Samir Tout, Ph.D.

Associate Professor

School of Technology Studies, Information Assurance

Eastern Michigan University

Ypsilanti MI 48197 USA

 

Office: 206 F Roosevelt Hall

Phone: 734.487.4906

E-mail: stout@emich.edu

 

 

Welcome to my Web page. Feel free to contact me (best through e-mail) if you have any questions.

 

Status:

Tenured Associate Professor

Adviser – Ph.D. in Technology, Information Assurance Concentration

 

Research/Scholarly:

Tout, S. (2011). A Roadmap for Transitioning an Information Assurance Program and Others to Cloud Computing. The International Journal of Information and Communication Technology Research. Vol. 1, No. 3, pp. 128-138.

Tout, S., Xie, Y., and Lawver, G.  (February, 2010). EDucational Games training Students how to Protect against Intrusion (EDGSPI).  NSF grant proposal submitted under the Strategies components of the ITEST Program.

Tout, S., McMillan, W., Xie, Y., and Lawver, G.  (February, 2009). CPS: Medium: RUI: The Enhanced Mobile Emergency Response System (EMERS).  NSF grant proposal submitted to Cyber-Physical Systems (CPS) Program.

Tout, S., Basal, A. (2009). “E-Security Global Governance”. In The Proceedings of ECDC’09, Kuala Lumpur, Malaysia, Nov 3-4, 2009.

Tout, S, W Sverdlik, and G Lawver (2009).  Cloud Computing and its Security in Higher Education.  In The Proceedings of the Information Systems Education Conference (ISECON) 2009, v 26 (Washington DC): §2314. ISSN: 1542-7382.

Tout, S., Sverdlik, W., & Sun, J. (2008). A Hybrid Evolutionary Approach to Cluster Detection. Trends in Intelligent Systems and Computer Engineering. Springer Science+Business Media, LLC 2008. Vol. 6, Chapter 42, pp. 619-636.

Tout, S., Sverdlik, W., & Sun, J. (2007c). A Hybrid Approach to Cluster Detection. IAENG International Journal of Computer Science, Volume 34 Issue 1, pp. 105-110

Tout, S., Sverdlik, W., & Sun, J. (2007b). Current Trends in Intelligent Systems and Computer Engineering. Accepted to appear in the edited Springer Book of IMECS’07.

Tout, S., & Higgins, M. (2007). Web Services Conversion, Security Enhancements - Experience Report. Proceedings of the 2007 IEEE SOA Industry Summit (SOAIS 2007), Salt Lake City, Utah, July 2007.

Tout, S., Sverdlik, W., & Sun, J. (2007a). Cluster Detection of Special Datasets using the PYRAMID Algorithm. Proceedings of IAENG International Multi-Conference of Engineers and Computer Scientists, March 21-23, 2007, pp. 812-817. (Chosen for publication in the special issue of the IAENG Journals)

Tout, S., Sverdlik, W., & Sun, J. (2007). Cluster detection with the PYRAMID algorithm. Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining, Hawaii, USA.

Tout, S., Sverdlik, W. (2007). Clustering using Genetic Programming. To appear in the proceedings of the 2007 Michigan Academy of Science.

Tout, S., Sverdlik, W., & Sun, J. (2006). Parallel hybrid clustering using genetic programming and multi-objective fitness with density (PYRAMID). Proceedings of the 2006 International Conference on Data Mining (DMIN’06), Las Vegas, NV, USA, pp. 197-203.

 

Other Scholarly:

Watch my TEDx talk at: http://youtu.be/n5pmqasoQkQ

I serve as an associate editor of ISC2’s Information Security Journal: A Global Perspective, 2011-present

I served as a Graduate Research Fair Supervisor for several graduate students

I continue to serve as a Ph.D. candidacy & dissertation chair for several students

 

Grants:

eFellows – REM, 2012

Faculty Research Fellowship – 2013-2014

Other submissions: NSF Grants – CPS/ITEST/SaTC Programs

 

Service:

United Way School of Technology Studies Representative, 2009 – 2011

University Human Subjects Review Committee (UHSRC), 2010 – 2012

Doctoral Operations Committee member, 2009 - 2012

 

