
Rashad Aliyev- PhD Candidate
- Teacher at Khazar University
Rashad Aliyev
- PhD Candidate
- Teacher at Khazar University
Immersed in SaaS Cybersecurity projects, I explore captivating PhD topics to enrich my professional journey.
About
10
Publications
6,864
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
10
Citations
Introduction
Presently immersed in the dynamic realm of SaaS Cybersecurity projects, I am actively exploring intriguing PhD research subjects to seamlessly weave into my professional journey. Enthralled by the exciting prospect of harmonizing academic knowledge with real-world applications, I aim to elevate and enrich my contributions. Open to valuable suggestions and collaborative ventures within the expansive Cybersecurity domain.
Current institution
Additional affiliations
Education
August 2014 - June 2016
September 2013 - June 2016
September 2003 - July 2005
Publications
Publications (10)
In this research, we explored methods for creating practical exams in the field of information security. Given the specialized knowledge required in this domain, a ready and tailored environment is necessary for hands-on testing. For example, when teaching concepts like SQL Injection, a database system and a vulnerable application are needed. Howev...
This paper explores enhancing user accessibility and experience in cybersecurity by introducing a user-friendly website interface for widely used port scanning tools (Nmap, Unicornscan, RustScan). Conducting global scans on the top 10 million hosts, the study provides valuable insights into open ports, vulnerabilities, and offers a foundation for f...
Distributed Denial of Service (DDoS) attacks pose a significant threat to online services, causing disruption and financial losses to victim organizations. To enhance the preparedness of potential targets, this research paper introduces the concept of a DDoS simulation portal. The portal, exemplified by ddosattack.online, aims to simulate DDoS atta...
Web proqramlaşdırma sahəsində çalışan mütəxəssislər və bu sahəyə yeni başlayaraq ilk addımlarını atmaq istəyən şəxslər, “Kompüter elmləri” ixtisasında və informasiya texnologiyaları ilə əlaqədar olan digər ixtisaslarda təhsil alan ali məktəb tələbələri, magistrantları üçün dərs vəsaiti.
This study examined cases where a system completely crashes when a user sends 2–3 DoS requests per second. The aim of these attacks is to find weak code or incorrect settings in the system. The research highlights the inadequacy of providing protection only at code and server levels or with security equipment, especially in critical infrastructures...
There are more and more vulnerabilities in database of computer system about weakness of software technology. Not all of them are major or most important. Our goal in this paper is to analyze a selected four major vulnerability databases that are the most important and their collect more than 230000 vulnerabilities. In this analysis we compare data...
This paper covering information about Penetration testing methodology, standards reporting formats and comparing reports. Explained problem of Cyber Security experts when they making penetration tests. How they doing current presentations.
We will focus our work in penetration testing methodology reporting form and detailed information how to compa...
The article deals with the problems of the establishment of Security Operations Center. The features and activity fields of the Security Operations Center have been described in this article. Besides that, multilevel logical structure of SOC was proposed and its working activities were presented. In this article, international experience has also b...