The_Origin Education Code_Vault Papers Secure_Channel DOWNLOAD_CV

[ WELCOME_TO_MY_ARCHIVE ]

01. ABOUT_ME

I’m Sarah Eid, a Senior Computer Science student at Effat University with a strong focus on cybersecurity, alongside a growing interest in AI-assisted analysis.

This portfolio serves as a curated digital archive of my technical work, research, and ongoing development.

Technical Arsenal:

LANGUAGES
Python C++ Java SQL
SECURITY_&_NETWORKING
Cisco Networking Zero Trust Architecture Digital Safety Encryption
DATA_&_ALGORITHMS
Data Structures Algorithm Analysis Text Retrieval Machine Learning

02. ACADEMIC_TIMELINE

2022 — PRESENT
Bachelor of Computer Science
Effat University - Saudi Arabia
2018 — 2022
High-School Diploma
Al-Kon Al-Motawara International School - Saudi Arabia
2016 — 2017
Secondary Education
Callaghan College Wallsend Campus - Australia
2014 — 2016
Secondary Education
Bishop Tyrrell Anglican College - Australia

03. PROJECT_SHELF

Student Employability & Salary Prediction Using Machine Learning

A comprehensive machine learning project that predicts student placement outcomes and salary ranges based on academic performance, work experience, and other key factors. This research provides data-driven insights for students, educational institutions, and employers in the Saudi Arabian context.

Watchlist Roulette: Random Movie Selector

Watchlist Roulette is a user-friendly tool that randomly selects a movie from your Letterboxd watchlist, enhancing the choice with metadata via the OMDb API. It also offers AI-powered recommendations for similar films based on plot summaries. Developed using Streamlit and Python, it transforms decision paralysis into enjoyable exploration.

Traffic Capture and Security Analysis Using Wireshark

This project focuses on setting up a safe virtual lab environment, capturing network traffic using Wireshark, and analyzing TCP/IP, HTTP, and web application behavior in a vulnerable web application (OWASP Juice Shop). The goal is to identify common security issues such as plaintext credentials, exposed session tokens, and lack of encryption.

Advanced Algorithmic Solutions for Data Structures & Problems

A comprehensive collection of algorithmic solutions to three complex data structure problems involving trees, graphs, and range queries. This project demonstrates advanced problem-solving skills and efficient implementation techniques for handling large-scale constraints.

Restaurant Ordering System Using Java OOP

An object-oriented restaurant ordering system built in Java. The project models real-world ordering and billing workflows using clean OOP principles, including encapsulation and separation of responsibilities. It handles menu items, order management, bill calculation, and payment processing through a console-based interface.

04. RESEARCH_PAPERS

Student Employability and Salary Prediction Using Machine Learning: A Comprehensive Analysis

This paper develops and compares machine learning models to predict two critical outcomes for university students: employability (the likelihood of securing a job) and expected starting salary.

The study integrates multiple datasets—campus placement records, industry salary benchmarks, and a global developer survey—to create a comprehensive predictive framework for the Saudi Arabian labor market, which is a key focus of the national Vision 2030 transformation.

Strengthening IoT Security: A Comprehensive Approach to Zero Trust Implementation

This research examines how Zero Trust Architecture (ZTA) can enhance security in Internet of Things (IoT) ecosystems. As IoT devices proliferate across healthcare, smart cities, and enterprise systems, traditional perimeter-based security models have become inadequate against modern cyber threats.

This study evaluates ZTA implementation strategies, including continuous authentication, least privilege access, and micro-segmentation, to address critical vulnerabilities in IoT networks.

A Comprehensive Study of Security Mechanisms in Software Engineering

A comprehensive literature review analyzing how embedding security mechanisms like static analysis, threat modeling, and DevSecOps throughout the Software Development Life Cycle (SDLC) reduces vulnerabilities.

The paper identifies key practices, evaluates their effectiveness, and highlights critical research gaps in empirical validation and organizational factors.

Innovations in Biometric Security: A Comprehensive Review

A comprehensive literature review examining the development, implementation, and challenges of biometric authentication technologies that use physiological and behavioral characteristics for identity verification across governmental and commercial sectors.

The paper analyzes various biometric modalities, addresses challenges including spoofing vulnerabilities and privacy concerns, and identifies critical research gaps in anti-spoofing mechanisms, privacy-preserving frameworks, and inclusive system design.

05. CONTACT_INTERFACE

Email: eid.sarah11@gmail.com

LinkedIn: in/sarah-eid-1a559332b

Github: github.com/sarah-eid

Phone: +966 55 667 9051