


default search action
ICIT 2025: Amman, Jordan
- 12th International Conference on Information Technology, ICIT 2025, Amman, Jordan, May 27-30, 2025. IEEE 2025, ISBN 979-8-3315-0894-4

- Ahmad Abumihsan, Majdi Owda, Amani Yousef Owda, Fathi Gasir, Mobarak A. Abu Mohsen, Lampros K. Stergioulas:

A Novel Deep Learning Approach for Enhanced Ischemic Brain Stroke Detection from CT Images Using Deep Feature Extraction and Optimized Feature Selection. 1-6 - Hisham Hussein

, Zaid Al Muala:
Fuzzy control of processes with long transportation delay - A comparative study. 1-6 - Mobarak Abumohsen, Enrique Costa-Montenegro, Silvia García-Méndez, Amani Yousef Owda, Majdi Owda:

Advanced Deep Learning Techniques for Accurate Lung Cancer Detection and Classification. 7-12 - Noura Abulail, Amani Yousef Owda, Majdi Owda:

Real-Time Detection and Analysis of Facial Movement Disorders Using MediaPipe and OpenCV: A Streamlit-Based Framework. 13-18 - Marah Radi Hawa, Majdi Owda, Amani Yousef Owda:

Enhancing Digital Investigation: The Role of Generative AI (ChatGPT) in Evidence Identification and Analysis in Digital Forensics. 19-26 - Roa Omar Baddad, Amani Yousef Owda, Majdi Owda:

Customer Segmentation for Targeted Campaigns Using RFM Analysis and K-Means Clustering. 27-32 - Shadi AlZu'bi

, Muder Almiani, Yaser Jararweh:
Agentic AI for Healthcare: Solutions to Intelligent Patient Care. 33-38 - Fatimah Alaliwat, Lena Alqahtani, Manar Alzahrani, Nouf Alamoudi, Shaima Hakami, Abdulrahman Alharby, Nawaf Alharbi:

OTuHunt: An Aggregated Threat Hunting & Intelligence Platform for OT/ICS Environment and MSSP Services. 39-46 - Fatimah Alaliwat, Lena Alqahtani, Manar Alzahrani, Nouf Alamoudi, Shaima Hakami, Abdulrahman Alharby:

Detection of Adversarial Evasion Attack on AI Model Running on IoT Devices. 47-54 - Jawad H. Alkhateeb, Rashiq Rafiq Marie:

Holy Quran Reciter Classification and Recognition Using Convolutional Neural Network: A Deep Learning Approach. 55-60 - C. S. Santhosh, Sharath Kumar R, Nisha P, Narendra Khatri, Harish Sharma, Bablu Kumar Singh:

Deep Learning-Based Automated Diagnosis and Classification of Rice Leaf Diseases Using CNN Architectures for Sustainable Agriculture. 61-66 - Moatasim Mahmoud, Stamatia Rizou, Andreas S. Panayides, Pavlos I. Lazaridis, George K. Karagiannidis, Nikolaos V. Kantartzis, Zaharias D. Zaharis:

STAV360: A Dataset for Subjective Tile-based Assessment of 360° Videos. 67-72 - Yahya Alhaj Maz, Mohammed Anbar, Selvakumar Manickam, Mosleh M. Abualhaj:

Utilizing Deep Learning, Ensemble Learning, and Transfer Learning for Enhancing Security in Internet of Things Networks through Intrusion Detection Systems. 73-76 - Mohmmad Husien Almajali, Ala' A. Masarweh, Ihab Fahmi Rayyan:

Evaluating Administrative Accountability for Artificial Intelligence Application Errors in Jordan: Legal and Ethical Implications. 77-83 - Insaf Kraidia, Samir Brahim Belhaouari:

Towards Robust SEA Detection: Leveraging Model Diversity and Randomization Against Adversarial Attacks. 84-90 - Alaa F. Sheta, Walaa H. Elashmwai, Abdelkarim Baareh, Peter Rausch, Emad S. Othman

:
Medical Image Analysis for Brain Tumor Classification Using CNN Architecture. 91-98 - Abdinasir Hirsi Abdi

, Jafar Ismail Mohamed, Abubakar Abdi Warsame, Abdirizak Abdullahi Khalif, Lukman Audah, Adeb Salh, Salman Ahmed, Diani Galih Saputri, Abdiaziz Mohamed Abdirahman:
A Survey of Supervised, Unsupervised, and Ensemble Learning Approaches for DDoS Detection in SDN. 99-104 - Iqbal M. Batiha, Louiza Diabi, Adel Ouannas, Iqbal H. Jebril, Jamal Oudetallah, Shaher Momani:

