Patents

 

  1. M. Abu-Amara, F. Abdulhameed, F. Azzedin, A. Mahmoud, and M. Sqalli, “Peer-to-Peer DNS Network Method US Patent # 8,612,618 (also published as US20130111049), 2013.

  2. M. Abu-Amara, “Method of Reducing the Rate of Registration in CDMA-based Mobile Networks US Patent # 7,769,380, 2010.

  3. M. Abu-Amara, S. Sides, A. Jalali, J. Boppana, S. Doctor, “CDMA Inter-Mobile Switching Center Soft Hand-Off US Patent # 6,173,183, 2001, US Patent # 5,930,714, 1999, World Intellectual Property Organization # WO/1998/018282, 1998.

Journal Publications

 

  1. M. Al-Asli, M. Elrabaa, and M. Abu-Amara, “FPGA-Based Symmetric Re-Encryption Scheme to Secure Data Processing for Cloud-Integrated Internet of ThingsIEEE Internet of Things Journal, Aug. 2018, Accepted.

  2. A. Shawahna, M. Abu-Amara, A. Mahmoud, and Y. Osais, “EDoS-ADS: An Enhanced Mitigation Technique against Economic Denial of Sustainability (EDoS) AttacksIEEE Transactions on Cloud Computing, Feb. 2018, Accepted.

  3. M. Elrabaa, M. Al-Asli, and M. Abu-Amara, “Secure Computing Enclaves Using FPGAsIEEE Transactions on Dependable and Secure Computing, Jan. 2018, Under Review.

  4. A. Mahmoud, A. Abo Naser, M. Abu-Amara, T. Sheltami, and N. Nasser, “Software Defined Networking Approach for Enhanced Evolved Packet Core NetworkInternational Journal of Communication Systems, Vol. 1, Issue 1, Jan. 2018.

  5. M. Sqalli, S. Alsowail, M. Abu-Amara, Z. Baig, and K. Salah, “An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the CloudArabian Journal for Science and Engineering (AJSE), pp. 1–11, 2015.

  6. M. Abu-Amara, “A Combined Solution for the Internet Access Denial Caused by Malicious ISPsJournal of Security and Communication Networks (SCN), John Wiley, Volume 7, Issue 11, pp. 2078–2095, October 2014.

  7. M. Sqalli, S. Firdous, K. Salah, and M. Abu-Amara, “Classifying Malicious Activities in Honeynets using Entropy and Volume-based ThresholdsJournal of Security and Communication Networks (SCN), John Wiley, Volume 6, Issue 5, pp. 567–583, May 2013.

  8. M. Abu-Amara, A. Al-Baiz, A. Mahmoud, M. Sqalli, and F. Azzedin, “A Scalable NAT-Based Solution to Internet Access Denial by Higher-tier ISPsJournal of Security and Communication Networks (SCN), John Wiley, Volume 6, Issue 2, pp. 194–209, February 2013.

  9. A. Mahmoud, A. Alrefai, M. Abu-Amara, M. Sqalli, and F. Azzedin, “Qualitative analysis of methods for circumventing malicious ISP blockingArabian Journal for Science and Engineering (AJSE), Volume 37, Issue 7, pp. 1911–1928, October 2012.

  10. S. Mahmoud and M. Abu-Amara, “The use of Radon Transform in Handwritten Arabic (Indian) Numerals RecognitionWSEAS Transactions on Computers, Volume 9, Issue 3, pp. 252–267, March 2010.

  11. T. Sheltami, A. Mahmoud, M. Abu-Amara, “An Ad hoc Wireless Sensor Network for Telemedicine ApplicationsArabian Journal for Science and Engineering (AJSE), Volume 32, No. 1B, pp. 131-143, April 2007.

  12. T. Sheltami, A. Mahmoud, M. Abu-Amara, “Telecare Monitoring System Based on Wireless Sensor Network,” International Journal of Computer Science and Network Security, Vol. 5, No. 12, pp. 66-74, December 2005.

