Follow
Ahmad K. AL Hwaitat
Title
Cited by
Cited by
Year
Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels
MA Almaiah, O Almomani, A Alsaaidah, S Al-Otaibi, N Bani-Hani, ...
Electronics 11 (21), 3571, 2022
552022
Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks
AK Al Hwaitat, MA Almaiah, O Almomani, M Al-Zahrani, RM Al-Sayed, ...
International Journal of Advanced Computer Science and Applications 11 (4), 2020
392020
AN INVESTIGATION OF DIGITAL FORENSICS FOR SHAMOON ATTACK BEHAVIOUR IN FOG COMPUTING AND THREAT INTELLIGENCE FOR INCIDENT RESPONSE
AKAHS Manaseer
Journal of Theoretical and Applied Information Technology 98 (07), 2020
242020
Big data based smart blockchain for information retrieval in privacy-preserving healthcare system
A Ali, MF Pasha, OH Fang, R Khan, MA Almaiah, A K. Al Hwaitat
Big Data Intelligence for Smart Applications, 279-296, 2022
192022
A new blockchain-based authentication framework for secure IoT networks
AK Al Hwaitat, MA Almaiah, A Ali, S Al-Otaibi, R Shishakly, A Lutfi, ...
Electronics 12 (17), 3618, 2023
132023
A secure internet of medical things framework for breast cancer detection in sustainable smart cities
THH Aldhyani, MA Khan, MA Almaiah, N Alnazzawi, AKA Hwaitat, ...
Electronics 12 (4), 858, 2023
132023
A survey on Li Fi technology and internet of things (IOT)
AK Al Hwaitat, MH Qasem
International Journal of Advanced Trends in Computer Science and Engineering …, 2020
92020
A survey of digital forensic methods under advanced persistent threat in fog computing environment
AK Alhwaitat, S Manaseer, RMH Al-Sayyed
Journal of Theoretical and Applied Information Technology 97 (18), 4934-4954, 2019
72019
Centralized Web Application Firewall Security System
SMAKA Hwaitat
Modern Applied Science; 12 (10), 164-170, 2018
7*2018
Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness
M Alawida, B Abu Shawar, OI Abiodun, A Mehmood, AE Omolara, ...
Information 15 (1), 27, 2024
62024
Big data intelligence for smart applications
Y Baddi, Y Gahi, Y Maleh, M Alazab, L Tawalbeh
Springer, 2022
62022
An investigator digital forensics frequencies particle swarm optimization for detection and classification of APT attack in fog computing environment (IDF-FPSO)
AKAL Hwaitat, S Manaseer, RMH Al-Sayyed, M Almaiah, O Almomani
Journal of Theoretical and Applied Information Technology 98 (7), 937-952, 2020
52020
Computer hardware components ontology
AKA Hwaitat, A Shaheen, K Adhim, EN Arkebat, AAA Hwiatat
Modern Applied Science 12 (3), 35, 2018
42018
DSpamOnto: An Ontology Modelling for Domain-Specific Social Spammers in Microblogging
M Al-Hassan, B Abu-Salih, A Al Hwaitat
Big Data and Cognitive Computing 7 (2), 109, 2023
32023
Sentiment analysis as a way of web optimization
OM Rababah, AK Hwaitat, DA Al Qudah
Scientific Research and Essays 11 (8), 90-96, 2016
32016
Hybrid algorithm to evaluate e-business website comments
O M Rababah, A K Hwaitat, DA Al Qudah, R Halaseh
Communications and Network 8 (03), 137-143, 2016
32016
Frequencies Wave Sound Particle Swarm Optimisation (FPSO)
AK Al Hwaitat, RMH Al-Sayyed, IKM Salah, S Manaseer, HS Al-Bdour, ...
Journal of Experimental & Theoretical Artificial Intelligence 34 (5), 749-780, 2022
22022
Distributed Detection and prevention of Web Threats in Heterogeneous Environment
S Manaseer, K Al Hwaitat, R Jabri
Modern Applied Science 12 (10), 13-22, 2018
22018
Measuring parallel performance of sorting algorithms
S Manaseer, AK Al Hwaitat
Modern Applied Science 12 (10), 1-23, 2018
22018
Web Threats Detection and Prevention Framework
O M Rababah, A K Al Hwaitat, S Al Manaseer, H N Fakhouri, R Halaseh
Communications and Network 8 (03), 170-178, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20