Control of Chaos in Memristives Systems Using Fractional Discrete Calculus. 105-108 - Iqbal H. Jebril, Khadidja Dibi, Imane Zoua, Adel Ouannas, Amina-Aicha Khennaoui, Iqbal M. Batiha:

Incommensurate Fractional Computer Virus System: Control and Simulation. 109-113 - Ayman M. Abdalla

, Qasem H. Makki, Ahmad A. Mazhar:
Image Encryption Using Circular-Shifting, Permutation Expansions and XOR. 114-119 - Iqbal H. Jebril, Louiza Diabi, Adel Ouannas, Iqbal M. Batiha, Wasim Audeh, Shaher Momani:

Synchronization of Fractional Discrete Memristives Models. 120-123 - Abdulrahman A. Alkannad, Ahmad Al Smadi, Wael Alzyadat:

Multi-crackNet: A Deep Learning Framework for Multi-Class Crack Detection in Concrete Structures. 124-129 - Reem Edwan:

A Novel Approach for Solving Space Fractional Heat Equations with Variable Coefficients Using the Crank-Nicolson Method. 130-133 - Omar Almomani, Adeeb Alsaaidah, Mohammed Amin Almaiah, Abdullah Alzaqebah, Mosleh M. Abualhaj, Wael Jumah Alzyadat:

Evaluating Machine Learning Classifiers for Detecting Distributed Denial of Service Attacks. 134-140 - Sibaram Prasad Panda

:
Securing 5G Critical Interfaces: A Zero Trust Approach for Next-Generation Network Resilience. 141-146 - Ghaith Al-Shawabkeh, Mohammad Abdalaziz, Amjed Al-Mousa:

A Two-Stage Hierarchical Skin Lesion Classification Using Transfer Learning. 147-153 - Rajanbir Singh Tucker, Muhammad Nadeem, Shahbaz Pervez

:
Real-Time Detection and Mitigation of GPS Spoofing in UAV Systems. 154-160 - Muhammad Nadeem, Rashid Mustafa, Pierre E. Abi-Char, Rajanbir Singh Tucker:

A Study of Security Threats in IoT Network Layer using MQTT and TLS. 161-166 - Shanzay Alam, Misha Fakhar, Fatima Khalid, Saeed Mian Qaisar, Usman Haider:

Image Similarity Assessment Using Node Degree Distribution. 167-172 - Amer Dababneh, Hamzah O. Al-Khawaldeh, Iqbal H. Jebril, Iqbal M. Batiha, Shaher Momani:

Fractional Bernoulli Equation with Ujlayan-Dixit operator. 173-176 - Rama Rasheed, Azeza A L. Abdallah, Andaleeb M. Abu Kamel

:
Distribution of Renyi Entropy from Nakagami Distribution Sample. 177-180 - Adel Sufyan Hussain, Zedan Z. Mashikhin, Naaman Omar Yaseen, Ma'Mon Abu Hammad, Emad A. Az-Zo'bi

, Mohammad A. Tashtoush:
Hybrid Deep Learning Framework for Estimating the Occurrence Rate of the Inverse Exponential Process: A Comparative Analysis of LSTM, ANN, and Traditional Methods. 181-187 - Muthanna Subhi Sulaiman, Adel Sufyan Hussain, Ma'Mon Abu Hammad, Mohammad A. Tashtoush, Emad A. Az-Zo'bi

, Rana Noaman Abbas:
Parameters Estimation in a Non-Homogeneous Poisson Process with Fuzzy Data Through a Modified Fuzzy Maximum Likelihood Approach Using Artificial Intelligence. 188-195 - Ahmad H. Al-Omari:

Penetration Testing of a Merchant Payment Platform; Systemic Vulnerabilities and Compliance-Centric Mitigation. 196-200 - Mohammad Bassam AbuRass, Rehab Aburass, Marwa Fayiz Hamza:

A Comparative Study of Machine Learning Algorithms for Credit Card Fraud Detection. 201-206 - Qusai Y. Shambour, Moh'd Khaled Yousef Shambour, Yousef Alrabanah, Mosleh M. Abualhaj:

