Mohammed Alani

Paper: MANET Security: A Survey

ABSTRACT

Mobile Ad hoc Networks are being adopted in more and more applications in our daily life. Mobile computing and mobile ad hoc networks in particular have become a daily need. As mobile ad hoc networks have been target for many attacks, the security of these networks has become an essential part of their existence. This paper provides a review of the current threats and how these threats are mitigated. The paper also discusses common attacks on mobile ad hoc networks and classifies these attacks in various classification types. The paper also discusses various countermeasures to mitigate the risks of attacks.

 

Citation Info:

Mohammed M. Alani, MANET Security: A Survey, published in the 4th IEEE International Conference on Control System, Computing, and Engineering, Penang, Malaysia, November 2014.

Full text available on IEEE Xplore on this link: http://dx.doi.org/10.1109/ICCSCE.2014.7072781

How to export Gantt chart from MS-Project 2010

I am not a “MS-Project” expert of any kind. Its just that a lot of my students need this, so I thought I would put it on the web for them as well as anyone else. Without wasting more time, here are the steps:

1. Mark all the rows in the WBS in MS-Project by clicking on the numbers on the side and sliding the pointer to the last row of project tasks.

1

2. Click on the small arrow next to “Copy” in the toolbar.

2

3. Click on “Copy Picture” from the small drop-down menu.

3

4. In the new window that is shown do the following:

a. Select “To GIF image file”

b. Select the location and the file name

c. Select “Selected Rows”

d. Select the proper dates for the start and end of your project. It is very important to select the correct dates that are used in the list or your Gantt Chart would not be complete.

e. Click on “OK”.

The file is now saved and can be easily added to your Word document.

4

Paper: Securing the Cloud against Distributed Denial of Service Attacks: A Review

ABSTRACT

Distributed denial of service attacks are becoming a serious threat that no business involved in providing services over the Internet can ignore. The rapidly growing frequency and magnitude in which these attacks are occurring is an alarming indicator. As cloud services are being adopted by many enterprises, the cloud infrastructure resilience to such attacks becomes a growing concern. In this paper, we discuss the types and possible impacts of DDoS attacks on cloud computing and the suggested mitigation techniques. These attacks were categorized into three categories; external, internal, and cloud-to-outside attacks.

 

Published in the Proceedings of the 2nd International Conference on Applied Information and Communication Technology, Muscat, Oman. 28-29 April, 2014.

Book: Guide to OSI and TCP/IP Models

  • Provides a simplified introduction to computer networks
  • Requires no prior background in the field
  • Discusses the fundamentals of the network, transport and application layers
This work opens with an accessible introduction to computer networks, providing general definitions of commonly used terms in networking. This is followed by a detailed description of the OSI model, including the concepts of connection-oriented and connectionless communications. The text carefully elaborates the specific functions of each layer, along with what is expected of protocols operating at each layer. Next, the journey of a single packet, from source to destination, is described in detail. The final chapter is devoted to the TCP/IP model, beginning with a discussion of IP protocols and the supporting ARP, RARP, and InARP protocols. The work also discusses the TCP and UDP protocols operating at the transport layer, and the application layer protocols HTTP, DNS, FTP, TFTP, SMTP, POP3, and Telnet. Important facts and definitions are highlighted in gray boxes found throughout the text.
Published: March, 2014 by Springer.
Guide to OSI and TCP/IP Model

Guide to OSI and TCP/IP Model

Develop research culture in the Arab Middle East

I wrote a letter to the Editor of the Communications of the ACM that was published in Issue 3/Vol 57 (March, 2014).

It was only 2002 when I first knew ACM even existed. I was preparing my master’s thesis in computer engineering in Iraq. I was so amazed I thought of ACM members as movie stars. Due to many circumstances, I did not have the honor of joining as a member until 2010. Having received my bachelor’s, master’s, and Ph.D. in the Middle East, I have always seen a gap, a large one, between the way research is conducted there on one side and in Europe and the U.S. on the other. This feeling has been enforced whenever I get a rejection letter for a paper sent to a big computer science conference or journal. Sometimes, unfortunately, reviewers have mocked and even ridiculed instead of provided a constructive review. This happened in the early stages of my own research, and, as I learned later, to many of my colleagues as well. In most cases, when I look at Arab scientists who have published in reputable conferences and journals, I see author names of those who have either studied abroad or are working abroad, many very successful with outstanding research records. What does this say?

The Arab Middle East needs a cultural revolution in terms of research, especially in computer science. The research mentality here is quite different from other areas of the world. This is not to say it is not scientifically valid, just that research here is conducted in a different way that needs to be formalized to conform to international standards. Many researchers in the Arab world have amazing potential. Unfortunately, that potential is not being unleashed until they go abroad.

I sincerely hope ACM takes the initiative in helping spread a valid and concrete academic research culture in the Arab world. We all aim for the same thing—improving the quality of life for ourselves and for the coming generations. The lack of tools and research culture should not prevent Arab computer scientists from contributing to the development of all humanity.

The letter can be found in here.

All feedback is welcomed.

Paper: Mathematical Approximation of Delay in Voice over IP

ABSTRACT

This paper introduces a novel method of approximate calculation of delay in voice over IP systems. The proposed method relies on mathematical operations like interpolation and integration to produce a continuous function. This continuous function shows the delay in different times. The paper shows a detailed example of applying this method successfully to a sample call. The resulting delay function can help in better understanding of the variations of delay in different times and how it is affected by network load.

Download

Citation Information:

Mohammed M. Alani, Mathematical Approximation of Delay in Voice over IP, International Journal of Computer and Information Technology (IJCIT), ISSN: 2279-0764, Vol. 3, Issue 1, pp. 78-82, January 2014.

How to Limit the Input of a Textbox of Windows Phone

Some time ago I have written about the keycode glitch. Other than this glitch, sometimes you might need to limit the scope of input to certain set of characters.Changing the inputscope of the keyboard helps alot. But, sometimes you need more specific filters. For example, if you’re expecting an all-numbers input and you use the “TelephoneNumber” keyboard, you’ll still be able to get “.” or other symbols. Another example is if you need to get an email address input which you would prefer to have in small letters.

Anyway, let’s get to the code. The code is simply one line. Lets assume that you have textbox name txtInput. You’ll just have to add the following code in the event handler of “KeyDown” for the txtInput control.

[crayon lang=”vb”]If “0123456789”.IndexOf(e.Key.ToString) = -1 Then e.Handled=True[/crayon]

This line limits the input of the textbox to the numbers 0 to 9. You can change the content between the qoutations into any range of acceptable input characters that you need.

I hope this helps.