Publications
Books
:
1.
Bind but Dynamic Technique: The Ultimate Protection against SQL Injections..
Encyclopaedia of Database Technologies and Applications. Idea Group Publishing. 2009.
2.
Kernelized Database Systems Security..
Information Security and Ethics: Concepts, Methodologies, Tools and Applications. Information Science Reference – an imprint of IGI Global. Library of Congress Cataloguing-in-Publication Data. 2008.
3.
Kernelized Database Systems Security..
Encyclopaedia of Database Technologies and Applications. Idea Group Publishing. 2006.
4.
Security
Issues in Distributed Transaction Processing Systems. Encyclopedia of
Information Science and Technology.
Idea Group
Publishing. 2005.
5.
Informatics – Secondary Education
– First Year (English and French versions). National Centre for
Educational Research and Development. National Textbook. Lebanese
Educational Publishing Company. 2004.
6.
Informatics – Secondary Education
–
First Year – Teacher’s Guide (English and French
versions).National Centre for Educational Research and Development.
National Textbook. Lebanese Educational Publishing Company. 2004.
7.
Informatics
– Secondary Education
– Second Year (English and French versions). National Centre for
Educational Research and Development. National Textbook. Lebanese
Educational Publishing Company. 2004.
8.
Informatics
– Secondary Education
– Second Year – Teacher’s Guide (English and French
versions). National Centre for Educational Research and Development.
National Textbook. Lebanese Educational Publishing Company. 2004.
9.
Regression
Test Selection for Database Applications.
Advanced Topics in Database Research.
Volume 3. Idea Group
Publishing. 2004.
10.
Informatics
– Basic Education
- Grade Twelve (English and French versions). National Centre for
Educational Research and Development. National Textbook. Lebanese
Educational Publishing Company. 2002.
11.
Informatics
– Basic Education – Teacher’s Guide
- Grade Twelve (English and French versions). National Centre for
Educational Research and Development. National Textbook. Lebanese
Educational Publishing Company. 2002.
12.
Evaluation
Guide – Informatics.
Grades 7, 8, 9, 10, and 11. Ministry of Education, Youth, and
Sports. 2000.
13.
Informatics
– Basic Education
- Grade Nine (English and French versions). National Centre for
Educational Research and Development. National Textbook. Lebanese
Educational Publishing Company. 2000.
14.
Informatics
– Basic Education – Teacher’s Guide
- Grade Nine. National Centre for Educational Research and
Development. National Textbook. Lebanese Educational Publishing
Company. 2000.
15.
Accelerating
Queries in Multilevel Secure Database Systems.
Lecture Notes in Computer Science. Springer-Verlag. 2000.
Journals :
-
The Relationship between using of an Intelligent Tutoring System and Class Achievement in a Basic Mathematics Course. Internaional Journal of Emerging Technologies in Learning (iJET). ISSN: 1863-0383. Volume 3, Number 2. June 2008.
-
Damage Assessment and Recovery from Malicious Transactions using Data Dependency.
International Journal of Computer Science and Engineering. 2007.
-
Modelling and Automated Blackbox Regression Testing of Web Applications.
Submitted to the International Journal of Theoretical and Applied Computer Sciences. Volume 2, Number 2. 2007.
-
CASRA+: A Colloquial Arabic Speech Recognition Application.
American Journal of Applied Sciences. ISSN: 1546-9239. 4(1): 23-32, 2007.
-
Multigrid Solvers in Reconfigurable Hardware.
Journal of Applied and Computational Mathematics. ISSN: 0377-0427. 2006.
-
A Hybrid Cryptosystem Based on WEP for 802.11 Networks.
Journal of Computational Methods in Sciences and Engineering (JCMSE). ISSN: 1472-7978. Volume 6, Numbers 5,6. Supplement 2. IOS Press. 2006.
-
A Comparative Study of El Gamal-based Digital Signature Algorithms
Journal of Computational Methods in Sciences and Engineering (JCMSE). ISSN: 1472-7978. Volume 6, Numbers 5,6. Supplement 1. IOS Press. 2006.
