Publications

Export 29 results:
Sort by: Author Title Type [ Year  (Desc)]
2023
Abdelwahab, M. B. M., and I. M. A. Helal, "Advanced Techniques for Business Process Automation: Insights and Challenges", 2023 Intelligent Methods, Systems, and Applications (IMSA): IEEE, pp. 303–308, 2023. Abstract
n/a
Helal, I. M. A., H. T. Elsayed, and S. A. Mazen, "Assessing and Auditing Organization’s Big Data Based on COBIT 5 Controls: COVID-19 Effects", World Conference on Internet of Things: Applications & Future: Springer Nature Singapore Singapore, pp. 119–153, 2023. Abstract
n/a
Gamal, M., I. M. A. Helal, S. A. Mazen, and S. Elhennawy, "Governance Model for Cloud Computing Service", World Conference on Internet of Things: Applications & Future: Springer Nature Singapore Singapore, pp. 97–116, 2023. Abstract
n/a
Taha, A., S. A. Mazen, and I. M. A. Helal, "IFPS-RPA: Interface-based Frequent Pattern Segmentation for Robotic Process Automation", 2023 Intelligent Methods, Systems, and Applications (IMSA): IEEE, pp. 610–615, 2023. Abstract
n/a
Abdelkader, M. A., S. A. Mazen, and I. M. A. Helal, "LMSs: A Roadmap from Selection to Evaluation", 2023 Intelligent Methods, Systems, and Applications (IMSA): IEEE, pp. 484–489, 2023. Abstract
n/a
Nassar, E. Y., S. Mazen, S. Cra$\beta$, and I. M. A. Helal, "Modelling Blockchain-Based Systems Using Model-Driven Engineering", 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA): IEEE, pp. 329–334, 2023. Abstract
n/a
Montasser, R. K., and I. M. A. Helal, "Process Discovery Automation: Benefits and Limitations", 2023 Intelligent Methods, Systems, and Applications (IMSA): IEEE, pp. 496–501, 2023. Abstract
n/a
2022
Helmy, M., S. Mazen, I. M. Helal, and W. Youssef, "Analytical Study on Building a Comprehensive Big Data Management Maturity Framework", International Journal of Information Science and Management, vol. 20, no. 1, pp. 225-255, 2022. AbstractWebsite
n/a
Esheiba, L., I. M. A. Helal, A. Elgammal, and M. E. El-Sharkawi, "A Data Warehouse-Based System for Service Customization Recommendations in Product-Service Systems", Sensors, vol. 22, no. 6, 2022. AbstractWebsite
n/a
Zaki, N. M., I. Helal, A. Awad, and E. E. Hassanein, "Efficient Checking of Timed Order Compliance Rules over Graph-encoded Event Logs", arXiv preprint arXiv:2206.09336, 2022. Abstract
n/a
Zaki, N. M., I. Helal, A. Awad, and E. E. Hassanein, "Efficient Checking of Timed Order Compliance Rules over Graph-encoded Event Logs", arXiv preprint arXiv:2206.09336, 2022. Abstract
n/a
Gamal, M., I. M. A. Helal, S. A. Mazen, and S. Elhennawy, "IS Risks Governance for Cloud Computing Service", Lecture Notes in Networks and Systems, vol. 224, pp. 67-79, 2022. AbstractWebsite
n/a
Gamal, M., I. M. A. Helal, S. A. Mazen, and S. Elhennawy, "IS Risks Governance for Cloud Computing Service", COVID-19 Challenges to University Information Technology Governance: Springer Cham, 2022.
Elnakeep, E., I. M. A. Helal, and S. A. Mazen, "Models and Frameworks for IS Outsourcing Structure and Dimensions: A Holistic Study", Lecture Notes in Networks and Systems, vol. 299, pp. 592-607, 2022. AbstractWebsite
n/a
Helal, I. M. A., and A. Awad, "Online correlation for unlabeled process events: A flexible CEP-based approach", Information Systems, vol. 108, 2022. AbstractWebsite
n/a
Shibl, M. A., I. M. A. Helal, and S. A. Mazen, "System Integration for Large-Scale Software Projects: Models, Approaches, and Challenges", Lecture Notes in Networks and Systems, vol. 299, pp. 99-113, 2022. AbstractWebsite
n/a
2021
Al-Matari, O. M. M., I. M. A. Helal, S. A. Mazen, and S. Elhennawy, "Adopting security maturity model to the organizations’ capability model", Egyptian Informatics Journal, vol. 22, no. 2, pp. 193-199, 2021. AbstractWebsite
n/a
Esheiba, L., A. Elgammal, I. M. A. Helal, and M. E. El-Sharkawi, "A hybrid knowledge-based recommender for product-service systems mass customization", Information (Switzerland), vol. 12, no. 8, 2021. AbstractWebsite
n/a
Al-Matari, O. M. M., I. M. A. Helal, S. A. Mazen, and S. Elhennawy, "Integrated framework for cybersecurity auditing", Information Security Journal, vol. 30, no. 4, pp. 189-204, 2021. AbstractWebsite
n/a
2020
Helal, I. M. A., and A. Awad, Correlating Unlabeled Events at Runtime, , 2020. Abstract

