Rashad Aliyev

Rashad Aliyev
Verified
Rashad verified their affiliation via an institutional email.
Verified
Rashad verified their affiliation via an institutional email.
  • PhD Candidate
  • Teacher at Khazar University

Immersed in SaaS Cybersecurity projects, I explore captivating PhD topics to enrich my professional journey.

About

10
Publications
6,864
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
10
Citations
Introduction
Presently immersed in the dynamic realm of SaaS Cybersecurity projects, I am actively exploring intriguing PhD research subjects to seamlessly weave into my professional journey. Enthralled by the exciting prospect of harmonizing academic knowledge with real-world applications, I aim to elevate and enrich my contributions. Open to valuable suggestions and collaborative ventures within the expansive Cybersecurity domain.
Current institution
Khazar University
Current position
  • Teacher
Additional affiliations
August 2014 - June 2016
Polytechnic University of Valencia
Position
  • Exchange Student (Alumni)
Description
  • Penetration testing with Penteston
January 2014 - June 2014
Baku State University
Position
  • Teacher
Description
  • Network administration Database management
February 2011 - August 2014
Khazar University
Position
  • Chief
Description
  • Teach Internet Technologies and programming Developing Projects in University
Education
August 2014 - June 2016
Polytechnic University of Valencia
Field of study
  • Computer Science (Exchange Student)
September 2013 - June 2016
Khazar University
Field of study
  • Computer Science
September 2003 - July 2005
Baku State University
Field of study
  • Applied Mathematics and Cybernetics

Publications

Publications (10)
Conference Paper
Full-text available
In this research, we explored methods for creating practical exams in the field of information security. Given the specialized knowledge required in this domain, a ready and tailored environment is necessary for hands-on testing. For example, when teaching concepts like SQL Injection, a database system and a vulnerable application are needed. Howev...
Conference Paper
Full-text available
This paper explores enhancing user accessibility and experience in cybersecurity by introducing a user-friendly website interface for widely used port scanning tools (Nmap, Unicornscan, RustScan). Conducting global scans on the top 10 million hosts, the study provides valuable insights into open ports, vulnerabilities, and offers a foundation for f...
Conference Paper
Full-text available
Distributed Denial of Service (DDoS) attacks pose a significant threat to online services, causing disruption and financial losses to victim organizations. To enhance the preparedness of potential targets, this research paper introduces the concept of a DDoS simulation portal. The portal, exemplified by ddosattack.online, aims to simulate DDoS atta...
Book
Web proqramlaşdırma sahəsində çalışan mütəxəssislər və bu sahəyə yeni başlayaraq ilk addımlarını atmaq istəyən şəxslər, “Kompüter elmləri” ixtisasında və informasiya texnologiyaları ilə əlaqədar olan digər ixtisaslarda təhsil alan ali məktəb tələbələri, magistrantları üçün dərs vəsaiti.
Article
Full-text available
This study examined cases where a system completely crashes when a user sends 2–3 DoS requests per second. The aim of these attacks is to find weak code or incorrect settings in the system. The research highlights the inadequacy of providing protection only at code and server levels or with security equipment, especially in critical infrastructures...
Conference Paper
Full-text available
There are more and more vulnerabilities in database of computer system about weakness of software technology. Not all of them are major or most important. Our goal in this paper is to analyze a selected four major vulnerability databases that are the most important and their collect more than 230000 vulnerabilities. In this analysis we compare data...
Conference Paper
Full-text available
This paper covering information about Penetration testing methodology, standards reporting formats and comparing reports. Explained problem of Cyber Security experts when they making penetration tests. How they doing current presentations. We will focus our work in penetration testing methodology reporting form and detailed information how to compa...
Poster
Full-text available
II ENCUENTRO DE ESTUDIANTES DE DOCTORADO DE LA UPV
Conference Paper
Full-text available
The article deals with the problems of the establishment of Security Operations Center. The features and activity fields of the Security Operations Center have been described in this article. Besides that, multilevel logical structure of SOC was proposed and its working activities were presented. In this article, international experience has also b...

Network

Cited By