-
A Comparative Study of RSA-based Digital Signature Algorithms
Journal of Mathematics and Statistics. ISSN: 1549-3644. Volume 2, Number 1. 2006.
-
Regression Test Selection for Trusted Database Applications
International Arab Journal of Information Technology. ISSN: 1683-3198. Volume 3, Number 4. October 2006.
-
Towards a Temporal Multilevel Secure Database
Journal of Computer Science. ISSN: 1549-3636. Volume 2, Number 1. 2006.
-
RSA-Based Cryptographic Algorithms
International Journal of Infonomics. ISSN: 1742-4712. November 2005.
-
T-Stem - A Superior Stemmer and Temporal Extractor for Arabic Texts
Journal of Digital Information Management. Volume 3, Number 3. September 2005.
-
El Gamal Public-Key Cryptosystem in Multiplicative Groups of Quotient Rings of Polynomials over Finite Fields
Journal of Computer Science and Information Systems. Volume 2, Number 1. June 2005.
-
A Comparative Study of El Gamal Based Cryptographic Algorithms
Journal of Theoretical and Applied Computing. ISSN: 0103-3408. Volume 12, Number 1. June 2005.
-
Abjad Hawwaz: An Off-line Arabic Handwriting Recognition System
International Journal of Computers and Applications. ACTA Press/IASTED. Volume 27, Number 3. 2005.
-
Arabic Character
Recognition.
International Arab Journal of
Information
Technology.
Volume 1, Number 2. July 2004.
-
Segmenting
Handwritten Arabic Text.
ACIS International Journal of Computer and Information Science (IJCIS),
Volume 3, Number 4. December, 2002.
-
Regression Testing
of Database Applications.
Journal of Database
Management. Vol. 13, No. 2. 2002.
-
Query Acceleration
in Distributed Database Systems.
Colombian Journal of
Computation. Volume 2, Number 1. June 2001.
-
Software Metrics
for Database Applications.
International Journal
of Computers and Their Application – A Publication of the
International Society for Computers and Their Applications. Volume
8, Number 1. March 2001.
-
A Concurrency
Control Model for Multilevel Secure Object-Oriented Databases.
International Journal for Mini and Microcomputer Applications.
Volume 14, No. 3 Alberta, Canada. 1995.
-
KB - HYDRO: A
Heterogeneous Distributed System Integrating Data and Knowledge
Bases.
International Journal for Mini and Microcomputer Application.
Volume 13, No. 1. 1994.
International Refereed
Conferences :
-
A Synchronous/Asynchronous Multi-master Replication Method.
Proceedings of the. International Conference on Computers and Their Applications (CATA-2008). Cancun, Mexico. April 2008.
-
IRS: An Intelligent Recruitment System.
Proceedings of the 20th International Conference on Computer Applications in Industry and Engineering (CAINE 2007). San Francisco, California USA. November 2007.
-
BIRP: Bank Intra Routing Protocol.
Proceedings of the IEEE Electro/Information Technology Conference. Chicago, USA. May 2007.
-
The Successive Over Relaxation Method in Reconfigurable Hardware..
Proceedings of the IAENG International MultiConference of Engineers and Computer Scientists. Hong Kong, China. March 2007.
-
Accurate High-Performance Multigrid Solvers in Reconfigurable Hardware.
Book of Abstract of the Society of Applied Mathematics Conference on Computational Science and Engineering. Costa Mesa, USA. February 2007.
-
Securing Wireless Networks with Enhanced WEP.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering. Las Vegas, USA. November 2006.
-
A Comparative Study of Replacement Algorithms used in the Scalable Asynchronous Cache Consistency Scheme.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering. Las Vegas, USA. November 2006.
-
A Three Poled Model for Web Applications.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering. Las Vegas, USA. November 2006.
-
SDDSR: Sequence Driven Dynamic Source Routing for Ad Hoc Mobile Networks.
Proceedings of the World Automation Congress - International Symposium on Soft Computing for Industry. Budapest, Hungary. July 2006.
