implementing RoboSoftware with c#, Selenium, AutoIt with the ability to 
                    connect to site, login, doing some configuration changing, downloading and 
                    saving downloaded objects with appropriate names. 
                    2. Designing and implementing different online shops with ability of online 
                    payment with C#, SQL, ASP.NET 
                    3. Designing and implementing different E-Learning sites with C#, SQL, ASP.NET 
                    4. Designing and implementing a web site for distributing, stock calculator 
                    and … for different kinds of dung (Fertilizers) with C#, SQL, ASP.NET 
                    5. Designing and implementing several web sites for company introduction with 
                    C#, SQL, ASP.NET, Joomla, and DotNetNuke. 
                       | 
        
| 
                
                 
 
                    Courses Thought 
                    Computer Graphics 
                    Software Engineering  
                    Computer Networks 
                    Lab of Computer Networks 
                    Computer System Architecture 
                    Multimedia Systems 
                    Lab of Web Designing 
                    Web Designing 
                    Computer Networks 
                    Computer Programming with C/C++/C# 
                       | 
        
| 
                
                 
 
                    Publication 
                    Conference 
                    Papers A new analysis of RC4, a data mining approach (j48),International Conference on Security and Cryptography, ICETE Conference, SECRYPT 2009, Milan, Italy, Mohsen Hajsalehi Sichani, Ali Movaghar, Download PDF. 
                    Big step refinement laws,The 13th 
                    IEEE Joint International Computer Science and Information Technology Conference 
                    Sponsored by IEEE, JICSIT 2011, Chongqing, China, Saeed Khalafinejad & Mohsen Hajsalehi Sichani 
                    Chapter book 
                    Regression, Knowledge Oriented Applications in Data Mining, InTech publication, 2011, 
                    Chapter 22, Pages 353-372, Mohsen 
                    Hajsalehi Sichani & Saeed Khalafinejad, Availed at :http://www.intechopen.com/articles/show/title/regression  
                       | 
        
| 
                
                 
 
                    Language Proficiency 
                    English 
                     
                      
                      | 
        
| 
                
                 
                    Research Interests VANET 
                    Security of VANET 
                    SQL injection 
                    IDS 
                    Wireless ad hoc networks 
                    Security of wireless networks 
                    Security of Wireless Protocols 
                      
                      | 
        
| 
                
                 Academic Theses 
 B.sc. thesis: Implementing an E-learning site with ASP.NET and C# with ability to create groups of students, groups of teachers, Online exams, ……. 
 
                     
                    M.Sc. thesis: Nowadays wireless 
                    technology is widespread all over the world and there is a competition among 
                    companies to provide the most secure and high range wireless networks for their 
                    customers.
                    
                     
                    This thesis focuses on the security of wireless ad hoc networks.
                    
                    There are lots of different encryption algorithms for securing wireless ad hoc networks.
                    
                    Some of the most important are:
                    
                    WEP, TKIP, WPA, WPA2.
                    
                    All other encryption methods of wireless ad hoc networks are derived from these methods.
                    
                     
                    This thesis focuses on WEP and WPA2.
                    
                    For both algorithms, a literature review is conducted, a new approach to cracking is suggested, 
                    and tested on real data, and the future works are mentioned. 
                    For WEP, which is an acronym of Wired Equivalent Privacy, a new approach is used that proves 
                    that WEP is not a secure algorithm and shows that this algorithm is not a 
                    shuffle algorithm although these vulnerabilities have been proven
                    
                    in different ways through years.
                    
                     For WPA2, which is an acronym of Wi-Fi Protected Access, its main encryption algorithm which is AES and is an acronym of Advanced Encryption Standard is discussed and a new approach is used which in real situation can break each bit of AES with the success rate of more than 70 percent. It should be mentioned that so far AES is not officially broken and is known as the most secure encryption algorithm of ad hoc networks by National Institute of Standards and Technology of America (NIST). 
                      |