  13. H. Sayeed, M. Abu-Amara, H. Abu-Amara, “Optimal Asynchronous Agreement and Leader Election Algorithm for Complete Networks with Byzantine Faulty Links,” Distributed Computing, Vol. 9, Issue 3, pp. 147-156, 1995.

  14. S. Sarwar and M. Abu-Amara, “Functional Languages: A Performance Study,” Journal of Systems and Software, Volume 20, Number 2, pp. 163-167, February 1993.

Conference Publications

 

  1. A. Al-Ghadhban, A. Mahmoud, M. Abu-Amara, F. Azzedin, and M. Sqalli, “Interdomain Traffic Engineering Techniques to Overcome Undesirable Connectivity Incidents,” Proceedings of the 11th IFIP International Conference on Network and Parallel Computing (NPC), pp. 618-622, Ilan, Taiwan, September 18-20, 2014.

  2. A. Al-Ghadhban, M. Abu-Amara, “Prototyping and Evaluating a Tunnel-Based Solution to Circumvent Malicious IISP Blocking,” Proceedings of the 2012 International Conference on Communications and Information Technology (ICCIT), pp. 286-290, Hammamet, June 26-28, 2012.

  3. A. Al-Ghadhban, A. Mahmoud, M. Abu-Amara, F. Azzedin, and M. Sqalli, “Prototyping and Evaluating BGP-Based Solutions to Overcome Malicious IISP Blocking,” Proceedings of the 2011 International Conference on Networking and Information Technology (IPCSIT), Vol. 17, pp. 134-143, Singapore, November 25-27, 2011.

  4. M. Abu-Amara, M. Asif, M. Sqalli, A. Mahmoud, and F. Azzedin, “Resilient Internet Access Using Tunnel-Based Solution for Malicious ISP Blocking,” Proceedings of the 3rd IEEE International Conference on Communication Software and Networks, pp. 85-89, Xi’an, China, May 27-29, 2011.

  5. M. Abu-Amara, F. Azzedin, F. Abdulhameed, A. Mahmoud, and M. Sqalli, “Dynamic Peer-to-Peer (P2P) Solution to Counter Malicious Higher Domain Name System (DNS) Nameservers,” Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, pp. 001014-001018, Niagara Falls, Ontario, Canada, May 8-11, 2011.

  6. A. Al-Baiz, M. Abu-Amara, A. Mahmoud, M. Sqalli, and F. Azzedin, “Internet Access Denial by Higher-tier ISPs: A NAT-Based Solution,” Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, pp. 001004-001008, Niagara Falls, Ontario, Canada, May 8-11, 2011.

  7. M. Sqalli, S. Firdous, K. Salah, and M. Abu-Amara, “Identifying Network Traffic Features Suitable for Honeynet Data Analysis,” Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, pp. 001044-001048, Niagara Falls, Ontario, Canada, May 8-11, 2011.

  8. M. Asif and M. Abu-Amara, “Resilient Internet Access for KSA using Tunnel-Based Solution,” Second Scientific Conference for Graduate and Undergraduate Students, Jeddah, Kingdom of Saudi Arabia, 28-31 March, 2011.

  9. A. Mahmoud, A. Al-Helali, M. Abu-Amara, T. Al-Kharobi, T. Sheltami, “Comparative Performance Study for Integrated 3G/WLAN Networks Using Mobile IP, SIP, and m-SCTP Protocols,” Proceedings of the 2010 IEEE 71st Vehicular Technology Conference (VTC 2010-Spring) , pp. 1-5, May 2010.

  10. F. Abdulhameed and M. Abu-Amara, “Dynamic Round-Robin P2P DNS to Improve Internet Access Resiliency at KSA,” First Scientific Conference for Graduate and Undergraduate Students, p. 96, Riyadh, March 2010.

  11. S. Mahmoud and M. Abu-Amara, “Recognition of Handwritten Arabic (Indian) Numerals using Radon-Fourier-based Features,” Proceedings of the 9th WSEAS International Conference on Signal Processing, Robotics and Automation, pp. 158-163, Cambridge, UK, February 2010.