-
Improving the Secure Socket Layer by Modifying its Authentication Function.
World Automation Congress - International Forum on Multimedia and Image Processing. Budapest, Hungary. July 2006.
-
A Comparative Study of El Gamal Based Digital Signature Algorithms.
World Automation Congress - International Symposium on Intelligent Automation and Control. Budapest, Hungary. July 2006.
-
An Evaluation of a Visual Query Language for Information Systems.
Proceedings of the International Conference on Enterprise Information Systems (ICEIS 2006) Conference. Paphos, Cyprus. May 2006.
-
Towards a New Visual Language for GIS.
Proceedings of the IASTED Database Applications (DBA 2006) Conference. Innsbruck, Austria. February 2006.
-
Lebanese Colloquial Arabic Speech Recognition.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering (CAINE-2005). Hawaii, USA. November 2005.
-
Modified RSA in the Domains of Gaussian Integers and Polynomials Over Finite Fields.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering (CAINE-2005). Hawaii, USA. November 2005.
-
Regression Testing for Trusted Database Applications.
Proceedings of the IBIMA 2005 Conference on Information Management in Modern Enterprise. Lisbon, Portugal. July 2005.
-
Towards a Temporal Multilevel Secure Relational Database Model.
Proceedings of the IBIMA 2005 Conference on Information Management in Modern Enterprise. Lisbon, Portugal. July 2005.
-
Attacking El Gamal
Based Cryptographic Algorithms Using Pollard's Rho Algorithm.
Proceedings of the ACS/IEEE International Conference on Computer
Systems and Applications (AICCSA 2005). Cairo, Egypt. January
2005.
-
TREX: A Temporal
Reference Extractor for Arabic Texts.
Proceedings of the ACS/IEEE International Conference on Computer
Systems and Applications (AICCSA 2005). Cairo, Egypt. January
2005.
-
Al-Monakkeb - A
Superior Indexer for Arabic Texts.
Proceedings of the International Conference on Computer Science,
Software Engineering, Information Technology, e-Business, and
Applications (CSITeA’04). Cairo, Egypt. December 2004.
- Modified RSA in the Domain of Gaussian Integers.
Proceedings of the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA’04). Cairo, Egypt. December 2004.
-
Rabin Public Key
Cryptosystem in Rings of Polynomials over Finite Fields.
Proceedings of the International Conference on Computer Science,
Software Engineering, Information Technology, e-Business, and
Applications (CSITeA’04). Cairo, Egypt. December 2004.
-
Ternary and
Quaternary Decision Diagrams.
Proceedings of the International Conference on Computer Science,
Software Engineering, Information Technology, e-Business, and
Applications (CSITeA’04). Cairo, Egypt. December 2004.
-
A Comparative Study
of RSA Based Cryptographic Algorithms.
Proceedings of the 13th International Conference on
Intelligent and Adaptive Systems and Software Engineering
(IASSE-2004). Nice, France. July 2004.
-
ElGamal Public-key
Cryptosystem Using Reducible Polynomials over a Finite Field.
Proceedings of the 13th International Conference on
Intelligent & Adaptive Systems and Software Engineering
(IASSE-2004). Nice, France. July 2004.
-
A Comparative Study
of ElGamal Based Cryptographic Algorithms.
Proceedings of the Sixth International Conference on Enterprise
Information Systems (ICEIS 2004). Porto, Portugal. April 2004.
-
BVA+ - A Bit
Vectors Algorithm for Accelerating Queries in Multilevel Secure
Databases.
Proceedings of the Sixth International Conference on Enterprise
Information Systems (ICEIS 2004). Porto, Portugal. April 2004.
-
ADD: Arabic
Duplicate Detector – A Duplicate Detection Data Cleansing Tool.
Proceedings of the ACS/IEEE International Conference on Computer
Systems and Applications (AICCSA 2003). Tunisia, Tunisia. July
2003.
-
Neuro-Classification
for Handwritten Arabic Text.