Leveraging Feature Selection and Explainable AI for Effective Autism Screening. 207-212 - Ala' M. Al-Zoubi, Katrina Sundus, Tarek Kanan:

A Comprehensive Survey on Intrusion Detection Systems in IoT: Challenges and Future Directions. 213-218 - Hamza Alzaareer, Waseem Ghazi Alshanti:

Analytical Solution of a Modified KdV Equation via Atomic Decomposition. 219-222 - Khaled M. Musa, Mohammad Abdallah:

Cloud Services Cyberattacks: Most Infectious Viruses and Method of Infections. 223-227 - Rahmeh Ibrahim, Ashraf Qaddomi:

A Novel Genetic Algorithm-Optimized Selective Encryption for Enhanced Privacy in Medical Imaging. 228-235 - Safaa Y. Al-Adwan, Salwani Abdullah, Mohammed Alweshah, Wandeep Kaur:

The Impact of Instance Reduction on Classification Process in Intrusion Detection. 236-241 - Nasim Matar, Feras Alnaimat, Ahmad Al-Qerem, Shadi Nashwan, Issam Jebreen:

Optimizing Multimodal Feature Alignment for Enhanced Text-to-Video Retrieval Performance. 242-246 - Andrew Reeves, Hang Dong

:
Robustness of Question Answering Systems in the Biomedical Domain: a study of the BioASQ dataset. 247-252 - Rand N. Albustanji, Ahmad Alkhatib, Ameen Shaheen

:
Technical and Ethical Strategies to Prevent Machine Learning Models from Exploiting Personally Identifiable Information (PII). 253-257 - Ala Alobeidyeen:

Information Dissemination Modeling for Connected Autonomous Vehicles (CAVs) at Urban Intersections Using Percolation Approach. 258-262 - Tawfiq Jallad, Ma'mon Abu Hammad:

Geometric Hyperplane Intersection Solver: A Matrix-Inversion-Free Framework with Quantum-Neuroevolutionary Enhancements. 263-271 - Mohamed Fezari, Ali Al-Dahoud, Mohamed Tahar Gossa, Mohamed Akram Bensaid, Ahmad Al-Dahoud:

Exploring SBC with Kinect And machine Learning for Indoor Mobile Robot Design and Monitoring. 272-276 - Ahmad Nabot, Feras Alnaimat, Issam Jebreen, Ahmad Al-Qerem, Ali Mohd Ali:

AI for Software Project Management: Predicting Delivery Times & Resource Allocation. 277-284 - Ameera Jaradat

, Salem Alhatamleh, Mohammad Amin, Hatem Malkawi:
AI-Driven Feature Selection for Enhanced Heart Disease Prediction. 285-289 - Virendra Gawande:

AI and Blockchain: Transforming Data Security in Higher Education Institutions. 290-296 - Bushra Al-Smadi, Bassam H. Hammo, Hossam Faris:

Addressing Class Imbalance in Arabic Medical Questions using Ensembles and SMOTE. 297-303 - Farhan Abdel-Fattah, Khalid A. Farhan, Seraj Fayyad:

Detecting double-spending attack in Blockchain Networks using k-nearest neighbor algorithm. 304-308 - Haitham Qawaqneh, Habes Alsamir:

An Analytical Approach to Fixed Point results for Sehgal Guseman Contraction in Extended b-Metric Spaces. 309-311 - Don Roosan, Rubayat Khan, Saif Nirzhor, Avik Mahata, Hasiba M. Khan:

Harnessing Quantum Gradient Machine Learning to Decode Subtelomeric Methylation in Telomere Maintenance Pathways. 312-316 - Mark Angelo T. Mercado, Juliet O. Niega, Oliver A. Medina, Jovette A. Pecayo, John Ceazar C. Bello, John Maverick V. Detera:

Development of Industrial Machine Temperature Monitoring System for Semiconductor Company A. 317-323 - Jalal Kiswani, Mohammad Abdallah:

Service Diversification and Employment Opportunities in a Rapidly Evolving Sector: Jordan as a Case Study. 324-328 - Oliver A. Medina, Mark Angelo T. Mercado, Juliet O. Niega, Arsenio N. Arellano, Toni May M. Sabater, John R. Rejano:

Development of an Examination Checker using OMR for Multiple Choice Test Evaluator in National University, Philippines. 329-333 - Mohammad Abdallah, Amir Ngah, Anas Al-Rahamneh

