Adwan Yasin

Adwan Yasin
Arab American University | AAUJ · Computer Science

Doctor of Philosophy

About

24
Publications
13,645
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
287
Citations
Introduction
Currently we working on Manet security and wireless security there are many issues have to be resolved like routing, clustering different types of attacks like Black and gray hole attacks, power consumption, events coordinations, jamming, interference and confidentiality
Additional affiliations
September 2006 - November 2017
Arab American University
Position
  • Professor (Full)

Publications

Publications (24)
Article
Mobile Ad hoc Network (MANET) experienced high technical revolution. Nowadays, routing in Ad hoc network is a challenging task. In addition, different security aspects should be considered to achieve the best performance in the network. MANET is a self organized infrastructureless network contain a large number of nodes that connected through wirel...
Article
Full-text available
Mobile Ad hoc Network (MANET) experienced high technical revolution. Nowadays, routing in Ad hoc network is a challenging task. In addition, different security aspects should be considered to achieve the best performance in the network. MANET is a self organized infrastructure less network contain a large number of nodes that connected through wire...
Article
Full-text available
Security in MANET is an essential task in preventing the harm that could be caused by malicious nodes in the network. Flooding attack is one of DoS attacks that aim to exhaust the network resources by flooding the network with a lot of fake packets and messages. There are different forms of Flooding attacks, and the most common form is the request...
Article
Full-text available
: Phishing is a kind of social engineering attack in which experienced persons or entities fool novice users to share their sensitive information such as usernames, passwords, credit card numbers, etc. through spoofed emails, spams, and Trojan hosts. The proposed scheme based on designing a secure two factor authentication web application that prev...
Article
Protecting intellectual property against tampering is an urgent issue to many software designers, where illegal access to sensitive data is considered as a form of copyright infringement. Software owners apply various protection techniques in order to address this issue. Many of used mechanisms are weak, since they are vulnerable to both dynamic an...
Article
Full-text available
This paper utilizes the combination of DS-CDMA with OFDM and FH in order to enhance anti-jamming technique in wireless sensor networks (WSN). The DS-CDMA component provides user isolation and protection whilst preserving the ability of many users to use the same carrier frequency simultaneously. The OFDM component removes ISI and enhances resistanc...
Article
Full-text available
Mobile Ad hoc Network (MANET) is a type of wireless networks that provides numerous applications in different areas. Security of MANET had become one of the hottest topics in networks fields. MANET is vulnerable to different types of attacks that affect its functionality and connectivity. The black-hole attack is considered one of the most widespre...
Conference Paper
One of the most important challenges that MANET face is how to connect nodes together also how to adapt the dynamically changes in the network topology. A novel clustering algorithm that ensures an increase in stability and adaptability of MANET has been proposed, it depends on the Artificial Bee Colony (ABC) to determine the Cluster Head (CH) in e...
Conference Paper
mobile ad-hoc networks are a new and useful type of wireless networks. These networks are used in many applications, especially in critical-situation applications like battlefields and rescue operations. The challenge in such networks arise in their structure and nature, they lack a central management and dynamism of the topology of the network, th...
Conference Paper
Security of Mobile Ad-hoc Network (MANET) is one of the hottest research topics in the network fields. MANET was originally used in military, and it is consists of mobile nodes connected via wireless links (radio, microwaves signals) with no fixed infrastructure to control the communication between nodes, Black hole attack is one of the widest spre...
Article
Full-text available
Despite their proven security breaches, text passwords have been dominating all other methods of human authentication over the web for tens of years, however, the frequent successful attacks that exploit the passwords vulnerable model raises the need to enhance web authentication security. This paper proposes BMBAT; a new authentication technique t...
Article
Full-text available
Several obfuscation tools and software are available for Java programs but larger part of these software and tools just scramble the names of the classes or the identifiers that stored in a bytecode by replacing the identifiers and classes names with meaningless names. Unfortunately, these tools are week, since the java, compiler and java virtual m...
Article
Full-text available
RFID systems are one of the important techniques that have been used in modern technologies; these systems rely heavily on default and random passwords. Due to the increasing use of RFID in various industries, security and privacy issues should be addressed carefully as there is no efficient way to achieve security in this technology. Some active t...
Article
Full-text available
Phishing attacks are one of the trending cyber-attacks that apply socially engineered messages that are communicated to people from professional hackers aiming at fooling users to reveal their sensitive information, the most popular communication channel to those messages is through users’ emails. This paper presents an intelligent classification m...
Article
Full-text available
Spam messages are today one of the most serious threats to users of E-mail messages. There are several ways to prevent and detect spam message, the most important way is filtering spam. Sometimes Filtering fails to discover some spam messages or even fails in the classification of non-spam messages as a spam messages. In this paper, we suggest a ne...
Article
Full-text available
SQL Injection Attack (SQLIA) is a technique of code injection, used to attack data driven applications especially front end web applications, in which heinous SQL statements are inserted (injected) into an entry field, web URL, or web request for execution. " Query Dictionary Based Mechanism " which help detection of malicious SQL statements by sto...
Article
Full-text available
MPTCP is a new protocol proposed by IETF working group as an extension for standard TCP, it adds the capability to split the TCP connection across multiple paths. It provides higher availability and improves the throughput between two multi-address endpoints. Many Linux distributions have been developed to support MPTCP, most of them are open sourc...
Article
Full-text available
In this paper we present a new algorithm for clustering MANET by considering several parameters. This is a new adaptive load balancing technique for clustering out Mobile Ad-hoc Networks (MANET). MANET is special kind of wireless networks where no central management exits and the nodes in the network cooperatively manage itself and maintains connec...
Article
Full-text available
Wireless sensor network (WSN) is widely used in environmental conditions where the systems depend on sensing and monitoring approach. Water pollution monitoring system depends on a network of wireless sensing nodes which communicate together depending on a specific topological order. The nodes distributed in a harsh environment to detect the pollut...
Article
Full-text available
The problem of protecting information, modification, privacy and origin validation are very important issues and became the concern of many researchers. Handling these problems definitely is a big challenge and this is probably why so much attention directed to the development of information protection schemes. In this paper, we propose a robust mo...
Article
Full-text available
Finding the best routing path in the M obile Ad-hoc Networks (M ANETs) is a very critical issue when designing M ANET protocols, since many conditions affects the topology of the network, one critical condition is nodes power; it affects the node availability and network connectivity, so that the power of overall nodes should be used wisely to keep...
Article
Full-text available
In this paper, we present a new block replacement policy in which we proposed a new efficient algorithm for combining two important policies Least Recently Used (LRU) and Least Frequently Used (LFU). The implementation of the proposed policy is simple. It requires limited calculations to determine the victim block. We proposed our models to impleme...
Article
Full-text available
Mobile Ad hoc Network (MANET) has random topology as MANET devices leaving or joining to the network at anytime. The dynamic nature of MANETs makes achieving secrecy, connectivity and high performance, a big challenge and a complex task. In this paper, we proposed an efficient technique for Dynamic construction of large MANET based on division the...

Questions

Questions (4)
Question
inorder to enhance interference tolerance
Question
for interference reduction
Question
for interference reduction

Network

Cited By