I am the CEO of Intellas and IBM Business Partner in the United Kingdom where I lead service delivery for using artificial intelligence in the area of cyber security, digital forensics and big data analytics.
As Business Partner at IBM I led the successful integration of KAIF an Artificial Intelligence software designed by Intellas with IBM QRADAR using Inter-Process Communication (IPC) strategies via Device Support Model (DSM)/Pipe an IBM custom middleware. This satisfied all basic requirements for enabling Intellas KAIF and IBM QRADAR to function as Software as a Service (SAAS).
QRADAR-KAIF Integrated platform addresses the continuous increase of growth of data on the Internet, public databases and distributed mobile systems. The system handles and understands complex data set as well as making sense out of meaningless data. QRADAR/KAIF Digital, Security, Forensics, and Incidence Response Software Platform apply techniques capable of harnessing intelligent data analysis capabilities essential for digital security and forensic analysis for electronic crime attacks, investigation and case analysis. This could range from day to day network security breach, counter-terrorism surveillance on Internet, mobility based systems, online fraud, online masking for impersonation and digital evidence recovery, collection and forensic analysis.
The system uses a set of intelligent algorithms, methods and techniques deployed at operating system level of an ICT infrastructure to facilitate the discovery and recovery of digital evidence essential for digital security and forensic analysis.
I have led delivery of training and services for a number of organizations in the security and defence industry including Britain’s (MOD) Ministry of Defence under the auspices of DESG (Defence Engineering & Science Graduate) Scheme. I have also served as an external evaluator for BAE British Aerospace Applied Intelligence Systems Unit on Usability Testing on Cyber Systems. Managing Editor of Cyber Security in Today World, a micro magazine that highlights contemporary and trending security matters globally.
Editor in Chief of International Journal of RFID Security and Cryptography (IJRFIDSC) and Co-Editor-in-Chief of the Journal of Chaotic Computing (IJCC).
Worked for the World Bank (IDA) as Senior Systems Analyst where I had the privilege of jointly leading the Planning, Development and Management Information Systems Unit, handling the World Bank’s Highway Sector Investment Credit (IDA Credit 2858-GH). I also worked for United Nations (IFAD) as a DBASE Programmer. I managed the information systems for international disbursements for the USAID (United States Agency for International Development), European Union (EU), DANIDA (Danish International Development Agency), United Arab Emirates (UAE) whiles at AMISU (Accounting Management Information Systems Unit) of the World Bank.
Subject Matter Expert (SME) for Cyber Security, Analytics and Artificial Intelligence at the University of Essex Online Computing & Business, visiting Scholar and Professor at the department of Computer Science University of Louisville, Kentucky for Information Security and Applied Computational Intelligence. I have also held senior academic posts at the school of computing and technology, University of Gloucestershire and the University of East London, United Kingdom. I am a Fellow of the British Computer Society (BCS).
Received my undergraduate, postgraduate/research and executive education and training at WANG Laboratories, East London Business School, City University London, Johnson School of Management - Cornell University and Harvard Business School.
Author of the following Books:
1. The Cyber Citizen and Homeland Security. Freedom versus Fears 2017. AICE Foundation
2. Online Business Security Systems 2008. Springer-Verlag
3. Artificial Intelligence. Existing and Emerging Ideas 2008. Aardvark Global Publishing
4. Synchronizing E-Security 2003. Kluwer
Chapter in Books
Johnness Arreymbi, Godfried Williams (2005). Assessing the Economics of Information Security. ISSE 2005. Securing Electroniuc Businesses.Vieweg ISBN:3-8348-0011-2 HYPERLINK "http://www.booksmatter.com/b3834800112.htm" http://www.booksmatter.com/b3834800112.htm
