Istteffanny Isloure Araujo (Stef) is a Lecturer in the School of Computing and Digital Media. She is also the course leader for Computer Networking and Cybersecurity – BSc Hons.
More about Istteffanny Isloure Araujo
Dr Istteffanny Isloure Araujo (Stef): Istteffanny Isloure Araujo received her PhD in Cybersecurity, M.Sc. and BSc degrees in Computer Forensics and IT Security and Computer Science from London Metropolitan University in 2024, 2015 and 2013, respectively. She is part of the Intelligent Systems Research Group of the School of Computing and Digital Media.
Stef has worked as part of the teaching team on modules such as Security in Computing, Network and Cloud Security, Cyber Security Fundamentals, Databases, Ethical Hacking, Cybercrime and Cybersecurity, Programming (Python and Java), Fundamentals of Computing, Networks and Operating Systems, Games Programming, and Introduction to Information Systems. Istteffanny has numerous Scientific Peer Reviewed Papers, Book Collaborations, Book Chapters and Conferences publications, recently a contribution to the worldwide publication of the book Cryptography and Network Security from William Stallings 8th edition from 2023.
Stef interests are on Big Data Advances and Digital Data Security, such as Information Hiding for Intellectual Property, Privacy and Copyrights, Improvement of Mobile Security, Cybercrime Forensic Investigation, Technologies to Locate Missing Individuals, Secure Design Networks, Network Investigations, Cryptography and Encryption Studies. She is a Senior Lecturer in Cybersecurity, Networking and Computer Science, Course Leader of BSc. Computer Networking and Cybersecurity, Personal Academic Tutor and Personal Academic Coach of a large Cohort, and Supervisor of Final BSc, and MSc Projects University in the School of Computing and Digital Media at London Metropolitan.
Araujo, I. (2024) Information Hiding and Copyrights. In: Mayer, J. Steganography. The Art of Hiding Information. London, UK: InterOpen, pp. 1-20. ISBN: 978-0-85466-901-1 - https://www.intechopen.com/welcome/499c860eedac33757fe248a4f6971879
Ndukwe, C, Homayounvala, E, Kazemian, H and Araujo, I. (2024) Comparative Analysis of Malware Detection Response Times Across Android Versions: An Emphasis on the "Hoverwatch" Application. 7th International Conference on Innovative Computing and Communication – ICICC 2024. New Delhi, India. Springer. S1-279 - https://icicc-conf.com/
Ghanem, M, Uribarri, M, Djemai, R, Dunsin, D and Araujo, I. (2023) A novel hybrid method for effective identification and extraction of digital evidence masked by steganographic techniques in WAV and MP3 files. Journal of Information Security and Cybercrimes Research, 6 (2). pp. 89-104. ISSN 1658-7790 - https://journals.nauss.edu.sa/index.php/JISCR/article/view/2508
Araujo, I. (2023) Contribution of Problems and Exercises at end Chapters plus Book Interactive Online Exercises MCQ. In: Stallings, W. (2023) Cryptography and network security: Principles and practice. 8th ed. London, UK: Pearson (Global) - https://www.pearson.com/en-gb/subject-catalog/p/cryptography-and-network-security-principles-and-practice-global-edition/P200000007245/9781292437484
Araujo, I.I. And Kazemian, H. “Improving Steganographic capacity using distributed steganography over BMP.” Springer - Multimed Tools Appl 79, 26181–26195 (2020)
Araujo, I.I. And Kazemian, H. “Vulnerability Exploitations Using Steganography in PDF Files.” EverScience Publications - International Journal of Computer Networks and Applications (IJCNA) DOI: 10.22247/ijcna/2020/193270 Volume 7, Issue 1, January – February (2020)
Araujo,I.I. And Kazemian, H, "Enhancement of Capacity, Detectability and Distortion of BMP, GIF and JPEG images with Distributed Steganography", MECS Press -International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.11, pp.21-27, 2019. DOI: 10.5815/ijcnis.2019.11.03
Araujo,I.I. And Kazemian, H, “Protecting against eavesdropping on Mobile Phones to snip data with Information Security Awareness and Steganography principles.” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 8, Issue 5, September - October 2019 ISSN 2278-6856
A successful transformation grant (£1,000) in 2022-2023 provided a basis to work on a common research area of Malicious Mobile App. It resulted in publications such as a 2024 conference paper and another ongoing project.
Istteffanny Isloure Araujo
Senior Lecturer in Computer Science and Cybersecurity
Course Leader of Computer Networking and Cybersecurity BSc (Hons)
Stef has eight scientific publications and recently contributed to the worldwide publication of the book Cryptography and Network Security from William Stallings' 8th global edition from 2023.