Carol Jim

Carol Jim

Visiting Assistant Professor of Computer Science
Office: 
Hodson Science and Technology Center
254
E-mail: 
Phone: 
(301) 696-3735
Education: 
Ph.D. Computer Science, The George Washington University
M.S. Computer Science, Hood College
B.A. Mathematics, Hood College
Areas of Interest: 
Data Mining and Analytics
Computer Security and Digital Forensics
Network Forensics and Security
Database Systems
Image Processing
Computational Biology
Theoretical Computer Science
Courses Taught: 
IT 530 Applied Database Systems
CSIT 555 Information Systems Security
ITMG 516 Introduction to Data Analytics/Business Data Mining
IT 599D Advanced Data Analytics with R
CSIT 532 Computer Forensics
CSIT 534 Network and Internet Security
IT 518 Systems Engineering and Integration
IT 548 Telecommunications and Networking
Selected Works: 
Turki Alkheliwi, Carol Jim, Khalid Lateef, Ahmed Salem, and Stephen Penn. “A Practical Approach to Applying Game Theory Rules to Enhance Decision Support Systems in Financial Applications.” In Proceedings of 31st CATA Conference, Las Vegas, NV, Apr. 2016.
Carol Jim and Simon Berkovich. “Labeling of Chromosomes in Cell Development and the Appearance of Monozygotic Twins.” BioMed Research International, Vol. 2015, Article ID 628092, pp. 1-8, June 2015.
Turki Alkheliwi, Carol Jim, Khalid Lateef, Stephen Penn, and Ahmed Salem. “Applying Game Theory Rules to Enhance Decision Support Systems in Credit and Financial Applications.” In Proceedings of 19th CGAMES Conference, Louisville, KY, July 2014.
George Dimitoglou, James A. Adams, and Carol M. Jim. “Comparison of the C4.5 and a Naïve Bayes Classifier for the Prediction of Lung Cancer Survivability.” Journal of Computing, 2012.
Carol M. Jim, Ahmed Salem, Aijuan Dong, and James Devilbiss. “Supervised Learning Algorithms to Enhance DDoS Prediction in Network Forensics.” In Proceedings of the 24th CAINE Conference, Honolulu, HI, November 2011.
Carol M. Jim, Ahmed Salem, and Aijuan Dong. “Testing Supervised Learning Algorithms To Enhance DDoS Prediction In Network Forensics & Security.” In Proceedings of Intl Congress on Computer Applications and Computational Science (CACS), Singapore, Dec 2010
Carol M. Jim, Ahmed Salem, and Aijuan Dong. “Network Forensics in Practice: A Survey.” In Proceedings of the First International Conference on Advanced Computing and Communications (ACC-2010), Orlando, FL, September 2010.
Go to top