, Daniel Staegemann:
AI-Based Program Slicing: Techniques, Tools, and Comparative Analysis. 334-338 - Hassan Al-Zoubi, Mais Jaradat, Mohammad Al-kafaween, Hamza Hzayen, Bayan Tayem:

Characterization of some results of surfaces and their properties in the Euclidean 3-space. 339-342 - Mossab Ibrahim, Pablo Gervás, Gonzalo Méndez:

SAHDA: A Semantic-Aware Hybrid Approach for Arabic Spell Checking with Domain Adaptation. 343-348 - Ghassan Kanaan, Mariam Dabaeen, Raed K. Kanaan

, Ghazi Kanaan, Salahiddin Altrahat, Ibrahim Atoum:
Improving the Classification of Arabic Tweet Sentiment Using Word Embedding Models. 349-352 - Ghassan Kanaan, Motaz Zghoul, Ghazi Kanaan, Ala' M. Al-Zoubi, Tarek Kanan:

Arabic Email Spam Detection Using Machine Learning and Deep Learning: A Comparative Study. 353-357 - Ceselia Alyawanseh, Renad Alwahsh, Ameen Shaheen

:
Modern Architectural Patterns for Scalable Learning Management Systems: Integrating Microservices Client-Server, and Databases Management. 358-362 - Maqsood Mahmud

, Ghayur Ahmad, Zahra Afridi:
AI in Employee Performance Management: Process Mining for Enhancing Productivity and Growth. 363-368 - Ameen Shaheen

, Ala'a Al-Shaikh, Abdallah Sameer Damra, Mohammad Rasmi Al-Mousa, Sami Askar, Suha Afaneh:
Energy Efficiency Optimization in the IoT using Whale Optimization Algorithm and Simulated Annealing. 369-374 - Adi El-Dalahmeh, Eman Abu Mariah:

Schnorr-Based Authentication Framework for Secure Vehicle to Vehicle Communication. 375-380 - Sunshine O. Casido, Jaydee C. Ballaho

, Edwin I. Arip:
Tree-Based Machine Learning Models for Phishing Email Detection. 381-386 - Katrina Sundus, Ala' M. Al-Zoubi, Eyad Hailat, Bassam Hammo:

Predicting Breast Cancer Recurrence Using Machine Learning Models: A Comparative Study. 387-392 - Marwa Fayiz Hamza, Rehab Bassam AbuRass, Mohammad Bassam AbuRass, Tamara Baker Jber:

Agile Project Management Optimization with AI technology: Challenges and Impact. 393-397 - Omran Salem, Marwa Fayiz Hamza, Akram M. Zeki:

Evaluating the Effectiveness of Cybersecurity Training: Key Elements, Best Strategies, and Future Prospects. 398-403 - Abdallah M. M. Altrad

:
IoT Medical Network Security System Based Explainable AI Model. 404-409 - Israa Al Badarneh

, Bassam H. Hammo, Omar S. Al-Kadi:
A Transformer-Based Deep Learning Model for Arabic Image Captioning. 410-415 - Yousef Jaradat, Mohammad Ahmad Alia, Mohammad Z. Masoud, Ahmad A. Manasrah, Ismael Jannoud, Omar Alheyasat:

Beyond One-Size-Fits-All: Comparing and Selecting Regression Metrics for Robust Model Assessment. 416-422 - Gana Sawalhi, Bisan Nasser, Mais Khatib:

IoT Cybersecurity Policies: A Comparative Analysis. 423-427 - Mohammad Z. Masoud, Nabeel A. Abu Shaban, Alia A. Mahmoud:

Predicting DC Motor Speed Using Acoustic Analysis: A Comparison of Neural Networks and Convolutional Neural Networks. 428-433 - Ahmad M. Manasrah, Nezar Qudah, Yousef Jaradat, Mohammad Z. Masoud, Mohammad Jaradat:

Evaluating the Economic Impact of On-Grid and Off-Grid Solar PV Systems in Homes. 434-438 - Mohammad Abdul Jawad

, Mohammad Z. Masoud, Álvaro Alesanco, José García:
A Distributed Brute-Force Attack and Misleading Countermeasure for Securing ModbusTCP Implementations in PLCs. 439-443 - Nadia Shamsulddin Abdulsattar

:
Pneumonia Classification from X-ray Images with Convolutional Neural Network. 444-450 - Mohamad Al Omari, Mojtaba Eslahi

