- Contact Me

Publications

   Books : 

1.    Bind but Dynamic Technique: The Ultimate Protection against SQL Injections.. Encyclopaedia of Database Technologies and Applications. Idea Group Publishing. 2009.

 

2.    Kernelized Database Systems Security.. Information Security and Ethics: Concepts, Methodologies, Tools and Applications. Information Science Reference – an imprint of IGI Global. Library of Congress Cataloguing-in-Publication Data. 2008.

 

3.    Kernelized Database Systems Security.. Encyclopaedia of Database Technologies and Applications. Idea Group Publishing. 2006.

 

4.  Security Issues in Distributed Transaction Processing Systems. Encyclopedia of Information Science and Technology. Idea Group Publishing. 2005.

 

5.   Informatics – Secondary Education – First Year (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2004.

 

6.  Informatics – Secondary Education First Year – Teacher’s Guide (English and French versions).National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2004.

 

7.      Informatics – Secondary Education – Second Year (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2004.

 

8.   Informatics – Secondary Education – Second Year – Teacher’s Guide (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2004.

 

9.   Regression Test Selection for Database Applications. Advanced Topics in Database Research. Volume 3. Idea Group Publishing. 2004.

 

10.     Informatics – Basic Education - Grade Twelve (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2002.

 

11.    Informatics – Basic Education – Teacher’s Guide - Grade Twelve (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2002.

 

12.  Evaluation Guide – Informatics. Grades 7, 8, 9, 10, and 11. Ministry of Education, Youth, and Sports. 2000.

 

13.  Informatics – Basic Education - Grade Nine (English and French versions). National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2000.

 

14.  Informatics – Basic Education – Teacher’s Guide - Grade Nine. National Centre for Educational Research and Development. National Textbook. Lebanese Educational Publishing Company. 2000.

 

15.  Accelerating Queries in Multilevel Secure Database Systems.  Lecture Notes in Computer Science. Springer-Verlag. 2000.

 

   Journals :  

 

  1. The Relationship between using of an Intelligent Tutoring System and Class Achievement in a Basic Mathematics Course. Internaional Journal of Emerging Technologies in Learning (iJET). ISSN: 1863-0383. Volume 3, Number 2. June 2008.

  1. Damage Assessment and Recovery from Malicious Transactions using Data Dependency. International Journal of Computer Science and Engineering. 2007.

 

  1. Modelling and Automated Blackbox Regression Testing of Web Applications. Submitted to the International Journal of Theoretical and Applied Computer Sciences. Volume 2, Number 2. 2007.

 

  1. CASRA+: A Colloquial Arabic Speech Recognition Application. American Journal of Applied Sciences. ISSN: 1546-9239. 4(1): 23-32, 2007.

 

  1. Multigrid Solvers in Reconfigurable Hardware. Journal of Applied and Computational Mathematics. ISSN: 0377-0427. 2006.

 

  1. A Hybrid Cryptosystem Based on WEP for 802.11 Networks. Journal of Computational Methods in Sciences and Engineering (JCMSE). ISSN: 1472-7978. Volume 6, Numbers 5,6. Supplement 2. IOS Press. 2006.

 

  1. A Comparative Study of El Gamal-based Digital Signature Algorithms Journal of Computational Methods in Sciences and Engineering (JCMSE). ISSN: 1472-7978. Volume 6, Numbers 5,6. Supplement 1. IOS Press. 2006.

 

  1. A Comparative Study of RSA-based Digital Signature Algorithms Journal of Mathematics and Statistics. ISSN: 1549-3644. Volume 2, Number 1. 2006.

 

  1. Regression Test Selection for Trusted Database Applications International Arab Journal of Information Technology. ISSN: 1683-3198. Volume 3, Number 4. October 2006.

 

  1. Towards a Temporal Multilevel Secure Database Journal of Computer Science. ISSN: 1549-3636. Volume 2, Number 1. 2006.

 

  1. RSA-Based Cryptographic Algorithms International Journal of Infonomics. ISSN: 1742-4712. November 2005.

 

  1. T-Stem - A Superior Stemmer and Temporal Extractor for Arabic Texts Journal of Digital Information Management. Volume 3, Number 3. September 2005.

 

  1. El Gamal Public-Key Cryptosystem in Multiplicative Groups of Quotient Rings of Polynomials over Finite Fields Journal of Computer Science and Information Systems. Volume 2, Number 1. June 2005.

 

  1. A Comparative Study of El Gamal Based Cryptographic Algorithms Journal of Theoretical and Applied Computing. ISSN: 0103-3408. Volume 12, Number 1. June 2005.

