أبحاث أعضاء الهيئة الأكاديمية 2011

  • # -----> #

1. Nabil M. Hewahi
"Rule-Based Knowledge Representation Inspired from Finite Automata " International Journal of Computer Application Vol. 19 

2. Nabil M. Hewahi
"Probabilistic Neural networks For Rule Based Systems " International Journal of Advanced Research in Computer Science Vol. 2, No. 2

3. Nabil M. Hewahi
"IT Education in The Palestinian Schools: How Far We are From the Advanced Countries ” University of Wales, UK 16-17 June, 2011 AROQA

4. Tawfiq S. M. Barhoom, Raed S. K. Rasheed
“Detection of XML Rewriting Attack: Enhance Inline Approach by Element Position”, Journal of Al-Azhar University series of natural Science.
Abstract: Web services communicates with each other using an
XML-based message, called Simple Object Access Protocol
SOAP message which has all XML document characteristics
including XML security.
The SOAP message has much vulnerability. One of the
vulnerabilities is modifying the SOAP message using
unauthorized access. This case is called XML rewriting attack.
Detecting the XML rewriting to ensure the security of SOAP
requested by inline approach has some limitations and
weaknesses. In this paper, we propose an enhancement of the
inline approach through the element position of SOAP message
elements using a tree-like structure, and implementation were
presented
Abstract- Web services communicates with each other using anXML-based message, called Simple Object Access ProtocolSOAP message which has all XML document characteristicsincluding XML security.The SOAP message has much vulnerability. One of thevulnerabilities is modifying the SOAP message usingunauthorized access. This case is called XML rewriting attack.Detecting the XML rewriting to ensure the security of SOAPrequested by inline approach has some limitations andweaknesses. In this paper, we propose an enhancement of theinline approach through the element position of SOAP messageelements using a tree-like structure, and implementation werepresented 

5. Tawfiq S. M. Barhoom, Raed S. K. Rasheed
"Position of Signed Element for SOAP Message Integrity", International Journal of Computer Information Systems, Vol. 2, No. 4, 2011
Abstract- Web service is one of the most rapidly developed technologies in the evolution. Web security service is an important matter that must be observed, especially at the level of communicating messages. Simple Object Access Protocol (SOAP) is the protocol used for communicating messages. We focus on the Integrity of SOAP messages. In this paper, we propose a new header in SOAP message containing the signed elements positions in the message. This header is added to the SOAP message after the detection of signed elements positions located in the Document Object Model (DOM) tree, an implementation was presented. 

6. Motaz K. Saad
“Arabic Text Classification: Text Preprocessing, Term Weighting and Morphological Analysis”, LAP LAMBERT Academic Publishing, ISBN 978-3-8443-1957-6, 2011. The book is available atMore Books ! and Amazon.

7. Motaz K. Saad and Ramzi M. Abed
“Distributed Data mining on Grid Environment”, International Journal of Computer Information Systems, Vol. 2, No.4,  

8. Alaa El-Halees.
" Information Technology Ethical Issues in Graduate Student Research", Gradate Studies Conference, Islamic University of Gaza, Gaza, Palestine 19-20 April 2011

9. Alaa El-Halees.
"Mining Opinions in User-Generated Contents to Improve Course Evaluation",  The Second International Conference on  Software Engineering and Computer Systems (ICSECS 2011) , Pahang, Malaysia, 27-29 June 2011-05-28.

10. Suhail Madoukh and Alaa El-Halees.
"Knowledge Discovery of Electricity Consumption and Payment Fulfillment", International Journal of Computer Information Systems, Vol. 2, No. 4, 2011

11. Tawfiq S. Barhoom and Sarah N. Kohail.
"A New Server-Side Solution for Detecting Cross Site Scripting Attack", International Journal of Computer Information Systems,Vol. 3, No. 2, 2011
Abstract— Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. Cross Site Scripting (XSS) is one of the most common web application vulnerabilities in which an attacker causes a victim’s browser to execute JavaScript from the attacker with the privileges of a trusted host. Most existing approaches to finding XSS vulnerabilities have not been applied in a universal manner, because of their deployment overhead and the poor understanding of XSS problems. In our paper we propose a new server side solution to detect and block XSS attack. Using the Extensible Markup Language (XML) and XML Schema Definition (XSD) our solution enforces the input type integrity by preventing untrusted user input from altering the structure of the trusted code through the execution life time of the web application. At the end of the paper we apply a set of extermination to support our idea proposed. The results show that our solution can detect any injected script breaks the input schema rules. 

12. Tawfiq S. Barhoom and Eyad ElShami.
"Detecting WLANs' DoS Attacks Using Backpropagate Neural Networkk", Journal of Al Azhar University-Gaza (Natural Sciences), 2011, 13 : 83-92
 Abstract- During evaluation stages IEEE 802.11 wireless networks (WLANs) there are many vulnerabilities including service availability security issues, Denial-of-Service (DoS) attacks which are the most dangerous for the WLANs’ availability . MAC frame contains useful features for detecting the DoS attacks. In this paper, a backpropagate neural network (BNN) has been used as a model for anomaly-based intrusion detection system for the wireless networks. We setup experiments for four different DoS attacks, the accuracy of the BNN model is too close to 100% and the false negative and the false positive rates are very small