متابعة
Ahmad K. AL Hwaitat
Ahmad K. AL Hwaitat
بريد إلكتروني تم التحقق منه على ju.edu.jo
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels
MA Almaiah, O Almomani, A Alsaaidah, S Al-Otaibi, N Bani-Hani, ...
Electronics 11 (21), 3571, 2022
842022
A new blockchain-based authentication framework for secure IoT networks
AK Al Hwaitat, MA Almaiah, A Ali, S Al-Otaibi, R Shishakly, A Lutfi, ...
Electronics 12 (17), 3618, 2023
492023
Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks
AK Al Hwaitat, MA Almaiah, O Almomani, M Al-Zahrani, RM Al-Sayed, ...
International Journal of Advanced Computer Science and Applications 11 (4), 2020
482020
Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness
M Alawida, B Abu Shawar, OI Abiodun, A Mehmood, AE Omolara, ...
Information 15 (1), 27, 2024
392024
AN INVESTIGATION OF DIGITAL FORENSICS FOR SHAMOON ATTACK BEHAVIOUR IN FOG COMPUTING AND THREAT INTELLIGENCE FOR INCIDENT RESPONSE
AKAHS Manaseer
Journal of Theoretical and Applied Information Technology 98 (07), 2020
292020
Big data based smart blockchain for information retrieval in privacy-preserving healthcare system
A Ali, MF Pasha, OH Fang, R Khan, MA Almaiah, A K. Al Hwaitat
Big data intelligence for smart applications, 279-296, 2022
242022
A secure internet of medical things framework for breast cancer detection in sustainable smart cities
THH Aldhyani, MA Khan, MA Almaiah, N Alnazzawi, AKA Hwaitat, ...
Electronics 12 (4), 858, 2023
222023
A survey on Li Fi technology and internet of things (IOT)
AK Al Hwaitat, MH Qasem
International Journal of Advanced Trends in Computer Science and Engineering …, 2020
112020
Centralized Web Application Firewall Security System
SMAKA Hwaitat
Modern Applied Science; 12 (10), 164-170, 2018
11*2018
A survey of digital forensic methods under advanced persistent threat in fog computing environment
AK Alhwaitat, S Manaseer, RMH Al-Sayyed
Journal of Theoretical and Applied Information Technology 97 (18), 4934-4954, 2019
92019
An investigator digital forensics frequencies particle swarm optimization for detection and classification of APT attack in fog computing environment (IDF-FPSO)
AK Hwaitat, S Manaseer, RM Al-Sayyed, MA Almaiah, O Almomani
J. Theor. Appl. Inf. Technol 98 (7), 937-952, 2020
82020
Dspamonto: an ontology modelling for domain-specific social spammers in microblogging
M Al-Hassan, B Abu-Salih, A Al Hwaitat
Big Data and Cognitive Computing 7 (2), 109, 2023
72023
Recent innovations in artificial intelligence and smart applications
M Al-Emran, K Shaalan
Springer, 2022
72022
Improved Path Testing Using Multi-Verse Optimization Algorithm and the Integration of Test Path Distance.
HN Fakhouri, AKA Hwaitat, M Ryalat, F Hamad, J Zraqou, A Maaita, ...
International Journal of Interactive Mobile Technologies 17 (20), 2023
62023
Computer hardware components ontology
AKA Hwaitat, A Shaheen, K Adhim, EN Arkebat, AAA Hwiatat
Modern Applied Science 12 (3), 35, 2018
52018
Sentiment analysis as a way of web optimization
OM Rababah, AK Hwaitat, DA Al Qudah
Scientific Research and Essays 11 (8), 90-96, 2016
52016
& Aldhyani, TH (2022). Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels
MA Almaiah, O Almomani, A Alsaaidah, S Al-Otaibi, N Bani-Hani, ...
Electronics 11 (21), 3571, 0
5
Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification
AK Al Hwaitat, HN Fakhouri
Applied Sciences 14 (19), 9142, 2024
32024
Overview of Mobile Attack Detection and Prevention Techniques Using Machine Learning.
AK Al Hwaitat, HN Fakhouri, M Alawida, MS Atoum, B Abu-Salih, ...
International Journal of Interactive Mobile Technologies 18 (10), 2024
32024
Hybrid algorithm to evaluate e-business website comments
OM Rababah, AK Hwaitat, DA Al Qudah, R Halaseh
Communications and Network 8 (03), 137, 2016
32016
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20