






|
|
Dr. Mohammed Houssaini Sqalli
 |
Research Interests
 |
Network Security, Cloud
Computing, Network Design & Management, Traffic Engineering, and
Iterative Heuristics. |
|
 |
Patents
 |
M. Abu-Amara, F. Abdulhameed, F. Azzedin, A. Mahmoud, and M.
Sqalli,
“Peer-to-Peer DNS Network Method,” US Patent Office Docket No.
32185.89, Accepted for Issuance, May 02, 2013. |
 |
M. Abu-Amara, M. Asif, M. Sqalli, A. Mahmoud, and F. Azzedin,
“Tunneling-Based Solution to Bypass Internet Access Denial by
Higher-tier Internet Service Providers,” US Patent Office Docket No.
32185.83, Patent Pending, November 22, 2011. |
 |
M. Abu-Amara, A. Al-Baiz, A. Mahmoud, M. Sqalli, and F.
Azzedin,
“Network Address Translation-Based Method of Bypassing Internet
Access Denial,” US Patent Office Docket No. 33000.46, Patent
Pending, May 14, 2012. |
|
 |
Professional
Activities
 |
Guest Co-Editor of the
Special Issue on: "Recent Advances in Network Security Attacks and
Defences" by the International Journal of Internet Protocol
Technology (IJIPT), June-November 2009. |
 |
Member
of the Program Committee of the 4th FTRA International
Conference on Computer Science and its Applications (CSA-12), Jeju,
Korea, November 22-25, 2012. |
 |
Member
of the Program Committee of the 4th IEEE International
Symposium on UbiSafe Computing Liverpool, UK, 25-27 June, 2012. |
 |
Member
of the Program Committee of the 3rd IEEE International
Symposium on UbiSafe Computing (UbiSafe 2011), Changsha, China,
November 16-18, 2011. |
 |
Member
of the Security Theme Program Committee of the International
Conference on Privacy, Security and Trust (PST2011), Montreal,
Quebec, Canada, July 19-21, 2011. |
 |
Member
of the International Technical Advisory Committee of the 4th
IEEE GCC Conference, Manama, Bahrain, November 11-14, 2007. |
 |
Member
of the Technical Program Committee of the IEEE Global Information
Infrastructure Symposium (GIIS '2007), Marrakech, Morocco, July 2-6,
2007. |
 |
Member
of the International Program Committee of the 3rd
International Conference on Information Technology (ICIT 2007),
Amman, Jordan, May 9-11, 2007. |
 |
Member
of the Technical Program Committee of the 8th
International Symposium on System and Information Security
(SSI´2006), Sao Jose dos Campos, Sao Paulo, Brazil, November 08-10,
2006. |
 |
Member
of the Board of Reviewers for the 13th International
Conference on Telecommunications (ICT-2006), Funchal, Madeira
Island, Portugal, May 9-12, 2006. |
|
 |
PhD/Masters Theses Supervision
 |
Fahd Abdulsalam Mohammad Al-Haidari, “Modeling and Mitigation of
Economic Denial of Sustainability (EDoS) Attacks in Cloud
Computing”,
PhD in Computer Science & Engineering, KFUPM. Defended in November
2012. |
 |
Muhammad Shoieb Arshad, “Identifying Malicious Activities in
Honeynets using Clustering”,
M. Sc. in Computer Networks, College of Computer Science &
Engineering, KFUPM. Defended in May 2012. |
 |
Syed Naeem Firdous, "Anomaly Detection Technique for Honeynet Data
Analysis",
M. Sc. in Computer Networks, College of Computer Science &
Engineering, KFUPM. Defended in January 2011. |
 |
Mohammed Moinuddin Rizwan Farooqi, "Adapting Tabu Search to
Accommodate Online demand variations in a Data Network",
M. Sc. in Computer Engineering, College of Computer Science &
Engineering, KFUPM. Defended in May 2010. |
 |
Louai A. Al-Awami, "A Framework for Reliable and Fault-Tolerant
Network Management Architecture",
M. Sc. in Computer Engineering, College of Computer Science &