Industry:

Roles Served:

Chief Architect

Software Designer/Developer/Consultant

Security Consultant

Mobile App Designer/Developer

Selected Employers/Clients/Platforms:

Perle Systems, Toronto, Ontario

Unisys, Plymouth, MI

Keane/GMAC, Southfield, MI

Compuware Corporation/OnStar, Detroit, MI

Apple AppStore

 

Awards and Professional Affiliations:

      Two GM-CIO awards for consulting excellence

      eFellows Grant

      ITIL Foundation Certified

      Project Management Professional (PMP) Certified

      TOGAF Certified

      SANS GIAC Certified

      IEEE Member

      AOGEA - Agile Enterprise Architecture Methodology Working Group

 

 

Courses Taught at EMU:

 

Winter 2013

Course Number

Course Name/CRN

Comments

IA 422

End-User Systems:Planning&Desn - 28152

IA 642

Enterprise Sec - 28049

IA 400

Mal Anal & Rev Eng – 27977

Lab-intensive

IA 894

Candidacy Seminar

Candidacy Chair

IA 799

Independent Study

Grant – NSF

IA 799

Independent Study

Advanced MARE

 IA 103

 Info Sec Overview –

 27850

 

 

 

Fall 2012

Course Number

Course Name/CRN

Comments

IA 422

End-User Systems:Planning&Desn - 16057

IA 642

Enterprise Sec - 17926

IA 651

Enterprise Incident Response - 14561

IA 400

Mal Anal & Rev Eng – 17746

Lab-intensive

IA 799

Independent Study

Grant – NSF

IA 894

Candidacy Seminar

Committee member

 

 

Winter 2012

Course Number

Course Name/CRN

Comments

IA 645

Data Mining for IA Security - 25772

IA 642

Information System Security Overview for Managers – 25771

IA 422

End-User Systems:Planning&Desn - 27684

COT 898

Ph.D. Dissertation Research - 23672

Dissertation Chair

 

 

Fall 2011

Course Number

Course Name/CRN

Comments

IA 422

End-User Systems:Planning&Desn - 17824

IA 642

Enterprise Sec - 15559

IA 651

Enterprise Incident Response - 15560

COT 899

Ph.D. Dissertation Research

 

 

Spring 2011

Course Number

Course Name/CRN

Comments

IA 422

End-User Systems:Planning&Desn - 33142

 

 

Winter 2011

Course Number

Course Name/CRN

Comments

IA 645

Data Mining for IA Security - 27922

IA 642

Info Sys Sec Overview for Managers – 27920

IA 422

End-User Systems:Planning&Desn - 27991

NITA 422 -> IA 422

COT 894

Ph.D. Candidacy Seminar - 24352

Dissertation Chair

COT 899

Ph.D. Dissertation Research - 23672

Dissertation Chair

COT 797

Independent Study - 28345

Mobile Security

 

 

Fall 2010

Course Number

Course Name/CRN

Comments

NITA 422

End-User Systems:Planning&Desn - 13275

IA 642

Enterprise Security - 17343

IA 651

Enterprise Incident Response - 17344

 

 

Spring 2010

Course Number

Course Name/CRN

Comments

IA 416

Applied Research Projects in Information Assurance - 32954

IA 642

Enterprise Security - 32955

542 -> 642

 

 

Winter 2010

Course Number

Course Name/CRN

Comments

IA 681

Data Mining for Security - 27852

IA 542

Information System Security Overview for Managers - 27875

IA 329

Policy Devlpmnt Info Assurance - 14692

NITA 422

End-User Systems:Planning&Desn - 27604

COT 894

Candidacy Seminar - 25664

 

 

Fall 2009

Course Number

Course Name/CRN

Comments

IA 103

Information Security Overview - 14684

IA 329

Policy Devlpmnt Info Assurance - 14692

IA 694

Professional Seminar in Information Security/Assurance - 18335

 

 

2006-2008 (Adjunct in Computer Science Department)

Course Number

Course Name/CRN

Comments

COSC 105

Everyday Computing and Social Responsibility

COSC 211

Programming Data Structures