Samir Tout, Ph.D.

Professor

School of Information Security & Applied Computing

Eastern Michigan University

Ypsilanti MI 48197 USA

 

Office: 206 F Roosevelt Hall

Phone: 734.487.4906

E-mail: stout@emich.edu

 

 

Welcome to my Web page. Feel free to contact me (best through e-mail) if you have any questions.

 

Status:

Tenured Professor of Information Assurance

Adviser – Ph.D. in Technology, Information Assurance Concentration

 

Research/Scholarly:

Tout, S. (2014). The Need for Strategic Planning Toward Adopting Cloud Computing in Higher Education. The International Journal of Information and Communication Technology Research. Vol. 4, No. 7, pp. 255-263.

Tout, S. & Miller, B. (2013). Supervisory Control and Data Acquisition (SCADA) System Malware Defense. Poster presentation at the IEEE Southeast Michigan Section (SEM) Spring meeting 2013.

Tout, S. (2011). A Roadmap for Transitioning an Information Assurance Program and Others to Cloud Computing. The International Journal of Information and Communication Technology Research. Vol. 1, No. 3, pp. 128-138.

Tout, S., Xie, Y., and Lawver, G.  (February, 2010). EDucational Games training Students how to Protect against Intrusion (EDGSPI).  NSF grant proposal submitted under the Strategies components of the ITEST Program.

Tout, S., McMillan, W., Xie, Y., and Lawver, G.  (February, 2009). CPS: Medium: RUI: The Enhanced Mobile Emergency Response System (EMERS).  NSF grant proposal submitted to Cyber-Physical Systems (CPS) Program.

Tout, S., Basal, A. (2009). “E-Security Global Governance”. In The Proceedings of ECDC’09, Kuala Lumpur, Malaysia, Nov 3-4, 2009.

Tout, S, W Sverdlik, and G Lawver (2009).  Cloud Computing and its Security in Higher Education.  In The Proceedings of the Information Systems Education Conference (ISECON) 2009, v 26 (Washington DC): §2314. ISSN: 1542-7382.

Tout, S., Sverdlik, W., & Sun, J. (2008). A Hybrid Evolutionary Approach to Cluster Detection. Trends in Intelligent Systems and Computer Engineering. Springer Science+Business Media, LLC 2008. Vol. 6, Chapter 42, pp. 619-636.

Tout, S., Sverdlik, W., & Sun, J. (2007c). A Hybrid Approach to Cluster Detection. IAENG International Journal of Computer Science, Volume 34 Issue 1, pp. 105-110

Tout, S., Sverdlik, W., & Sun, J. (2007b). Current Trends in Intelligent Systems and Computer Engineering. Accepted to appear in the edited Springer Book of IMECS’07.

Tout, S., & Higgins, M. (2007). Web Services Conversion, Security Enhancements - Experience Report. Proceedings of the 2007 IEEE SOA Industry Summit (SOAIS 2007), Salt Lake City, Utah, July 2007.

Tout, S., Sverdlik, W., & Sun, J. (2007a). Cluster Detection of Special Datasets using the PYRAMID Algorithm. Proceedings of IAENG International Multi-Conference of Engineers and Computer Scientists, March 21-23, 2007, pp. 812-817. (Chosen for publication in the special issue of the IAENG Journals)

Tout, S., Sverdlik, W., & Sun, J. (2007). Cluster detection with the PYRAMID algorithm. Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining, Hawaii, USA.

Tout, S., Sverdlik, W. (2007). Clustering using Genetic Programming. To appear in the proceedings of the 2007 Michigan Academy of Science.

Tout, S., Sverdlik, W., & Sun, J. (2006). Parallel hybrid clustering using genetic programming and multi-objective fitness with density (PYRAMID). Proceedings of the 2006 International Conference on Data Mining (DMIN’06), Las Vegas, NV, USA, pp. 197-203.

 

Grants & Awards:

NSF Grants awarded 2014-2017: SaTCIntegrated Smart Grid Analytics for Anomaly Detection” 


Academic ServiceLearning (AS-L) Fellowship – Winter 2015

Faculty Research Fellowship – 2013-2014

eFellow Award – 2012

 

Other Scholarly:

Watch my TEDx talk at: http://youtu.be/n5pmqasoQkQ

I serve as an associate editor of ISC2’s Information Security Journal: A Global Perspective, 2011-present

I served as a Graduate Research Fair Supervisor for several graduate students

I continue to serve as a Ph.D. candidacy & dissertation chair for several students

 

Service:

University Faculty Senate, 2014 – 2015

University Human Subjects Review Committee (UHSRC), 2010 – 2012

Doctoral Operations Committee member, 2009 - 2012

United Way School of Technology Studies Representative, 2009 – 2014

 

Industry:

Roles Served:

Chief Architect

Software Designer/Developer/Consultant

Security Consultant

Mobile App Designer/Developer

Selected Employers/Clients/Platforms:

Perle Systems, Toronto, Ontario

Unisys, Plymouth, MI

Keane/GMAC, Southfield, MI

Compuware Corporation/OnStar, Detroit, MI

Apple AppStore

 

Awards and Professional Affiliations:

      Two GM-CIO awards for consulting excellence

      eFellows Grant

      ITIL Foundation Certified

      Project Management Professional (PMP) Certified

      TOGAF Certified

      SANS GIAC Certified

      IEEE Member

      AOGEA - Agile Enterprise Architecture Methodology Working Group

 

Featured Activities:

-      Research campaign: http://www.emich.edu/univcomm/releases/release.php?id=1412364044

