Takip et
Dr. Homam El-Taj
Dr. Homam El-Taj
Dar Al-Hekma
dah.edu.sa üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Active e-mail system SMTP protocol monitoring algorithm
R Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
362009
False positive reduction in intrusion detection system: A survey
O Abouabdalla, H El-Taj, A Manasrah, S Ramadass
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
322009
Detecting neighbor discovery protocol-based flooding attack using machine learning techniques
F Najjar, MM Kadhum, H El-Taj
Advances in Machine Learning and Signal Processing: Proceedings of MALSIP …, 2016
142016
Neighbor discovery protocol anomaly detection using finite state machine and strict anomaly detection
F Najjar, M Kadhum, H El-Taj
Proceedings of the 4th International Conference on Internet Applications …, 2015
142015
Intrusion detection and prevention response based on signature-based and anomaly-based: Investigation study
H El-Taj, F Najjar, H Alsenawi, M Najjar
International Journal of Computer Science and Information Security 10 (6), 50, 2012
132012
Ipv6 change threats behavior
F Najjar, H El-Taj
International Journal of Advanced Computer Science and Applications 6 (1), 2015
92015
QRphish: An Automated QR Code Phishing Detection Approach
AY Alnajjar, M Anbar, S Manickam, O Elejla, H El-Taj
Journal Of Engineering And Applied Sciences 11 (3), 553-560, 2016
82016
Applying Mobile Agents on Mobile Grid Computing
HR El-Taj, CH Yong
Computer Science Postgraduate Colloquium, 2007
72007
Balancing Potential and Peril: The Ethical Implications of Artificial Intelligence on Human Rights
H al-Taj, B Polok, AA Rana
Multicultural Education 9 (6), 2023
62023
False positive reduction by correlating the intrusion detection system alerts: Investigation study
H El-Taj, O Abouabdalla, A Manasrah
Journal of Communication and Computer 7 (3), 64, 2010
52010
A Study on Video Conferencing using Overlay Network
A Alalousi, A Osman, S Noori, A Hussain, A Munther, H El-Taj
European Journal of Scientific Research 59 (3), 284-294, 2011
42011
Forthcoming aggregating intrusion detection system alerts framework
H El-Taj, O Abouabdalla, A Manasrah, A Al-Madi, MI Sarwar, S Ramadass
2010 Fourth International Conference on Emerging Security Information …, 2010
42010
Balancing Potential and Peril: The Ethical Implications of Artificial Intelligence on Human Rights
B Polok, H el-Taj, AA Rana
Taj, Homam el-, Beata Polok, and Afrasiab Ahmed Rana.“Balancing Potential …, 2023
32023
Intrusion detection and prevention systems (IDPS) state of art: IDPS challenges
HR El-Taj
International Journal of Computer Science and Information Security 13 (9), 28, 2015
22015
CryptoQR System based on RSA
HR El-Taj, R Alhadhrami
Int. J. Comput. Sci. Inf. Secur 18 (6), 2020
12020
A Comprehensive Survey of Microsoft Office Macros' Dual Role in Enhancing Efficiency and Elevating Security Risks
H El-Taj, AA Alattas
2024 International Jordanian Cybersecurity Conference (IJCC), 124-130, 2024
2024
Renewable Energy and Cyber Threats: Safeguarding Solar Power Systems
H El-Taj, A Khoja, D Kamal, F Alammari, J Alkhowaiter, L Bogari, R Essa
2024 International Jordanian Cybersecurity Conference (IJCC), 118-123, 2024
2024
Network sniffing and its consequences: a comprehensive survey
H El-Taj, L Miralam
International Journal of Computer Science and Information Security (IJCSIS …, 2024
2024
A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden Communication
H El-Taj
International Journal of Computational and Experimental Science and …, 2024
2024
False Positive Reduction using IDS Alert Correlation Method based on the Apriori Algorithm
H El-Taj, O Abouabdalla, A Manasrah, M Anbar, A Al-Madi
International Journal of Computer Science & Information Security, 2010
2010
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20