Skip Ribbon Commands
Skip to main content
Use SHIFT+ENTER to open the menu (new window).
  
  
Details
  
  
  
  
  

Mohammad Qbea'h, Mohammad Alshraideh and Khair Eddin Sabri. 

Detecting and Preventing SQL Injection Attacks: A Formal Approach. 

In Proceedings of the Cybersecurity and Cyberforensics Conference (CCC), pages 123-129. IEEE, 2016.

http://ieeexplore.ieee.org/document/7600222/​

Computer ScienceComputer Science10/20/2016Computer Science
  

Hazem Hiary, Khair Eddin Sabri, Mohammed S. Mohammed and Ahlam Al-Dhamari. 

A Hybrid Steganography System based on LSB Matching and Replacement. 

International Journal of Advanced Computer Science and Applications(IJACSA), 7(9): 374-380, 2016.

http://thesai.org/Publications/ViewPaper?Volume=7&Issue=9&Code=ijacsa&SerialNo=51

Computer ScienceComputer Science9/1/2016Computer Science
  

Khair Eddin Sabri and Hazem Hiary. 

Algebraic model for handling access control policies. 

In Proceedings of the 7th International Conference on Ambient Systems, Networks and Technologies

(ANT 2016), volume 83 of Procedia Computer Science, pages 653-657. Elsevier, 2016.

http://www.sciencedirect.com/science/article/pii/S1877050916301764
Computer ScienceComputer Science5/12/2016Computer Science
  

Khair Eddin Sabri and Nadim Obeid. 

A temporal defeasible logic for handling access control policies. 

Applied Intelligence, 44(1): 30-42, 2016.

https://link.springer.com/article/10.1007/s10489-015-0692-8

Computer ScienceComputer Science1/1/2016Computer Science
  

Sherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi:

Generating statistical insights into network behavior using SKETURE. 

J. High Speed Networks 22(1): 65-76 (2016)

http://content.iospress.com/articles/journal-of-high-speed-networks/jhs539​

Computer ScienceComputer Science2/10/2016Computer Science
  

Sherenaz W. Al-Haj Baddar

Identifying Energy-Deprivation in Wireless Sensor Networks. 

AINA Workshops 2016: 276-279

http://ieeexplore.ieee.org/abstract/document/7471213/​

Computer ScienceComputer Science5/19/2016Computer Science
  

Reem Q. Al Fayez, Mike Joy.

Using Linked Data for Integrating Educational Medical Web Databases Based on BioMedical Ontologies. 

The Computer Journal, Oxford University Press, 2016 1-20. doi: 10.1093/comjnl/bxw096

http://comjnl.oxfordjournals.org/content/early/2016/12/04/comjnl.bxw096.abstract​

Computer Information SystemsComputer Information Systems12/5/2016Computer Information Systems
  

Hudaib, A. M. Huneiti, I. Othman

 Software Reusability Classification and Predication Using Self-Organizing Map (SOM). 

Communications and Network, August 2016, Vol(8), pp. 179-192.

http://m.scirp.org/papers/69828​

Computer Information SystemsComputer Information Systems8/1/2016Computer Information Systems
  

A. Zaid, J. Alqatawna, A. M. Huneiti

A Proposed Model for Malicious Spam Detection In Email Systems of Educational Institutes. 

Cybersecurity and Cyberforensics Conference - Jordan. Aug. 2-4, 2016.

http://ieeexplore.ieee.org/abstract/document/7600211/​

Computer Information SystemsComputer Information Systems8/2/2016Computer Information Systems
  
Nadim Obeid, Enas Rawashdeh, Eman Alduweib
 
On Ontology-Based Diagnosis and Defeasibilit
 
The 2016 International Conference on Computational Science and Comuptational Intelligence, IEEE. 2016
 

 

Computer Information SystemsComputer Information Systems12/16/2016Computer Information Systems
  

​Khair Eddine Sabri and Nadim Obeid,

A Temporal Defeasible Logic for Handling Access Control Policies 

Applied Intelligence, Vol. 44, No. 1, 30-42.

 http://link.springer.com/article/10.1007%2Fs10489-015-0692-8 
Computer Information SystemsComputer Information Systems1/1/2016Computer Information Systems
  

Bassam Hammo, Nadim Obeid and Israa Huzayyen, I. 

 ViStA: a visualization system for exploring Arabic text. 

International Journal of Speech Technology,  Vol. 19, No. 2, 237-247.

Computer Information SystemsComputer Information Systems6/1/2016Computer Information Systems
  

​Ala’a Al-Shaikh, Hebatallah Khattab, Asma Moubaiddin, Nadim Obeid, 

A Defeasible Description Logic for Representing Bibliographic Data

In: Social Media Shaping e-Publishing, Social Media Shaping e-Publishing, Taha, N., Al-Sayyed, R., Alqatawna, J., Rodan, A. (Eds.).

https://www.springer.com/gp/book/9783319553535#aboutAuthors

Computer Information SystemsComputer Information Systems1/1/2017Computer Information Systems
  

Amjad A. Hudaib, Hussam N. Fakhouri, Fatima Eid Al Adwan, Sandi N. Fakhouri

A Survey about Self-Healing Systems (Desktop and Web Application)

Communications and Network, Vol. 9, No. 1, pp. 71-88, 2017

Computer Information SystemsComputer Information Systems2/1/2017Computer Information Systems
  

Amjad Hudaib, Dima Suleiman, Arafat Awajan

A Fast Pattern Matching Algorithm Using Changing Consecutive Characters

Journal of Software Engineering and Applications (JSEA), Vol. 9, No. 8, 2016.

