106
Thesis Title: A Genetics-Based Approach to Inheritance Modeling
Author: Dareen Mousa Mohammad Hamoudeh, Supervisor: Prof. Said Ghoul, Year: 2012
Faculty: Information Technology, Department: Computer Science

Abstract: The conventional Inheritance concept which is adopted in the current Object Oriented Programming (OOP), where it is acting on "is-a" hierarchy model, has some defects. Where OOP is trying to be more close to the real life, it is still far from genetics principles. Inheritance means that the child class can inherit, and get everything that is public in the parent class automatically. This process has solved many problems, but it does not simulate what is really happening in our life, where each object can gain just the needed traits from the parent class. That means the conventional inheritance is not selective and is generating identical objects. While conventional Inheritance acts on “is-a” hierarchy model, the works that introduced the selective inheritance were also done on this model. The inspiration from genetics has led to a selective inheritance acting upon a “Composed by” model rather than the “is-a” model; where in biology, the needed traits are selected from the Genome which holds all the aspect traits. Those traits are classified into several classes according to "Composed by" relation. After evaluation, it has shown that the selective inheritance that acts on "composed by" model is better than the selective inheritance over “is-a” hierarchy model.

Keywords: OOP, Inheritance, Hierarchy Model

107
Thesis Title: 4 + 1 View Architectural Model Pattern for Software-Intensive Systems
Author: Noor Rasheed Hameed, Supervisor: Dr. Moayad A.fadhil, Year: 2012
Faculty: Information Technology, Department: Computer Science

Abstract: The architecture is general has no specific recommendation on using special method or language. Software-intensive systems are considered as one of the major and essential roles in software engineering, where software-intensive systems affect on the design, constructions, deployment and also the evolution of the whole system. In this thesis we purpose an enhancement on a specific model (4+1 view model) in order to reduce challenges a software intensive system. The problem of architecture model for software intensive system is lack of software pattern (Template). The new pattern must enhance the 4+1 view model by providing the model of how to design and implement two types of software-intensive system (monitoring and control), (Integration and composition ). So, that we created a new pattern (template) that solves the problem mentioned above. As a result we will have pattern (template) that ensure an adaptable methodology which can integrate and synchronize all the activities of software intensive system.

Keywords: 4+1 View Model, Software-Intensive, Template, Monitoring, Control, Integration, Composition

108
Thesis Title: A Bio-Inspired Objects Evolution Methodology
Author: Enas Tawfiq Sa’ad Al-Naffar, Supervisor: Prof. Said Ghoul, Year: 2012
Faculty: Information Technology, Department: Computer Science

Abstract: One of the major issues of object-oriented programming languages is the lack of reclassification mechanisms. Reclassification allows an object to change its class at runtime. Object reclassification is desired in applications whose entities need to change dynamically at runtime. The previous approaches dealt with object reclassification in different ways. But none had approached the notion of real entities evolution, where objects can evolve while belonging to the same class. This had led to a large number of classes most of the times; making the design and the implementation of the intended system more complex. The desired evolution of objects should allow objects to evolve automatically at runtime, without changing their classes membership. In this work, we present a new approach for objects evolution; inspired by some genetics concepts. Objects that belong to the same class can change their structure, functions and behaviors at run time automatically, while keeping their membership to the same class. A slight environmental influence on the proposed evolution process is introduced.

Keywords: Bio-Inspired Model, Evolution, Genome, Genotype, Phenotype

109
Thesis Title: A Holistic Cyber Security Strategy Implementation Framework
Author: ISSA ALI FALAH ATOUM, Supervisor: Dr. Amer Abu Ali and Dr. Ahmed Otoom, Year: 2012
Faculty: Information Technology, Department: Computer Science

Abstract: Cyber Security Strategy (CSS) implementation is a problem for many countries. Cyberspace is insecure and is considered a challenging problem for many governments due to a set of factors such as: lack of holistic systematic cyber security strategy implementation frameworks, lack of comprehensive performance measures at the national level, and lack of cooperation with other governments in the field of cyber security. While several cyber security frameworks address the issue from a management perspective of cyber security, little research has been conducted on cyber security from engineering perspectives. This thesis proposes an implementation framework for cyber security strategy that has the following benefits: 1) helps the international governments to take on a consolidated approach to enforce the implementation of CSS across their nations, 2) The CSS-IF provides an early detection of likely threats and mitigate risks related to government information systems and critical infrastructure, 3) enhances security by providing leading and lagging measures of cyber security at the national level, and 4) helps convert the CSS from the natural language to a set of business and security requirements. The framework has been conceptually and practically validated to provide a proof of concept by using a case study and Bayes Belief Network. The case study shows that the CSS-IF is applicable to the Cyber Security Strategy of Jordan. The Bayesian network validation model shows the strong relevance of CSS-IF and its components to achieve the required security objectives. The CSS-IF outperforms other frameworks on six selected cyber security features. The framework is developed for CSS implementation; however a possible future research may show that it can be generalized or be applicable for other domains.

Keywords: Cyber Security, Security Performance, Requirements Elicitation, Strategy Implementation Framework, Information Assurance, and Strategic Controls.

110
Thesis Title: An Associative Classification Approach Using Data Mining For Predicting Phishy Email
Author: Bader Abdul Hafeez Al-rahamneh, Supervisor: Dr.Fadi Fayez Thabtah, Year: 2013
Faculty: Information Technology, Department: Computer Science

Abstract: Email communication has come up as an effective trend of communication nowadays. People are sending and receiving many messages per day, communicating with each other and interchanging files and information. Phishing using email is a common electronic crime. It is one of social engineering techniques used to get advantage of human unawareness. It allows abusive people to utilize the weaknesses in web security technologies to get confidential information, such as usernames, passwords, financial account credentials and credit card details. This thesis handles Phishy email problem using classification based on association rule mining, which is a common data mining approach that merges association rule discovery in the learning step within classification techniques. Experimental studies manifest that this learning approach produces clear simple rules by discovering all possible correlations among all attributes which is output “If-Then” classifiers that are understandable by end-user. However, this approach generates many rules that may redundant so this thesis proposes a new rule ranking method, rule pruning procedures in classifier building phase to remove unnecessary rules without impacting accuracy rate and new predicting procedure to obtain high accuracy rate. The result is an algorithm that discovers rules from dataset to improve upon previous works.

Keywords: Email Communication, Phishing, Electronic Crime, Social Engineering