{"id":14,"date":"2016-09-08T21:20:41","date_gmt":"2016-09-08T21:20:41","guid":{"rendered":"http:\/\/qufaculty.qu.edu.qa\/n-fetais\/?page_id=14"},"modified":"2016-11-28T16:40:41","modified_gmt":"2016-11-28T16:40:41","slug":"research","status":"publish","type":"page","link":"http:\/\/qufaculty.qu.edu.qa\/n-fetais\/research\/","title":{"rendered":"Research"},"content":{"rendered":"<p>[vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;]<h1 class=\"fac-big-title fac-title text-center\" style=\"color:\">Introduction<\/h1>\n[\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;][vc_column_text]<\/p>\n<p>This page is regarding\u00a0my research<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;]<h1 class=\"fac-big-title fac-title text-center\" style=\"color:\">Interests<\/h1>\n[\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;]<ul class=\"ul-boxed list-unstyled\"><li class=\"\">Visualization<\/li><li class=\"\">Visual Analytics<\/li><li class=\"\">Representational systems<\/li><li class=\"\">Cognitive Modelling<\/li><li class=\"\">Evaluating the Usability of Systems<\/li><\/ul>[\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;]<h1 class=\"fac-big-title fac-title text-center\" style=\"color:\">Research Projects<\/h1>\n[\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;]<ul class=\"ul-withdetails \"><li class=\"\"><div class=\"row\">\n\t\t\t\t<div class=\"col-sm-6 col-md-3\"><div class=\"image\"><img src=http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-content\/themes\/faculty\/img\/project-default.png alt=\"Using the Model-View-Controller Design pattern to model a game: A case study of a Qatari game\" class=\"img-responsive\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><\/div><div class=\"col-sm-6 col-md-9\"><div class=\"meta\"><h3>Using the Model-View-Controller Design pattern to model a game: A case study of a Qatari game<\/h3><p><\/p><\/div><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<ul>\n<li>A case study to model a tradition-based game using the Model-View-Controller Design pattern.<\/li>\n<li>This design pattern will help in understanding the game process that we need to analogue.<\/li>\n<li>Preserving cultural heritage is a global problem and we expect our approach will have global potential<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li><\/ul>[\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;]<ul class=\"ul-withdetails \"><li class=\"\"><div class=\"row\">\n\t\t\t\t<div class=\"col-sm-6 col-md-3\"><div class=\"image\"><img src=http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-content\/themes\/faculty\/img\/project-default.png alt=\"A New Proposed Framework for an Intrusion Detection System\" class=\"img-responsive\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><\/div><div class=\"col-sm-6 col-md-9\"><div class=\"meta\"><h3>A New Proposed Framework for an Intrusion Detection System<\/h3><p><\/p><\/div><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<ul>\n<li>Using an Information Visualization (IV) approach to monitor computer systems and network traffic for possible malicious attacks.<\/li>\n<li>Support activities for each of the three phases, using logs to capture the events, in the Intrusion Detection process, namely i) Monitoring ii) Analysis iii) Reporting.<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li><\/ul>[\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;]<ul class=\"ul-withdetails \"><li class=\"\"><div class=\"row\">\n\t\t\t\t<div class=\"col-sm-6 col-md-3\"><div class=\"image\"><img src=http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-content\/themes\/faculty\/img\/project-default.png alt=\"Using Diagrams to increase the understanding of energy consumption\" class=\"img-responsive\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><\/div><div class=\"col-sm-6 col-md-9\"><div class=\"meta\"><h3>Using Diagrams to increase the understanding of energy consumption<\/h3><p><\/p><\/div><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<ul>\n<li>Evaluating the use of a visual notation to interpret data and to find out how non-technical users can understand data without being domain experts.<\/li>\n<li>The choice of a representation must be done carefully to avoid misinterpretations.<\/li>\n<li>Examining the ability to use diagrams to model a graphical system for showing energy consumption data.<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li><\/ul>[\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;]<ul class=\"ul-withdetails \"><li class=\"\"><div class=\"row\">\n\t\t\t\t<div class=\"col-sm-6 col-md-3\"><div class=\"image\"><img src=http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-content\/themes\/faculty\/img\/project-default.png alt=\"Can interactive Diagrams be used to make instant decisions regarding energy consumption?