Aiman Ahmed Abusamra

Aiman Ahmed Abusamra
Islamic University of Gaza · Department of Computer Engineering

PhD in Computer Engineering
Currently I am interested in Blockchains and smart contracts

About

39
Publications
14,153
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
123
Citations
Citations since 2017
19 Research Items
99 Citations
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520
201720182019202020212022202305101520
Additional affiliations
October 1996 - May 2019
Islamic University of Gaza
Position
  • Professor (Full)
Education
September 1992 - February 1996

Publications

Publications (39)
Article
Full-text available
The emergence of the IoT technology has garnered significant interest in recent years, with its ability to integrate multiple sensors and nodes for seamless interconnectivity without human intervention. The three layers of the IoT system, namely the physical perception layer, network layer and application layer, require secure mechanisms to guarant...
Article
Full-text available
There has been an increase in the adoption of mobile payment systems worldwide in the past few years. However, poor Internet connection in rural regions continues to be an obstacle to the widespread use of such technologies. On top of that, there are significant problems with the currently available offline wallets; for instance, the payee cannot v...
Thesis
Full-text available
Online social networks have become essential to the everyday activities of millions of users worldwide. Social networks are used to share content, interact with friends and family, browse news, discuss events, and much more. This huge amount of data that is shared on these platforms has made them a favourite target for many attackers to obtain user...
Conference Paper
Nowadays android is the most popular operating system. Android apps suffer from more and more malware attacks. So more and more research is done to get a reliable malware detection approaches. Android malware detection is mainly divided into dynamic approach and static approach. In this paper, we present a survey of the two major approaches of the...
Conference Paper
Full-text available
Blockchain technology is a core technology in modern deployed payment applications. There has been widespread progress regarding the application of Blockchain in the financial field. Using the blockchain technology in the financial field, resulted in the creation and establishment of multiple applications of Blockchain Wallets based on Blockchain t...
Conference Paper
Full-text available
The main drawback of the Bitcoin cryptocurrency is its low scalability, which somehow is a consequence of the Proof-of-Work (PoW) consensus algorithm. So many other cryptocurrencies use the Proof-of-Stake (PoS) algorithm. In this paper, we present an outline of the architectural design of ARAM technology and arrangements built on PoS, ARAM is a sca...
Article
Full-text available
Blockchain technology is a core technology in modern deployed payment applications. There has been widespread progress regarding the application of Blockchain in the financial field. Using the blockchain technology in the financial field, resulted in the creation and establishment of multiple applications of Blockchain Wallets based on Blockchain t...
Article
Full-text available
Due to the widespread use of smart phones, location-based services (LBS) has become important in all aspects of human’s life. LBS offer many advantages to the mobile users to retrieve information about their location. Some LBS services use the smartphone’s location and service provider information to offer directions, targeted recommendations, or o...
Article
Full-text available
Homomorphic Cryptography raised as a new solution used in electronic voting systems. In this research, Fully Homomorphic encryption used to design and implement an e-voting system. The purpose of the study is to examine the applicability of Fully Homomorphic encryption in real systems and to evaluate the performance of fully homomorphic encryption...
Article
Full-text available
Due to rapid changes and consequent new threats to computer networks there is a need for the design of systems that enhance network security. These systems make network administrators fully aware of the potential vulnerability of their networks. This paper designs a Network Monitoring System (NMS) which is an active defense and complex network surv...
Article
Full-text available
Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP service along with traditional data services using the same IP infrastructure. That is why today it is one of the most dominant technologies for communication. In this paper, simulative investigations have been done for VoIP service in WiFi campus network...
Article
Full-text available
The increasing number of malwares has led to an increase in research work on malware analysis studying the malware behavior. The malware tries to leak sensitive information from infected devices. In this paper, we study a specific attack method, which distributes the data source and the point of data loss on different versions of the malware applic...
Article
Full-text available