Godfried Williams, Hossein Jahankhan (2006) Authenticating E-learners and Virtual Learning systems. Chapter 10. Hoang Nguyen, Tuan and David Seth Preston(Eds). Rodopi Series. At the Reader/Probing the Boundary Series. ISBN: 90-420-2070-9 HYPERLINK "http://www.rodopi.nl/functions/search.asp?BookId=Ati%2FPtb+34" http://www.rodopi.nl/functions/search.asp?BookId=Ati%2FPtb+34
Journal Articles
Durkee, David; Brant, Stephen; Nevin, Pete; Odell, Annette; Williams, Godfried; Melomey, Divina; Roberts, Hedley; Imafidon, Chris; Perryman, Roy; Lopes, Anna. Implementing e-learning and Web 2.0 innovation: Didactical scenarios and practical implications. HYPERLINK "http://www.ingentaconnect.com/content/ip/ihe" \o "Industry and Higher Education" Industry and Higher Education, Volume 23, Number 4, August 2009, pp. 293-300(8), : HYPERLINK "http://www.ingentaconnect.com/content/ip" \o "publisher" IP Publishing Ltd
A. Adnan, A. Cazan, M. Safa, A.W.M Lung & G. Williams, Evaluation of Potential Manufacturing Suppliers Using Analytical Hierarchy Process and Cluster Analysis for Benchmarking. International Journal of Security. Volume 3, Issue 3 June 2009, pp 35-47. HYPERLINK "http://www.cscjournals.org/csc/manuscript/Journals/IJS/volume3/Issue3/IJS-12.pdf" http://www.cscjournals.org/csc/manuscript/Journals/IJS/volume3/Issue3/IJS-12.pdf
Williams G and Arreymbi J (2006). The digital world and survivability of emerging economies. Open source Journal on Communication and Electronic Security - ISSN – 1746-8558 Williams G.(2006). Security of payment technologies. A review of Payment Technologies for E-commerce. IEEE distributed systems Journal ISSN: 1541-4922 Williams, G (2005) Translating Statistical images to text summaries for partially sighted persons on mobile devices. Iconic image maps approach. IS & T/SPIE’s 17th Annual Symposium Electronic Imaging Science & Technology, Multimedia on Mobile devices SPIE Volume: 5684 - ISSN: 0-8194-5657-8 Adnan, G. Williams, S. Arunachalam, & A. Cazan, J. Arreymbi Communication Systems for Successful Outsourcing – Game Theory Perspective. Open Source publication on Communication Networks and Electronic Security – Journal for ICT security synergy . Volume 2 Issue 2. Copyright 2007 AICE Foundation ISSN:1746-8558. Melomey Divina, Chris Imafidon & Godfried Williams ; Modelling Languages for Agent Systems. System and Information Science Noted Vol 1, No 2, Jul 2007, pp 207-212ISSN – 1753-2310; ISSN – 1753-2329 |
Significant Peer Reviewed Publications |
Articles on Machine Learning & Computational Intelligence (Data Mining, Visualization and Forensics)
W. A. Albukhanajer, Y. Jin, J. A. Briffa and G. Williams ''A Comparative Study of Multi
Objective Evolutionary Trace Transform Methods for Robust Feature Extraction'' 7th International Conference on Evolutionary Multi-Criterion Optimization. Sheffield, UK, March 19-22, 2013.[PDF]
W. A. Albukhanajer, Y. Jin, J. A. Briffa and G. Williams "Evolutionary Multi-Objective Optimization of Trace Transform for Invariant Feature Extraction" IEEE Congress on Evolutionary Computation CEC, Brisbane, Australia, June 10-15, 2012. [PDF]
W. A. Albukhanajer, Y. Jin, J. A. Briffa and G. Williams "Image Identification Using Evolutionary Trace Transform for Copyright Protection" 9th Annual Computing ConferenceCompConf2012, Department of Computing, University of Surrey, Guildford UK, March 21, 2012.
Williams, G (2004). Can Agents be trusted for forensic evidence on Ad-hoc Wireless Networks?” 8th world multi-conference on systemics, cybernetic and informatics USA. July 18-21, 2004 – Orlando, Florida. Invited Session Organiser and Chair
Williams, G. Aber, Jennifer Neural Networks and Airline Security (2004) 8th world multi-conference on systemics, cybernetic and informatics USA. July 18-21, 2004 – Orlando, Florida. Invited Session Organiser
Williams, G.(2005) Translating Profiling self-adaptive mobile device interfaces. IS & T/SPIE’s 17th Annual Symposium Electronic Imaging Science & Technology, Multimedia on Mobile devices 16 -20 January 2005, San Jose, California, USA.
Williams G & Adediran.O. Is JAVA suitable for genetic algorithm/programming? Proceedings of the 11th International conference on intelligent systems of the International Society for Computers & their Applications (ISCA). July 18-20, 2002. Boston, Massachusetts, USA. ISBN: 1-880843-43-9. Abstract and Index of Institute of Electrical Engineers (IEE) INSPEC.
