Curriculum Vitae
Education
Ph.D. in Intelligent Systems Security
2013
University of Edinburgh, UK
Thesis: Securing Open Multi-agent Systems Governed by Electronic Institutions
M.Sc. in Artificial Intelligence
2003
Amirkabir University of Technology (Tehran Polytechnic)
Thesis: Optimizing Methods of Shape-Based Image Retrieval
B.Sc. in Computer Engineering (Hardware)
1999
Amirkabir University of Technology (Tehran Polytechnic)
Project: Web-based Persian database interface using ASP
Professional Appointments
Associate Professor
Department of Computer Science, Shahed University
2013 – Present
Vice President for Research and Technology
Shahed University
2021 – Present
CEO
Faraconesh Inc. (Knowledge-Based ICT Company)
2014 – 2024
Research Interests
Cybersecurity Governance & Cybersecurity Maturity Models
Privacy Engineering & Risk-Based Privacy Strategies
Security of Intelligent and Multi-Agent Systems
AI-Driven Behavioral Anomaly Detection in Telecom Systems
Secure Software Development & Mobile Security
Big-Data Processing for Security Analytics
Teaching Experience
Associate Professor & Faculty Member
Graduate Courses: Advanced AI, Big Data Processing, Secure Software Development, Secure Communication Systems, Information Hiding, E-Commerce Security, Intelligent Multi-Agent Systems
Undergraduate Courses: Artificial Intelligence, Computer Networks, Algorithms Design, Data Structures, Computer Programming (C++, C#, Pascal), Computer Fundamentals, Programming Language Design
Guest Lecturer & Teaching Assistant
Guest Lecturer: Computer Security (Mobile Network Security), 2011–2012
Teaching Assistant: Informatics 1 (Computation & Logic), Informatics 2 (Algorithms & Learning), Computer Security
Lecturer
Courses: Theory of Languages and Automata (3 semesters), Operating Systems Design (2 semesters), Operating Systems Lab (1 semester)
Visiting Lecturer
Graduate Course: E-Commerce Security
Professional & Research Experiences
Vice President for Research and Technology
Overseeing university-wide research strategy, technology transfer, and innovation ecosystems.
CEO
Led a knowledge-based ICT company specializing in cybersecurity consulting, R&D, and national-level security projects.
Research Associate
Analyzed global curricula in Pattern Recognition, Signal Analysis, and Computer Vision; proposed standardized syllabi.
Software Developer (Part-time)
Developed Windows-based reservoir simulation and optimization software (3RPSim).
Researcher & R&D Manager
Conducted pioneering work in mobile network security (2G/3G/4G/5G), designed Iran’s first mobile and fixed telecom security labs, and led national CERT design initiatives.
Publications & Scholarly Works
Journal Articles
Bijani, S., Khazraeian, H., Bali Lashk, A., & Modiri, N. (2025). Risk-Based Privacy Protection Strategies for National Cloud Infrastructures. National Security Quarterly, 15(55).
Alizadeh, R., Bijani, S., Shakeri, F. (2024). Distributed consensus-based estimation of the leading eigenvalue of a non-negative irreducible matrix. Parallel Computing, 122.
Bijani, S., Talebi, M., Entezari, M. H., & Salehi Esfahani, M. (2023). A Conceptual Model for Cybersecurity Maturity of National Telecom Operators. National Security Quarterly, 13(48), 137–154.
Yari Eili, M., Rezaeenour, J., Jalaly Bidgoly, A., & Bijani, S. (2023). Analyzing the Research Grant Process in Iran’s National Elites Foundation: An Approach Based on Process Mining and Machine Learning. Iranian Journal of Management Studies, 16(2), 429–445.
Ahmadi-Nik, M., & Bijani, S. (2021). A Graph-Based Framework for Intelligent Selection of Security Controls in Smart Policing. Journal of Police ICT, 2(5). doi:10.22034/PITC.2021.207883.1051
Faezi, M. H., Bijani, S., & Dolati, A. (2020). DEGAN: Decentralized generative adversarial networks. Neurocomputing, Elsevier.
Shaeiri, Z., Kazemitabar, J., Bijani, S., & Talebi, M. (2019). Behavior-Based Online Anomaly Detection for a Nationwide Short Message Service. Journal of AI & Data Mining, 7(2), 239–247.
Bijani, S., Robertson, D., & Aspinall, D. (2018). Secure information sharing in social agent interactions using information flow analysis. Engineering Applications of Artificial Intelligence, 70, 52–66.
Bijani, S., & Robertson, D. (2014). A Review of Attacks and Security Approaches in Open Multi-agent Systems. Artificial Intelligence Review, 42, 607–636.
Conference Papers
Amini, A., & Bijani, S. (2016). A Framework for Automated Security Assessment of Mobile Applications. 1st National Conference on Security of Intelligent Mobile Systems, ITRC.
Anderson, P., Bijani, S., & Vichos, A. (2012). Multi-Agent Negotiation of Virtual Machine Migration. KES AMSTA 2012.
Bijani, S., & Robertson, D. (2011). Intrusion Detection in Open Peer-to-Peer Multi-agent Systems. AIMS 2011, Nancy, France.
Bijani, S., & Kazemitabar, M. (2008). HIDGM: A Host and Network-based Intrusion Detection for Mobile Networks. ICCEE 2008.
Books & Media
Author, An Introduction to Internal Network Security (2004), Intelligent Signal Processing Research Institute. ISBN: 964-95935-1-9.
Live TV Interview: “Artificial Intelligence and Cybersecurity”, Porseshgar, IRIB Amoozesh, Feb 2025.
Live TV Interview: “Introduction to Cybersecurity Concepts for the Public”, Vali Amrooz, IRIB Amoozesh, Jan 2024.