Subscribe:

Publications


·    Masum Rahman, Cheng-Hsin Hsu, Ahmad Hassan, and Mohamed Hefeeda, Energy-Aware and Bandwidth-Efficient Hybrid Video Streaming Over Mobile Networks, IEEE Transactions on Multimedia, 18(1):102—115, January 2016.
·    Mohammed Alkurbi, Ahmad Hassan, and Mohamed Hefeeda, Detection of Botnets Mounted on the Session Initiation Protocol, Technical Report, August 2013.
·    HASSAN, A., BHRAM, A.: Enhancing the Security of Biometric Systems on View of BioFM. 1st Taibah University International Conference on Computing and Information Technology (ICCIT), Madina, KSA, 2012.
·    HASSAN, A., BHRAM, A., SALEH, A.: Applying a New Functional Model to Improve the Security of Biometric Systems. 2011 International Conference on Information and Computer Networks (ICICN), Guiyang, China, Jan., 2011.
·    HASSAN, A., BAHGAT, W.: A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms. Journal of electrical Engineering, ISSN 1335-3632, issue no. 1, vol. 61, 2010.
·    HASSAN, A., BAHGAT, W.: EOrBAC Based Active Directory Management. The 2nd International Conference on Advanced Computer Theory and Engineering (ICACTE 2009), Cairo, Egypt, Sept., 2009.
·    HASSAN, A., BAHGAT, W.: A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms. The 7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-2009), Rabat, Morocco, May, 2009.
·    HASSAN, A., BAHGAT, W., IBRAHIM, A.: EOrBAC Based Network Security Management Toolkit. The Sixth IEEE and IFIP International Conference on Wireless and Optical Communications Networks (WOCN2009), Cairo, Egypt, April, 2009. 
·    HASSAN, A., ELNAKIB, A., ABOEL-SOUD, M.: FPGA-Based Neuro-Architecture Intrusion Detection System. The 2008 International Conference on Computer Engineering & Systems (ICCES’08), Cairo, Egypt, November, 2008. 
·    HASSAN, A., ELNAKIB, A., ABOEL-SOUD, M.: FPGA-Based Neuro-Architecture that can Detect Novel Attacks. Al-Azhar Engineering nineth International Conference, Cairo, Egypt. 2007. 
·    HASSAN, A., HUDEC, L.: Management and Verification of Firewall and Router Access Lists. Computers and Artificial Intelligence Journal, vol. 23, No. 1, 2004.-pp. 77-100.
·    HASSAN, A., HUDEC, L.: Role Based Network Security Model: A Forward Step towards Firewall Management. Workshop on Security of Information Technology, WSTI03, 8th – 10th of December 2003.
·    HASSAN, a.: Algorithms for Verifying Firewall and Router Access Lists. The 46th IEEE International Midwest symposium on Circuits and systems, MWSCASC, 27th – 30th of December 2003.
·    HASSAN, A., HUDEC, L.: Host Based Role Based Network Security Model. In: 5th International Scientific Conference "Electronic Computer and Informatics 2002": Košice, Slovak Republic, 10.-11.10.2002. - pp. 256-261.
·    HASSAN, A.: Host Based Role Based Network Security Model. In: 4th Scientific Conference on Electrical Engineering and Information Technology, Bratislava, Slovak Republic, 29.11.2001. - pp. 66-68.