, Amine Ammar, Rani El Meouche, Laure Ducoulombier, Laurent Guillaumat:
Comparison of ML Methods for Analyzing Scaffolding Behavior: A Case Study on Safety and Multimodal Results. 451-457 - Adnan A. Hnaif, Faid AlNoor Fawareh, Rania Saadeh, Hamed Fawareh, Ahmad Qazza, Belal Zaqaibeh:

Impact of Aboodh Power Series Algorithm for Integral Equations. 458-464 - Ahmad Abdel-Hafez, Areej Yousef:

A Dataset of Media Articles on ChatGPT. 465-470 - Emad Al-Shawakfa, Majd Alzahrawi, Rami Malkawi

:
A Deep Learning Approach to Predict User Experience Writing Faults in Mobile Applications' Interfaces. 471-476 - Firas Omar

, Mohammad R. Hassan, Shadi Nashwan, Ahmad Al-Qerem, Ali Mohd Ali:
Artificial Intelligence Innovations and Strategic Insights for a Smart Retail Transformation. 477-483 - Abeer Malkawi, Azrina Kamaruddin:

Toward Enhancing Outdoor Mobility Assistive Technologies for People with Vision Impairment: Experts' Perspective. 484-489 - Yousra Odeh, Rana Yousef:

A Phase-Based and Student-Centric Requirements Classification Framework for Software Engineering Education in the Metaverse. 490-494 - Waseem Ghazi Alshanti, Ma'mon Abu Hammad, Hamza Alzaareer, Hassan Al-Zoubi, Ahmad Alshanty:

Conformable Fractional Derivative of a Vector Field. 495-498 - Balqees Aldabaybah, Ali Rodan:

Characteristics-Based Sampling Technique for Highly Imbalanced Large Scale Datasets. 499-505 - Waseem Al Mashaelh, Alaa Al-Zboon, Rania Saadeh, Alaa Al-Wadi, Ahmad Qazza, Iqbal H. Jebril:

Complex Sawi Integral Transform and Some Applications. 506-510 - Mohammad Abdel-Majeed, Ahmad Maraqa, Moath Abu-Mahmoud, Othman Milad, Shorouq Al-Awawdeh:

Dublejli: AI-Based Adaptive and Multi-Lingual Video Dubbing System. 511-516 - Ouahab Adelwhab, Hautia Cherifa:

Evaluating the Performance of Three IHS-based Pansharpening Techniques. 517-521 - Irene Izco, Adrian Serrano, Javier Faulin:

Power Optimization of Urban Logistics with Autonomous Delivery Robots. 522-527 - Duha Al-Darras

, Bashar Al-Shboul, Nadim Obeid:
Towards Using Ontology-Based Systems for Explainable Medical Diagnosis in Nutrition Domain. 528-533 - Tarek Kanan, Ceselia Alyawanseh, Ghassan Kanaan, Nesreen A. Hamad:

Enhancing Security and Reliability in IoT Smart Homes via Advanced Engineering Testing Methodologies. 534-539 - Anas Ali Alkasasbeh:

Machine Learning Approach to Detect Blackhole Attack over MANETs. 540-545 - Mohammad Z. Masoud, Yousef Jaradat, Mais A. Alhawawsheh, Ismael Jannoud, Rashed Alsakarnah:

Smartphone Communication Strategies for Legacy Industrial Systems: A Study of ModbusTCP and Local Server Solutions. 546-551 - Sukruthi Sanampudi, Chandra Prabha, Sampann Raheja, Sudeepa Roy, Raghavendra G. Ambekar:

Hybrid Crime Data-driven Route Optimization System for Safer Urban Navigation. 552-557 - Long Vu Pham, Vanha Tran, Truongminh Ngo:

Celebrity Hairstyle Recommendation System with Hairstyle Transfer. 558-564 - Iyas Qaddara, Enas Naffar, Abdallah Hyassat

, Amneh Kenanah, Yousef Alrabanah, Mosleh M. Abualhaj, Rania Alzubaidi:
Arabic News Text Summarization: An Extractive Technique. 571-576 - Ishtiaque Mahmood, Mahammad Mastan, Zunysha Naveed, Hamza Iftikhar, Wakeel Ahmad, Syed M. Adnan:

AzureIQ-RAG: Hybrid RAG System for Automated Information Retrieval and Semantic Query Answering Using Azure AI. 577-583 - Reem Amro, Ahmad Althunibat, Bilal Hawashin:

