Introduction

This page is regarding my research

Interests

  • Visualization
  • Visual Analytics
  • Representational systems
  • Cognitive Modelling
  • Evaluating the Usability of Systems

Research Projects

  • Using the Model-View-Controller Design pattern to model a game: A case study of a Qatari game

    Using the Model-View-Controller Design pattern to model a game: A case study of a Qatari game

    • A case study to model a tradition-based game using the Model-View-Controller Design pattern.
    • This design pattern will help in understanding the game process that we need to analogue.
    • Preserving cultural heritage is a global problem and we expect our approach will have global potential
  • A New Proposed Framework for an Intrusion Detection System

    A New Proposed Framework for an Intrusion Detection System

    • Using an Information Visualization (IV) approach to monitor computer systems and network traffic for possible malicious attacks.
    • Support activities for each of the three phases, using logs to capture the events, in the Intrusion Detection process, namely i) Monitoring ii) Analysis iii) Reporting.
  • Using Diagrams to increase the understanding of energy consumption

    Using Diagrams to increase the understanding of energy consumption

    • Evaluating the use of a visual notation to interpret data and to find out how non-technical users can understand data without being domain experts.
    • The choice of a representation must be done carefully to avoid misinterpretations.
    • Examining the ability to use diagrams to model a graphical system for showing energy consumption data.
  • Can interactive Diagrams be used to make instant decisions regarding energy consumption?

    Can interactive Diagrams be used to make instant decisions regarding energy consumption?

    • Energy and water are global problems and we expect our approach will have global potential.
    • Evaluating diagrams to promote managers deeper and more realistic understanding of their own energy use and water resources.
    • Better understanding will lead to beneficial changes in users’ behavior towards the resources that is more sustainable.
  • Visualizing Abnormal Behavior to Detect Network Attacks

    Visualizing Abnormal Behavior to Detect Network Attacks

    • Evaluating the use of a visual notation to interpret security related data and to find patterns to predict attacks.
    • Find the predicted sources of the possible attacks.
  • Visualizing Software Security Requirements using Concept Diagrams

    Visualizing Software Security Requirements using Concept Diagrams

    • Model security requirements visually to support unambiguous specification of security policies for all stakeholders.
    • Bridge the communication gap between different stakeholders.
  • Security Risk Modeling and Assessment of Cloud Computing

    Security Risk Modeling and Assessment of Cloud Computing

    • A security framework that addresses the challenges in a unified manner.
    • Enable security decision makers to determine the effectiveness of security mechanisms in a quantitative and qualitative manner.
    • Enhance the security posture of the Cloud by taking best possible decisions.