Journals
-
- Wasan Shaker Awad, and Hanin Mohammed Abdullah, “Improving the Security of Storage Systems Using Cloud Computing”, Journal of Information Technology, to be published, 2017.
Research area: Information Security and Cloud Computing
- Wasan Shaker Awad, and Hanin Mohammed Abdullah, “Improving the Security of Storage Systems Using Cloud Computing”, Journal of Information Technology, to be published, 2017.
-
- Wasan Shaker Awad, and Hanin Mohammed Abdullah, “Improving The Security Of Storage Systems: Bahrain Case Study” International Journal of Mobile Computing and Multimedia Communications”, USA, 6(3), pp. 78-108, 2014.
Research area: Information Security and Cloud Computing
- Wasan Shaker Awad, and Hanin Mohammed Abdullah, “Improving The Security Of Storage Systems: Bahrain Case Study” International Journal of Mobile Computing and Multimedia Communications”, USA, 6(3), pp. 78-108, 2014.
-
- Wasan Shaker Awad, and Ali Zolait., “E-Mail as an Official Communication Tool in Bahrain: Individual and Public Organization Perspectives”, International Journal of E-Services and Mobile Applications, USA, 5(1), 2013, pp. 51-76.
Research area: Information Security
- Wasan Shaker Awad, and Ali Zolait., “E-Mail as an Official Communication Tool in Bahrain: Individual and Public Organization Perspectives”, International Journal of E-Services and Mobile Applications, USA, 5(1), 2013, pp. 51-76.
-
- A Road Map For Implementing Service Oriented Agricultural Information Management System, Rehan Akbar, Mohd Fadzil Hassan, Abdullah A., Babar M. E., Sohail Safdar (September 2012), The Journal of Animal and Plant Sciences (JAPS), Volume. 22, Issue 3, Pages. 802-805. (ISSN:1018-7081)
Abstract (pdf) / Journal link / Research area: : Software Engineering, Information Systems
- A Road Map For Implementing Service Oriented Agricultural Information Management System, Rehan Akbar, Mohd Fadzil Hassan, Abdullah A., Babar M. E., Sohail Safdar (September 2012), The Journal of Animal and Plant Sciences (JAPS), Volume. 22, Issue 3, Pages. 802-805. (ISSN:1018-7081)
-
- Wasan Shaker Awad, “Designing Stream Cipher Systems Using Genetic Programming”, LNCS, Springer,Vol. 6683, 2011, pp. 308-320.
Research area: Information Security and Computational Intelligence
- Wasan Shaker Awad, “Designing Stream Cipher Systems Using Genetic Programming”, LNCS, Springer,Vol. 6683, 2011, pp. 308-320.
-
- Effective Methods for Secure Authentication in Workflows under Intrusion Threat, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar (2011), Information Technology Journal, Volume 10, Issue 6, Pages 1161-1169. (ISSN: 1812-5638)
Abstract (pdf) / Journal link / Research area: Software Engineering, Information Systems
- Effective Methods for Secure Authentication in Workflows under Intrusion Threat, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar (2011), Information Technology Journal, Volume 10, Issue 6, Pages 1161-1169. (ISSN: 1812-5638)
-
- Structured Role Based Interaction Model for Agile Based Outsourced IT Projects: Client’s Composite Structure, Rehan Akbar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Sohail Safdar (2011), Information Technology Journal, Volume 10, Issue 5, Pages 1009-1016. (ISSN: 1812-5638)
Abstract (pdf) / Journal link / Research area: Software Engineering
- Structured Role Based Interaction Model for Agile Based Outsourced IT Projects: Client’s Composite Structure, Rehan Akbar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Sohail Safdar (2011), Information Technology Journal, Volume 10, Issue 5, Pages 1009-1016. (ISSN: 1812-5638)
-
- Directions and Advancements in Global Software Development: A Summarized Review of GSD and Agile Methods, Rehan Akbar, Muhammad Fadzil Hassan, Azrai Abdullah, Sohail Safdar, Muhammad Aasim Qureshi (2011), Research Journal of Information Technology, Volume 3, Issue 2, Pages 69-80. (ISSN: 1815-7432)
Abstract (pdf) / Journal link / Research area: Software Engineering
- Directions and Advancements in Global Software Development: A Summarized Review of GSD and Agile Methods, Rehan Akbar, Muhammad Fadzil Hassan, Azrai Abdullah, Sohail Safdar, Muhammad Aasim Qureshi (2011), Research Journal of Information Technology, Volume 3, Issue 2, Pages 69-80. (ISSN: 1815-7432)
-
- Wasan Shaker Awad, “Information hiding using ant colony optimization algorithm”, International journal of technology diffusion”, USA, 2(1), 2010, pp. 16-28.
