الصفحة الرئيسية

كلية الحاسبات وتقنية المعلومات \ هندسة الحاسب

أسامه شبل عبد الغني يونس

نسبة اكتمال الملف الشخصي
الجنسية المصرية
التخصص العام تقنية المعلومات
التخصص الدقيق أمن المعلومات
المسمى الوظيفي أستاذ مساعد
الدرجة العلمية (المرتبة) دكتوراه

نبذه مختصرة

I received the BSc degree in electrical engineering, and the MSc degree in computer networks from Menoufia University, Egypt I received the PhD degree in performance engineering and wireless networks from Newcastle University, UK, in 2013 Currently I am an associate professor in the department of computer engineering at Faculty of Computer and Information Technology, University of Tabuk, SA My main research interest includes the performance engineering of computer systems, wireless networks, internet of things, cloud computing, information and network security, cybersecurity, and artificial intelligence As indicated in Google Scholar, I published over than 34 peer-reviewed research articles in various international journals and conferences

المؤهلات العلمية

BSc , Electrical Engineering, Faculty of Engineering, Menoufia University, Egypt Master, Computer Networks, Faculty of Computers and Information, Menoufia University, Egypt PhD, Wireless Networks, Computing School, Newcastle University, UK

الاهتمامات البحثية

Computer Networks Network Security Cybersecurity Internet of Things (IoT) Mobile Communications Performance Analysis of Computer Systems Performance Engineering Artificial Intelligence

الخبرات والمناصب الإدارية

Demonstrator, Menoufia University, Egypt Lecturer, Menoufia University, Egypt Lecturer, Newcastle University, UK Assistant Professor, Menoufia University, Egypt Assistant Professor, University of Tabuk, SA Associate Professor, University of Tabuk, SA

