Menu

Information Security

Ahlia University

Journals

    1. Wasan Shaker Awad, and Hanin Mohammed Abdullah, “Improving the Security of Storage Systems Using Cloud Computing”,  Journal of Information Technology, to be published, 2017.
      Research area: Information Security and Cloud Computing

 

    1. Wasan Shaker Awad, and Hanin Mohammed Abdullah, “Improving The Security Of Storage Systems: Bahrain Case Study” International Journal of Mobile Computing and Multimedia Communications”, USA, 6(3), pp. 78-108, 2014.
      Research area: Information Security and Cloud Computing

 

    1. Wasan Shaker Awad, and Ali Zolait., “E-Mail as an Official Communication Tool in Bahrain: Individual and Public Organization Perspectives”, International Journal of E-Services and Mobile Applications, USA, 5(1), 2013, pp. 51-76.
      Research area: Information Security

 

    1. A Road Map For Implementing Service Oriented Agricultural Information Management System, Rehan Akbar, Mohd Fadzil Hassan, Abdullah A., Babar M. E., Sohail Safdar (September 2012), The Journal of Animal and Plant Sciences (JAPS), Volume. 22, Issue 3, Pages. 802-805. (ISSN:1018-7081)
      Abstract (pdf) / Journal link / Research area: : Software Engineering, Information Systems

 

    1. Wasan Shaker Awad, “Designing Stream Cipher Systems Using Genetic Programming”, LNCS, Springer,Vol. 6683, 2011, pp. 308-320.
      Research area: Information Security and Computational Intelligence

 

    1. Effective Methods for Secure Authentication in Workflows under Intrusion Threat, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar (2011), Information Technology Journal, Volume 10, Issue 6, Pages 1161-1169. (ISSN: 1812-5638)
      Abstract (pdf) / Journal link / Research area: Software Engineering, Information Systems

 

    1. Structured Role Based Interaction Model for Agile Based Outsourced IT Projects: Client’s Composite Structure, Rehan Akbar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Sohail Safdar (2011), Information Technology Journal, Volume 10, Issue 5, Pages 1009-1016. (ISSN: 1812-5638)
      Abstract (pdf) / Journal link / Research area: Software Engineering

 

    1. Directions and Advancements in Global Software Development: A Summarized Review of GSD and Agile Methods, Rehan Akbar, Muhammad Fadzil Hassan, Azrai Abdullah, Sohail Safdar, Muhammad Aasim Qureshi (2011), Research Journal of Information Technology, Volume 3, Issue 2, Pages 69-80. (ISSN: 1815-7432)
      Abstract (pdf) / Journal link / Research area: Software Engineering

 

    1. Wasan Shaker Awad, “Information hiding using ant colony optimization algorithm”, International journal of technology diffusion”, USA, 2(1), 2010, pp. 16-28.
      Research area: Information Security and Computational Intelligence

 

    1. Wasan Shaker Awad and Huda Kadim Al Jobori, “Non Homogeneous Steganography Using Genetic Simulated Annealing”,  International Journal of Information Science and Computer Mathematics, Pushpa Publishing House, 2(1), pp. 61-73, 2010.
      Research area: Information Security and Computational Intelligence

 

    1. Wasan Shaker Awad, “Deploying E-mail as an official communication tool: technical prospect”,  International journal of computer science and security, 4(4), 2010, pp. 273-282.
      Research area: Information Security

 

    1. Biologically Inspired Execution Framework for Vulnerable Workflow Systems, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar (2009), International Journal of Computer Science and Information Security IJCSIS, Volume. 6, Issue.1. (ISSN:1947-5500)
      Abstract (pdf) / Journal link / Research area: Software Engineering, Information Security, Reliable systems

 

  1. Al-Bastaki, Y. and Wasan Shaker Awad, “New development in genetic algorithms for developing software”, Studies in Informatics and Control, 12(4), December 2003, pp. 277-284.
    Research area: Computation intelligence and information security

