جسرٌ نحو المعرفة
Skip Navigation Links الرئيسية : التفاصيل
             
الإسم : د. تتيانا بليخنا

الرتبة العلمية: أستاذ مساعد

المسمى الوظيفي: عضو هيئة تدريسية

المكتب 7307       الرقم الفرعي 7307

بريد الكتروني: tbalikhina@uop.edu.jo

التخصص: شبكات الحاسوب

جامعة التخرج: اكسفورد بروكس / اكسفورد

المؤهل العلمي

    المؤهل العلمي

    الجامعة

    البلد

    سنة الحصول على المؤهل

    الدكتوراه
    اكسفورد بروكس / اكسفورد
    المملكه المتحدة
    2005



  • Journal Paper





      Ali Maqousi, and Tat, " User Security Awareness in E-Society " , "International Arab Conference of e-Technology",Vol.,No., Arab Open University, Amman, Jordan, 10/15/2008 :الملخص
      Recently, the growth in using computers and the Internet, forming what is now known as E-Society. This imposes the need for developing computer security packages. These packages are intended to help users protect their assets such as information, databases, programs, and computer services from any harm or damage. The level of harm or damage that could happen to assets varies from one user to another. This variation depends on: users’ awareness of possible threats, their knowledge of the source of threats, and if they are applying security controls or not. This paper aims to analyze current users’ level of awareness and to propose possible methods in order to increase the level of users’ awareness i.e. education, continues education, and training. The paper is organized as follows: first section presents an introduction, where the importance of security awareness is highlighted and also it presents a research idea, the second section introduces the experimental design for a more comprehensive research that we are looking to carry on in later stages and specifies the objective of this stage, third section presents results and discussions where we provide our own proposal of methods to increase level of users awareness; finally, conclusion is presented




      T. Balikhina, A. Maq, " The Evaluation of an Active Networking Approach for Supporting the QOS Requirements of Distributed Virtual Environments " , "International Journal of Simulation, Systems, Science & Technology",Vol.7,No.1, United Kingdom Simulation Society, UK, 03/01/2006 :الملخص
      This paper describes work that is part of a more general investigation into how Active Network ideas might benefit large scale Distributed-Virtual-Environments (DVEs). Active Network approaches have been shown to offer improved solutions to the Scalable Reliable Multicast problem, and this is in a sense the lowest level at which Active Networks might benefit DVEs in supporting the peer-to-peer architectures considered most promising for large scale DVEs. To go further than this, the key benefit of Active Networking is the ability to take away from the application the need to understand the network topology and delegate the execution of certain actions, for example intelligent message pruning, to the network itself. The need to exchange geometrical information results in a type of traffic that can place occasional, short-lived, but heavy loads on the network. However, the Level of Detail (LoD) concept provides the potential to reduce this loading in certain circumstances. This paper introduces the performance modelling approach being used to evaluate the effectiveness of active network approaches for supporting DVEs and presents an evaluation of messages filtering mechanisms, which are based on the (LoD) concept. It describes the simulation experiment used to carry out the evaluation, presents its results and discusses plans for future work. Download




      Ali Maqousi, Tatiana, " An Effective Method for Information Security Awareness Raising Initiatives " , "International Journal of Comuter Science & Information Technology (IJCSIT)",Vol.5,No.2, AIRCC, Victoria, Australia, 04/30/2013 :الملخص
      Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their activities and provide E-Services for their customers. In the process, whether they know it or not, those organizations are also opening themselves up to the risk of information security breaches. Therefore protecting an organization’s ICT infrastructure, IT systems, and Data is a vital issue that is often underestimated. Research has shown that one of the most significant threats to information security comes not from external attack but rather from the system's users, because they are familiar with the infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only technological solutions to protect an organization’s assets is not enough; there is a need to consider the human factor by raising users’ security awareness. Our contribution to this problem is to propose an Information Security Awareness Program that aims at raising and maintaining the level of users’ security awareness. This paper puts forward a general model for an information security awareness program and describes how it could be incorporated into an organization’s website through the process of development life cycle.




