Active e-mail system SMTP protocol monitoring algorithm R Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj 2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009 | 36 | 2009 |
False positive reduction in intrusion detection system: A survey O Abouabdalla, H El-Taj, A Manasrah, S Ramadass 2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009 | 32 | 2009 |
Detecting neighbor discovery protocol-based flooding attack using machine learning techniques F Najjar, MM Kadhum, H El-Taj Advances in Machine Learning and Signal Processing: Proceedings of MALSIP …, 2016 | 14 | 2016 |
Neighbor discovery protocol anomaly detection using finite state machine and strict anomaly detection F Najjar, M Kadhum, H El-Taj Proceedings of the 4th International Conference on Internet Applications …, 2015 | 14 | 2015 |
Intrusion detection and prevention response based on signature-based and anomaly-based: Investigation study H El-Taj, F Najjar, H Alsenawi, M Najjar International Journal of Computer Science and Information Security 10 (6), 50, 2012 | 13 | 2012 |
Ipv6 change threats behavior F Najjar, H El-Taj International Journal of Advanced Computer Science and Applications 6 (1), 2015 | 9 | 2015 |
QRphish: An Automated QR Code Phishing Detection Approach AY Alnajjar, M Anbar, S Manickam, O Elejla, H El-Taj Journal Of Engineering And Applied Sciences 11 (3), 553-560, 2016 | 8 | 2016 |
Applying Mobile Agents on Mobile Grid Computing HR El-Taj, CH Yong Computer Science Postgraduate Colloquium, 2007 | 7 | 2007 |
Balancing Potential and Peril: The Ethical Implications of Artificial Intelligence on Human Rights H al-Taj, B Polok, AA Rana Multicultural Education 9 (6), 2023 | 6 | 2023 |
False positive reduction by correlating the intrusion detection system alerts: Investigation study H El-Taj, O Abouabdalla, A Manasrah Journal of Communication and Computer 7 (3), 64, 2010 | 5 | 2010 |
A Study on Video Conferencing using Overlay Network A Alalousi, A Osman, S Noori, A Hussain, A Munther, H El-Taj European Journal of Scientific Research 59 (3), 284-294, 2011 | 4 | 2011 |
Forthcoming aggregating intrusion detection system alerts framework H El-Taj, O Abouabdalla, A Manasrah, A Al-Madi, MI Sarwar, S Ramadass 2010 Fourth International Conference on Emerging Security Information …, 2010 | 4 | 2010 |
Balancing Potential and Peril: The Ethical Implications of Artificial Intelligence on Human Rights B Polok, H el-Taj, AA Rana Taj, Homam el-, Beata Polok, and Afrasiab Ahmed Rana.“Balancing Potential …, 2023 | 3 | 2023 |
Intrusion detection and prevention systems (IDPS) state of art: IDPS challenges HR El-Taj International Journal of Computer Science and Information Security 13 (9), 28, 2015 | 2 | 2015 |
CryptoQR System based on RSA HR El-Taj, R Alhadhrami Int. J. Comput. Sci. Inf. Secur 18 (6), 2020 | 1 | 2020 |
A Comprehensive Survey of Microsoft Office Macros' Dual Role in Enhancing Efficiency and Elevating Security Risks H El-Taj, AA Alattas 2024 International Jordanian Cybersecurity Conference (IJCC), 124-130, 2024 | | 2024 |
Renewable Energy and Cyber Threats: Safeguarding Solar Power Systems H El-Taj, A Khoja, D Kamal, F Alammari, J Alkhowaiter, L Bogari, R Essa 2024 International Jordanian Cybersecurity Conference (IJCC), 118-123, 2024 | | 2024 |
Network sniffing and its consequences: a comprehensive survey H El-Taj, L Miralam International Journal of Computer Science and Information Security (IJCSIS …, 2024 | | 2024 |
A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden Communication H El-Taj International Journal of Computational and Experimental Science and …, 2024 | | 2024 |
False Positive Reduction using IDS Alert Correlation Method based on the Apriori Algorithm H El-Taj, O Abouabdalla, A Manasrah, M Anbar, A Al-Madi International Journal of Computer Science & Information Security, 2010 | | 2010 |