Research area: Information Security and Computational Intelligence
- Wasan Shaker Awad, “Information hiding using ant colony optimization algorithm”, International journal of technology diffusion”, USA, 2(1), 2010, pp. 16-28.
-
- Wasan Shaker Awad and Huda Kadim Al Jobori, “Non Homogeneous Steganography Using Genetic Simulated Annealing”, International Journal of Information Science and Computer Mathematics, Pushpa Publishing House, 2(1), pp. 61-73, 2010.
Research area: Information Security and Computational Intelligence
- Wasan Shaker Awad and Huda Kadim Al Jobori, “Non Homogeneous Steganography Using Genetic Simulated Annealing”, International Journal of Information Science and Computer Mathematics, Pushpa Publishing House, 2(1), pp. 61-73, 2010.
-
- Wasan Shaker Awad, “Deploying E-mail as an official communication tool: technical prospect”, International journal of computer science and security, 4(4), 2010, pp. 273-282.
Research area: Information Security
- Wasan Shaker Awad, “Deploying E-mail as an official communication tool: technical prospect”, International journal of computer science and security, 4(4), 2010, pp. 273-282.
-
- Biologically Inspired Execution Framework for Vulnerable Workflow Systems, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar (2009), International Journal of Computer Science and Information Security IJCSIS, Volume. 6, Issue.1. (ISSN:1947-5500)
Abstract (pdf) / Journal link / Research area: Software Engineering, Information Security, Reliable systems
- Biologically Inspired Execution Framework for Vulnerable Workflow Systems, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar (2009), International Journal of Computer Science and Information Security IJCSIS, Volume. 6, Issue.1. (ISSN:1947-5500)
- Al-Bastaki, Y. and Wasan Shaker Awad, “New development in genetic algorithms for developing software”, Studies in Informatics and Control, 12(4), December 2003, pp. 277-284.
Research area: Computation intelligence and information security
Conferences
-
- Investigating the role of information security management in smart city organizations, Mohamad Amin Hasbini, Tillal ElDabi and Ammar Aldallal (16-18 May 2017), 15th International conference on The Digital Revolution, Smart Cities and Performance Improvement towards a Sustainable Knowledge, Manama, Bahrain
Abstract (pdf) / Conference link / Research area: Information Security, Smart Cities
- Investigating the role of information security management in smart city organizations, Mohamad Amin Hasbini, Tillal ElDabi and Ammar Aldallal (16-18 May 2017), 15th International conference on The Digital Revolution, Smart Cities and Performance Improvement towards a Sustainable Knowledge, Manama, Bahrain
-
- Mechanism to Continue System Availability during Cyber Threat Scenario, Sohail Safdar, Mohd Fadzil Hassan, Karim Hajjar, Rehan Akbar, Baraa Tariq Sharef, M Aasim Qureshi (Jan 2017), ACM International Conference on Ubiquitous Information Management and Communication (ACM IMCOM), Beppu Japan, Jan 2017.
Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security
- Mechanism to Continue System Availability during Cyber Threat Scenario, Sohail Safdar, Mohd Fadzil Hassan, Karim Hajjar, Rehan Akbar, Baraa Tariq Sharef, M Aasim Qureshi (Jan 2017), ACM International Conference on Ubiquitous Information Management and Communication (ACM IMCOM), Beppu Japan, Jan 2017.
-
- A short review of Global Software Development (GSD) and latest software development trends, Rehan Akbar, Sohail Safdar (April 2015), International Conference on Computer, Communications, and Control Technology (I4CT), pages. 314 – 317, Malaysia.
