Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ihssan Alkadi is active.

Publication


Featured researches published by Ihssan Alkadi.


The Journal of Object Technology | 2003

Application of a Revised DIT Metric to Redesign an OO Design

Ghassan Alkadi; Ihssan Alkadi

In this paper, we continue a series of papers that discuss specific design metrics [Alkadi 1999] [Alkadi 2000] [Alkadi 2001] [Alkadi 1998]. The design metric discussed in this paper is the Depth of Inheritance [DIT] metric. Design evaluation is a recurring step that should be performed and checked multiple times before committing to the final design implementation. Metrics are utilized to evaluate inheritance and reuse in order to take into account the greater number of abstraction levels inherent in object-oriented systems. Furthermore, they facilitate the designers to address cost estimation and product quality across all life-cycle stages of developing the final product.


ieee aerospace conference | 2015

Collaborative penetration-testing and analysis toolkit (CPAT)

Darrien Rushing; Jason Guidry; Ihssan Alkadi

Penetration testing (or “pentesting”) is critical to both maintaining and increasing the reliability of computer networks while lessening their vulnerability. The number, importance and value of these networks has been growing over the past decade, and their capabilities and respective uses have been integrated into many aspects of our lives. Without penetration testing, our networks can fall victim to a myriad of malicious mayhem which has the potential for serious, large-scale ramifications, and when these networks are not operating as expected it is often individuals who suffer. However, penetration testing poses its own new and diverse set of problems to security analysts. Due to the abstract nature of performing a pentest, the near complete lack of design geared toward effective collaboration and teamwork in many widely used penetration testing tools can create a notable hindrance for security teams. This paper describes a software project surrounding network penetration testing from a collaborative standpoint and the problems associated with team-based efforts utilizing present network analysis tools and technologies.


Human systems management | 2003

Effects of Information Technology on the Business World

Ihssan Alkadi; Ghassan Alkadi; Michael W. Totaro


Human systems management | 2009

Barriers to e-texts usage and what prevents mass customization of texts and teaching materials

Ihssan Alkadi; Jason Matthew Johnson


Human systems management | 2006

Grid Computing: The past, now, and future

Ihssan Alkadi; Ghassan Alkadi


ieee aerospace conference | 2016

An algorithmic approach to improving cloud security: The MIST and Malachi algorithms

Justin LeJeune; Cara Tunstall; Kuo-pao Yang; Ihssan Alkadi


business information systems | 2011

Grid Computing: The Trend Of The Millenium

Ihssan Alkadi; Sandeep Gregory


ieee aerospace conference | 2001

Applying a revised RFC metric to redesign an OO design

Ghassan Alkadi; Ihssan Alkadi


International journal of engineering research and technology | 2013

Enforcing anti-breaching of Security in Cloud Computing by Applying multiple Methodologies to enhance protection of Cloud based Grids/Servers

Ihssan Alkadi; Ghassan Alkadi; Kuo-pao Yang; Matthew Gill


Human systems management | 2004

Growth of international franchising through E‐commerce

Ihssan Alkadi; Ghassan Alkadi; Zhiwei Zhu

Collaboration


Dive into the Ihssan Alkadi's collaboration.

Top Co-Authors

Avatar

Ghassan Alkadi

Southeastern Louisiana University

View shared research outputs
Top Co-Authors

Avatar

Kuo-pao Yang

Southeastern Louisiana University

View shared research outputs
Top Co-Authors

Avatar

Michael W. Totaro

University of Louisiana at Lafayette

View shared research outputs
Top Co-Authors

Avatar

Zhiwei Zhu

University of Louisiana at Lafayette

View shared research outputs
Top Co-Authors

Avatar

Harlan L. Etheridge

University of Louisiana at Lafayette

View shared research outputs
Top Co-Authors

Avatar

Sandeep Gregory

University of Louisiana at Lafayette

View shared research outputs
Top Co-Authors

Avatar

Ghassan Alkadi

Southeastern Louisiana University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge