Ali Hadi
Ali Hadi
Champlain College, VT, USA
Verified email at champlain.edu - Homepage
Title
Cited by
Cited by
Year
Vulnerability scanning of IoT devices in Jordan using Shodan
H Al-Alami, A Hadi, H Al-Bahadili
2017 2nd International Conference on the Applications of Information …, 2017
332017
Network security using hybrid port knocking
H Al-Bahadili, AH Hadi
Ijcsns 10 (8), 8, 2010
332010
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
JA Alaeddin Almubayed, Ali Hadi
International Journal of Computer Network and Information Security (IJCNIS …, 2015
18*2015
Phishing websites prediction using classification techniques
DR Ibrahim, AH Hadi
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
132017
Threat hunting using grr rapid response
H Rasheed, A Hadi, M Khader
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
112017
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files
AH Esraa Alshammari
Cybersecurity and Cyberforensics Conference (CCC), 2016, 55-59, 2016
9*2016
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files
AH Esra’a Alshammary
Cybersecurity & Cyberforensics Conference 2016, 86-91, 2016
7*2016
A preliminary analysis of drive-by email attacks in educational institutes
J Alqatawna, A Hadi, M Al-Zwairi, M Khader
2016 Cybersecurity and Cyberforensics Conference (CCC), 65-69, 2016
62016
HDFS file operation fingerprints for forensic investigations
M Khader, A Hadi, G Al-Naymat
Digital Investigation 24, 50-61, 2018
52018
Covert communication using port knocking
M Khader, A Hadi, A Hudaib
2016 Cybersecurity and Cyberforensics Conference (CCC), 22-27, 2016
52016
Windows forensic investigations using powerforensics tool
A Barakat, A Hadi
2016 Cybersecurity and Cyberforensics Conference (CCC), 41-47, 2016
52016
PDF Forensic Analysis System using YARA
SJ Khitan, A Hadi, J Atoum
International Journal of Computer Science and Network Security 17 (5), 77-85, 2017
42017
Analyzing and Detecting Malicious Content: DOCX Files
AH Ayyad Naser, Mohammad Btoush
International Journal of Computer Science and Information Security (IJCSIS …, 2016
3*2016
A Novel Approach Covert Channel for Secret Communications
JA Mariam Khader, Ali Hadi
International Journal of Computers & Technology 14 (2), 5479-5486, 2015
3*2015
Passive DNS Analysis Using Bro-IDS
A Dakhgan, A Hadi, J Al Saraireh, D Alrababah
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
22017
Smart parser for identifying and detecting insecure functions
E Al-Shammari, A Hadi, M Qasaimeh
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
22017
A New Technique for File Carving on Hadoop Ecosystem
E Alshammari, G Al-Naymat, A Hadi
2017 International Conference on New Trends in Computing Sciences (ICTCS), 72-77, 2017
22017
Using IPython for Teaching Web Scraping
A Hadi, M Al-Zewairi
Social Media Shaping e-Publishing and Academia, 47-54, 2017
22017
A Hybrid Port-Knocking Technique for Host Authentication
HAB Ali H. Hadi
IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications Book …, 2013
2*2013
A Hybrid Port-Knocking Technique for Host Authentication
HAB Ali H. Hadi
Simulation in Computer Network Design and Modeling: Use and Analysis, 336-357, 2012
22012
The system can't perform the operation now. Try again later.
Articles 1–20