  12. M. Abu-Amara, A. Mahmoud, T. Sheltami, A. Al-Shahrani, K. Al-Otaibi, S.M. Rehman, T. Anwar, “Performance of UMTS/WLAN Integration at Hot-Spot Locations Using OPNET,” Proceedings of 4th IEEE-GCC Conference, 5 pages, Bahrain, November 11-14, 2007.

  13. S. Asadullah, A. Mahmoud, M. Abu-Amara, T. Sheltami, “Vertical Handoff Characterization for SIP and mSCTP Based UMTS-WLAN Integration Solutions,” Proceedings of 4th IEEE-GCC Conference, 5 pages, Bahrain, November 11-14, 2007.

  14. T. Landolsi and M. Abu-Amara, “CDMA Access Channel Performance under Idle–Mode Ping–Pong Effect in Inter–MSC Handoffs,” Proceedings of the 3rd International Symposium on Wireless Communication Systems (ISWCS), pp. 584-586, Valencia, Spain, September 5–8, 2006.

  15. M. Abu-Amara, S. Sait, Abdul Subhan, “A Heuristics Based Approach for Cellular Mobile Network Planning,” Proceedings of the 2006 International Wireless Communications & Mobile Computing Conference, p. 79, Vancouver, Canada, July 3–6, 2006.

  16. A. Mahmoud, M. Abu-Amara, T. Sheltami, E. Rahman, J. Jaffar, “WLAN Integration For Future Generation Mobile Network Operators – A Case Study,” Proceedings of 18th National Computer Conference (NCC 18), pp. 47-54, Riyadh - Saudi Arabia, March 26-29, 2006.

  17. T. Sheltami, A. Mahmoud, M. Abu-Amara, “Warning and Monitoring System using Sensor Networks,” Proceedings of 18th National Computer Conference (NCC 18), pp. 63-68, Riyadh - Saudi Arabia, March 26-29, 2006.

  18. A. Mahmoud, T. Sheltami, M. Abu-Amara, “Wireless Sensor Network Implementation for Mobile Patient,” Proceedings of 3rd IEEE-GCC Conference, Bahrain, March 19-22, 2006.

  19. A. Mahmoud and M. Abu-Amara, “Performance of Inter-Base Station Soft Handoff for 3G CDMA Networks,” Proceeding of the First International Conference on Modeling, Simulation and Applied Optimization, Sharjah, U.A.E., February 2005.

  20. M. Abu-Amara, “Minimum Traffic Inter-BS SHO Boundary Selection Algorithm for CDMA-Based Wireless Networks,” Proceedings of the 2004 IEEE Radio and Wireless Conference, pp. 51-53, Atlanta, Georgia, September 2004.

  21. M. Abu-Amara, “Asynchronous Failure Location Algorithm for Fiber-Optic Networks,” Proceedings of the Seventh IEEE Symposium of Parallel and Distributed Processing, pp. 690-693, San Antonio, Texas, October, 1995.

  22. H. Sayeed, M. Abu-Amara, H. Abu-Amara, “Asynchronous Agreement and Leader Election Algorithms for General Networks with Byzantine Faulty Links,” Proceedings of the ISCA Eighth International Conference on Parallel and Distributed Computing Systems, pp. 177-182, Orlando, Florida, September, 1995.

  23. H. Sayeed, M. Abu-Amara, H. Abu-Amara, “Optimal Asynchronous Agreement Algorithm for Complete Networks with Byzantine Links,” Proceedings of the ISCA/IEEE Seventh International Conference on Parallel and Distributed Computing Systems, pp. 593-596, Las Vegas, Nevada, October, 1994.

  24. M. Abu-Amara and H. Abu-Amara, “Locating Switching Faults In General Synchronous Fiber-Optic Networks,” Proceedings of the ISCA/IEEE Seventh International Conference on Parallel and Distributed Computing Systems, pp. 761-766, Las Vegas, Nevada, October, 1994.