Skip to main content

Showing 1–8 of 8 results for author: Bahaa-ElDin, A M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1402.6219  [pdf

    quant-ph cs.CR

    Quantum Secure Direct Communication using Entanglement and Super Dense Coding

    Authors: Ola M. Hegazy, Ayman M. Bahaa-Eldin, Yasser H. Dakroury

    Abstract: This paper introduces a new quantum protocol for secure direct communication. This protocol is based on Entanglement and Super-Dense coding. In this paper we present some basic definitions of entanglement in quantum mechanics, present how to use the maximally entangled states known as Bell States, and super dense coding technique to achieve secure direct message communication. Finally, we will app… ▽ More

    Submitted 21 January, 2014; originally announced February 2014.

    Comments: SECRYPT 2009. arXiv admin note: text overlap with arXiv:quant-ph/0612114 by other authors

  2. arXiv:1401.5686  [pdf

    cs.DC cs.NE

    Increasing Server Availability for Overall System Security: A Preventive Maintenance Approach Based on Failure Prediction

    Authors: Ayman M. Bahaa-Eldin, Hoda K. Mohamead, Sally S. Deraz

    Abstract: Server Availability (SA) is an important measure of overall systems security. Important security systems rely on the availability of their hosting servers to deliver critical security services. Many of these servers offer management interface through web mainly using an Apache server. This paper investigates the increase of Server Availability by the use of Artificial Neural Networks (ANN) to pred… ▽ More

    Submitted 21 January, 2014; originally announced January 2014.

    Comments: arXiv admin note: text overlap with arXiv:1206.1534 by other authors

    Journal ref: Ain Shams Journal of Electrical Engineering (ASJEE), Volume 1, Issue 2, pp 135-143 (2009)

  3. arXiv:1401.5246  [pdf

    cs.NE

    Genetic Algorithms and its use with back-propagation network

    Authors: Ayman M. Bahaa-Eldin, A. M. A. Wahdan, H. M. K. Mahdi

    Abstract: Genetic algorithms are considered as one of the most efficient search techniques. Although they do not offer an optimal solution, their ability to reach a suitable solution in considerably short time gives them their respectable role in many AI techniques. This work introduces genetic algorithms and describes their characteristics. Then a novel method using genetic algorithm in best training set g… ▽ More

    Submitted 21 January, 2014; originally announced January 2014.

    Journal ref: AIN Shams University, Faculty of Engineering Scientific Bulletin, Volume 35, Issue 3, pp 337-348 (2000)

  4. arXiv:1401.4872  [pdf

    cs.CR cs.DB cs.LG

    Classification of IDS Alerts with Data Mining Techniques

    Authors: Hany Nashat Gabra, Ayman Mohammad Bahaa-Eldin, Huda Korashy

    Abstract: A data mining technique to reduce the amount of false alerts within an IDS system is proposed. The new technique achieves an accuracy of 99% compared to 97% by the current systems.

    Submitted 20 January, 2014; originally announced January 2014.

    Comments: 2012 International Conference on Internet Study (NETs2012), Bangkok, Thailand

  5. arXiv:1401.3592  [pdf

    cs.NE cs.CR

    Intelligent Systems for Information Security

    Authors: Ayman M. Bahaa-Eldin

    Abstract: This thesis aims to use intelligent systems to extend and improve performance and security of cryptographic techniques. Genetic algorithms framework for cryptanalysis problem is addressed. A novel extension to the differential cryptanalysis using genetic algorithm is proposed and a fitness measure based on the differential characteristics of the cipher being attacked is also proposed. The complexi… ▽ More

    Submitted 15 January, 2014; originally announced January 2014.

    Comments: PhD Thesis. Ain Shams University, Faculty of Engineering. Computer and Systems Eng. Dept., 2004

  6. arXiv:1211.2946   

    cs.NI cs.CR

    ATDSR: Trusted On-Demand Routing Protocol based on Agents for Mobile Ad-hoc Networks

    Authors: Ayman M. Bahaa-ElDin, Islam Tharwat A. Halim, Hossam M. A. Fahmy

    Abstract: The routing performance in Mobile Ad-hoc Networks (MANETs) relies on the co-operation of the individual nodes that constitute the network. The existence of misbehaving nodes may paralyze the routing operation in MANETs. To overcome this behavior, the trustworthiness of the network nodes should be considered in the route selection process combined with the hop count. The trustworthiness is achieved… ▽ More

    Submitted 17 September, 2013; v1 submitted 13 November, 2012; originally announced November 2012.

    Comments: Submited by error

  7. arXiv:1211.1158  [pdf

    cs.CR

    Data Mining Based Technique for IDS Alerts Classification

    Authors: Hany N. Gabra, Ayman M. Bahaa-Eldin, Hoda K. Mohamed

    Abstract: Intrusion detection systems (IDSs) have become a widely used measure for security systems. The main problem for those systems results is the irrelevant alerts on those results. We will propose a data mining based method for classification to distinguish serious alerts and irrelevant one with a performance of 99.9% which is better in comparison with the other recent data mining methods that have re… ▽ More

    Submitted 21 February, 2013; v1 submitted 6 November, 2012; originally announced November 2012.

    Journal ref: International Journal of Electronic Commerce Studies Vol.5, No.1 , pp.1-6, 2014

  8. arXiv:1211.0673   

    cs.NI

    RCA: Efficient Connected Dominated Clustering Algorithm for Mobile Ad Hoc Networks

    Authors: Ayman M. Bahaa-Eldin, Dina S. M. Hassan, Hossam M. A. Fahmy

    Abstract: Clustering of mobile ad hoc networks is a largely growing field. The perceived benefits of clustering are comprehensively analyzed in open literature. This paper considers the development of a new connected-dominated-set clustering algorithm called Ring Clustering Algorithm (RCA). RCA is a heuristic algorithm that groups mobile nodes in a network into rings. Each ring consists of three ring-nodes.… ▽ More

    Submitted 17 September, 2013; v1 submitted 4 November, 2012; originally announced November 2012.

    Comments: Submited by error