Voice over Internet Protocol (VoIP) service is growing very fast and supported by many applications. Its interactive nature makes it very attractive service. VoIP requires a precise level of quality to be utilized. Quality of Service (QoS) is determined by factors like jitter, traffic sent, traffic received and end-to-end delay. In this paper, we s...
Article
Full-text available
Enterprise network (EN) supports thousands of users, and interconnects many networks. EN integrates different operating systems and hosts hundreds of servers that provide several services such as web applications, databases, E-mail, and others. Security threats represent a serious problem to EN. They try to damage enterprise confidentiality, integr...
Conference Paper
Full-text available
Many researches were done to find creative techniques, for Android platform, that can detect malware in easy and reliable manner. The aim is not only the effectiveness but to have less processing time, and less resources consumption. This research provide a solution for a part of this problem by finding an easy and fast way to analyze static applic...
Article
Full-text available
This thesis presents a new approach to the visualization of sound for deaf assistance that simultaneously illustrates important dynamic sound properties and the recognized sound icons in an easy readable view. .In order to visualize general sounds efficiently, the MFCC sound features was utilized to represent robust discriminant properties of the s...
Article
Full-text available
Positioning systems can be used for different purposes and for different services, so a lot of research tries to find low error techniques with good results, GPS Global Positioning System is widely used but unfortunately it is difficult to use for indoor applications, WiFi positioning system (WPS) solve this problem, So in this paper we introduce s...
Conference Paper
Mobile computing is an important field in information technology, because of the wide use of mobile devises and mobile applications. Clustering gives good results with information retrieval (IR), It aims to automatically put similar applications in one cluster. In this paper, we evaluate clustering techniques in Android applications. We explain how...
Conference Paper
Full-text available
In Palestine, 44.7% of the population is under 16 with literacy rate of 91.9% over all of the population. More than half of Palestinian youth own computers and have access to the Internet. With such prospect, ensuring information security and spreading awareness of it is one of the main challenges facing researchers on a national level. In this...
Article
Full-text available
Power consumption is an increasingly pressing problem in modern processor design. Since the on-chip caches usually consume a significant amount of power so power and energy consumption parameters have become one of the most important design constraint. It is one of the most attractive targets for power reduction. This paper presents an approach to...
Article
Full-text available
In this paper, we present a new block replacement policy in which we proposed a new efficient algorithm for combining two important policies Least Recently Used (LRU) and Least Frequently Used (LFU). The implementation of the proposed policy is simple. It requires limited calculations to determine the victim block. We proposed our models to impleme...
Article
Full-text available
Abstract- Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces many researchers to revise robust and reliable Wireless Intrusion Detection Techniques (WIDTs).In this paper we propose an algorithm to enhance the performance of the correlation of two WIDTs in detecting MAC spoofing Denial of Service (DoS) at...
Preprint
Full-text available
A software framework is dedicated to the efficient execution of procedures for supporting the construction of applications. Nowadays Java Application Servers are widely used in software development. Islamic University of Gaza Information Technology teamwork uses JBoss jBPM enterprise framework to develop IUG systems. In this paper, we study the fea...
Article
Full-text available
Power consumption is an important issue for embedded computing systems. We proposed a novel Low Power Architecture (LPA) cache which reduced dynamic write power dissipation. The new architecture based on separating the sets in the cache. We added a new separating bit named mostly bit to each cache line. The in-coming cache spreading in each set to...
Article
Full-text available
In recent years Mashups are increasingly found in the eLearning field to offer instructors the opportunity oflinking students to multiple sources of information as well as offering students the ability of accessing learning tools andservices in an easy manner. In this paper we describe the design and implementation of our Mashup web application tha...
Article
Full-text available
681.324 МЕТОДЫ ОЦЕНКИ И СРЕДСТВА ПОВЫШЕНИЯ ЭФФЕКТИВНОСТИ ПРОТОКОЛОВ ДОСТУПА ВЫЧИСЛИТЕЛЬНЫХ СЕТЕЙ Специальность 05.13.08-Вычислительные машины, системы и сети, элементы и устройства вычислительной техники и систем управления АВТОРЕФЕРАТ Диссертации на соискание ученой степени кандидата технических наук Киев-1995 г.

Network

Cited By