Using the Model-View-Controller Design pattern to model a game: A case study of a Qatari game
A case study to model a tradition-based game using the Model-View-Controller Design pattern.
This design pattern will help in understanding the game process that we need to analogue.
Preserving cultural heritage is a global problem and we expect our approach will have global potential
A New Proposed Framework for an Intrusion Detection System
Using an Information Visualization (IV) approach to monitor computer systems and network traffic for possible malicious attacks.
Support activities for each of the three phases, using logs to capture the events, in the Intrusion Detection process, namely i) Monitoring ii) Analysis iii) Reporting.
Using Diagrams to increase the understanding of energy consumption
Evaluating the use of a visual notation to interpret data and to find out how non-technical users can understand data without being domain experts.
The choice of a representation must be done carefully to avoid misinterpretations.
Examining the ability to use diagrams to model a graphical system for showing energy consumption data.
Can interactive Diagrams be used to make instant decisions regarding energy consumption?
Energy and water are global problems and we expect our approach will have global potential.
Evaluating diagrams to promote managers deeper and more realistic understanding of their own energy use and water resources.
Better understanding will lead to beneficial changes in users’ behavior towards the resources that is more sustainable.
Visualizing Abnormal Behavior to Detect Network Attacks
Evaluating the use of a visual notation to interpret security related data and to find patterns to predict attacks.
Find the predicted sources of the possible attacks.
Visualizing Software Security Requirements using Concept Diagrams
Model security requirements visually to support unambiguous specification of security policies for all stakeholders.
Bridge the communication gap between different stakeholders.
Security Risk Modeling and Assessment of Cloud Computing
A security framework that addresses the challenges in a unified manner.
Enable security decision makers to determine the effectiveness of security mechanisms in a quantitative and qualitative manner.
Enhance the security posture of the Cloud by taking best possible decisions.