      Ali Maqousi, Tatiana, " A REFERENCE MODEL OF SECURITY REQUIREMENTS FOR EARLY IDENTIFICATION AND MEASUREMENT OF SECURITY AWARENESS PROGRAM " , "Journal of Theoretical and Applied Information Technology",Vol.63,No.1, Little Lion Scientific Islamabad Pakistan, Islamabad. PAKISTAN, 05/10/2014 :الملخص
      In practice, at software/system requirements assembly stages, the focus is regularly on the software security requirements as usually described at the system level this may lead to explicit security-related product which may be implemented as both in system and software. According to the ECSS standards internal security awareness is restricted to avoid illegal access to the software system and confidential data while the external security requirements related awareness is failing to put off the leak of secure output data awareness and illegal processes. In European, ISO 25021 a amount of terms are afforded to describe many types of aspirant security awareness requirements. This paper accumulates and systematizes these security awareness-related requirements into a standards-based reference model of the software security awareness; In the absence of such a model, such security awareness requirements are definitively assigned at software system testing time, stakeholders find out that a number of Security awareness requirements are neglected and additional efforts should be added to implement such awareness’s. Moreover, the proposed model may also be used for identify the functional size of security awareness programs using the ISO 19761 standard. This size may be used for estimation purposes.


  • Chapter in a Book





      Ali Maqousi, and Tat, " Building Security Awareness Culture to Serve E-Government Initiative " , "E-Services in the Public Sector: E-Government Strategies and Advancements",Vol.,No., Information Science Reference (an imprint of IGI Global), Pennsylvania, USA, 10/01/2009 :الملخص
      Recently, many countries have adopted E-Government initiatives for providing public E-Services to their citizens. These initiatives, together with the existing and emerging private initiatives which offer E-Services, lead to a dramatic increase in the number of Internet users. This will form what is now known as E-Society. All E-Government initiatives consider citizen-centered approach, where user’s security and privacy is a major issue. The level of citizen’s engagement in these initiatives will depend on the extent of his/her confidence in the security system used by these initiatives. This imposes the need for developing computer security packages. These packages are intended to help users protect their assets such as information, databases, programs, and computer services from any harm or damage. The level of harm or damage that could happen to assets varies from one user to another. This variation depends on: users’ awareness of possible threats, their knowledge of the source of threats, and if they are applying security controls or not. This paper aims to analyze current users’ level of awareness and to propose possible methods in order to increase the level of users’ awareness i.e. education, continues education, and training. This chapter is organized as follows: the first section presents an introduction, where the importance of security awareness to E-Government initiatives is highlighted and also it presents a research idea, the second section introduces the experimental design for a more comprehensive research that we are looking to carry on in later stages and specifies the objective of this stage, the third section presents results and discussions where we provide our own proposal of methods to increase the level of users awareness; finally, a conclusion is presented. Download




      A. Maqousi and T. Ba, " Wire and Wireless Local Area Networks Simulation: OPNET Tutorial " , "Simulation in Computer Network Design and Modeling: Use and Analysis",Vol.,No., Information Science Reference (IGI Global), Hershey-New York, USA, 02/01/2012 :الملخص
      There has been a tremendous increase in the use of wire/wireless local area networks (LAN) with different network configurations. Therefore, it is so vital to have an accurate and a reliable generic platform to enable network developers, managers, security mangers, researchers, and students evaluating and investigating the performance of LANs of different technologies and configurations. Many network simulators have been developed throughout the years, such as: the optimized network engineering tool (OPNET), the network simulator (NS), the global mobile simulator (GloMoSim), etc. One of the most widely-used and powerful general-purpose network simulators is OPNET, which is an object-oriented simulation environment. This chapter provides two walk through tutorials on using OPNET IT Guru (Academic Edition of OPNET) for wire/wireless LANs simulations. These tutorials demonstrate in step-by-step fashion, the procedures of initiating new simulation, setting up the simulation parameters, running the simulation, and viewing the results. The first tutorial (Tutorial #1) simulates a wired LAN of 10 computers and one server connected to a single switch, and the second tutorial (Tutorial #2) simulates a wireless ad hoc network of 10 mobile nodes and one server. This chapter demonstrates that OPNET IT Guru is a powerful tool that can be used by a range of professional users to simulate, evaluate, and investigate the performance of wire and wireless LANs. Moreover, it encourages and helps students to easily perform network simulation for better understanding to the network performance under different network conditions. Download


