Follow
Ahmad K. AL Hwaitat
Title
Cited by
Cited by
Year
Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels
MA Almaiah, O Almomani, A Alsaaidah, S Al-Otaibi, N Bani-Hani, ...
Electronics 11 (21), 3571, 2022
872022
A new blockchain-based authentication framework for secure IoT networks
AK Al Hwaitat, MA Almaiah, A Ali, S Al-Otaibi, R Shishakly, A Lutfi, ...
Electronics 12 (17), 3618, 2023
502023
Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks
AK Al Hwaitat, MA Almaiah, O Almomani, M Al-Zahrani, RM Al-Sayed, ...
International Journal of Advanced Computer Science and Applications 11 (4), 2020
482020
Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness
M Alawida, B Abu Shawar, OI Abiodun, A Mehmood, AE Omolara, ...
Information 15 (1), 27, 2024
412024
AN INVESTIGATION OF DIGITAL FORENSICS FOR SHAMOON ATTACK BEHAVIOUR IN FOG COMPUTING AND THREAT INTELLIGENCE FOR INCIDENT RESPONSE
AKAHS Manaseer
Journal of Theoretical and Applied Information Technology 98 (07), 2020
292020
Big data based smart blockchain for information retrieval in privacy-preserving healthcare system
A Ali, MF Pasha, OH Fang, R Khan, MA Almaiah, A K. Al Hwaitat
Big data intelligence for smart applications, 279-296, 2022
242022
A secure internet of medical things framework for breast cancer detection in sustainable smart cities
THH Aldhyani, MA Khan, MA Almaiah, N Alnazzawi, AKA Hwaitat, ...
Electronics 12 (4), 858, 2023
232023
Centralized Web Application Firewall Security System
SMAKA Hwaitat
Modern Applied Science; 12 (10), 164-170, 2018
12*2018
A survey on Li Fi technology and internet of things (IOT)
AK Al Hwaitat, MH Qasem
International Journal of Advanced Trends in Computer Science and Engineering …, 2020
112020
A survey of digital forensic methods under advanced persistent threat in fog computing environment
AK Alhwaitat, S Manaseer, RMH Al-Sayyed
Journal of Theoretical and Applied Information Technology 97 (18), 4934-4954, 2019
92019
An investigator digital forensics frequencies particle swarm optimization for detection and classification of APT attack in fog computing environment (IDF-FPSO)
AK Hwaitat, S Manaseer, RM Al-Sayyed, MA Almaiah, O Almomani
J. Theor. Appl. Inf. Technol 98 (7), 937-952, 2020
82020
Dspamonto: an ontology modelling for domain-specific social spammers in microblogging
M Al-Hassan, B Abu-Salih, A Al Hwaitat
Big Data and Cognitive Computing 7 (2), 109, 2023
72023
Recent innovations in artificial intelligence and smart applications
M Al-Emran, K Shaalan
Springer, 2022
72022
Improved Path Testing Using Multi-Verse Optimization Algorithm and the Integration of Test Path Distance.
HN Fakhouri, AKA Hwaitat, M Ryalat, F Hamad, J Zraqou, A Maaita, ...
International Journal of Interactive Mobile Technologies 17 (20), 2023
62023
& Aldhyani, TH (2022). Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels
MA Almaiah, O Almomani, A Alsaaidah, S Al-Otaibi, N Bani-Hani, ...
Electronics 11 (21), 3571, 0
6
Computer hardware components ontology
AKA Hwaitat, A Shaheen, K Adhim, EN Arkebat, AAA Hwiatat
Modern Applied Science 12 (3), 35, 2018
52018
Sentiment analysis as a way of web optimization
OM Rababah, AK Hwaitat, DA Al Qudah
Scientific Research and Essays 11 (8), 90-96, 2016
52016
Overview of Mobile Attack Detection and Prevention Techniques Using Machine Learning.
AK Al Hwaitat, HN Fakhouri, M Alawida, MS Atoum, B Abu-Salih, ...
International Journal of Interactive Mobile Technologies 18 (10), 2024
42024
Adaptive Cybersecurity Neural Networks: An Evolutionary Approach for Enhanced Attack Detection and Classification
AK Al Hwaitat, HN Fakhouri
Applied Sciences 14 (19), 9142, 2024
32024
Hybrid algorithm to evaluate e-business website comments
OM Rababah, AK Hwaitat, DA Al Qudah, R Halaseh
Communications and Network 8 (03), 137, 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20