B.S. Uganda Martyrs University, \nM.S. Uganda Martyrs University, \nM.S. George Mason University, \nPhD George Mason University<\/p>\n
Biography<\/b><\/p>\n
Alex is an assistant professor for cybersecurity at Marymount University where he teaches undergraduate, graduate, and doctoral courses. While at George Mason University, he was a Fulbright scholar where he published research on detecting cybercrime using machine learning and natural language processing.\u00a0 He is also a member of the cybersecurity and privacy working group for the Greater Washington Board of Trade. He presents and publishes peer-reviewed research in cybercrime, malware analysis, cyber forensics, privacy, and applied machine learning. He is also a member of professional organizations like IEEE. \n\u00a0<\/p>\n
Diaz-Gonzalez J., Mbaziira A.V.<\/strong>, Liu M (2019), An exploratory deep learning approach to mobile malware detection, Journal of Computing Sciences in Colleges 35 (3) ACM, 219-219 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/li>\n
Sabir M.F., Jones J.H., Liu H., Mbaziira A.V<\/strong>(2019), Predicting Stealthy Watermarks in Files Using Deep Learning, 7th International Symposium on Digital Forensics and Security (ISDFS), 1-6<\/li>\n
Sabir, M. F., Jones, J. H., Liu, H., & Mbaziira, A. V. <\/strong>(2019, March). Using Machine Learning to Detect Stealthy Watermarks in Files. In Proceedings of the 3rd<\/sup> International Conference on Compute and Data Analysis. ACM, Kahului, Hawaii.<\/li>\n
Mbaziira, A. V.<\/strong>, & Murphy, D. R. (2018). An Empirical Study on Detecting Deception and Cybercrime Using Artificial Neural Networks. In Proceedings of the 2nd International Conference on Compute and Data Analysis (pp. 42-46). ACM.- Best paper presentation award<\/em><\/li>\n
Sabir, M. F., Jones, J. H., Liu, H., & Mbaziira, A. V. <\/strong>(2018, March). A Non-Algorithmic Forensic Approach for Hiding Data in Image Files. In Proceedings of the 2nd International Conference on Compute and Data Analysis (pp. 60-64). ACM. \u2013 Best paper presentation award<\/em><\/li>\n
Maha Sabir, Jim Jones, Liu Hang, Alex Mbaziira<\/strong>, (2018) \u201cA Non-Algorithmic Forensic Approach for Hiding Data in Image Files””, 2018 International Conference on Computing and Data Analysis.<\/li>\n
Maha Sabir, Jim Jones, Liu Hang, Alex Mbaziira<\/strong>, (2017) “” A File-Type Independent Approach to Persistent Forensic Watermarks for Cyber Analysis “”, International Conference on Computing and Technology<\/li>\n
Alex Mbaziira<\/strong>, Jim Jones (2017) “” Hybrid Text-based Deception Models for Native and Non-Native English Cybercriminal Networks””, 2017 International Conference on Computing and Data Analysis, pp 23-27, ACM.<\/li>\n
Alex Mbaziira<\/strong>, Jim Jones (2016) “”A Text-based Deception Detection Model for Cybercrime””, 3rd<\/sup> International Conference on Technology and Management (ICTM)<\/li>\n
Alex Mbaziira<\/strong>, Ehab Abozinadah, James Jones, (2015) “”Evaluating Classifiers in Detecting 419 Scams in Bilingual Cybercriminal Communities””. International Journal of Computer Science and Information Security 7: 1-7 (Best Paper Award).<\/li>\n
\u00a0Ehab Abozinadah, Alex Mbaziira<\/strong>, James Jones, (2015) “”Detection of Abusive Accounts with Arabic Tweets””. 4th International Conference on Knowledge Discovery (ICKD) 2: 113-119.<\/li>\n
\u00a0Hamed Sarvari, Ehab Abozinadah, Alex Mbaziira<\/strong>, Damon McCoy, (2014) “”Constructing and Analyzing Criminal Networks””. In Security and Privacy Workshops (SPW), 2014 IEEE (pp. 84-91). IEEE.<\/li>\n<\/ol>\n\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\r\n\t\t\t<\/div>\r\n<\/div>","protected":false},"featured_media":0,"menu_order":735,"template":"","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","ngg_post_thumbnail":0},"staff-member-category":[],"acf":[],"yoast_head":"\nAlex Mbaziira | Marymount Directory<\/title>\n\n\n\n\n\n\n\n\n\n\n\n\n\t\n