n/a

Kamal, S., I. M. A. Helal, S. A. Mazen, and S. Elhennawy, "Computer-assisted audit tools for IS auditing: A comparative study", Lecture Notes in Networks and Systems, vol. 114, pp. 139-155, 2020. AbstractWebsite
n/a
2019
Al-Matari, O. M., I. M. A. Helal, S. A. Mazen, and S. Elhennawy, "Security Management Techniques and Tools for IS Auditing", 2019 1st International Conference of Intelligent Computing and Engineering: Toward Intelligent Solutions for Developing and Empowering our Societies, ICOICE 2019, 2019. Abstract

n/a

2018
Al-Matari, O. M., I. M. A. Helal, S. A. Mazen, and S. Elhennawy, "Cybersecurity Tools for IS Auditing", The 6th International Conference on Enterprise Systems, Limassol, Cyprus, IEEE, pp. 217-223, 2018. Abstract

In a time of growing threats and advancing circumstances, receiving and keeping up a strong cybersecurity profile in the enterprises are crucial. Important data and resources must be protected. Nowadays, cybersecurity became a predominant issue facing most organizations. It is recognized by organizations as an enterprise-wide issue requiring protection and detection from possible and malicious attacks to protect enterprise information assets. Hence, enterprises are obligated to use multiple tools for covering most of the cybersecurity aspects through different operations and for supporting different levels of users. Information systems auditing is becoming more difficult due to the rapidly developing technological threats. Hence, having these audits and reviews performed by independent functions increase the likelihood of detecting control weaknesses and provides further checks. These control issues are typically not due to the failure of the technology. However, they are mostly the result of individuals not executing the process, or using a process that is poorly defended. The main purpose of this research is to make a comparative study of the capabilities of most of the available automated cybersecurity auditing tools for frontend cloud computing. The results of this comparative study lead to knowing how to secure the enterprise's assets by using automated tools and techniques. Also, it uses clear steps to gather the information to provide the evidence required in the final report of IS auditing.

Abdulhameed, N. M., I. Helal, A. Awad, and E. Ezat, "A Resource Recommendation Approach based on Co-Working History", INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, vol. 9, issue 7: SCIENCE & INFORMATION SAI ORGANIZATION LTD 19 BOLLING RD, BRADFORD, WEST YORKSHIRE, 00000, ENGLAND, pp. 236-245, 2018. AbstractWebsite

Recommending the right resource to execute the next activity of a running process instance is of utmost importance for the overall performance of the business process, as well as the resource and for the whole organization. Several approaches have recommended a resource based on the task requirements and the resource capabilities. Moreover, the process execution history and the logs have been used to better recommend a resource based on different human-resource recommender criteria like frequency and speed of execution, etc. These approaches considered the recommendation based on the individual’s execution history of the task that will be allocated to the resource. In this paper, a novel approach based on the co-working history of resources has been proposed. This approach considers the resources that had executed the previous tasks in the current running process instances. Then, it recommends a resource that has the best harmony with the rest of the resources.

2015
Bayomie, D., I. M. A. Helal, A. Awad, E. Ezat, and A. ElBastawissi, Deducing Case IDs for Unlabeled Event Logs (Technical Report), , Cairo, Faculty of Computers and Information, pp. 1-16, June, 2015. bplabellingeventlogtr.pdf
Helal, I. M. A., A. Awad, and A. ElBastawissi, "Runtime deduction of case ID for unlabeled business process execution events", Computer Systems and Applications (AICCSA), 2015 IEEE/ACS 12th International Conference of, Marrakech, Morocco, IEEE, pp. 1-8, 2015. Abstract

n/a

Bayomie, D., I. M. A. Helal, A. Awad, E. Ezat, and A. ElBastawissi, "Deducing Case IDs for Unlabeled Event Logs", Business Process Management Workshops - {BPM} 2015, 13th International Workshops, Innsbruck, Austria, August 31 - September 3, 2015, Revised Papers, vol. 256: Springer, pp. 242–254, 2015. Abstract
n/a
2010
Helal, I. M. A., A. El-Bastawissy, and O. Hegazy, "ICCPN: Interval-based Conditional Colored Petri Net", Informatics and Systems (INFOS), 2010 The 7th International Conference on, Cairo, Egypt, IEEE, pp. 1-8, 2010. Abstract

n/a