Abstract (pdf) / Conference link / Research area: Software Engineering
- A short review of Global Software Development (GSD) and latest software development trends, Rehan Akbar, Sohail Safdar (April 2015), International Conference on Computer, Communications, and Control Technology (I4CT), pages. 314 – 317, Malaysia.
-
- A Simple Interactive 3D Interior Design Application for Living Room, Seow Hui Saw, Heng Wai Tan, Sohail Safdar and Teik Boon Tan (3-5 Nov 2014), IET International Conference on Frontiers of Communications, Networks and Applications (ICFCNA 2014), Kuala Lumpur, Malaysia.
Abstract (pdf) / Conference link / Research area: Software Engineering
- A Simple Interactive 3D Interior Design Application for Living Room, Seow Hui Saw, Heng Wai Tan, Sohail Safdar and Teik Boon Tan (3-5 Nov 2014), IET International Conference on Frontiers of Communications, Networks and Applications (ICFCNA 2014), Kuala Lumpur, Malaysia.
-
- Software development process tailoring for small and medium sized companies, Rehan Akbar, Sohail Safdar, M. F. Hassan, Azrai Abdullah (June 2014), International Conference on Computer and Information Sciences (ICCOINS), pp.1 – 5.
Abstract (pdf) / Conference link / Research area: Software Engineering
- Software development process tailoring for small and medium sized companies, Rehan Akbar, Sohail Safdar, M. F. Hassan, Azrai Abdullah (June 2014), International Conference on Computer and Information Sciences (ICCOINS), pp.1 – 5.
-
- Software development project states and project behavior, Rehan Akbar, Sohail Safdar, M. A. Qureshi, M. F. Hassan, Azrai Abdullah (16-18 Dec. 2013), International Conference on Open Source Systems and Technologies (ICOSST), Pages.46 – 49.
Abstract (pdf) / Conference link / Research area: Software Engineering.
- Software development project states and project behavior, Rehan Akbar, Sohail Safdar, M. A. Qureshi, M. F. Hassan, Azrai Abdullah (16-18 Dec. 2013), International Conference on Open Source Systems and Technologies (ICOSST), Pages.46 – 49.
-
- Formalizing An Abstract Architecture For The Alternative Data Source Utilized During System Availability Under Intrusion Threat, Sohail Safdar, Mohd Fadzil Hassan, Rehan Akbar, M Aasim Qureshi (8th – 10th Oct 2012), The IET International Conference on Wireless Communications and Applications ICWCA.
Abstract (pdf) / Conference link / Research area: Software Engineering, Reliability, Information Security
- Formalizing An Abstract Architecture For The Alternative Data Source Utilized During System Availability Under Intrusion Threat, Sohail Safdar, Mohd Fadzil Hassan, Rehan Akbar, M Aasim Qureshi (8th – 10th Oct 2012), The IET International Conference on Wireless Communications and Applications ICWCA.
-
- Two Dimensional Password Based Hybrid Authentication Methods in Vulnerable Workflows, Sohail Safdar, Mohd Fadzil Hassan (12th – 14th June 2012), International Conference on Computer and Information Sciences ICCIS, pages. 908-913.
Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security
- Two Dimensional Password Based Hybrid Authentication Methods in Vulnerable Workflows, Sohail Safdar, Mohd Fadzil Hassan (12th – 14th June 2012), International Conference on Computer and Information Sciences ICCIS, pages. 908-913.
-
- The client as a real option in successful software project management (The CPPM model), Rehan Akbar, Muhammad Fadzil Hassan, Azrai Abdullah, Sohail Safdar, Muhammad Aasim Qureshi (19th Sept. 2011), National Postgraduate Conference – Energy and Sustainability: Exploring the Innovative Minds, NPC.
Abstract (pdf) / Conference link / Research area: Software Engineering
- The client as a real option in successful software project management (The CPPM model), Rehan Akbar, Muhammad Fadzil Hassan, Azrai Abdullah, Sohail Safdar, Muhammad Aasim Qureshi (19th Sept. 2011), National Postgraduate Conference – Energy and Sustainability: Exploring the Innovative Minds, NPC.