 

  1. Abjad Hawwaz: An Off-line Arabic Handwriting Recognition System International Journal of Computers and Applications. ACTA Press/IASTED. Volume 27, Number 3. 2005.

 

  1. Arabic Character Recognition. International Arab Journal of Information Technology. Volume 1, Number 2. July 2004.

 

  1. Segmenting Handwritten Arabic Text. ACIS International Journal of Computer and Information Science (IJCIS), Volume 3, Number 4. December, 2002.

 

  1. Regression Testing of Database Applications. Journal of Database Management. Vol. 13, No. 2. 2002.

 

  1. Query Acceleration in Distributed Database Systems. Colombian Journal of Computation. Volume 2, Number 1. June 2001.

 

  1. Software Metrics for Database Applications. International Journal of Computers and Their Application – A Publication of the International Society for Computers and Their Applications. Volume 8, Number 1. March 2001.

 

  1. A Concurrency Control Model for Multilevel Secure Object-Oriented Databases. International Journal for Mini and Microcomputer Applications. Volume 14, No. 3 Alberta, Canada. 1995.

 

  1. KB - HYDRO: A Heterogeneous Distributed System Integrating Data and Knowledge Bases. International Journal for Mini and Microcomputer Application. Volume 13, No. 1. 1994.

 

   International Refereed Conferences :

 

  1. A Synchronous/Asynchronous Multi-master Replication Method. Proceedings of the. International Conference on Computers and Their Applications (CATA-2008). Cancun, Mexico. April 2008.

 

  1. IRS: An Intelligent Recruitment System. Proceedings of the 20th International Conference on Computer Applications in Industry and Engineering (CAINE 2007). San Francisco, California USA. November 2007.

 

  1. BIRP: Bank Intra Routing Protocol. Proceedings of the IEEE Electro/Information Technology Conference. Chicago, USA. May 2007.

 

  1. The Successive Over Relaxation Method in Reconfigurable Hardware.. Proceedings of the IAENG International MultiConference of Engineers and Computer Scientists. Hong Kong, China. March 2007.

 

  1. Accurate High-Performance Multigrid Solvers in Reconfigurable Hardware. Book of Abstract of the Society of Applied Mathematics Conference on Computational Science and Engineering. Costa Mesa, USA. February 2007.

 

  1. Securing Wireless Networks with Enhanced WEP. Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering. Las Vegas, USA. November 2006.

 

  1. A Comparative Study of Replacement Algorithms used in the Scalable Asynchronous Cache Consistency Scheme. Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering. Las Vegas, USA. November 2006.

 

  1. A Three Poled Model for Web Applications. Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering. Las Vegas, USA. November 2006.

 

  1. SDDSR: Sequence Driven Dynamic Source Routing for Ad Hoc Mobile Networks. Proceedings of the World Automation Congress - International Symposium on Soft Computing for Industry. Budapest, Hungary. July 2006.

 

  1. Improving the Secure Socket Layer by Modifying its Authentication Function. World Automation Congress - International Forum on Multimedia and Image Processing. Budapest, Hungary. July 2006.

 

  1. A Comparative Study of El Gamal Based Digital Signature Algorithms. World Automation Congress - International Symposium on Intelligent Automation and Control. Budapest, Hungary. July 2006.

 

  1. An Evaluation of a Visual Query Language for Information Systems. Proceedings of the International Conference on Enterprise Information Systems (ICEIS 2006) Conference. Paphos, Cyprus. May 2006.

 

  1. Towards a New Visual Language for GIS. Proceedings of the IASTED Database Applications (DBA 2006) Conference. Innsbruck, Austria. February 2006.

 

  1. Lebanese Colloquial Arabic Speech Recognition. Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering (CAINE-2005). Hawaii, USA. November 2005.

 

  1. Modified RSA in the Domains of Gaussian Integers and Polynomials Over Finite Fields. Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering (CAINE-2005). Hawaii, USA. November 2005.

 

  1. Regression Testing for Trusted Database Applications. Proceedings of the IBIMA 2005 Conference on Information Management in Modern Enterprise. Lisbon, Portugal. July 2005.

 

  1. Towards a Temporal Multilevel Secure Relational Database Model. Proceedings of the IBIMA 2005 Conference on Information Management in Modern Enterprise. Lisbon, Portugal. July 2005.

 

  1. Attacking El Gamal Based Cryptographic Algorithms Using Pollard's Rho Algorithm. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2005). Cairo, Egypt. January 2005.

 

  1. TREX: A Temporal Reference Extractor for Arabic Texts. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2005). Cairo, Egypt. January 2005.

