Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels MA Almaiah, O Almomani, A Alsaaidah, S Al-Otaibi, N Bani-Hani, ... Electronics 11 (21), 3571, 2022 | 56 | 2022 |
Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks AK Al Hwaitat, MA Almaiah, O Almomani, M Al-Zahrani, RM Al-Sayed, ... International Journal of Advanced Computer Science and Applications 11 (4), 2020 | 41 | 2020 |
AN INVESTIGATION OF DIGITAL FORENSICS FOR SHAMOON ATTACK BEHAVIOUR IN FOG COMPUTING AND THREAT INTELLIGENCE FOR INCIDENT RESPONSE AKAHS Manaseer Journal of Theoretical and Applied Information Technology 98 (07), 2020 | 24 | 2020 |
Big data based smart blockchain for information retrieval in privacy-preserving healthcare system A Ali, MF Pasha, OH Fang, R Khan, MA Almaiah, A K. Al Hwaitat Big Data Intelligence for Smart Applications, 279-296, 2022 | 19 | 2022 |
A new blockchain-based authentication framework for secure IoT networks AK Al Hwaitat, MA Almaiah, A Ali, S Al-Otaibi, R Shishakly, A Lutfi, ... Electronics 12 (17), 3618, 2023 | 16 | 2023 |
A secure internet of medical things framework for breast cancer detection in sustainable smart cities THH Aldhyani, MA Khan, MA Almaiah, N Alnazzawi, AKA Hwaitat, ... Electronics 12 (4), 858, 2023 | 14 | 2023 |
A survey on Li Fi technology and internet of things (IOT) AK Al Hwaitat, MH Qasem International Journal of Advanced Trends in Computer Science and Engineering …, 2020 | 9 | 2020 |
Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness M Alawida, B Abu Shawar, OI Abiodun, A Mehmood, AE Omolara, ... Information 15 (1), 27, 2024 | 8 | 2024 |
A survey of digital forensic methods under advanced persistent threat in fog computing environment AK Alhwaitat, S Manaseer, RMH Al-Sayyed Journal of Theoretical and Applied Information Technology 97 (18), 4934-4954, 2019 | 7 | 2019 |
Centralized Web Application Firewall Security System SMAKA Hwaitat Modern Applied Science; 12 (10), 164-170, 2018 | 7* | 2018 |
Big data intelligence for smart applications Y Baddi, Y Gahi, Y Maleh, M Alazab, L Tawalbeh Springer, 2022 | 6 | 2022 |
An investigator digital forensics frequencies particle swarm optimization for detection and classification of APT attack in fog computing environment (IDF-FPSO) AKAL Hwaitat, S Manaseer, RMH Al-Sayyed, M Almaiah, O Almomani Journal of Theoretical and Applied Information Technology 98 (7), 937-952, 2020 | 5 | 2020 |
Computer hardware components ontology AKA Hwaitat, A Shaheen, K Adhim, EN Arkebat, AAA Hwiatat Modern Applied Science 12 (3), 35, 2018 | 4 | 2018 |
DSpamOnto: An Ontology Modelling for Domain-Specific Social Spammers in Microblogging M Al-Hassan, B Abu-Salih, A Al Hwaitat Big Data and Cognitive Computing 7 (2), 109, 2023 | 3 | 2023 |
Sentiment analysis as a way of web optimization OM Rababah, AK Hwaitat, DA Al Qudah Scientific Research and Essays 11 (8), 90-96, 2016 | 3 | 2016 |
Hybrid algorithm to evaluate e-business website comments O M Rababah, A K Hwaitat, DA Al Qudah, R Halaseh Communications and Network 8 (03), 137-143, 2016 | 3 | 2016 |
Frequencies Wave Sound Particle Swarm Optimisation (FPSO) AK Al Hwaitat, RMH Al-Sayyed, IKM Salah, S Manaseer, HS Al-Bdour, ... Journal of Experimental & Theoretical Artificial Intelligence 34 (5), 749-780, 2022 | 2 | 2022 |
Distributed Detection and prevention of Web Threats in Heterogeneous Environment S Manaseer, K Al Hwaitat, R Jabri Modern Applied Science 12 (10), 13-22, 2018 | 2 | 2018 |
Measuring parallel performance of sorting algorithms S Manaseer, AK Al Hwaitat Modern Applied Science 12 (10), 1-23, 2018 | 2 | 2018 |
Web Threats Detection and Prevention Framework O M Rababah, A K Al Hwaitat, S Al Manaseer, H N Fakhouri, R Halaseh Communications and Network 8 (03), 170-178, 2016 | 2 | 2016 |