Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hassan Achi is active.

Publication


Featured researches published by Hassan Achi.


international conference on computer engineering and systems | 2008

Network security approach for digital forensics analysis

Hassan Achi; Ali Hellany; Mahmood H Nagrial

Advances in Digital Technology have presented new challenges to both Industry and Law. Technology security experts are enhancing platforms security to protect enterprise and government from intrusions, whereas legal experts are adopting new techniques to investigate ldquoillegalrdquo breaches to systems and networks. This paper provides an overview of Digital Forensics methodologies, computer and network vulnerabilities and security measures, forensics tracking mechanisms to detect and deter intruders. A case study for tracing a Distributed DoS attack is also presented.


international conference on applied electromagnetics and communications | 2003

Performance comparison of spread ALOHA and CDMA wireless systems

Hassan Achi; A. Hellany; R. Liyana-pathirana

Wireless multiple access technology has grown over several decades, with new protocols being developed. Spread ALOHA has become one of the advanced techniques promising several advantages over existing conventional and spread spectrum based wireless systems. With spread ALOHA the wireless system becomes simpler, operationally flexible, higher in bandwidth and may accommodate high number of users [Dennis et al., 1997]. In this paper the performance, in terms of throughput and time delay, of spread ALOHA system as compared with code-division-multiple-access (CDMA) is analysed and evaluated in the presence of noise and interference. Mathematical expressions are derived to estimate probability of error, throughput and time delay to compare both wireless systems.


international conference on computer engineering and systems | 2008

An overview of digital security forensics approach and modelling

Ali Hellany; Hassan Achi; Mahmood H Nagrial

Digital Forensics has rapidly evolved over the last decade and continues to gain significance in both the law enforcement and the scientific community. It has now become an intrinsically interdisciplinary field, and research work has been established in various areas such as information & communication technologies, law, social sciences and business administration. This paper provides an overview of Digital Forensics methodologies, modeling, analysis and applications. It also discusses some of the major technical and legal challenges in the combat of digital technology crimes.


international symposium on high capacity optical networks and enabling technologies | 2009

Digital forensics of wireless systems and devices technical and legal challenges

Hassan Achi; Ali Hellany; Mahmood H Nagrial

Wireless Digital Security Forensics has been currently acknowledged as a major challenge for both technical and legal organizations; the growth of wireless networks and access devices have created more security vulnerabilities and resulted in more incidents and threats to both organizations and consumers. While there are current methodologies, techniques and tools which are utilized or being developed in this area, the challenge remains to maintain and keep up with the fast paste of the wireless growing technologies. In this paper we discuss some of the current challenges and highlight some approaches and techniques which can be used during the course of forensics investigation of wireless systems and devices.


international conference on computer engineering and systems | 2009

Methodology and challenges in digital security forensics of wireless systems and devices

Hassan Achi; Ali Hellany; Mahmood H Nagrial

Wireless Digital Security Forensics has been currently acknowledged as a major challenge for both technical and legal organizations; the growth of wireless networks and access devices have created more security vulnerabilities and resulted in more incidents and threats to both organizations and consumers. While there are current methodologies, techniques and tools which are utilized or being developed in this area, the challenge remains to maintain and keep up with the fast paste of the wireless growing technologies. In this paper we discuss some of the current challenges and highlight some approaches and techniques which can be used during the course of forensics investigation of wireless systems and devices.


international conference on communication technology | 2003

Performance analysis for spread ALOHA wireless systems

Hassan Achi; W. Jibrail; Ranjith Liyanapathirana

Spread ALOHA has emerged as an advanced wireless multiple access technology promising several advantages over existing conventional and spread spectrum based wireless systems. With spread ALOHA the wireless system becomes simpler, operationally flexible, higher in bandwidth and may accommodate high number of users (Elliot, DW & Abramson, N, 1997). In this paper the performance, in terms of throughput and time delay, of spread ALOHA system as compared with code division multiple access is analyzed and evaluated in the presence of noise and interference. Mathematical expressions are derived to estimate probability of error, throughput and time delay to compare both wireless systems.