\" class=\"img-responsive\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><\/div><div class=\"col-sm-6 col-md-9\"><div class=\"meta\"><h3>Can interactive Diagrams be used to make instant decisions regarding energy consumption?<\/h3><p><\/p><\/div><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<ul>\n<li>Energy and water are global problems and we expect our approach will have global potential.<\/li>\n<li>Evaluating diagrams to promote managers deeper and more realistic understanding of their own energy use and water resources.<\/li>\n<li>Better understanding will lead to beneficial changes in users\u2019 behavior towards the resources that is more sustainable.<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li><\/ul>[\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;]<ul class=\"ul-withdetails \"><li class=\"\"><div class=\"row\">\n\t\t\t\t<div class=\"col-sm-6 col-md-3\"><div class=\"image\"><img src=http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-content\/themes\/faculty\/img\/project-default.png alt=\"Visualizing Abnormal Behavior to Detect Network Attacks\" class=\"img-responsive\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><\/div><div class=\"col-sm-6 col-md-9\"><div class=\"meta\"><h3>Visualizing Abnormal Behavior to Detect Network Attacks<\/h3><p><\/p><\/div><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<ul>\n<li>Evaluating the use of a visual notation to interpret security related data and to find patterns to predict attacks.<\/li>\n<li>Find the predicted sources of the possible attacks.<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li><\/ul>[\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;]<ul class=\"ul-withdetails \"><li class=\"\"><div class=\"row\">\n\t\t\t\t<div class=\"col-sm-6 col-md-3\"><div class=\"image\"><img src=http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-content\/themes\/faculty\/img\/project-default.png alt=\"Visualizing Software Security Requirements using Concept Diagrams\" class=\"img-responsive\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><\/div><div class=\"col-sm-6 col-md-9\"><div class=\"meta\"><h3>Visualizing Software Security Requirements using Concept Diagrams<\/h3><p><\/p><\/div><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<ul>\n<li>Model security requirements visually to support unambiguous specification of security policies for all stakeholders.<\/li>\n<li>Bridge the communication gap between different stakeholders.<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li><\/ul>[\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;]<ul class=\"ul-withdetails \"><li class=\"\"><div class=\"row\">\n\t\t\t\t<div class=\"col-sm-6 col-md-3\"><div class=\"image\"><img src=http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-content\/themes\/faculty\/img\/project-default.png alt=\"Security Risk Modeling and Assessment of Cloud Computing\" class=\"img-responsive\"><div class=\"imageoverlay\"><i class=\"fa fa-search\"><\/i><\/div><\/div><\/div><div class=\"col-sm-6 col-md-9\"><div class=\"meta\"><h3>Security Risk Modeling and Assessment of Cloud Computing<\/h3><p><\/p><\/div><\/div><\/div>\n\t\t<div class=\"details\">\n\t\t\t<ul>\n<li>A security framework that addresses the challenges in a unified manner.<\/li>\n<li>Enable security decision makers to determine the effectiveness of security mechanisms in a quantitative and qualitative manner.<\/li>\n<li>Enhance the security posture of the Cloud by taking best possible decisions.<\/li>\n<\/ul>\n\n\t\t<\/div> <\/li><\/ul>[\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;]<ul class=\"ul-withdetails \"><br \/>\n<\/ul>[\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;][vc_column_text] This page is regarding\u00a0my research [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; parallax=&#8221;&#8221; parallax_image=&#8221;&#8221;][vc_column width=&#8221;1\/1&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8221;&#8221; [&hellip;]<\/p>\n","protected":false},"author":589,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-14","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-json\/wp\/v2\/pages\/14","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-json\/wp\/v2\/users\/589"}],"replies":[{"embeddable":true,"href":"http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":15,"href":"http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-json\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":124,"href":"http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-json\/wp\/v2\/pages\/14\/revisions\/124"}],"wp:attachment":[{"href":"http:\/\/qufaculty.qu.edu.qa\/n-fetais\/wp-json\/wp\/v2\/media?parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}