Malek Al-Zewairi
Malek Al-Zewairi
Jordan Information Security and Digital Forensics Research Group
Verified email at - Homepage
Cited by
Cited by
Agile software development methodologies: survey of surveys
M Al-Zewairi, M Biltawi, W Etaiwi, A Shaout
Journal of Computer and Communications 5 (05), 74, 2017
Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system
M Al-Zewairi, S Almajali, A Awajan
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
Improving knowledge based spam detection methods: The effect of malicious related features in imbalance data distribution
J Alqatawna, H Faris, K Jaradat, M Al-Zewairi, O Adwan
International Journal of Communications, Network and System Sciences 8 (05), 118, 2015
Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database
M Al-Zewairi, J Alqatawna, O Al-Kadi
2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing …, 2011
Spotting the Islamist Radical within: Religious Extremists Profiling in the United State
M Al-Zewairi, G Naymat
Procedia Computer Science 113, 162-169, 2017
An experimental software defined security controller for software defined network
M Al-Zewairi, D Suleiman, S Almajali
2017 Fourth International Conference on Software Defined Systems (SDS), 32-36, 2017
Risk adaptive hybrid RFID access control system
M Al‐Zewairi, J Alqatawna, J Atoum
Security and Communication Networks 8 (18), 3826-3835, 2015
Multilevel fuzzy inference system for risk adaptive hybrid RFID access control system
M Al-Zewairi, D Suleiman, A Shaout
2016 Cybersecurity and Cyberforensics Conference (CCC), 1-7, 2016
An Empirical Evaluation of Intelligent Machine Learning Algorithms under Big Data Processing Systems
D Suleiman, M Al-Zewairi, G Naymat
Procedia Computer Science 113, 539-544, 2017
Scientific Research
S Madakam, R Ramaswamy, S Tripathi, W Li, F Jia, Q Hu, JS Ojo, ...
Journal of Computer and Communications 3 (5), 2015
A preliminary analysis of drive-by email attacks in educational institutes
J Alqatawna, A Hadi, M Al-Zwairi, M Khader
2016 Cybersecurity and Cyberforensics Conference (CCC), 65-69, 2016
Optimized Multi-Layer Hierarchical Network Intrusion Detection System with Genetic Algorithms
P Santikellur, T Haque, M Al-Zewairi, RS Chakraborty
2019 2nd International Conference on new Trends in Computing Sciences (ICTCS …, 2019
Using IPython for Teaching Web Scraping
A Hadi, M Al-Zewairi
Social Media Shaping e-Publishing and Academia, 47-54, 2017
Unknown Security Attack Detection Using Shallow and Deep ANN Classifiers
M Al-Zewairi, S Almajali, M Ayyash
Electronics 9 (12), 2006, 2020
Ultrasurf traffic classification: detection and prevention
R Al-Qura’n, A Hadi, J Atoum, M Al-Zewairi
International Journal of Communications, Network and System Sciences 8 (08), 304, 2015
Empirical Evaluation of the Classification of Deep Learning under Big Data Processing Platforms
D Suleiman, M Al-Zewairi, W Etaiwi, G Al-Naymat
International Journal 9 (5), 2020
A new model of multi-key generation for RFID access control system.
M Al-Fayoumi, S Hamdan, M Al-Zewairi
Int. Arab J. Inf. Technol. 15 (3A), 585-591, 2018
Enhanced Multi-keyed Risk Adaptive Hybrid RFID Access Control System
M Al-Zewairi, S Hamdan, M Al Fayoumi
CCC 2017 Technical Program Committee
A Huneiti, A Swidan, D Smeed, H Sattar, H Sellahewa, H Lee, J Abawajy, ...
CCC 2017 Reviewers
A Sharieh, A Manasrah, A Al-Nemrat, A Karami, A Alazab, A Swidan, ...
The system can't perform the operation now. Try again later.
Articles 1–20