Mohammad Qbea'h, Mohammad Alshraideh and Khair Eddin Sabri. 

Detecting and Preventing SQL Injection Attacks: A Formal Approach. 

In Proceedings of the Cybersecurity and Cyberforensics Conference (CCC), pages 123-129. IEEE, 2016.​

Computer ScienceComputer Science10/20/2016Computer Science

Hazem Hiary, Khair Eddin Sabri, Mohammed S. Mohammed and Ahlam Al-Dhamari. 

A Hybrid Steganography System based on LSB Matching and Replacement. 

International Journal of Advanced Computer Science and Applications(IJACSA), 7(9): 374-380, 2016.

Computer ScienceComputer Science9/1/2016Computer Science

Khair Eddin Sabri and Hazem Hiary. 

Algebraic model for handling access control policies. 

In Proceedings of the 7th International Conference on Ambient Systems, Networks and Technologies

(ANT 2016), volume 83 of Procedia Computer Science, pages 653-657. Elsevier, 2016.
Computer ScienceComputer Science5/12/2016Computer Science

Khair Eddin Sabri and Nadim Obeid. 

A temporal defeasible logic for handling access control policies. 

Applied Intelligence, 44(1): 30-42, 2016.

Computer ScienceComputer Science1/1/2016Computer Science

Sherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi:

Generating statistical insights into network behavior using SKETURE. 

J. High Speed Networks 22(1): 65-76 (2016)​

Computer ScienceComputer Science2/10/2016Computer Science

Sherenaz W. Al-Haj Baddar

Identifying Energy-Deprivation in Wireless Sensor Networks. 

AINA Workshops 2016: 276-279​

Computer ScienceComputer Science5/19/2016Computer Science

Reem Q. Al Fayez, Mike Joy.

Using Linked Data for Integrating Educational Medical Web Databases Based on BioMedical Ontologies. 

The Computer Journal, Oxford University Press, 2016 1-20. doi: 10.1093/comjnl/bxw096​

Computer Information SystemsComputer Information Systems12/5/2016Computer Information Systems

Hudaib, A. M. Huneiti, I. Othman

 Software Reusability Classification and Predication Using Self-Organizing Map (SOM). 

Communications and Network, August 2016, Vol(8), pp. 179-192.​

Computer Information SystemsComputer Information Systems8/1/2016Computer Information Systems

A. Zaid, J. Alqatawna, A. M. Huneiti

A Proposed Model for Malicious Spam Detection In Email Systems of Educational Institutes. 

Cybersecurity and Cyberforensics Conference - Jordan. Aug. 2-4, 2016.​

Computer Information SystemsComputer Information Systems8/2/2016Computer Information Systems
Nadim Obeid, Enas Rawashdeh, Eman Alduweib
On Ontology-Based Diagnosis and Defeasibilit
The 2016 International Conference on Computational Science and Comuptational Intelligence, IEEE. 2016


Computer Information SystemsComputer Information Systems12/16/2016Computer Information Systems

​Khair Eddine Sabri and Nadim Obeid,

A Temporal Defeasible Logic for Handling Access Control Policies 

Applied Intelligence, Vol. 44, No. 1, 30-42. 
Computer Information SystemsComputer Information Systems1/1/2016Computer Information Systems

Bassam Hammo, Nadim Obeid and Israa Huzayyen, I. 

 ViStA: a visualization system for exploring Arabic text. 

International Journal of Speech Technology,  Vol. 19, No. 2, 237-247.

Computer Information SystemsComputer Information Systems6/1/2016Computer Information Systems

​Ala’a Al-Shaikh, Hebatallah Khattab, Asma Moubaiddin, Nadim Obeid, 

A Defeasible Description Logic for Representing Bibliographic Data

In: Social Media Shaping e-Publishing, Social Media Shaping e-Publishing, Taha, N., Al-Sayyed, R., Alqatawna, J., Rodan, A. (Eds.).

Computer Information SystemsComputer Information Systems1/1/2017Computer Information Systems

Amjad A. Hudaib, Hussam N. Fakhouri, Fatima Eid Al Adwan, Sandi N. Fakhouri

A Survey about Self-Healing Systems (Desktop and Web Application)

Communications and Network, Vol. 9, No. 1, pp. 71-88, 2017

Computer Information SystemsComputer Information Systems2/1/2017Computer Information Systems

Amjad Hudaib, Dima Suleiman, Arafat Awajan

A Fast Pattern Matching Algorithm Using Changing Consecutive Characters

Journal of Software Engineering and Applications (JSEA), Vol. 9, No. 8, 2016.