Proceedings of the ACS/IEEE International Conference on Computer
Systems and Applications (AICCSA 2003). Tunisia, Tunisia. July
2003.
-
An
Auto-Indexing System for Arabic Information Retrieval.
Proceedings of the IASTED International Conference on Applied
Informatics (AI 2003). Innsbruck, Austria. February 2003.
-
ABJAD:An
Off-Line Arabic Handwritten Recognition System.
Proceedings of the 2002 International Arab Conference on
Information Technology (ACIT'2002). Doha, Qatar. December 2002.
-
Segmenting
Handwritten Arabic
Text.
Proceedings of the International Conference on Computer Science,
Software Engineering, Information Technology, e-Business, and
Applications (CSITeA’02). Foz do Iguazu, Brazil. June 2002.
-
A
Bit Vectors Algorithm for Accelerating Queries in Multilevel
Secure Databases.
Proceedings of the International Conference on Computer Science,
Software Engineering, Information Technology, e-Business, and
Applications (CSITeA’02). Foz do Iguazu, Brazil. June 2002.
-
Iterative
Querying in Web-Based Database Applications.
Proceedings of the 17th ACM Symposium on Applied
Computing (SAC 2002). Madrid, Spain. March 2002.
-
A Neuro-Heuristic
Approach for Segmenting Handwritten Arabic Text.
Proceedings of the ACS/IEEE International Conference on Computer
Systems and Applications (AICCSA 2001). Beirut, Lebanon. June
2001.
-
Regression Testing
of Database Applications.
Proceedings of the 16th
ACM Symposium on Applied Computing (SAC 2001). Las Vegas, USA.
March 2001.
-
Transaction
Acceleration in Secure Database Systems.
Proceedings of the 13th National Conference on Computer
Applications in Industry and Engineering (CAINE-2000). Honolulu,
Hawaii, USA. November 2000.
-
Accelerating
Queries in Multilevel Secure Database Systems.
Proceedings of
the 10th International Conference on Computing and Information
ICCI ‘2000, Kuwait, November 18-21, 2000. (Proceedings not
published yet!)
-
A PERF Solution for
Distributed Query Optimization.
Proceedings of the ISCA 15th International Conference on Computers
and Their Applications. Louisiana, USA. March 2000.
-
Database Software
Metrics for Small Database Applications.
Proceedings of the 15th ACM Symposium on Applied
Computing. Como, Italy. March 2000.
-
Distributed Query
Optimization Using PERF Joins.
Proceedings of the 15th ACM Symposium on Applied
Computing. Como, Italy. March 2000.
-
A Security Policy
Manager for Multilevel Secure Object Oriented Database Management
Systems.
Proceedings of the International Conference on Applied Modelling
and Simulation. Cairns - Queensland, Australia. September 1999.
-
C2 Secure Database
Management Systems – A Comparative Study.
Proceedings of the ACM
Symposium on Applied Computing. San Antonio, Texas. March 1999.
-
A Concurrency
Control Model for Multilevel Secure Object-Oriented Databases.
Proceedings of the Mid-Content Conference on Information and
Database Systems. Fargo, ND. May 1994.
-
Secure Transaction
Management and Query Processing in Multilevel Secure Database
Systems.
Proceedings of the Symposium on Applied Computing. Phoenix, AZ.
April 1994.
-
Transaction
Processing in Multilevel Secure Replicated Databases. Proceedings of the Mid-Continent Information Systems Conference.
Fargo, ND. May
1993.
-
OOHYDRO:
A Heterogeneous Distributed Database System for Object-Base and Database Interoperability. Proceedings of the Mid-Continent
Information Systems Conference. Fargo, ND. May 1993.
-
Multilevel Security
in Multidatabase Systems.
Proceedings of the Small College Computing Symposium. Cedar
Rapids, IA. April 1993.
-
Integrating
Knowledge Based Systems in Heterogeneous Distributed Databases.
Proceeding of the International Conference on Computer
Applications in Design, Simulation and Analysis. Washington, DC.