Engineering, KFUPM. Defended on May 17th, 2006. |
 |
Mohammed Aijaz Mohiuddin,
"Optimizing
weights for OSPF to improve utilization using modern heuristics",
M. Sc. in
Computer Networks,
College of Computer Science & Engineering, KFUPM. Defended on
September 21, 2005. |
 |
Shaik Sirajuddin, "Extensions
to XML-based Network Management",
M. Sc. in
Computer Engineering,
College of Computer Science & Engineering, KFUPM. Defended on March
9, 2005. |
|
 |
Masters Theses Committees
 |
Mahmoud Salman Jassem Al-Saba, “Two Layers Peer-To-Peer (P2P) Domain
Name System (DNS)”,
M. Sc. in Computer Networks, College of Computer Science &
Engineering, KFUPM. Defended in February 2013. |
 |
Amer Mohammed Al-Ghadhban, "
Prototyping and Evaluating the BGP-Based Solutions to Overcome
Malicious IISP Blocking ",
M. Sc. in Computer Networks, College of Computer Science &
Engineering, KFUPM. Defended in December 2011. |
 |
Mohammed Abdul Khadir Khan Asif, "Tunneling Based Solution to Bypass
Internet Access Denial by International Internet Service Providers",
M. Sc. in Computer Engineering, College of Computer Science &
Engineering, KFUPM. Defended in December 2010. |
 |
Fahd Abdulhameed, "Dynamic Round-Robin Peer-To-Peer (P2P) Domain
Name System (DNS)",
M. Sc. in Computer Networks, College of Computer Science &
Engineering, KFUPM. Defended in November 2010. |
 |
Jamil Mohammed Ahmed Hamodi, "Deploying Triple-Play Services over
Existing IP Networks",
M. Sc. in Computer Networks, College of Computer Science &
Engineering, KFUPM. Defended in June 2010. |
 |
Abdulaziz Al-Baiz, "Bypassing Internet Denial By International ISPs
Using NAT Networks",
M. Sc. in Computer Engineering, College of Computer Science &
Engineering, KFUPM. Defended in April 2010. |
 |
Ahmad Salam A. L. Al-Refai, "BGP Based Solution for International
ISP Blocking",
M. Sc. in Computer Engineering, College of Computer Science &
Engineering, KFUPM. Defended in December 2009. |
 |
Karim Asif Sattar, "A Potential DoS Attack Against Network
Firewalls",
M. Sc. in Information and Computer Science, College of Computer
Science & Engineering, KFUPM. Defended in June 2008. |
 |
Muhamad Khaled Alhamwi, "Performance Evaluation of a Hybrid
Interrupt-Handling Scheme with Multiple Network Interfaces & SMP
Configurations",
M. Sc. in Computer Networks, College of Computer Science &
Engineering, KFUPM. Defended in June 2008. |
 |
Ahmad Ridha, "Analysis and classification of Reputation Systems in
Peer-to-Peer Networks",
M. Sc. in Information and Computer Science, College of Computer
Science & Engineering, KFUPM. Defended in May 2008. |
 |
Syed Asadullah, "Optimization of Metrics in OSPF/IS-IS Routing Using
Accelerated Iterative Heuristics",
M. Sc. in Computer Networks, College of Computer Science &
Engineering, KFUPM. Defended on November 24th, 2007. |
 |
Bilal Hussein Hasan AbuQadous, "A Study on Cross-Layer Optimization
for TCP over Wireless Networks",
M. Sc. in Computer Engineering, College of Computer Science &
Engineering, KFUPM.
Defended on May 14th, 2007. |
 |
Abdul-Subhan
Abdul-Majid,
"Designing
Cellular Mobile Network Using Modern Heuristics",
M. Sc.
in Computer Networks,
College of Computer Science & Engineering, KFUPM. Defended on June
1, 2005. |
 |
Itrat
Rasool Quadri, "Measurement-based
Comparison between VoIPoMPLS and VoIP using Software Routers",
M. Sc. in
Computer Networks,
College of Computer Science & Engineering, KFUPM. Defended on
October 2, 2004. |
|
|