  • Conference paper





      T. Balikhina, D. Duc, " Level of Detail Filtering in Active Networks to Support Distributed Virtual Environments " , "20th UK Performance Engineering Workshop",Vol.,No., University of Bradford, Bradford, UK, 07/10/2004 :الملخص
      T. Balikhina, D. Duce, A. Maqousi, and F. Ball, "Level of Detail Filtering in Active Networks to Support Distributed Virtual Environments, 20th UK Performance Engineering Workshop", July 2004, University of Bradford, UK.




      :الملخص
      T. Balikhina, F. Ball, and D. Duce, "Distributed Virtual Environments – An Active Future? In Proceedings of EUROGRAPHICS UK 2002, Leister June 2002.




      Suleiman Almasri, Al, " Assessment of 3.5G Network and Wireless Broadband in Developing World: Jordan as a case Study " , "International Conference on Information Society (i-Society 2011), IEEE UK/RI Computer Chapter",Vol.,No., , London, UK, 06/27/2011 :الملخص
      The number of 3.5G (beyond third generation) users was emerged throughout the world during the last few years. This is because it provides very advanced services such as Wireless Internet broadband and good quality video/voice telephone calls. In developing countries, this service is still at the initial phase. There are still some obstacles facing people of these countries to use this new service. This paper provides an overview about 3.5G in these countries: Jordan as a case study. It also discusses people’s expectations about this service via conducting a questionnaire targeted Internet users. The paper also presents a network assessment experimental test carried out to evaluate the network QoS at selected places of the area where this service is provided. The test was performed on three main network performance metrics: throughput, delay and packet loss.




      A. Maqousi, T. Balik, " Trustworthy Online Research Community System " , "International Conference on Science Communication, JHC 2012",Vol.,No., University of Lorraine, Nancy, France, 09/04/2012 :الملخص
      Research community faced many challenges to utilize social networking. This community is interested in sharing and disseminating its ideas and findings with special requirements such as privacy, trust, and communicating with the right audience. We proposed our approach to build trustworthy online system that enables researchers to communicate and disseminate their findings securely and to their audience.




      Ali Maqousi, Tatiana, " Towards an Open Architecture for Smart Grid Communications " , "the 1st International Conference on the Applications of Information Technology in the Development of Renewable Energy Processes & Systems (IT-DREPS)",Vol.,No., IEEEXplore, Amman, Jordan, 05/30/2013 :الملخص
      This paper addresses the challenge of developing communications architecture for the Smart Grid. It considers the similarity between the QoS requirements for Smart Grid communication and those addressed by previous work into multiservice networks and QoS Architectures. It discusses this previous work within the context of Smart Grid requirements and identifies the contribution it could make to the development of Smart Grid communications architecture.




      F.Ball, K.Basu, A.Ma, " Smart Grid Communications: A Renewed Challenge to Multiservice Networking " , "Proceedings of the Tenth International Network Conference (INC 2014)",Vol.,No., Plymouth University, Plymouth, UK, 06/10/2014 :الملخص
      This paper focuses on the multiservice aspects of the Smart Grid communications system with particular emphasis on the real time requirements of its control system. A general outline of the Smart Grid is presented and its general communications requirements are identified. The stringent real-time requirements of substation and transmission line control are discussed in greater detail. An overview of previous and current research into multiservice networking is given with the aim of identifying areas that need to be revisited, and extended, in order to meet the real time needs of the Smart Grid. The paper then presents proposals for future research into number of specific areas relevant to meeting these requirements.
  • التقويم
    <أيلول 2017>
    السبتالاحدالاثنينالثلاثاءالاربعاءالخميسالجمعة
    1
    2345678
    9101112131415
    16171819202122
    23242526272829
    30