Williams.G & Howe.R., Application of Neural Network algorithm in investment appraisals using JAVA. Proceedings of the 11th International conference on intelligent systems of the International Society for Computers & their Applications(ISCA). July 18-20, 2002. Boston, Massachusetts, USA. ISBN: 1-880843-43-9. Abstract & Index of Institute of Electrical Engineers (IEE) INSPEC.
Tom page, S. Arunachalam, Williams G (2005). Knowledge-Based Approach in PCB Design. AICE, IEEE, International Conference on Advances in Information and Communication Engineering, La Palm Royal Beach Hotel, Ghana
Williams G (2005) Software Agent. A tool for digital investigation on Wireless Communication Networks. AICE, IEEE, International Conference on Advances in Information and Communication Engineering, La Palm Royal Beach Hotel, Ghana
Williams G. Neural Networks as Image Translation Tool in digital Forensic Investigation. (Poster Presentation) CAIS, Seminar, Engaging Brains in Security. 15th February 2006, University College London
Walcott Terry and Williams G. Investigating current methodologies used in developing neural network intelligent applications for SMEs. Proceedings of AICE Conference 2006
Williams G. Imaging techniques in digital forensic investigation: a study using neural networks Proceedings of SPIE Vol. 6402, 64020H (Sep. 28, 2006): HYPERLINK "http://spiedl.aip.org/dbt/dbt.jsp?KEY=PSISDG&Volume=6402&Issue=1&bproc=volrange&scode=6400+-+6402" http://spiedl.aip.org/dbt/dbt.jsp?KEY=PSISDG&Volume=6402&Issue=1&bproc=volrange&scode=6400+-+6402
Melomey D, Imafidon C, Williams G, Comparative Study of Modelling Languages for Agent Systems. 3rd International Workshop on Agent-Oriented Software Development Methodology, China 2007
Melomey Divina, Chris Imafidon and Williams G; Comparative Study of Modelling Languages for Agent Systems. 3rd International Workshop on Agent-Oriented Software Development Methodology, China 2007: sisn.2007.07.059, Vol 1, No 2, Jul 2007, pp 207-212ISSN – 1753-2310; ISSN – 1753-2329
Melomey Divina, Williams G, Imafidon C, A Fitness Function for capturing Mobile Agent Mobility on Game Platforms 12th International Conference on Computer Games, Artificial Intelligence, Mobile and Serious Games , Education Louisville, Kentucky USA 2008
Williams G, Nahomihs N, Krishna G, Mahboob W, Jakombum J and Allasifiqbal A, Choosing a Programming Language for Strategic Games using Horn Clauses: A demo in Visual Prolog 7.0 12th International Conference on Computer Games, Artificial Intelligence, Mobile and Serious Games , Education Wolverhamptom, UK 2008
Articles on Security Risk Analysis, Distributed Systems and Mobile Agents:
Williams, G. & Avudzivi P.V.(2002). A retrospective view on information security management. The impact of tele-banking on the end-user. Proceedings of the 2nd Hawaii international conference on business.
Williams, G & Avudzivi P.V.(2003). Risk assessment methods for technologies that support e-commerce transactions in developing economies (A study in Ghana). Proceedings of the 3rd Hawaii international conference on business
Williams, G (2003). A dive into policies and international laws that create security gaps in global electronic transactions among developing economies. Proceedings of the 3rd Hawaii international conference on business.
Williams, G & Oynango E.K (2003) The impact of electronic commerce on small businesses in UK economy. Proceedings of the 3rd Hawaii international conference on business
Williams G (2004) Simulating intrusions via synchronising e-security methodology on global wired-wireless networks. 2nd international workshop in Wireless Security in collaboration with BCS(British Computer Society) Technologies 6-7th April 2004 London UK. ISBN – 1-85924-216-2 HYPERLINK "http://www.iwwst.org.uk/Files/2004/Proceedings.pdf" \l "search=%22Godfried%20Williams%22" http://www.iwwst.org.uk/Files/2004/Proceedings.pdf#search=%22Godfried%20Williams%22
Williams G(2004) Risk analysis of mobile technology on business strategy of SMES (SMALL & MEDIUM SIZE ENTERPRISES). 4th Hawaii International conference on Business HYPERLINK "http://www.imaging.org/store/epub.cfm?abstrid=33116" http://www.imaging.org/store/epub.cfm?abstrid=33116
Williams G & Kikalas T.(2005) Operating systems – Worm Targets. Proceedings of ICGeS ,IEE, BCS Conference, University of East London, London UK.
