[PDF][PDF] Recent trends in compact planar antennas at 5G sub-6 GHz and mmwave frequency bands for automotive wireless applications: A review

A Kumar, M Aljaidi, M Singh, M Alshammari… - Prog. Electromagn. Res …, 2024 - jpier.org
5G wireless communication offers higher channel capacity, high data rate, sufficient
bandwidth, enhanced coverage, and reliable link as compared to the previous generation …

[HTML][HTML] Advancing XSS detection in IoT over 5g: a cutting-edge artificial neural network approach

R Alqura'n, M AlJamal, I Al-Aiash, A Alsarhan… - IoT, 2024 - mdpi.com
The rapid expansion of the Internet of Things (IoT) and the advancement of 5G technology
require strong cybersecurity measures within IoT frameworks. Traditional security methods …

Enhanced Anomaly Detection in Ethereum: Unveiling and Classifying Threats with Machine Learning

A Ehsan, Z Iqbal, S Abuowaida, M Aljaidi, HU Zia… - IEEE …, 2024 - ieeexplore.ieee.org
Blockchain has emerged as a groundbreaking security technology, playing a vital role in
various industries such as banking, the Internet of Things (IoT), healthcare, education, and …

Cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules

M Aljaidi, A Alsarhan, D Al-Fraihat… - … on Electrical, Energy …, 2023 - ieeexplore.ieee.org
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit
individuals for fraudulent purposes such as providing sensitive information like usernames …

A Comprehensive Technical Analysis of URL Redirect Attacks: A Case Study of British Airways Data Breach

M Aljaidi - 2023 24th International Arab Conference on …, 2023 - ieeexplore.ieee.org
British Airways (BA) became a victim of a unique form of a URL Redirect Attack after a
breach was suspected to have happened over a period of 15 days. This is not uncommon …

Expert Phishing Detection System

A Alsarhan, I Al-Aiash, D Al-Fraihat… - … on Industry 4.0 …, 2024 - ieeexplore.ieee.org
Phishing attacks are a threat that continuously emphasizes the need for effective detection
methods. This paper presents a machine learning detection method that employs a random …

Logistic Regression Classification for Assessing the Risk of Kidney Tumor

D Alzu'bi, RE Al Mamlook, A Nasayreh… - … on Electrical, Energy …, 2023 - ieeexplore.ieee.org
The kidneys have the important function of filtering waste products and toxins from the blood
in the human body. Any problems affecting the kidneys can potentially impact their efficiency …

An Assessment of Obfuscated Bad Rabbit Ransomware Detection and Prevention Methods

M Aljaidi, M Hassan, G Samara, A Alsarhan… - Artificial Intelligence and …, 2024 - Springer
A specific type of virus called Systems and Resources ransomware attacks, which prevents
users from accessing these systems and resources until a ransom is paid. This attack is …

Unveiling Android Malware: A Deep Learning Perspective Using RNN and LSTM

A Alqammaz, MR Al-Mousa, AA Zaid… - … Arab Conference on …, 2024 - ieeexplore.ieee.org
The advent and increasing popularity of Android devices have brought about undesirable
mobile malware and its attendant applications that constitutes a danger to society in terms of …

Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks

Q Al-Na'amneh, M Aljaidi, A Nasayreh… - Journal of Intelligent …, 2024 - degruyter.com
Abstract The Internet of Things (IoT) has expanded into a realm of cutting-edge integrated
solutions across numerous applications, following three stages of development …