-      TED talk: http://tedxtalks.ted.com/video/Engineering-our-Future-One-Hack

-      One Wxyz Detroit TV: http://www.wxyz.com/news/power-back-on-but-threat-of-outages-in-detroit-looms

-        WEMU radio: http://wemu.org/post/emu-researcher-working-prevent-electric-grid-problems

-        Organizer – Ann Arbor Raspberry Pi: http://www.meetup.com/Ann-Arbor-Raspberry-Pi-Projects/

-      Co-FounderCyber Security Awareness Committee (Cyber SAC): http://www.emich.edu/it/security/initiatives/cybersac/aboutcybersac.php

 

 

 

Courses Taught at EMU:

 

Winter 2015

Course Number

Course Name/CRN

Comments

AS-L

Academic Service Learning Fellowship

IA 896

Dissertation Research

Chair

IA 897

Independent Study

 IA 329

Policy Development Info Assurance - 27840

 

 

 

Fall 2014

Course Number

Course Name/CRN

Comments

IA 422

End-User Systems:Planning&Desn - 17809

IA 400

Mal Anal & Rev Eng – 14924

Lab-intensive

IA 896

Dissertation Research

Chair

IA 897

Independent Study

 IA 103

 Info Sec Overview –

 17929

 

 

Summer 2014

Course Number

Course Name/CRN

Comments

IA 329

Policy Development Info Assurance - 54578

IA 498

Independent Study

 IA 681

 Malware/DM, 54781

 

 

 

 

Winter 2014

Course Number

Course Name/CRN

Comments

IA 422

End-User Systems:Planning&Desn - 28099

IA 400

Mal Anal & Rev Eng – 25966

Lab-intensive

IA 894

Candidacy Seminar

Candidacy Chair

 

 

Fall 2013

Course Number

Course Name/CRN

Comments

IA 651

Enterprise Incident Response - 14096

IA 400

Mal Anal & Rev Eng – 16060

Lab-intensive

IA 697

Independent Study

Grant – NSF

IA 799

Independent Study

Advanced MARE

 

 

Summer 2013

Course Number

Course Name/CRN

Comments

IA 422

End-User Systems:Planning&Desn - 51675

IA 495

Networks:Implementation&Eval – 55016

 IA 103

 Info Sec Overview –

 55066

 

 

 

Winter 2013

Course Number

Course Name/CRN

Comments

IA 422

End-User Systems:Planning&Desn - 28152

IA 642

Enterprise Sec - 28049

IA 400

Mal Anal & Rev Eng – 27977

Lab-intensive

IA 894

Candidacy Seminar

Candidacy Chair

IA 799

Independent Study

Grant – NSF

IA 799

Independent Study

Advanced MARE

 IA 103

 Info Sec Overview –

 27850

 

 

 

Fall 2012

Course Number

Course Name/CRN

Comments

IA 422

End-User Systems:Planning&Desn - 16057

IA 642

Enterprise Sec - 17926

IA 651

Enterprise Incident Response - 14561

IA 400

Mal Anal & Rev Eng – 17746

Lab-intensive

IA 799

Independent Study

Grant – NSF

IA 894

Candidacy Seminar

Committee member

 

 

Winter 2012

Course Number

Course Name/CRN

Comments

IA 645

Data Mining for IA Security - 25772

IA 642

Information System Security Overview for Managers – 25771

IA 422

End-User Systems:Planning&Desn - 27684

COT 898

Ph.D. Dissertation Research - 23672

Dissertation Chair

 

 

Fall 2011

Course Number

Course Name/CRN

Comments

IA 422

End-User Systems:Planning&Desn - 17824

IA 642

Enterprise Sec - 15559

IA 651

Enterprise Incident Response - 15560

COT 899

Ph.D. Dissertation Research

 

 

Spring 2011

Course Number

Course Name/CRN

Comments

IA 422

End-User Systems:Planning&Desn - 33142

 

 

Winter 2011

Course Number

Course Name/CRN

Comments

IA 645

Data Mining for IA Security - 27922

IA 642

Info Sys Sec Overview for Managers – 27920

IA 422

End-User Systems:Planning&Desn - 27991

NITA 422 -> IA 422

COT 894

Ph.D. Candidacy Seminar - 24352

Dissertation Chair

COT 899

Ph.D. Dissertation Research - 23672

Dissertation Chair

COT 797

Independent Study - 28345

Mobile Security

 

 

Fall 2010

Course Number

Course Name/CRN

Comments

NITA 422

End-User Systems:Planning&Desn - 13275

IA 642

Enterprise Security - 17343

IA 651

Enterprise Incident Response - 17344

 

 

Spring 2010

Course Number

Course Name/CRN

Comments

IA 416

Applied Research Projects in Information Assurance - 32954

IA 642

Enterprise Security - 32955

542 -> 642

 

 

Winter 2010

Course Number

Course Name/CRN

Comments

IA 681

Data Mining for Security - 27852

IA 542

Information System Security Overview for Managers - 27875

IA 329

Policy Devlpmnt Info Assurance - 14692

NITA 422

End-User Systems:Planning&Desn - 27604

COT 894

Candidacy Seminar - 25664

 

 

Fall 2009

Course Number

Course Name/CRN

Comments

IA 103

Information Security Overview - 14684

IA 329

Policy Devlpmnt Info Assurance - 14692

IA 694

Professional Seminar in Information Security/Assurance - 18335

 

 

2006-2008 (Adjunct in Computer Science Department)

Course Number

Course Name/CRN

Comments

COSC 105

Everyday Computing and Social Responsibility

COSC 211

Programming Data Structures