Conferences

    1. Investigating the role of information security management in smart city organizations, Mohamad Amin Hasbini, Tillal ElDabi and Ammar Aldallal (16-18 May 2017), 15th International conference on The Digital Revolution, Smart Cities and Performance Improvement towards a Sustainable Knowledge, Manama, Bahrain
      Abstract (pdf) / Conference link / Research area: Information Security, Smart Cities

 

    1. Mechanism to Continue System Availability during Cyber Threat Scenario, Sohail Safdar, Mohd Fadzil Hassan, Karim Hajjar, Rehan Akbar, Baraa Tariq Sharef, M Aasim Qureshi (Jan 2017), ACM International Conference on Ubiquitous Information Management and Communication (ACM IMCOM), Beppu Japan, Jan 2017.
      Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security

 

    1. A short review of Global Software Development (GSD) and latest software development trends, Rehan Akbar, Sohail Safdar (April 2015), International Conference on Computer, Communications, and Control Technology (I4CT), pages. 314 – 317, Malaysia.
      Abstract (pdf) / Conference link / Research area: Software Engineering

 

    1. A Simple Interactive 3D Interior Design Application for Living Room, Seow Hui Saw, Heng Wai Tan, Sohail Safdar and Teik Boon Tan (3-5 Nov 2014), IET International Conference on Frontiers of Communications, Networks and Applications (ICFCNA 2014), Kuala Lumpur, Malaysia.
      Abstract (pdf)Conference link / Research area: Software Engineering

 

    1. Software development process tailoring for small and medium sized companies, Rehan Akbar, Sohail Safdar, M. F. Hassan, Azrai Abdullah (June 2014), International Conference on Computer and Information Sciences (ICCOINS), pp.1 – 5.
      Abstract (pdf) / Conference link / Research area: Software Engineering

 

    1. Software development project states and project behavior, Rehan Akbar, Sohail Safdar, M. A. Qureshi, M. F. Hassan, Azrai Abdullah (16-18 Dec. 2013), International Conference on Open Source Systems and Technologies (ICOSST), Pages.46 – 49.
      Abstract (pdf) / Conference link / Research area: Software Engineering.

 

    1. Formalizing An Abstract Architecture For The Alternative Data Source Utilized During System Availability Under Intrusion Threat, Sohail Safdar, Mohd Fadzil Hassan, Rehan Akbar, M Aasim Qureshi (8th – 10th Oct 2012), The IET International Conference on Wireless Communications and Applications ICWCA.
      Abstract (pdf) / Conference link / Research area: Software Engineering, Reliability, Information Security

 

    1. Two Dimensional Password Based Hybrid Authentication Methods in Vulnerable Workflows, Sohail Safdar, Mohd Fadzil Hassan (12th – 14th June 2012), International Conference on Computer and Information Sciences ICCIS, pages. 908-913.
      Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security

 

    1. The client as a real option in successful software project management (The CPPM model), Rehan Akbar, Muhammad Fadzil Hassan, Azrai Abdullah, Sohail Safdar, Muhammad Aasim Qureshi (19th Sept. 2011), National Postgraduate Conference – Energy and Sustainability: Exploring the Innovative Minds, NPC.
      Abstract (pdf) / Conference link / Research area: Software Engineering

 

    1. Wasan Shaker Awad, “Designing Stream Cipher Systems Using Genetic Programming”, Learning and optimization (LION5), 21/1/2011, Rome, Italy.
      Research area: Information Security and Computational Intelligence

 

    1. Analyzing Framework for Alternate Execution of Workflows for Different Types of Intrusion Threats, Sohail Safdar, Mohd fadzil Hassan (2011), 2nd International Conference on Software Engineering and Computer Systems, ICSECS, Malaysia, CCIS Book chapter Volume 180, pages. 361-375. (ISSN: 1865-0929)
      Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security

 

    1. Data Hibernation Framework in Workflows Under Intrusion Threat, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar (2011), IEEE Symposium on Computers and Informatics ISCI, pages. 680-685, Malaysia.
      Abstract (pdf) / Conference link / Research area: Software Engineering, Reliable System, Information Security

 

    1. An Insight into Real Software Industry Paradigms and Software Engineering Research, Rehan Akbar, Muhammad Fadzil Hassan, Sohail Safdar, Muhammad Aasim Qureshi, (2011) IEEE Symposium on Computers and Informatics ISCI, Malaysia.
      Abstract (pdf) / Conference linkAbstract (pdf) Research area: Software Engineering