Computer Information SystemsComputer Information Systems8/1/2016Computer Information Systems

Amjad Hudaib, Hussam N. Fakhouri, Rawan Ghnemat

New Methodology For Microarray Spot Segmentation And Gene Expression Analysis

Scientific Research and Essays, Vol. 11 (12), pp. 126-134, 2016

Computer Information SystemsComputer Information Systems6/1/2016Computer Information Systems

Amjad Hudaib, Hussam N. Fakhouri

An Automated Approach for Software Fault Detection and Recovery

Communications and Network (CN). Vol. 8, No. 3. Pp.158-169, 2016

Computer Information SystemsComputer Information Systems8/1/2016Computer Information Systems

Osama Rababah, Thair Hamtini, Hussam Fakhouri, Amjad Hudaib, Ahmad Hwaitat,

Theoretical Framework for Social Network Marketing Base on Genetic Algorithm.

Scientific Research and Essays, Vol. 11 (3), pp. 23-28, 2016

Computer Information SystemsComputer Information Systems2/1/2016Computer Information Systems

Hussein, Riyad; Sawalha, Majdi

A Corpus-based Study of Similes in British and American English.

Arab World English Journal, Volume 7, Issue 2, June 2016. Pp. 49-60

Computer Information SystemsComputer Information Systems6/1/2016Computer Information Systems

Brierley, Claire; Sawalha, Majdi; Heselwood, Barry; Atwell, Eric. 

A Verified Arabic-IPA Mapping for Arabic Transcription Technology, Informed by Quranic Recitation, Traditional Arabic Linguistics, and Modern Phonetics 

Journal of Semitic Studies, (Spring 2016) 61 (1): 157-186.  doi: 10.1093/jss/fgv035. Oxford Journals.

Computer Information SystemsComputer Information Systems3/11/2016Computer Information Systems

AlMaayah, Manal; Sawalha, Majdi;  Abushariah, Mohammed

Towards an automatic extraction of synonyms for Quranic Arabic WordNet

International Journal of Speech Technology,  Volume 19, Issue 2, June 2016, DOI 10.1007/s10772-015-9301-9

Computer Information SystemsComputer Information Systems6/1/2016Computer Information Systems

Ibrahim Aljarah, Hossam Faris, Seyedali Mirjalili, Nailah Al-Madi,

Training radial basis function networks using biogeography-based optimizer

Neural Computing and Applications, Springer, August 2016.

Information TechnologyInformation Technology8/1/2016Information Technology

Hossam Faris, Mohammad A. Hassonah, Ala' M. Al-Zoubi, Seyedali Mirjalili, and Ibrahim Aljarah.

 A multi-verse optimizer approach for feature selection and optimizing SVM parameters based on a robust system architecture

 Neural Computing and Applications, Springer, December 2016.

Information TechnologyInformation Technology12/1/2016Information Technology

​Hossam Faris, Ibrahim Aljarah, Nailah Al-Madi, and Seyedali Mirjalili. 

Optimizing the Learning Process of Feedforward Neural Networks Using Lightning Search Algorithm

International Journal on Artificial Intelligence Tools 25, no. 06 (2016)

Information TechnologyInformation Technology12/1/2016Information Technology

Al-Kadi, O.S. Spatio-temporal segmentation in 3D echocardiographic sequences using fractional Brownian motion. IEEE Transactions on Biomedical Engineering 67 (2020), 2286–2296. [DOI:]

Reserch on ResearchGate Website

Information TechnologyInformation Technology9/12/2019Information Technology

Aljarah, I., Faris, H., Heidari, A. A., Mafarja, M. M., Ala’M, A. Z., Castillo, P. A., & Merelo, J. J. A Robust Multi-Objective Feature Selection Model Based on Local Neighborhood Multi-Verse Optimization. IEEE Access, 9, (2021).

[DOI: 10.1109/ACCESS.2021.3097206]

Research on IEEE Website

Information TechnologyInformation Technology7/14/2021Information Technology

Abuqaddom, I., Mahafzah, B. A., & Faris, H. (2021). Oriented stochastic loss descent algorithm to train very deep multi-layer neural networks without vanishing gradients. Knowledge-Based Systems, 230, 107391.


Research on ScienceDirect Website

Computer ScienceComputer Science10/27/2021Computer Science

Al-Shaikh, A., Mahafzah, B. A., & Alshraideh, M. (2021). Hybrid harmony search algorithm for social network contact tracing of COVID-19. Soft Computing, 1-23.


Research on Springer Website

Computer ScienceComputer Science6/28/2021Computer Science

Evolutionary inspired approach for mental stress detection using EEG signal​

Authors: Lakhan Dev Sharma, Vijay Kumar Bohat, Maria Habib, Al-Zoubi Ala’M, Hossam Faris, Ibrahim Aljarah​

Artificial IntelligenceArtificial Intelligence7/1/2022Artificial Intelligence

A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System

Authors: Abdullah Alzaqebah, Ibrahim Aljarah, Omar Al-Kadi, Robertas Damaševičius​

Artificial IntelligenceArtificial Intelligence2/8/2022Artificial Intelligence
1 - 30Next