Seguir
Ali Hadi
Ali Hadi
Champlain College, VT, USA
Dirección de correo verificada de champlain.edu - Página principal
Título
Citado por
Citado por
Año
Vulnerability scanning of IoT devices in Jordan using Shodan
H Al-Alami, A Hadi, H Al-Bahadili
2017 2nd International Conference on the Applications of Information …, 2017
722017
Network security using hybrid port knocking
H Al-Bahadili, AH Hadi
Ijcsns 10 (8), 8, 2010
462010
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
JA Alaeddin Almubayed, Ali Hadi
International Journal of Computer Network and Information Security (IJCNIS …, 2015
38*2015
Threat hunting using grr rapid response
H Rasheed, A Hadi, M Khader
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
312017
Phishing websites prediction using classification techniques
DR Ibrahim, AH Hadi
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
232017
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files
AH Esraa Alshammari
Cybersecurity and Cyberforensics Conference (CCC), 2016, 55-59, 2016
18*2016
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files
AH Esra’a Alshammary
Cybersecurity & Cyberforensics Conference 2016, 86-91, 2016
16*2016
Data Exfiltration Techniques and Data Loss Prevention System
H Kilani, M Nasereddin, A Hadi, S Tedmori
Conference: 2019 International Arab Conference on Information Technology (ACIT), 2019
122019
PDF Forensic Analysis System using YARA
SJ Khitan, A Hadi, J Atoum
International Journal of Computer Science and Network Security 17 (5), 77-85, 2017
122017
Windows forensic investigations using powerforensics tool
A Barakat, A Hadi
2016 Cybersecurity and Cyberforensics Conference (CCC), 41-47, 2016
112016
HDFS file operation fingerprints for forensic investigations
M Khader, A Hadi, G Al-Naymat
Digital Investigation 24, 50-61, 2018
92018
Covert Communication Using Port Knocking
AH Mariam Khader, Ali Hadi
Cybersecurity & Cyberforensics Conference 2016, 28-34, 2016
9*2016
Analyzing and Detecting Malicious Content: DOCX Files
AH Ayyad Naser, Mohammad Btoush
International Journal of Computer Science and Information Security (IJCSIS …, 2016
8*2016
A preliminary analysis of drive-by email attacks in educational institutes
J Alqatawna, A Hadi, M Al-Zwairi, M Khader
2016 cybersecurity and cyberforensics conference (ccc), 65-69, 2016
72016
A new technique for file carving on hadoop ecosystem
E Alshammari, G Al-Naymat, A Hadi
2017 International Conference on New Trends in Computing Sciences (ICTCS), 72-77, 2017
62017
Passive DNS Analysis Using Bro-IDS
A Dakhgan, A Hadi, J Al Saraireh, D Alrababah
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
52017
MR-VDENCLUE: Varying density clustering using MapReduce
G Al-Naymat, M Khader, MA Al-Betar, R Hriez, A Hadi
Proceedings of SAI Intelligent Systems Conference, 771-788, 2022
42022
Visualizing Clustered Botnet Traffic using t-SNE on Aggregated NetFlows
M Alsadi, AH Hadi
International Conference on new Trends in Computing Sciences, 6, 2017
42017
Apremilast for lichen planopilaris and frontal fibrosing alopecia: a case series
A Hadi, M Lebwohl
SKIN The Journal of Cutaneous Medicine 1 (1), 32-36, 2017
42017
Smart parser for identifying and detecting insecure functions
E Al-Shammari, A Hadi, M Qasaimeh
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
32017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20