Suivre
Ahmad K. AL Hwaitat
Ahmad K. AL Hwaitat
Adresse e-mail validée de ju.edu.jo
Titre
Citée par
Citée par
Année
Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels
MA Almaiah, O Almomani, A Alsaaidah, S Al-Otaibi, N Bani-Hani, ...
Electronics 11 (21), 3571, 2022
852022
A new blockchain-based authentication framework for secure IoT networks
AK Al Hwaitat, MA Almaiah, A Ali, S Al-Otaibi, R Shishakly, A Lutfi, ...
Electronics 12 (17), 3618, 2023
482023
Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks
AK Al Hwaitat, MA Almaiah, O Almomani, M Al-Zahrani, RM Al-Sayed, ...
International Journal of Advanced Computer Science and Applications 11 (4), 2020
472020
Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness
M Alawida, B Abu Shawar, OI Abiodun, A Mehmood, AE Omolara, ...
Information 15 (1), 27, 2024
382024
AN INVESTIGATION OF DIGITAL FORENSICS FOR SHAMOON ATTACK BEHAVIOUR IN FOG COMPUTING AND THREAT INTELLIGENCE FOR INCIDENT RESPONSE
AKAHS Manaseer
Journal of Theoretical and Applied Information Technology 98 (07), 2020
302020
Big data based smart blockchain for information retrieval in privacy-preserving healthcare system
A Ali, MF Pasha, OH Fang, R Khan, MA Almaiah, A K. Al Hwaitat
Big Data Intelligence for Smart Applications, 279-296, 2022
252022
A secure internet of medical things framework for breast cancer detection in sustainable smart cities
THH Aldhyani, MA Khan, MA Almaiah, N Alnazzawi, AKA Hwaitat, ...
Electronics 12 (4), 858, 2023
222023
A survey on Li Fi technology and internet of things (IOT)
AK Al Hwaitat, MH Qasem
International Journal of Advanced Trends in Computer Science and Engineering …, 2020
102020
Centralized Web Application Firewall Security System
SMAKA Hwaitat
Modern Applied Science; 12 (10), 164-170, 2018
10*2018
DSpamOnto: An Ontology Modelling for Domain-Specific Social Spammers in Microblogging
M Al-Hassan, B Abu-Salih, A Al Hwaitat
Big Data and Cognitive Computing 7 (2), 109, 2023
72023
An investigator digital forensics frequencies particle swarm optimization for detection and classification of APT attack in fog computing environment (IDF-FPSO)
AKAL Hwaitat, S Manaseer, RMH Al-Sayyed, M Almaiah, O Almomani
Journal of Theoretical and Applied Information Technology 98 (7), 937-952, 2020
72020
A survey of digital forensic methods under advanced persistent threat in fog computing environment
AK Alhwaitat, S Manaseer, RMH Al-Sayyed
Journal of Theoretical and Applied Information Technology 97 (18), 4934-4954, 2019
72019
Improved Path Testing Using Multi-Verse Optimization Algorithm and the Integration of Test Path Distance.
HN Fakhouri, AKA Hwaitat, M Ryalat, F Hamad, J Zraqou, A Maaita, ...
International Journal of Interactive Mobile Technologies 17 (20), 2023
62023
Recent Innovations in Artificial Intelligence and Smart Applications
M Al-Emran, K Shaalan
Springer, 2022
62022
Computer hardware components ontology
AKA Hwaitat, A Shaheen, K Adhim, EN Arkebat, AAA Hwiatat
Modern Applied Science 12 (3), 35, 2018
52018
Sentiment analysis as a way of web optimization
OM Rababah, AK Hwaitat, DA Al Qudah
Scientific Research and Essays 11 (8), 90-96, 2016
52016
& Aldhyani, TH (2022). Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels
MA Almaiah, O Almomani, A Alsaaidah, S Al-Otaibi, N Bani-Hani, ...
Electronics 11 (21), 3571, 0
5
Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification
AK Al Hwaitat, HN Fakhouri
Applied Sciences 14 (19), 9142, 2024
32024
Overview of Mobile Attack Detection and Prevention Techniques Using Machine Learning.
AK Al Hwaitat, HN Fakhouri, M Alawida, MS Atoum, B Abu-Salih, ...
International Journal of Interactive Mobile Technologies 18 (10), 2024
32024
Measuring parallel performance of sorting algorithms
S Manaseer, AK Al Hwaitat
Modern Applied Science 12 (10), 1-23, 2018
32018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20