 

    1. Shortest Path Algorithm With Pre-calculated Single Link Failure Recovery for Non-Negative Weighted Undirected Graphs, Muhammad Aasim Qureshi, Mohd Fadzil Hassan, Sohail Safdar, Rehan Akbar, Rabia Sammi (2010), International Conference on Information and Emerging Technologies, ICIET, Karachi, Pakistan.
      Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security

 

    1. Authentication Model Based on Reformation Mapping Method, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar, Rizwan Aamir (2010), International Conference on Information and Emerging Technologies ICIET, Karachi, Pakistan.
      Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security

 

    1. Moving Towards Two Dimensional Passwords, Sohail Safdar, Mohd Fadzil Hassan (June 2010), International Symposium on Information Technology ITSIM, Malaysia.
      Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security

 

    1. Framework for Alternate Execution of workflows under threat, Sohail Safdar, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar (Feb 2010), 2nd International Conference on Communication Software and Networks ICCSN, Singapore.
      Abstract (pdf) / Conference link / Research area: Software Engineering, Information Security

 

    1. Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management Rehan Akbar, Muhammad Fadzil Hassan, Sohail Safdar, Muhammad Aasim Qureshi (Feb 2010), 2nd International Conference on Communication Software and Networks, ICCSN, Pages.191-195, Singapore.
      Abstract (pdf) / Conference link / Research area: Software Engineering

 

    1. Towards the effective and powerful representation of workflow, Sohail Safdar, Tayyab Asghar, Shehzad Khalid (Aug 2008), 5th International Conference NEXT 2008, University of Turku, Finland.
      Abstract (pdf) / Research area: Software Engineering

 

    1. Security Model for the Protection of Sensitive and Confidential Data on Mobile Devices, Muhammad Tayyab Asghar, Muhammad Riaz, Jamil Ahmad, Sohail Safdar (2008), International Symposium on Biometrics and Security Technologies ISBAST, Islamabad, Pakistan.
      Abstract (pdf) / Conference link / Research area: Computer Science, Software Engineering

 

    1. Agent based Model for providing optimized, synchronized and failure free exexution of workflow process, Sohail Safdar, Jamil Ahmad, Shaftab Ahmed, M. Tayyab Asghar, Saqib Saeed (25-27 Oct 2007), 4th International conference on New EXploratory Technologies NEXT, pp. 308-315, South Korea.
      Research area: Software Engineering

 

  1. AL_Hamdani W. A. K., Wasan Shaker Awad, and  Abbas F. Abdul Kader , “Adaptive ciphertext-only attack using GP ”, the first Conference on Data Security, Baghdad, 1999.
    Research area: Computation intelligence and information security

Books

    1. Wasan Shaker Awad, El-Sayed M. El-Alfy, and Yousif Al-Bastaki, and, “Improving Information Security Practices through Computational Intelligence”, IGI Global, 2016.
      Research area: Information Security and Computational Intelligence

 

  1. AL_Hamdani W. A. K. & Wasan Shaker Awad, “Stream Cipher Systems”, Iraq, 1997.
    Research area: Information Security

Books Chapters:

    1. Wasan Shaker Awad, and Amal Al Hiddi, “Automated Design of Stream Ciphers Using GADS”, 2016, pp. 46-73.
      Research area: Information Security and Computational Intelligence

 

    1. Wasan Shaker Awad, and El-Sayed M. El-Alfy, “Computational Intelligence in Cryptology”, 2016, pp. 28-44.
      Research area: Information Security and Computational Intelligence

 

  1. El-Sayed M. El-Alfy and Wasan Shaker Awad, “Computational Intelligence Paradigms: An Overview”, 2016, pp. 1-27.
    Research area: Information Security and Computational Intelligence
close-link
Live

19th Graduation Ceremony

Date: 07/12/2024 | Time: 06:30 PM (UTC+03:30)

Watch the Ahlia University 19th Graduation Ceremony live on YouTube by clicking on the button below.
 
close-link
See Event Details