Follow
Ali Hadi
Ali Hadi
Champlain College, VT, USA
Verified email at champlain.edu - Homepage
Title
Cited by
Cited by
Year
Vulnerability scanning of IoT devices in Jordan using Shodan
H Al-Alami, A Hadi, H Al-Bahadili
2017 2nd International Conference on the Applications of Information …, 2017
612017
Network security using hybrid port knocking
H Al-Bahadili, AH Hadi
Ijcsns 10 (8), 8, 2010
442010
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
JA Alaeddin Almubayed, Ali Hadi
International Journal of Computer Network and Information Security (IJCNIS …, 2015
36*2015
Threat hunting using grr rapid response
H Rasheed, A Hadi, M Khader
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
292017
Phishing websites prediction using classification techniques
DR Ibrahim, AH Hadi
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
192017
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files
AH Esraa Alshammari
Cybersecurity and Cyberforensics Conference (CCC), 2016, 55-59, 2016
17*2016
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files
AH Esra’a Alshammary
Cybersecurity & Cyberforensics Conference 2016, 86-91, 2016
15*2016
Windows forensic investigations using powerforensics tool
A Barakat, A Hadi
2016 Cybersecurity and Cyberforensics Conference (CCC), 41-47, 2016
112016
PDF Forensic Analysis System using YARA
SJ Khitan, A Hadi, J Atoum
International Journal of Computer Science and Network Security 17 (5), 77-85, 2017
102017
HDFS file operation fingerprints for forensic investigations
M Khader, A Hadi, G Al-Naymat
Digital Investigation 24, 50-61, 2018
92018
Covert Communication Using Port Knocking
AH Mariam Khader, Ali Hadi
Cybersecurity & Cyberforensics Conference 2016, 28-34, 2016
9*2016
Data Exfiltration Techniques and Data Loss Prevention System
H Kilani, M Nasereddin, A Hadi, S Tedmori
Conference: 2019 International Arab Conference on Information Technology (ACIT), 2019
82019
A preliminary analysis of drive-by email attacks in educational institutes
J Alqatawna, A Hadi, M Al-Zwairi, M Khader
2016 cybersecurity and cyberforensics conference (ccc), 65-69, 2016
72016
Analyzing and Detecting Malicious Content: DOCX Files
AH Ayyad Naser, Mohammad Btoush
International Journal of Computer Science and Information Security (IJCSIS …, 2016
6*2016
Passive DNS Analysis Using Bro-IDS
A Dakhgan, A Hadi, J Al Saraireh, D Alrababah
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
42017
A new technique for file carving on hadoop ecosystem
E Alshammari, G Al-Naymat, A Hadi
2017 International Conference on New Trends in Computing Sciences (ICTCS), 72-77, 2017
42017
Visualizing Clustered Botnet Traffic using t-SNE on Aggregated NetFlows
M Alsadi, AH Hadi
International Conference on new Trends in Computing Sciences, 6, 2017
32017
Apremilast for lichen planopilaris and frontal fibrosing alopecia: a case series
A Hadi, M Lebwohl
SKIN The Journal of Cutaneous Medicine 1 (1), 32-36, 2017
32017
MLDED: multi-layer data exfiltration detection system
MAA Allawi, A Hadi, A Awajan
2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015
32015
Ultrasurf Traffic Classification: Detection and Prevention
MAZ Raed Al-Qura’n, Ali Hadi, Jalal Atoum
International Journal of Communications, Network and System Sciences (IJCNS …, 2015
3*2015
The system can't perform the operation now. Try again later.
Articles 1–20