 

  1. Al-Monakkeb - A Superior Indexer for Arabic Texts. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’04). Cairo, Egypt. December 2004.

 

  1. Modified RSA in the Domain of Gaussian Integers. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’04). Cairo, Egypt. December 2004.

 

  1. Rabin Public Key Cryptosystem in Rings of Polynomials over Finite Fields. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’04). Cairo, Egypt. December 2004.

 

  1. Ternary and Quaternary Decision Diagrams. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’04). Cairo, Egypt. December 2004.

 

  1. A Comparative Study of RSA Based Cryptographic Algorithms. Proceedings of the 13th International Conference on Intelligent and Adaptive Systems and Software Engineering (IASSE-2004). Nice, France. July 2004.

 

  1. ElGamal Public-key Cryptosystem Using Reducible Polynomials over a Finite Field. Proceedings of the 13th International Conference on Intelligent & Adaptive Systems and Software Engineering (IASSE-2004). Nice, France. July 2004.

 

  1. A Comparative Study of ElGamal Based Cryptographic Algorithms. Proceedings of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004). Porto, Portugal. April 2004.

 

  1. BVA+ - A Bit Vectors Algorithm for Accelerating Queries in Multilevel Secure Databases. Proceedings of the Sixth International Conference on Enterprise Information Systems (ICEIS 2004). Porto, Portugal. April 2004.

 

  1. ADD: Arabic Duplicate Detector – A Duplicate Detection Data Cleansing Tool. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2003). Tunisia, Tunisia. July 2003.

 

  1. Neuro-Classification for Handwritten Arabic Text. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2003). Tunisia, Tunisia. July 2003.

 

  1. An Auto-Indexing System for Arabic Information Retrieval. Proceedings of the IASTED International Conference on Applied Informatics (AI 2003). Innsbruck, Austria. February 2003.

 

  1. ABJAD:An Off-Line Arabic Handwritten Recognition System. Proceedings of the 2002 International Arab Conference on Information Technology (ACIT'2002). Doha, Qatar. December 2002. 

 

  1. Segmenting Handwritten Arabic Text. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’02). Foz do Iguazu, Brazil. June 2002.

 

  1. A Bit Vectors Algorithm for Accelerating Queries in Multilevel Secure Databases. Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’02). Foz do Iguazu, Brazil. June 2002.

 

  1. Iterative Querying in Web-Based Database Applications. Proceedings of the 17th ACM Symposium on Applied Computing (SAC 2002). Madrid, Spain. March 2002.

 

  1. A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text. Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2001). Beirut, Lebanon. June 2001.

 

  1. Regression Testing of Database Applications. Proceedings of the 16th ACM Symposium on Applied Computing (SAC 2001). Las Vegas, USA. March 2001.

 

  1. Transaction Acceleration in Secure Database Systems. Proceedings of the 13th National Conference on Computer Applications in Industry and Engineering (CAINE-2000). Honolulu, Hawaii, USA. November 2000.

 

  1. Accelerating Queries in Multilevel Secure Database Systems. Proceedings of the 10th International Conference on Computing and Information ICCI ‘2000, Kuwait, November 18-21, 2000. (Proceedings not published yet!)

 

  1. A PERF Solution for Distributed Query Optimization. Proceedings of the ISCA 15th International Conference on Computers and Their Applications. Louisiana, USA. March 2000.

 

  1. Database Software Metrics for Small Database Applications. Proceedings of the 15th ACM Symposium on Applied Computing. Como, Italy. March 2000.

 

  1. Distributed Query Optimization Using PERF Joins. Proceedings of the 15th ACM Symposium on Applied Computing. Como, Italy. March 2000.

 

  1. A Security Policy Manager for Multilevel Secure Object Oriented Database Management Systems. Proceedings of the International Conference on Applied Modelling and Simulation. Cairns - Queensland, Australia. September 1999.

 

  1. C2 Secure Database Management Systems – A Comparative Study. Proceedings of the ACM Symposium on Applied Computing. San Antonio, Texas. March 1999.  

 

  1. A Concurrency Control Model for Multilevel Secure Object-Oriented Databases. Proceedings of the Mid-Content Conference on Information and Database Systems. Fargo, ND. May 1994.

 

  1. Secure Transaction Management and Query Processing in Multilevel Secure Database Systems. Proceedings of the Symposium on Applied Computing. Phoenix, AZ. April 1994.

 

  1. Transaction Processing in Multilevel Secure Replicated Databases. Proceedings of the Mid-Continent Information Systems Conference. Fargo, ND. May 1993.

