Search
 |  Sign In
 

Guidelines_English_Final
 

English

 1.  Alfantookh, A. “Web Hacking Detection and Recovery Model,” the Scientific Bulletin of the Faculty of Engineering, Ain Shams University, 2006.

  2.  Alfantookh A. “An automated universal server level solution for SQL injection security flaw.” Proceedings of  the IEEE International Conference on Electrical, Electronic and computer Engineering (ICEEC'04), Cairo, Egypt, September, 2004.

 3. Alfantookh A. "DoS Attacks Intelligent Detection using Neural Networks", the Journal of King Saud University, Computer and Information Sciences, Vol. 18, 2005.

 4. Bakry SH, Alfantookh A. IT governance practices: COBIT, Saudi Computer Journal: Applied Computing and Informatics 2006; 5(2): pp. 53-61. 

5. Alfantookh, A. "Implementation of a family of 234 trees in the hypercube." MS Thesis, Oklahoma State University, Stillwater, USA, 1992.

 6. Alfantookh, A. "Experimental evaluation of high-speed transport protocol mechanisms." Ph.D. Thesis, Illinois Institute of Technology, Chicago, USA, 1995.

 7. Alfantookh, A.; George, K. "Implementation of 2-4 finger trees in the hupercube architecture," Proceedings of the 1995 ACM Symposium on Applied Computing, pp. 198-205, Nashville, Tennessee, United States, 1995.

 8. Soliman, H.; Elmaghraby, A.; Alfantookh, A. " Performance Evaluation of a Clustered Adaptive-Risk Approach for Parallel Simulation." ِproceedings of the Second IEEE Symposium in Computer and Communication, ISCC' 97. Alexandria. Egypt, pp. 614-618, July 1997.

 9. Alfantookh, A.; Albadr, B. “ Review of the Internet arabization techniques.” The first Workshop on the Internet arabization Techniques. King Saud University. 1997.

10.Soliman, H.; Alharbi, S.; Alfantookh, A.; Almazyad, A. An object oriented visual simulation environment for queuing networks.” Proceedings of the 15th Saudi National Computer Conference (NCC’97), Dhahran, Saudi Arabia, November 1997, pp. 499-507.

11.Alfantookh A., Soliman, H., Jabli, F.  “Performance evaluation of a web-based parallel simulator.”  Proceedings of the 17th IASTED International Conference APPLIED INFORMATICS,(AI’99), Innsbruck, Austria, February 1999, pp. 205-207.

12.Soliman, H.; Alfantookh, A. “Modeling and simulation of the operation of a fleet-oriented system.” Proceedings of the IASTED International Conference on Modeling and Simulation (MS’99), May 1999, Philadelphia, USA, pp. 566-569.

13.Alwagait, E.; Alfantookh, A. “Multi-Level authentication model for the World Wide Web.” Proceedings of the Gulf Internet 99 Symposium (GI’99), Dammam, Saudi Arabia, September 1999, pp. 96-99.

14. Soliman, H.; Alfantookh, A. “Web-Based Simulation: An Overview.” Proceedings of the Gulf Internet 99 Symposium (GI’99), Dammam, Saudi Arabia, September 1999, pp. 96-99.

 

الخبرات البحثية (اللغة العربية) :

1.     عبد القادر الفنتوخ، بدر البدر "مسح لاستخدامات تقنيات الإنترنت باللغة العربية" ندوة تقنيات تعريب شبكة الإنترنت الأولى، جامعة الملك سعود بالرياض. 1417 هـ.

2.       عبد العزيز السلطان، عبد القادر الفنتوخ "الإنترنت في التعليم : مشروع المدرسة الإلكترونية" مجلة رسالة الخليج العربي العدد الحادي والسبعون. مكتب التربية العربي لدول الخليج 1420 هـ.

3.     عبد القادر الفنتوخ "نحو إنترنت تعليمية" منظمة اليونسكو ومكتب التربية العربي لدول مجلس الخليج العربي. 1419 هـ.

4.     عبد القادر الفنتوخ "المؤسسات الإسلامية في عصر الإنترنت" ملتقى خادم الحرمين الإسلامي الثقافي –1422 – كوبنهاجن –الدانمارك.

الكتب

1.     الإنترنت خدمات وتقنيات. كتاب المجلة العربية العاشر، شوال 1418 هـ.

2.     الإنترنت للمستخدم العربي. مكتبة العبيكان للطباعة والنشر 1419 هـ.

3.     الإنترنت مهارات وحلول . مكتبة الشقري 1422 هـ.

4.     الشبكة وغزل الأشباح. مدار الوطن 1426 هـ

 

 My Publications

NCC97.pdfNCC97عبدالقادر عبدالله الفنتوخ
DoS attacks using NN.pdfDoS attacks using NNعبدالقادر عبدالله الفنتوخ
Web based simulation.pdfWeb based simulationعبدالقادر عبدالله الفنتوخ
Web Hacking Detection and Recovery Model.pdfWeb Hacking Detection and Recovery Modelعبدالقادر عبدالله الفنتوخ
auselsqifinal.pdfauselsqifinalعبدالقادر عبدالله الفنتوخ
IT governance practices COBIT.pdfIT governance practices COBITعبدالقادر عبدالله الفنتوخ
Assessment of IT in Higher Education Institutions Sept 2007.pdfAssessment of IT in Higher Education Institutions Sept 2007عبدالقادر عبدالله الفنتوخ
DoS Attacks Intelligent Detection using Neural Networks  Arabic abstract.pdfDoS Attacks Intelligent Detection using Neural Networks Arabic abstractعبدالقادر عبدالله الفنتوخ
DoS Attacks Intelligent Detection using Neural Networks.pdfDoS Attacks Intelligent Detection using Neural Networksعبدالقادر عبدالله الفنتوخ
Improved Detection System of Denial of Service Attack.pdfImproved Detection System of Denial of Service Attackعبدالقادر عبدالله الفنتوخ
IP and SW Industry ppt.pdfIP and SW Industry pptعبدالقادر عبدالله الفنتوخ
IP and SW Industry.pdfIP and SW Industryعبدالقادر عبدالله الفنتوخ
Public private sectors coopartion.pdfPublic private sectors coopartionعبدالقادر عبدالله الفنتوخ

 Error

Web Part Error: A Web Part or Web Form Control on this Page cannot be displayed or imported. The type could not be found or it is not registered as safe.
King Saud University. All rights reserved, 2007 | Disclaimer |   CiteSeerx