Williams G & Olenskij M (2005). Security Evaluation of .NET Security. Proceedings of ICGeS, IEE, BCS Conference, University of East London, London UK.
Williams G & Awosola A.(2005) Voice over IP. An IEEE, AICE tutorial Workhop, International Conference on Advances in information and Communication Engineering, La Palm Royal Beach Hotel, Ghana.
Abdullah Al-Zakwani, Williams G(2005). Agent securtiy vulnerability on Network Databases. AICE, IEEE, International Conference on Advances in Information and Communication Engineering, LaPalm Royal Beach Hotel Ghana
Adnan, Williams G, S. Arunachalam, & A. Cazan, J. Arreymbi, Analysing Communication Systems for Successful Outsourcing –Game Theory Perspective. 3rd International Conference on Advances in Information and Communication Engineering, Novotel, London UK 2007
Williams G. A Multi-factor Authentication Model for E-learners and Virtual Learning Systems. Federated Approach. Student Mobility and ICT: Can E-LEARNING overcome barriers of Life-Long learning?19-11-2008 t/m 20-11-2008, Maastricht, Netherlands
Williams, G & Nateghi.C, Measuring the performance of garbage collectors (An empirical evaluation). Proceedings of the International conference of the International Society for Computers & their Applications(ISCA). June 5-7, 2003. Rio de Janeiro, Brazil. ISBN 0-9742059-0-7. Abstract & Index of Institute of Electrical Engineers (IEE) INSPEC: Invited Paper & Session Chair
Melomey D, Williams G & Imafidon, Mobility Requirements on Game Platforms: An Agent Perspective, 11th International Conference on Computer Games, Artificial Intelligence, Mobile and Serious Games , Education. France 2007
Xudong Mao and Williams G, Malware and Online Computer Games (Case Analysis in China) 10th International Conference on Computer Games, AI, Animation, Mobile Educational and Serious Games 2007
Williams G & J. Arreymbi, Is Cyber Tribalism winning Online Information Warfare? ISSE(Information Security Solutions Europe) 2007 Poland
Williams G, Future Threats on Computer Games, 11th International Conference on Computer Games, Artificial Intelligence, Mobile and Serious Games , Education France 2007
Melomey D, Williams G, Imafidon C, Modelling Mobile Agent Mobility in Virtual Learning Environment (VLE) using Fitness function 2008 Student Mobility and ICT: Can E-LEARNING overcome barriers of Life-Long learning?19-11-2008 t/m 20-11-2008, Maastricht, Netherlands
Castillo, A. Rebecca, Williams G, Securing Penalty Shoots in Game Applications Exploratory study of reaction times using simulation and artificial neural networks, 11th International Conference on Computer Games, Artificial Intelligence, Mobile and Serious Games , Education France 2007
Williams G. Technical notes on Remote Method Invocation. Acknowledgements: Sun micro systems and Dayspring Communications
Williams G, I. Kwakye, Jamil Ampomah, P.V.Avudzivi, Ray Ankobia, Sylvia Williams, J. Arreymbi & Albert Quarmyne Building wealth based systems (WBS) for developing economies. Proceedings of AICE Conference 2006
PhD supervised to Completion
Markus Grube: Enterprise Resource Planning 2018 – Director of Studies/Co-Supervisor, University of Gloucestershire
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.745074
2014 - Wissam Albukhanajer: Multi Objective Feature Extraction and Ensembles of Classifiers for Invariant Image Identification. Department of Mathematics and Computer Science, University of Surrey. EPSRC partly funded project £89K - co-sponsored by Intellas UK Ltd.
2011 - Mohammed Shamou: Developing an optimum framework for lean six sigma for SMES for the manufacturing industry 2011. - Supervisor
https://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.542406
2009 - Terry Hugh Walcott: Building Business Intelligence for SMES - 2009 – Director of Studies -UEL
CITATIONS
1. The Cambridge Blue Book 2006
2. D.Sc level citation - Department of Computer Science - University of Louisville USA - Contributions to Advances in Information Security & Applied Computational Intelligence 2005
3. GOLD Medal Award and Best Professional Graduate Worldwide - Institute for the Management of Information Systems UK - Highest Distinction in Managing Informatics 1993/4.
INTEREST:
I enjoy playing percussion instruments and a big fun of Jazz music.