Agile software development methodologies: survey of surveys M Al-Zewairi, M Biltawi, W Etaiwi, A Shaout Journal of Computer and Communications 5 (05), 74, 2017 | 210 | 2017 |
Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system M Al-Zewairi, S Almajali, A Awajan 2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017 | 124 | 2017 |
Improving knowledge based spam detection methods: The effect of malicious related features in imbalance data distribution J Alqatawna, H Faris, K Jaradat, M Al-Zewairi, O Adwan International Journal of Communications, Network and System Sciences 8 (05), 118, 2015 | 53 | 2015 |
Unknown Security Attack Detection Using Shallow and Deep ANN Classifiers M Al-Zewairi, S Almajali, M Ayyash Electronics 9 (12), 2006, 2020 | 37 | 2020 |
Spotting the Islamist Radical within: Religious Extremists Profiling in the United State M Al-Zewairi, G Naymat Procedia Computer Science 113, 162-169, 2017 | 37 | 2017 |
Optimized multi-layer hierarchical network intrusion detection system with genetic algorithms P Santikellur, T Haque, M Al-Zewairi, RS Chakraborty 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS …, 2019 | 15 | 2019 |
An Empirical Evaluation of Intelligent Machine Learning Algorithms under Big Data Processing Systems D Suleiman, M Al-Zewairi, G Naymat Procedia Computer Science 113, 539-544, 2017 | 13 | 2017 |
Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database M Al-Zewairi, J Alqatawna, O Al-Kadi 2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing …, 2011 | 13 | 2011 |
An experimental software defined security controller for software defined network M Al-Zewairi, D Suleiman, S Almajali 2017 Fourth International Conference on Software Defined Systems (SDS), 32-36, 2017 | 12 | 2017 |
Multilevel fuzzy inference system for risk adaptive hybrid RFID access control system M Al-Zewairi, D Suleiman, A Shaout 2016 Cybersecurity and Cyberforensics Conference (CCC), 1-7, 2016 | 12 | 2016 |
Risk adaptive hybrid RFID access control system M Al‐Zewairi, J Alqatawna, J Atoum Security and Communication Networks 8 (18), 3826-3835, 2015 | 10 | 2015 |
A preliminary analysis of drive-by email attacks in educational institutes J Alqatawna, A Hadi, M Al-Zwairi, M Khader 2016 cybersecurity and cyberforensics conference (ccc), 65-69, 2016 | 7 | 2016 |
Enhanced Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System. D Suleiman, M Al-Zewairi, A Shaout International Journal of Online & Biomedical Engineering 16 (4), 2022 | 3 | 2022 |
Using IPython for Teaching Web Scraping A Hadi, M Al-Zewairi Social Media Shaping e-Publishing and Academia, 47-54, 2017 | 3 | 2017 |
Ultrasurf traffic classification: detection and prevention R Al-Qura’n, A Hadi, J Atoum, M Al-Zewairi International Journal of Communications, Network and System Sciences 8 (08), 304, 2015 | 3 | 2015 |
Empirical Evaluation of the Classification of Deep Learning under Big Data Processing Platforms D Suleiman, M Al-Zewairi, W Etaiwi, G Al-Naymat International Journal 9 (5), 2020 | 1 | 2020 |
A new model of multi-key generation for RFID access control system. M Al-Fayoumi, S Hamdan, M Al-Zewairi Int. Arab J. Inf. Technol. 15 (3A), 585-591, 2018 | 1 | 2018 |
Enhanced Multi-keyed Risk Adaptive Hybrid RFID Access Control System M Al-Zewairi, S Hamdan, M Al Fayoumi ACIT'2017 The International Arab Conference on Information Technology, 2017 | 1 | 2017 |
Discovering Unknown Botnet Attacks on IoT Devices Using Supervised Shallow and Deep Learning Classifiers M AL-ZEWAIRI, S ALMAJALI, M AYYASH Journal of Theoretical and Applied Information Technology 99 (14), 3564-3583, 2021 | | 2021 |
A Novel Multilayer IDS Architecture for Learning Undefined Attacks MAS Al-Zewairi PQDT-Global, 2021 | | 2021 |