الجدول الدراسي
اليوم المادة الوقت
من إلى
الأحد شبكات الحاسب 08:00 09:30
الثلاثاء شبكات الحاسب 08:00 09:30
الأبحاث والمؤلفات
  • Hayam Mousa, Sonia Ben Mokhtar, Omar Hasan, Osama Younes, Mohiy Hadhoud, Lionel Brunie, Trust management and reputation systems in mobile participatory sensing applications: A survey, Computer Networks, Volume 90, 2015, Pages 49-73
  • Younes, OS Securing ARP and DHCP for mitigating link layer attacks Sādhanā 42, 2041–2053 (2017)
  • Younes, O (2016) A Secure DHCP Protocol to Mitigate LAN Attacks Journal of Computer and Communications, 4, 39-50
  • W Abd Ellatief, O Younes, H Ahmed and M Hadhoud, "Energy efficient density-based clustering technique for wireless sensor network," 2016 8th International Conference on Knowledge and Smart Technology (KST), Chiang Mai, Thailand, 2016, pp 196-200, doi: 101109/KST20167440509
  • H Mousa, S Benmokhtar, O Hasan, L Brunie, O Younes and M Hadhoud, "A reputation system resilient against colluding and malicious adversaries in mobile participatory sensing applications," 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2017, pp 829-834, doi: 101109/CCNC20177983241
  • Hasan O, Brunie L and Bertino E (2022) Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey ACM Computing Surveys 55:2 (1-37)
  • Osama S Youne “Modelling and analysis of TCP congestion control mechanisms using stochastic reward nets, International Journal of Computing Science and MathematicsVol 10, No 4, 2019
  • O S Younes and U A Albalawi, "Analysis of Route Stability in Mobile Multihop Networks Under Random Waypoint Mobility," in IEEE Access, vol 8, pp 168121-168136, 2020, doi: 101109/ACCESS20203023142
  • Mervat A Ahmed, Osama S Younes, and Hatem S Abdul-kader, "Multi secret Sharing Based on Hill Cipher and Blakley Secret Sharing", 27th International Conference on Computer Theory and Applications (ICCTA 2017) , Alexandria, Egypt, Oct 2017
  • Hayam Mousa, Osama Younes, Mohy Hadhoud, "A Comparative Study of Trust Mapping Functions in Mobile Phone Participatory Sensing Applications In: Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017 (AISI 2017), vol 639 Springer
  • Mervet A Ahmed, Osama S Younes, "Secret Image Sharing Based on Elementary Cellular Automata", In: Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017, AISI 2017, Vol 639, Springer, Sep 2017
  • H Mousa, S Benmokhtar, O Hasan, L Brunie, O Younes and M Hadhoud, "A reputation system resilient against colluding and malicious adversaries in mobile participatory sensing applications", 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, Jan 2017, pp 829-834
  • H Mousa, S Benmokhtar, O Hasan, L Brunie, O Younes and M Hadhoud, " PrivaSense: Privacy-Preserving and Reputation-Aware Mobile," 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2017), Melbourne, Australia, November 2017
  • Wala Abdellatief and Osama Younes, "Density-based Spatial Clustering Technique for Wireless Sensor Network", 12th IEEE International Conference on Computer Engineering and Systems (ICCES 2017), Cairo, Egypt, Dec 2017
جوائز التميز
  • جائزة التميز في البحث العلمي
  • جائز التميز في تصميم المقررات الالكترونية - من جامعة البحرين
المشاريع البحثية
اسم المشروع وصف المشروع
An Automated Security Approach for Mitigating Data Link Layer Attacks in Ethernet Networks Evolving of computer networks, and the variety of its services and applications, has increased the users need for Local Area Networks (LANs) LAN technologies, such as Ethernet, are the infrastructure for the Internet that everybody uses without further thought Recently, security issues in the data link layer of LANs have started to receive long overdue attention from the research community, standardization organizations, and equipment vendors However, most solutions introduced to secure Ethernet LANs do not allow mobility for hosts, much deteriorate the performance of the network, and do not provide robust separation of security domains in large networks This work introduces a software solution, called Ethernet Watch Guard (EWG), for mitigation of Ethernet LAN attacks EWG is a set of client server protocols that mitigate most dangerous Ethernet attacks, such as MAC flooding, DHCP exhaustion, DHCP rogue server, and IP/MAC spoofing EWG mentors the Ethernet layer processes in the server, clients, and switches takes decision and updates clients with new rules, and sends some control request to switches to control traffic EWG is a simple and scalable protocol, can allow host mobility, does not degrade the performance of the network, and reduce the load on the administrator and avoid their mistakes
Monitoring Air and Water Pollution in the Area of Tabuk and Red Sea Using Wireless Sensor Networks Pollution is the presence of contaminants or pollutant substances in the environment (air, water or land) that interfere with human health, or produce other harmful environmental effects It is of fundamental interest to monitor the pollution in the environment (especially water and air) continuously The pollution, if not caught early, may lead to a catastrophe Traditional methods for air and water pollution measurement are expensive and have a many constraints With these limitations, air and water pollution monitoring in broader area is not feasible However, use of modern low-cost sensors in conjunction with wireless sensor network (WSN) creates an opportunity to collect real time data from different locations and provide detailed pollution map WSNs offer a cheap, yet reliable means of data collection with minimal human intervention Nowadays, WSNs are proving to be a promising wireless monitoring technology in various pollution monitoring applications However, there are many issues that affect the design and performance of a wireless sensor network such as follows: energy consumption, quality of service, network security, network architecture, data collection and transmission, sensor deployment, Fault Tolerance, clustering, localization, and scalability The main object of this project is designing a new WSN architecture dedicated for air and water pollution monitoring The new architecture will be efficient in terms of power consumption, performance, connectivity, lifetime, fault tolerant, capacity, quality of service, security, and cost The proposed system will be designed to monitor all possible pollutants in the Area of TABUK and Red Sea
معلومات التواصل
البريد الإلكتروني : o_younes@ut.edu.sa