Computer Information SystemsComputer Information Systems8/1/2016Computer Information Systems
  

Amjad Hudaib, Hussam N. Fakhouri, Rawan Ghnemat

New Methodology For Microarray Spot Segmentation And Gene Expression Analysis

Scientific Research and Essays, Vol. 11 (12), pp. 126-134, 2016

http://www.academicjournals.org/journal/SRE/article-abstract/4180CA259499

Computer Information SystemsComputer Information Systems6/1/2016Computer Information Systems
  

Amjad Hudaib, Hussam N. Fakhouri

An Automated Approach for Software Fault Detection and Recovery

Communications and Network (CN). Vol. 8, No. 3. Pp.158-169, 2016

Computer Information SystemsComputer Information Systems8/1/2016Computer Information Systems
  

Osama Rababah, Thair Hamtini, Hussam Fakhouri, Amjad Hudaib, Ahmad Hwaitat,

Theoretical Framework for Social Network Marketing Base on Genetic Algorithm.

Scientific Research and Essays, Vol. 11 (3), pp. 23-28, 2016

http://www.academicjournals.org/journal/SRE/article-abstract/F2ED78757304

Computer Information SystemsComputer Information Systems2/1/2016Computer Information Systems
  

Hussein, Riyad; Sawalha, Majdi

A Corpus-based Study of Similes in British and American English.

Arab World English Journal, Volume 7, Issue 2, June 2016. Pp. 49-60

http://www.awej.org/index.php?option=com_content&view=article&id=915:riyad-f-hussein-majdi-sawalha&catid=66&Itemid=168

Computer Information SystemsComputer Information Systems6/1/2016Computer Information Systems
  

Brierley, Claire; Sawalha, Majdi; Heselwood, Barry; Atwell, Eric. 

A Verified Arabic-IPA Mapping for Arabic Transcription Technology, Informed by Quranic Recitation, Traditional Arabic Linguistics, and Modern Phonetics 

Journal of Semitic Studies, (Spring 2016) 61 (1): 157-186.  doi: 10.1093/jss/fgv035. Oxford Journals.

https://academic.oup.com/jss/article-abstract/61/1/157/2472188/A-Verified-Arabic-IPA-Mapping-for-Arabic

Computer Information SystemsComputer Information Systems3/11/2016Computer Information Systems
  

AlMaayah, Manal; Sawalha, Majdi;  Abushariah, Mohammed

Towards an automatic extraction of synonyms for Quranic Arabic WordNet

International Journal of Speech Technology,  Volume 19, Issue 2, June 2016, DOI 10.1007/s10772-015-9301-9

https://link.springer.com/article/10.1007/s10772-015-9301-9

Computer Information SystemsComputer Information Systems6/1/2016Computer Information Systems
  

​Ibrahim Aljarah, Hossam Faris and Seyedali Mirjalili,

Optimizing connection weights in neural networks using the whale optimization algorithm

Soft Computing, Springer, November 2016.

https://link.springer.com/article/10.1007/s00500-016-2442-1

Business Information TechnologyBusiness Information Technology11/1/2016Business Information Technology
  

Ibrahim Aljarah, Hossam Faris, Seyedali Mirjalili, Nailah Al-Madi,

Training radial basis function networks using biogeography-based optimizer

Neural Computing and Applications, Springer, August 2016.

http://link.springer.com/article/10.1007/s00521-016-2559-2

Business Information TechnologyBusiness Information Technology8/1/2016Business Information Technology
  

Hossam Faris, Mohammad A. Hassonah, Ala' M. Al-Zoubi, Seyedali Mirjalili, and Ibrahim Aljarah.

 A multi-verse optimizer approach for feature selection and optimizing SVM parameters based on a robust system architecture

 Neural Computing and Applications, Springer, December 2016.

http://link.springer.com/article/10.1007/s00500-016-2442-1

Business Information TechnologyBusiness Information Technology12/1/2016Business Information Technology
  

​Hossam Faris, Ibrahim Aljarah, Nailah Al-Madi, and Seyedali Mirjalili. 

Optimizing the Learning Process of Feedforward Neural Networks Using Lightning Search Algorithm

International Journal on Artificial Intelligence Tools 25, no. 06 (2016)

http://www.worldscientific.com/doi/abs/10.1142/S0218213016500330

Business Information TechnologyBusiness Information Technology12/1/2016Business Information Technology
  

Hossam Faris, Ibrahim Aljarah and Seyedali Mirjalili

Training feedforward neural networks using multi-verse optimizer for binary classification problems

Applied Intelligence, Springer, March 2016.

http://link.springer.com/article/10.1007/s10489-016-0767-1

Business Information TechnologyBusiness Information Technology3/1/2016Business Information Technology