March 1993.
-
Transaction
Management in Multilevel Secure Database Management Systems.
International Conference on Mathematical Modelling and Scientific
Computing in Science and Technology. College Park, MD. April 1993.
-
Concurrency Control
and Recovery in Multilevel Secure Replicated Databases
(short paper). AAAI-IEEE-ACM-ISMM-International Conference of
Information and Knowledge Management. Baltimore, MD. November
1992.
Local Conferences :
-
Eye2See: A Mobile Surveillance System for Pocket PCs.
Proceedings of the International Conference on Research Trends in Science and Technology. Beirut, Lebanon. March 2005.
-
GISMO: A
Geographical Information System for a Municipality Office.
Proceedings of the International Conference on Research Trends
in Science and Technology. Beirut, Lebanon. March 2002.
-
MLS/ERD: A Tool for
Building Multilevel Secure Entity Relationship Diagrams.
Proceedings of the International Conference on Research Trends in
Science and Technology. Beirut, Lebanon. March 2002.
-
Factory Simulation.
Proceedings of the 14th Science Meeting (Book of
Abstracts) – 2000 – organized by the National Council for
Scientific Research and the Lebanese Association for the
Advancement of Science. Beirut, Lebanon. November 2000.
-
Routing Journal
Operations on Disk using Striping with Parity.
Proceedings of the International Conference on Research Trends in
Science and Technology (RTST). Lebanese American University.
Beirut, Lebanon. March 2000.
-
Query Optimization
in Distributed Databases.
Proceedings of the 13th Science Meeting (Book of
Abstracts) – 1999 – organized by the National Council for
Scientific Research and the Lebanese Association for the
Advancement of Science. Beirut, Lebanon. November 1999.
-
Using WebSQL to
Query the World Wide Web.
Proceedings of the International Conference on Scientific
Computations – Beirut, Lebanon. March 1999.
Technical Reports :
1.
Final
Evaluation Report – Novell Incorporated Netware 4 Trusted Network
System Design.
National Computer Security Centre. CSC-EPL-98/XX. 1998.
2.
Final
Evaluation Report - Sybase SQL Server and Secure SQL Server.
National Computer Security Centre. CSC-EPL-97/01. 1997.
3.
Security
Testing and Evaluation Report of the Operational Flight Program
Build System for the F-22 Weapon System.
July
1997.
4.
Security
Testing and Evaluation Report of the Integrated Maintenance
Information System for the F-22 Weapon.
May 1997.
5.
Final
Evaluation Report - Informix Online/Secure. National Computer Security Centre CSC-EPL-96/xx. 1996.
6.
Technical
Assessment of the IBM OS/2 Warp Operating System.
August 1996.
7.
Final
Evaluation Report
- IBM AS/400 System. National Computer Security Centre
CSC-EPL-95/13. 1995.
8.
Transaction Management in Multilevel Secure Database Management
Systems. (NDSU-CS-TR-92-07).
1992.
9.
Concurrency Control and Recovery in Multilevel Secure Replicated
Databases. (NDSU-CS-TR-92-15).
1992.
10.
MLS-ROLL:
Concurrency Control Object for Multilevel Secure Replicated
Databases. (NDSU-CS-TR-92-16).
1992.
11.
Optimal
Transaction Processing in Replicated Multilevel Secure Databases.
(NDSU-CS-TR-91-17).
1991.
Others :
-
Issues in
Integrating Trusted Products in Real-Word Applications. Data Security Letter June 1995.
-
Multilevel Secure
System Engineering. Data Security Letter. September 1994.
-
An Optimal
Transaction Processing Protocol for Multilevel Secure Replicated
Databases.
Poster Session at the 1992 IEEE Symposium in Security and
Privacy. Oakland, CA. May 1992.
-
Transaction
Management in Multilevel Secure Database Management Systems.
Ph.D. Dissertation. North Dakota State University. November 1992.
-
Optical Fibre
Communication Systems: Theory and Practice.
M.S. Thesis. Minnesota State University. July 1989.
|