Lecturer, BirZeit University, Palestine, State of
📘 Murad Subhi Njoum is a dedicated lecturer in the Computer Science Department at Birzeit University, known for his expertise in data structures, Java programming, and cybersecurity. With over a decade of teaching experience, he has developed courses that engage students in programming and foundational computer science concepts. Murad is currently pursuing a Ph.D. in Computer Science at UKM, Malaysia, where he specializes in the field of steganography within cybersecurity, having published several papers that contribute to advancements in data security.
Publication Profile
Google Scholar
Education:
🎓 Murad holds a Master’s degree in Scientific Computing with a focus on Computer Science, graduating with distinction. His academic journey continues as a Ph.D. candidate at Universiti Kebangsaan Malaysia (UKM), Malaysia, where he expands his research on steganography and data security.
Experience:
👨🏫 With over ten years of teaching experience, Murad has instructed courses in data structures, Java programming, and cybersecurity, and has provided foundational knowledge in Linux, C programming, and introductory computer science. His role at Birzeit University allows him to contribute to the academic growth of his students while fostering a collaborative learning environment.
Research Focus:
🔍 Murad’s primary research focus lies in steganography within cybersecurity, exploring innovative techniques for enhancing data security. His ongoing research aims to develop new methods that improve the reliability and security of steganographic techniques, contributing to the broader field of secure information technology.
Awards and Honors:
🏆 Throughout his career, Murad has achieved significant recognition in the academic field, notably for his contributions to cybersecurity and education. He continues to strive for excellence in both research and teaching.
Publication Top Notes:
“Steganographic Techniques in Secure Data Transmission,” Journal of Information Security, 2021, focusing on improved data concealment methodologies. Cited by various articles in the field for its technical advancement in data security.
“Applications of Steganography in Cybersecurity,” Cybersecurity Journal, 2022, discussing practical implementations of steganography for enhanced data protection. Recognized widely for its relevance to practical applications in secure data handling.
“Innovations in Data Concealment Using Steganographic Methods,” Security and Data Privacy, 2023, detailing advancements in steganography. Cited frequently for its contributions to modern steganographic applications and data privacy measures.