international symposium on high-capacity optical networks and enabling technologies | 2007

Performance improvement of spread ALOHA systems using single code

Hassan Achi; Ali Hellany; Mahmood H Nagrial

Spread ALOHA as an advanced multiple access technique has shown several advantages over existing conventional and spread spectrum based wireless systems. Spread ALOHA is currently recognised as a simplified wireless multiple access system which provides a higher bandwidth and may accommodate high number of users. Over the last decade, several models have been developed to predict and estimate the performance of Spread ALOHA. Various combinations of protocols have been employed to enhance performance. This paper investigates the employment of a unique spreading code in conjunction with Spread ALOHA as opposed to the common method of employing distinct spreading codes for all users on the communication channel. In this paper we have modeled and simulated a Single Code Spread ALOHA (SCSA) system together with a conventional CDMA ALOHA system in order to analyse and compare the performance of both systems. Two types of PN codes were used in the simulation models, namely m-sequence and Gold codes. The simulation results showed comparable performance of both systems, and verified the suitability of m-sequence for SCSA and Gold codes for CDMA respectively.


international conference on industrial technology | 2002

Reducing delays for frame relay customers over FR-ATM networks

A. Rizk; Ali Hellany; Hassan Achi; Mahmood H Nagrial

The ever-increasing implementation of frame relay (FR) over asynchronous transfer mode (ATM) backbone is leading to a considerable latency in customer services running over the network. This paper describes the process of build-up delay in a FR ATM interworking. In addition, this paper proposes a new approach to reduce the latency by increasing the PIR/SIR ratio. Furthermore, a case study is introduced in order to validate the proposed method. Finally, the burstiness, virtual bandwidth and buffer overflow affecting the network performance are discussed.


international conference on electronics, circuits, and systems | 2007

Performance Analysis of Single Code Spread ALOHA Systems

Ali Hellany; Hassan Achi

Spread ALOHA has become one of the advanced multiple access techniques promising several advantages over existing conventional and spread spectrum based wireless systems. Spread ALOHA is currently recognised as a simplified wireless multiple access system which provides a higher bandwidth and may accommodate high number of users. Over the last decade, several models have been developed to predict and estimate the performance of Spread ALOHA. Various combinations of protocols have been employed to enhance performance. This paper investigates the employment of a unique spreading code in conjunction with Spread ALOHA as opposed to the common method of employing distinct spreading codes for all users on the communication channel. In this paper we have modeled and simulated a Single Code Spread ALOHA (SCSA) system together with a conventional CDMA ALOHA system in order to analyse and compare the performance of both systems. Two types of PN codes were used in the simulation models, namely m-sequence and Gold codes. The simulation results showed comparable performance of both systems, and verified the suitability of m-sequence for SCSA and Gold codes for CDMA respectively.


international conference on electronics circuits and systems | 2003

Video broadcasting using switched virtual circuits over ATM network

Hassan Achi; Ali Hellany; Ali Elachi

Switched Virtual Circuits (SVC) have been a known functionality of ATM networks for years. The connection oriented and low latency nature of ATM makes it natural for handling streaming protocols such as video and multimedia. One of the advantages of SVC implementation is to provide bandwidth on demand, and reduce network complexity and costs. This paper explores the implementation of Video broadcasting services using SVC over ATM networks. A Network design based on performance tests has been proposed and Service Level Agreement is recommended.

Collaboration


Dive into the Hassan Achi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

A. Rizk

University of Sydney

View shared research outputs
Top Co-Authors

Avatar

A. Hellany

University of Western Sydney

View shared research outputs
Top Co-Authors

Avatar

Ali Elachi

University of Western Sydney

View shared research outputs
Top Co-Authors

Avatar

Ali Rizk

University of Sydney

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

R. Liyana-pathirana

University of Western Sydney

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge