أبحاث ودراسات

Interesting research area

Design Patterns and Design with Reuse.

Secure Software Modeling.

XMLs security, databases and frameworks.

Web services and its Applications.

Internetworking, Local Area Networks "LANs"

Information retrieving

 ———————————————————————————-

Publications

  • Tawfiq S. M. Barhoom, Lobna A.A. Abu-Serrieh ” THE ROLE OF AGENTS IN SEARCHING LOCAL NETWORK”,  The International Engineering

     

     

     

    Tawfiq S and Zhang S. Groundwork for True XML-Based Security Pattern Languages. Journal of Dong Hua University, Shanghai, China 2004 2nd Edition

     

    Tawfiq S and Zhang S. Trusted Exam Marks System at IUG Using XML-Signature, The 4th International Conference on Computer and Information Technology (CIT2004) Wuhan, China, 14-16 September 2004

     

    Tawfiq S. M. Barhoom, Lobna A.A. Abu-Serrieh " THE ROLE OF AGENTS IN SEARCHING LOCAL NETWORK",  The International Engineering Conference on Construction and Development – IUG – Gaza- Palestine, June 2007

     

    Tawfiq S and Zhang S. " XML Context`s Security Patterns Language: Description and Syntax" Information Technology Journal – 30-ITJ-DOI , 2007

     

    TAWFIQ S. BARHOOM, HEBA Z. AL-LAHHAM, SAFAA M. EL-SOUSI "Mobile-Agent-Based System for Controlling Anti-Virus over LANs" ,  Journal of Al-Aqsa University series of natural Science, 2010

     

    Tawfiq S. M. Barhoom, Eyad H. Elshami " PROTECTING MOBILE AGENT BASED ON HOST-BEHAVIOR ",  The International Engineering Conference on Construction and Development – IUG – Gaza- Palestine, 2010

     

    Tawfiq S. M. Barhoom, Raed S. K. Rasheed "Detection of XML Rewriting Attack: Enhance Inline Approach by Element Position", Journal of Al Azhar University–Gaza (Natural Sciences series),  2011

     

    Tawfiq. Barhoom and Eyad. Elshami "Detecting WLANs’ DoS Attacks Using Backpropagate Neural Network", Journal of Al Azhar University–Gaza (Natural Sciences series), [Accepted: August 2011]

     

    Tawfiq S. M. Barhoom, Raed S. K. Rasheed "Position of Signed Element for SOAP Message Integrity", International Journal of Computer Information Systems, Vol. 2, No. 4, 2011

     

    Tawfiq S. Barhoom and Sarah N. Kohail "A New Server-Side Solution for Detecting Cross Site Scripting Attack", International Journal of Computer Information Systems. IJCI August, 2011

     

    Tawfiq S. Barhoom, Lamiya M. AL_Saedi "N+1 Decision Trees For Attack Graph", The International Conference for Information and Communication  Technology –  ICICT – 2012

     

    Tawfiq Barhoom,  Hanaa Qeshta "Worm Detection by Combination of Classification With Neural Networks", International Arab Journal of e-Technology [Accepted: November 2012]

     

    Tawfiq Barhoom,  Hanaa Qeshta" adaptive Worm Detection Model Based On Multi Classifiers “WDMAC” Model", Palestinian International Conference on Information and Communication Technology 2013

     

    Tawfiq Barhoom, Eyad H Humaid , "Water Consumption Financial Fraud Detection: a model based on rule induction", Palestinian International Conference on Information and Communication Technology 2013

     

    Tawfiq Barhoom, ZakariaM. Abusilmiyeh "Cryptography method based on Image for Key Generation", Palestinian International Conference on Information and Communication Technology 2013

     

    Tawfiq Barhoom, Rasha atalaa " Filtering Features and Recommender Model For Messaging System of MOODLE" University  of  Palestine Journal 04/2014; 5(5):30

     

    Amna S. M Abukeshipa, Tawfiq Barhoom, "Implementation and Comparison of OTP Techniques (TOTP, HTOP, CROTP) to Prevent Replay Attack in RADIUS Protocol "Journal of Palestine Technical College-Deir El-Balah, 2014 (accepted)

     

    Manal I. Hejazi, Tawfiq Barhoom, "Extracting Guidance Against CrossSite Scripting Attack in Open Content Management System "Journal of Palestine Technical College-Deir El-Balah, 2014 (accepted)

     

    Mohammed H. Abu Hamada, Tawfiq S. Barhoom ,   " PALXSS:

    CLIENT SIDE SECURE TOOL TO DETECT XSS ATTACKS", SABA

    JOURNAL OF INFORMATION TECHNOLOGY AND NETWORKING

    (SJITN), May , 2014.

     

    Tawfiq S. Barhoom , Ramzi Abed, Mohammed Hamada, "Improve privacy protection for users in social networks in the Gaza Strip through awareness in security, and technical tools", Journal of Al Azhar University   Gaza, Natural

    Sciences, 12,2014 ( in Arabic)

     

    Tawfiq SM. Barhoom,  Emad KH. Elrayyes,"Model for Strengthening Accuracy through Detection of Anomalous Firewall Policy Rules". International Journal of Innovative Research in Computer and Communication Engineering Vol. 2, Issue 11, November 2014

     

    TAWFIQ S. BARHOOM, ZAKARIA KH. SAQALLAH " A model to ensure data integrity in the cloud", International Journal of Advanced Research in Computer and Communication Engineering  Vol. 3, Issue 12, December 2014 "

     

    Majed Tabash, Tawfiq Barhoom ,"An Approach for Detecting and Preventing DoS Attacks in LA N" International Journal of Computer Trends and Technology (IJCTT) – 2014 (accepted)

     

    Hussam AbdelRazek Elkurd , Tawfiq Barhoom ,"Preventing Buffer Overflow DOS Attack in Restful Services", International Journal of Information and Communication Technology Research , Volume 5 No. 1, January 2015 (accepted)

     

    Tawfiq S. Barhoom , Ramzi A. Matar,"Network Intrusion Detection Using Semi-Supervised Learning Based on Normal Behaviour's Standard Deviation", International Journal of Advanced Research in Computer and Communication Engineering , Vol. 4, Issue 1, January 2015

     

     

    Tawfiq S. Barhoom, Ibrahim S. Alfayoumi,"Client – Side Pharming Attacks Detection using Authoritative Domain Name Server", International Journal of Computer Applications (IJCA) March 2015 Edition

     

    Teejan T. El-Khazendar, Tawfiq S. M. Barhoom, Protect Local Data on Personal Devices: Third Party Application, Advances in Networks. Special Issue:Android Security. Vol. 3, No. 4-1, 2015, pp. 1-4. doi:10.11648/j.net.s.2015030401.11

     

    Tawfiq S. Barhoom, Sheren Mohammed Abo Mousa," A Steganography LSB technique for hiding Image within Image Using blowfish Encryption Algorithm", International Journal of Research in Engineering and Science (IJRES), Volume 3 Issue 3 ? March. 2015 ? PP.48-53

     

    Tawfiq S. Barhoom, Heba Al-Beltaji, " Detecting DDos Attack Using A Multilayer DataMining Techniques", Journal of Al Azhar University   Gaza, Natural

    Sciences, 3,2015 

     

    Awad, Badran M., and Tawfiq Barhoom. "Wormhole Attack Detection and Prevention Model in MANET Based on Hop-Count and Localization."

     

    Tawfiq S. Barhoom, Mohammed O Al-akhras "Enhanced Context-Aware Role-Based Access Control Framework for Pervasive Environment", Journal of Engineering Research and Technology (JERT)  Volume 1,Number 4(December 2014)

     

     

    Barhoom, Tawfiq S., and M. A. Ghosh. "Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms." International Journal of Research in Engineering and Science (IJRES) (2016).

     

    Barhoom, Tawfiq S., and Samir S. Hillis. "An Efficient Approach for Supporting Multi-Tenancy Schema Inheritance in RDBMS for SaaS." Journal of Engineering Research and Technology 2.4 (2015).

     

    Tawfiq S. Barhoom, Mohammed I. Nasman. " Malware Detection Based on Permissions on Android Platform Using Data Mining." Journal of Engineering Research and Technology 2.4 (2016).


    BARHOOM, Tawfiq S.; AHMED J. I. ELAFF, " Frame Duplication Forgery Detection Using Physical Random Object". SABA JOURNAL OF INFORMATION TECHNOLOGY AND NETWORKING (SJITN), 2016.

     

     

    Wesam Saqer, Tawfiq S. Barhoom." Steganography and Hiding Data with Indicators-based LSB Using a Secret Key", Engineering, Technology & Applied Science Research Vol. 6, No. 3, 2016, 1013-1017

     

    Tawfiq S. Barhoom1 and Rola J. Azaiza , "Enhance MOODLE Security Against XSS Vulnerabilities", International Journal of Computing and Digital Systems ISSN (2210-142X), 5, No.5 (Sep. 2016)

     

    , "Tawfiq S. Barhoom * , Fady R. Alkhateeb "Detecting Polymorphic No-Operations in Shellcode Based on Mining Techniques ", Saba Journal of Information Technology and Networking , S.J.I.T.N Vol .5 No.1 (2017)

    كتاب منهجي (الحاسوب 1) – جامعة القدس المفتوحة,2005 , يوسف ابو زر, توفيق برهوم 

     

     

———————————————————————————————————————————————

Talks

        امن المعلومات و ماهيتها:IS

       Towards E-Placement in Public Sector   EP

Patterns: Tools For Reuse Dp