.

Recently added

LAUR Repository

SoAS - Scholarly Publications: Recent submissions

  • Charpentier, Robert; Debbabi, Mourad; Mourad, Azzam; Laverdiere, Marc-Andre; SAS; 200904853; Computer Science and Mathematics; azzam.mourad@lau.edu.lb; Lebanese American University
    In today's computing world, security takes an increasingly predominant role. The industry is facing challenges in public confidence at the discovery of vulnerabilities and customers are expecting security to be delivered ...
  • Mourad, Azzam; Abdel Wahab, Omar; Bentahar, Jamal; Otrok, Hadi; SAS; 200904853; Computer Science and Mathematics; azzam.mourad@lau.edu.lb; Lebanese American University
    With the advent of cloud computing and the rapid increase in the number of deployed services, the competition between functionally-similar Web services is increasingly governing the markets of services. For example, Amazon ...
  • Mourad, Azzam; Tout, Hanine; Talhi, Chamseddine; Otrok, Hadi; Yahyaoui, Hamdi; SAS; 2009004853; Computer Science and Mathematics; azzam.mourad@lau.edu.lb; Lebanese American University
    With lot of hype surrounding policy-based computing, XACML (eXtensible Access Control Markup Language) has become the widely used de facto standard for managing access to open and distributed service-based environments ...
  • CEAP 
    Mourad, Azzam; Abdel Wahab, Omar; Otrok, Hadi; Bentahar, Jamal; SAS; 200904853; Computer Science and Mathematics; azzam.mourad@lau.edu.lb; Lebanese American University
    The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. Detecting such attacks has attracted several contributions in the past ...
  • Haraty, Ramzi; Perrizo, William; Hakimzadeh, Hossein; Panda, B.; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    Much attention is being directed toward the development of secure database systems, which are critical for both military and sensitive commercial applications. Most research in security and multilevel secure database ...
  • Nasser, Selim; Ghanem, Hadi; Abi-Habib, Ralph J.; Bekdash, Amira; Darwish, Manal; Timsah, Zahra; Najjar, Vicky; Ghosn, Marwan; El-Hajj, Hiba; Bazerbachi, Ali; Liu, Shihui; Leppla, Stephen H.; Frankel, Arthur E.; Kassab, Elias; SOM; SOA; 200804624; 201306055; 200901419; N/A; selim.nasser@lau.edu.lb; hady.ghanem@lau.edu.lb; ralph.abihabib@lau.edu.lb; Lebanese American University
    In this study, we attempt to target both the urokinase plasminogen activator and the mitogen-activated protein kinase pathway in acute myeloid leukemia (AML) cell lines and primary AML blasts using PrAgU2/LF, a urokinase-activated ...
  • KB-HYDRO 
    Haraty, R.; Perrizo, W.; Ram, P.; Panda, B.; Kodali, P.; Goli, V.; Kaliappan, S.; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    In this paper we describe a heterogeneous knowledge base management system which is being designed and developed at North Dakota State University with support from IBM Rochester, MN. The system is called KB-HYDRO. It will ...
  • Haraty, Ramzi; Mansour, Nashat; Abiad, Sanaa; SAS; 199729410; 198629170; Computer Science and Mathematics; rharaty@lau.edu.lb; nmansour@lau.edu.lb; Lebanese American University
    Known software metrics for estimating complexity and effort are usually based on lines of code or the program’s flow graph. Such metrics are suitable for large-scale procedural or object-oriented software applications, but ...
  • Haraty, Ramzi A.; Lytras, Miltiadis D.; Al-Halabi, Wadee; Xi Zhang, Jacky; Masud, Mehedi; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    The last years we faced a tremendous development of social media powered by innovative technologies related to web services, web 2.0 and social networks. Nowadays we are entering in to the next digitally enriched generation ...
  • Haraty, Ramzi A.; Kaddoura, Sanaa; Zekri, Ahmed; Masud, Mehedi; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    In a distributed mobile e-health care system, e-health service providers exchange data on the fly in response to user queries without any centralized control. Local databases in e-health service providers might be intercepted ...
  • Haraty, Ramzi A.; Dimishkieh, Mohamad; Masud, Mehedi; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    The huge amounts of data generated by media sensors in health monitoring systems, by medical diagnosis that produce media (audio, video, image, and text) content, and from health service providers are too complex and ...
  • Haraty, Ramzi A.; Zantout, Bassam; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical ...
  • Haraty, Ramzi A.; Zantout, Bassem; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    The paper introduces a new collaborative technique for assuring data integrity while avoiding traffic analysis and other types of similar attacks (e.g., man-in-the-middle, data source fingerprinting, etc.). The new ...
  • Haraty, Ramzi A.; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    Providing and managing e-health data from heterogeneous and ubiquitous e-health service providers in a content distribution network (CDN) for providing e-health services is a challenging task. A content distribution network ...
  • Haraty, Ramzi A.; El Sai, Mohamed; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    The age of Internet technology has introduced new types of attacks to new assets that did not exist before. Databases that represent information assets are subject to attacks that have malicious intentions, such as stealing ...
  • Haraty, Ramzi A.; Mansour, Nashat; Moukahal, Lama; Khalil, Iman; SAS; 199729410; 198629170; Computer Science and Mathematics; rharaty@lau.edu.lb; nmansour@lau.edu.lb; Lebanese American University
    Regression testing is important for maintaining software quality. However, the cost of regression testing is relatively high. Test case prioritization is one way to reduce this cost. Test case prioritization techniques ...
  • Haraty, Ramzi A.; Zeitunlian, Arda; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    With the advancement of Internet technology, securing information systems from electronic attacks have become a significant concern. With all the preventive methods, malicious users still find new methods that ...
  • Haraty, Ramzi A.; Zbib, Mirna; Masud, Mehedi; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    In a data sharing system in a cloud computing environment, such as health care system, peers or data sources execute transactions on-the-fly in response to user queries without any centralized control. In this case ...
  • Haraty, R. A.; El-Zabadani, H. M.; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    The authors present a system for the recognition of handwritten Arabic text using neural networks. This work builds upon previous work that dealt with the vertical segmentation of the written text. However, faced with some ...
  • Haraty, Ramzi A.; Makaram, Omar Chehayeb; SAS; 199729410; Computer Science and Mathematics; rharaty@lau.edu.lb; Lebanese American University
    The need to move various items from one location to another has become a primary need of most companies. Items are usually boxed and arranged inside containers to be transported from one location to the other. Most companies ...

Search LAUR


Advanced Search

Browse

My Account