Evaluating the Impact of Dataset Size on the Accuracy of Arabic Software Requirements Classification Using AraBERT. 584-589 - Anas Abu-Doleh:

GenoCGC: A Hybrid CNN and Graph-based Transformer Model for Genomic Sequence Classification. 590-595 - Anas Al-Rahamneh, José Javier Astrain:

The Synergy of Cognitive Cities and Open Data in Advancing Sustainable Urban Mobility: A Case Study of Pamplona, Spain. 596-601 - Mousa Salah, Mohammad Abdallah, Mustafa Alrifaee, Basem Alokush, Khalid Mohammad Jaber:

The Role of 360-Degree Photos in Enhancing User Experience and Site Documentation on Google Maps. 602-608 - Anis Faeza binti Faisal, Hussam Mizher, Syahrir Zaini, Qasem M. Abdallah, Mohammad Abdallah:

Knowledge, Attitude, and Practice Toward AI Use Among Health Profession Students in a Malaysian Public University. 609-614 - Hamzeh Abdelfattah Awad Alassaf, Fadi Bani Ahmad

, Haitham Qawaqneh:
The Degree of Awareness of Engineering, Science and Mathematics Teachers of The Importance of Using Internet of Things Technology In The Educational Process. 615-619 - Safaa Hriez, Mohammad Hmidan:

Temperature Forecasting for High-Temperature Data Centers: Enhancing Energy Efficiency Through Predictive Modeling. 620-625 - Qasem M. Abdallah, Farah Al-Daghistani, Hussam Mizher, Mohammad Abdallah, Asad A. Abukhalil:

The Role of Large Language Models in Personalized Obesity Management: Opportunities and Challenges. 626-630 - Laila Barqawi, Sewar Al-Rashdan:

The Impact of AI on Women's Roles in the Workplace: A Legal Gender Perspective. 631-634 - Khalid Mohammad Jaber, Mousa Salah, Al Rifaee Mustafa, Naji AlQbailat, Issa Bassem, AbuElzeet Ashour:

ChatGPT Vs. DeepSeek: A Comparative Analysis of AI Models for Enhancing Virtual Reality Experiences. 635-643 - Mohammad Lafi, Khalid A. Farhan, Ahmad Abusukhon:

Machine Learning Model for Fault Prediction in Object-Oriented Systems. 644-646 - Haidar Jabbar, Samir Al-janabi:

Securing Smart Supply Chains with Adaptive AI Agents: A Virtual Simulation Framework. 647-652 - Yasmin AlHowail, Meshaal Alqahtani, Atiq Waliullah Siddiqui:

Enhancing Project Selection Process Via Machine Learning. 653-658 - Dongwei Wang, Sally I. McClean, Ian R. McChesney

, Zeeshan Tariq
:
Process Duration Modeling and Concept Drift Detection using Phase-Type Distributions. 659-664 - Zhi Chen

, Sally I. McClean, Zeeshan Tariq
, Nektarios Georgalas, Adeshola Adefila:
Integrating IT Infrastructure Metrics into Business Process Mining: A Telecommunications Industry Case Study. 665-670 - Towfeeq Fairooz, Aleeha Iftikhar, Zeeshan Tariq

, Sally I. McClean, Ian R. McChesney
:
Enhancing Process Mining on Sparse Event Logs: A Simulation-Driven Academic Case Study. 671-676 - Syed Arshad Raza

, Atiq Waliullah Siddiqui, Zeeshan Tariq
:
Analyzing the Impact of COVID-19 on Gas Demand Markets: A Process Analytics Perspective. 677-682 - Bilal Ahmed Lodhi

, Zeeshan Tariq
, Hanif Ullah
:
BalancedCL: A Balanced Contrastive Learning Framework for Process Mining with Multi-Head Attention. 683-688 - Layla Albdour, Ahmad Sharieh:

Scalable IoT Security: Machine Learning-Based Threat Identification Using Crawler-Collected Data. 689-696 - Amjed Zraiqat, Alaa Al-Wadi, Rania Saadeh, Alaa Al-Zboon, Iqbal H. Jebril, Ahmad Qazza:

A New Analytical Approach to Fractional Calculus via Mittag-Leffler Functions and the complex Sawi Transform. 697-701 - Baraa Khamayseh, Nabil Arman, Faisal Khamayseh:

A Heuristic-Based Approach for Classifying Functional and Non-functional Arabic Security Requirements. 702-708

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