 

  1. OOHYDRO: A Heterogeneous Distributed Database System for Object-Base and Database Interoperability. Proceedings of the Mid-Continent Information Systems Conference. Fargo, ND. May 1993.

 

  1. Multilevel Security in Multidatabase Systems. Proceedings of the Small College Computing Symposium. Cedar Rapids, IA. April 1993.

 

  1. Integrating Knowledge Based Systems in Heterogeneous Distributed Databases. Proceeding of the International Conference on Computer Applications in Design, Simulation and Analysis. Washington, DC. March 1993.

 

  1. Transaction Management in Multilevel Secure Database Management Systems. International Conference on Mathematical Modelling and Scientific Computing in Science and Technology. College Park, MD. April 1993.

 

  1. Concurrency Control and Recovery in Multilevel Secure Replicated Databases (short paper). AAAI-IEEE-ACM-ISMM-International Conference of Information and Knowledge Management. Baltimore, MD. November 1992.

  

   Local Conferences :

 

  1. Eye2See: A Mobile Surveillance System for Pocket PCs. Proceedings of the International Conference on Research Trends in Science and Technology. Beirut, Lebanon. March 2005.

 

  1. GISMO: A Geographical Information System for a Municipality Office. Proceedings of the International Conference on Research Trends in Science and Technology. Beirut, Lebanon. March 2002.

 

  1. MLS/ERD: A Tool for Building Multilevel Secure Entity Relationship Diagrams. Proceedings of the International Conference on Research Trends in Science and Technology. Beirut, Lebanon. March 2002.

 

  1. Factory Simulation. Proceedings of the 14th Science Meeting (Book of Abstracts) – 2000 – organized by the National Council for Scientific Research and the Lebanese Association for the Advancement of Science. Beirut, Lebanon. November 2000.

 

  1. Routing Journal Operations on Disk using Striping with Parity. Proceedings of the International Conference on Research Trends in Science and Technology (RTST). Lebanese American University. Beirut, Lebanon. March 2000.

 

  1. Query Optimization in Distributed Databases. Proceedings of the 13th Science Meeting (Book of Abstracts) – 1999 – organized by the National Council for Scientific Research and the Lebanese Association for the Advancement of Science. Beirut, Lebanon. November 1999.

 

  1. Using WebSQL to Query the World Wide Web. Proceedings of the International Conference on Scientific Computations – Beirut, Lebanon. March 1999.

 

   Technical Reports :

 

1.  Final Evaluation Report – Novell Incorporated Netware 4 Trusted Network System Design. National Computer Security Centre. CSC-EPL-98/XX. 1998.

 

2.  Final Evaluation Report - Sybase SQL Server and Secure SQL Server. National Computer Security Centre. CSC-EPL-97/01. 1997.

 

3.    Security Testing and Evaluation Report of the Operational Flight Program Build System for the F-22 Weapon System. July 1997.

 

4.    Security Testing and Evaluation Report of the Integrated Maintenance Information System for the F-22 Weapon. May 1997.

 

5.      Final Evaluation Report - Informix Online/Secure. National Computer Security Centre CSC-EPL-96/xx. 1996.

 

6.      Technical Assessment of the IBM OS/2 Warp Operating System. August 1996.

 

7.   Final Evaluation Report - IBM AS/400 System. National Computer Security Centre CSC-EPL-95/13. 1995.

 

8.      Transaction Management in Multilevel Secure Database Management Systems. (NDSU-CS-TR-92-07). 1992.

 

9.     Concurrency Control and Recovery in Multilevel Secure Replicated Databases. (NDSU-CS-TR-92-15). 1992.

 

10.  MLS-ROLL: Concurrency Control Object for Multilevel Secure Replicated Databases. (NDSU-CS-TR-92-16). 1992.

 

11.  Optimal Transaction Processing in Replicated Multilevel Secure Databases. (NDSU-CS-TR-91-17). 1991.

 

   Others :

 

  1. Issues in Integrating Trusted Products in Real-Word Applications. Data Security Letter June 1995.

 

  1. Multilevel Secure System Engineering. Data Security Letter. September 1994.

 

  1. An Optimal Transaction Processing Protocol for Multilevel Secure Replicated  Databases. Poster Session at the 1992 IEEE Symposium in Security and Privacy. Oakland, CA. May 1992.

 

  1. Transaction Management in Multilevel Secure Database Management Systems. Ph.D. Dissertation. North Dakota State University. November 1992.

 

  1. Optical Fibre Communication Systems: Theory and Practice. M.S. Thesis. Minnesota State University. July 1989.