Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels MA Almaiah, O Almomani, A Alsaaidah, S Al-Otaibi, N Bani-Hani, ... Electronics 11 (21), 3571, 2022 | 84 | 2022 |
A new blockchain-based authentication framework for secure IoT networks AK Al Hwaitat, MA Almaiah, A Ali, S Al-Otaibi, R Shishakly, A Lutfi, ... Electronics 12 (17), 3618, 2023 | 49 | 2023 |
Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks AK Al Hwaitat, MA Almaiah, O Almomani, M Al-Zahrani, RM Al-Sayed, ... International Journal of Advanced Computer Science and Applications 11 (4), 2020 | 48 | 2020 |
Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness M Alawida, B Abu Shawar, OI Abiodun, A Mehmood, AE Omolara, ... Information 15 (1), 27, 2024 | 39 | 2024 |
AN INVESTIGATION OF DIGITAL FORENSICS FOR SHAMOON ATTACK BEHAVIOUR IN FOG COMPUTING AND THREAT INTELLIGENCE FOR INCIDENT RESPONSE AKAHS Manaseer Journal of Theoretical and Applied Information Technology 98 (07), 2020 | 29 | 2020 |
Big data based smart blockchain for information retrieval in privacy-preserving healthcare system A Ali, MF Pasha, OH Fang, R Khan, MA Almaiah, A K. Al Hwaitat Big data intelligence for smart applications, 279-296, 2022 | 24 | 2022 |
A secure internet of medical things framework for breast cancer detection in sustainable smart cities THH Aldhyani, MA Khan, MA Almaiah, N Alnazzawi, AKA Hwaitat, ... Electronics 12 (4), 858, 2023 | 22 | 2023 |
A survey on Li Fi technology and internet of things (IOT) AK Al Hwaitat, MH Qasem International Journal of Advanced Trends in Computer Science and Engineering …, 2020 | 11 | 2020 |
Centralized Web Application Firewall Security System SMAKA Hwaitat Modern Applied Science; 12 (10), 164-170, 2018 | 11* | 2018 |
A survey of digital forensic methods under advanced persistent threat in fog computing environment AK Alhwaitat, S Manaseer, RMH Al-Sayyed Journal of Theoretical and Applied Information Technology 97 (18), 4934-4954, 2019 | 9 | 2019 |
An investigator digital forensics frequencies particle swarm optimization for detection and classification of APT attack in fog computing environment (IDF-FPSO) AK Hwaitat, S Manaseer, RM Al-Sayyed, MA Almaiah, O Almomani J. Theor. Appl. Inf. Technol 98 (7), 937-952, 2020 | 8 | 2020 |
Dspamonto: an ontology modelling for domain-specific social spammers in microblogging M Al-Hassan, B Abu-Salih, A Al Hwaitat Big Data and Cognitive Computing 7 (2), 109, 2023 | 7 | 2023 |
Recent innovations in artificial intelligence and smart applications M Al-Emran, K Shaalan Springer, 2022 | 7 | 2022 |
Improved Path Testing Using Multi-Verse Optimization Algorithm and the Integration of Test Path Distance. HN Fakhouri, AKA Hwaitat, M Ryalat, F Hamad, J Zraqou, A Maaita, ... International Journal of Interactive Mobile Technologies 17 (20), 2023 | 6 | 2023 |
Computer hardware components ontology AKA Hwaitat, A Shaheen, K Adhim, EN Arkebat, AAA Hwiatat Modern Applied Science 12 (3), 35, 2018 | 5 | 2018 |
Sentiment analysis as a way of web optimization OM Rababah, AK Hwaitat, DA Al Qudah Scientific Research and Essays 11 (8), 90-96, 2016 | 5 | 2016 |
& Aldhyani, TH (2022). Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels MA Almaiah, O Almomani, A Alsaaidah, S Al-Otaibi, N Bani-Hani, ... Electronics 11 (21), 3571, 0 | 5 | |
Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification AK Al Hwaitat, HN Fakhouri Applied Sciences 14 (19), 9142, 2024 | 3 | 2024 |
Overview of Mobile Attack Detection and Prevention Techniques Using Machine Learning. AK Al Hwaitat, HN Fakhouri, M Alawida, MS Atoum, B Abu-Salih, ... International Journal of Interactive Mobile Technologies 18 (10), 2024 | 3 | 2024 |
Hybrid algorithm to evaluate e-business website comments OM Rababah, AK Hwaitat, DA Al Qudah, R Halaseh Communications and Network 8 (03), 137, 2016 | 3 | 2016 |