-
- Wasan Shaker Awad, “Designing Stream Cipher Systems Using Genetic Programming”, Learning and optimization (LION5), 21/1/2011, Rome, Italy.
Research area: Information Security and Computational Intelligence
- Wasan Shaker Awad, “Designing Stream Cipher Systems Using Genetic Programming”, Learning and optimization (LION5), 21/1/2011, Rome, Italy.
-
- Analyzing Framework for Alternate Execution of Workflows for Different Types of Intrusion Threats, Sohail Safdar, Mohd fadzil Hassan (2011), 2nd International Conference on Software Engineering and Computer Systems, ICSECS, Malaysia, CCIS Book chapter Volume 180, pages. 361-375. (ISSN: 1865-0929)
Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security
- Analyzing Framework for Alternate Execution of Workflows for Different Types of Intrusion Threats, Sohail Safdar, Mohd fadzil Hassan (2011), 2nd International Conference on Software Engineering and Computer Systems, ICSECS, Malaysia, CCIS Book chapter Volume 180, pages. 361-375. (ISSN: 1865-0929)
-
- Data Hibernation Framework in Workflows Under Intrusion Threat, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar (2011), IEEE Symposium on Computers and Informatics ISCI, pages. 680-685, Malaysia.
Abstract (pdf) / Conference link / Research area: Software Engineering, Reliable System, Information Security
- Data Hibernation Framework in Workflows Under Intrusion Threat, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar (2011), IEEE Symposium on Computers and Informatics ISCI, pages. 680-685, Malaysia.
-
- An Insight into Real Software Industry Paradigms and Software Engineering Research, Rehan Akbar, Muhammad Fadzil Hassan, Sohail Safdar, Muhammad Aasim Qureshi, (2011) IEEE Symposium on Computers and Informatics ISCI, Malaysia.
Abstract (pdf) / Conference link / Abstract (pdf) Research area: Software Engineering
- An Insight into Real Software Industry Paradigms and Software Engineering Research, Rehan Akbar, Muhammad Fadzil Hassan, Sohail Safdar, Muhammad Aasim Qureshi, (2011) IEEE Symposium on Computers and Informatics ISCI, Malaysia.
-
- Shortest Path Algorithm With Pre-calculated Single Link Failure Recovery for Non-Negative Weighted Undirected Graphs, Muhammad Aasim Qureshi, Mohd Fadzil Hassan, Sohail Safdar, Rehan Akbar, Rabia Sammi (2010), International Conference on Information and Emerging Technologies, ICIET, Karachi, Pakistan.
Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security
- Shortest Path Algorithm With Pre-calculated Single Link Failure Recovery for Non-Negative Weighted Undirected Graphs, Muhammad Aasim Qureshi, Mohd Fadzil Hassan, Sohail Safdar, Rehan Akbar, Rabia Sammi (2010), International Conference on Information and Emerging Technologies, ICIET, Karachi, Pakistan.
-
- Authentication Model Based on Reformation Mapping Method, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar, Rizwan Aamir (2010), International Conference on Information and Emerging Technologies ICIET, Karachi, Pakistan.
Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security
- Authentication Model Based on Reformation Mapping Method, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar, Rizwan Aamir (2010), International Conference on Information and Emerging Technologies ICIET, Karachi, Pakistan.
-
- Moving Towards Two Dimensional Passwords, Sohail Safdar, Mohd Fadzil Hassan (June 2010), International Symposium on Information Technology ITSIM, Malaysia.
Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security
- Moving Towards Two Dimensional Passwords, Sohail Safdar, Mohd Fadzil Hassan (June 2010), International Symposium on Information Technology ITSIM, Malaysia.
-
- Framework for Alternate Execution of workflows under threat, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar (Feb 2010), 2nd International Conference on Communication Software and Networks ICCSN, Singapore.
Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security
- Framework for Alternate Execution of workflows under threat, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar (Feb 2010), 2nd International Conference on Communication Software and Networks ICCSN, Singapore.
-
- Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management Rehan Akbar, Muhammad Fadzil Hassan, Sohail Safdar, Muhammad Aasim Qureshi (Feb 2010), 2nd International Conference on Communication Software and Networks, ICCSN, Pages.191-195, Singapore.
Abstract (pdf) / Conference link / Research area: Software Engineering
- Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management Rehan Akbar, Muhammad Fadzil Hassan, Sohail Safdar, Muhammad Aasim Qureshi (Feb 2010), 2nd International Conference on Communication Software and Networks, ICCSN, Pages.191-195, Singapore.
-
- Towards the effective and powerful representation of workflow, Sohail Safdar, Tayyab Asghar, Shehzad Khalid (Aug 2008), 5th International Conference NEXT 2008, University of Turku, Finland.
Abstract (pdf) / Research area: Software Engineering
- Towards the effective and powerful representation of workflow, Sohail Safdar, Tayyab Asghar, Shehzad Khalid (Aug 2008), 5th International Conference NEXT 2008, University of Turku, Finland.
-
- Security Model for the Protection of Sensitive and Confidential Data on Mobile Devices, Muhammad Tayyab Asghar, Muhammad Riaz, Jamil Ahmad, Sohail Safdar (2008), International Symposium on Biometrics and Security Technologies ISBAST, Islamabad, Pakistan.
Abstract (pdf) / Conference link / Research area: Computer Science, Software Engineering
- Security Model for the Protection of Sensitive and Confidential Data on Mobile Devices, Muhammad Tayyab Asghar, Muhammad Riaz, Jamil Ahmad, Sohail Safdar (2008), International Symposium on Biometrics and Security Technologies ISBAST, Islamabad, Pakistan.
-
- Agent based Model for providing optimized, synchronized and failure free exexution of workflow process, Sohail Safdar, Jamil Ahmad, Shaftab Ahmed, M. Tayyab Asghar, Saqib Saeed (25-27 Oct 2007), 4th International conference on New EXploratory Technologies NEXT, pp. 308-315, South Korea.
Research area: Software Engineering
- Agent based Model for providing optimized, synchronized and failure free exexution of workflow process, Sohail Safdar, Jamil Ahmad, Shaftab Ahmed, M. Tayyab Asghar, Saqib Saeed (25-27 Oct 2007), 4th International conference on New EXploratory Technologies NEXT, pp. 308-315, South Korea.
- AL_Hamdani W. A. K., Wasan Shaker Awad, and Abbas F. Abdul Kader , “Adaptive ciphertext-only attack using GP ”, the first Conference on Data Security, Baghdad, 1999.
Research area: Computation intelligence and information security
Books
-
- Wasan Shaker Awad, El-Sayed M. El-Alfy, and Yousif Al-Bastaki, and, “Improving Information Security Practices through Computational Intelligence”, IGI Global, 2016.
Research area: Information Security and Computational Intelligence
- Wasan Shaker Awad, El-Sayed M. El-Alfy, and Yousif Al-Bastaki, and, “Improving Information Security Practices through Computational Intelligence”, IGI Global, 2016.
- AL_Hamdani W. A. K. & Wasan Shaker Awad, “Stream Cipher Systems”, Iraq, 1997.
Research area: Information Security
Books Chapters:
-
- Wasan Shaker Awad, and Amal Al Hiddi, “Automated Design of Stream Ciphers Using GADS”, 2016, pp. 46-73.
Research area: Information Security and Computational Intelligence
- Wasan Shaker Awad, and Amal Al Hiddi, “Automated Design of Stream Ciphers Using GADS”, 2016, pp. 46-73.
-
- Wasan Shaker Awad, and El-Sayed M. El-Alfy, “Computational Intelligence in Cryptology”, 2016, pp. 28-44.
Research area: Information Security and Computational Intelligence
- Wasan Shaker Awad, and El-Sayed M. El-Alfy, “Computational Intelligence in Cryptology”, 2016, pp. 28-44.
- El-Sayed M. El-Alfy and Wasan Shaker Awad, “Computational Intelligence Paradigms: An Overview”, 2016, pp. 1-27.
Research area: Information Security and Computational Intelligence