Published Articles
Browse our extensive archive of rigorous peer-reviewed research across advanced computer science and sustainable engineering disciplines.
93 Results Found
Robust Image Steganography against Differential Attacks Using GA-Optimized LSB Embedding
Dena Abu Laila, Ziad E. Dawahdeh, Amer Alqutaesh, Ghada Alradwan
A Framework for Transparent and Secure Digital Trading Using Decentralized Applications
Alwi M Bamhdi
A Systematic Literature Review of Blockchain-Enabled Zero Trust Architectures for Secure Non-Terrestrial Networks in 6G Cloud–Edge Environments
Abdullah Albuali , Huda Aldawghan, Ashwag Alotaibi
A Smart Dashboard Framework for Urban Tourism Risk Analysis Using Deep Learning and Machine Learning
Adona Kulathinal Josephi, Mahmud Maqsood
IoT-Driven Enterprise Development and Supply Chain Risk Management in Healthcare Organizations
Mahmood A. Al-Shareeda, Iman Asker Hawi
Cybersecurity Risks and Challenges in Smart Cities: A Review with Insights for Cambodia
Mony Ho, Sokroeurn Ang, Sopheaktra Huy, Midhunchakkaravarthy Janarthanan
Machine Learning Approaches to Mitigate Insider Threats in Electronic Health Records Systems
Abdullah Alessa, Yaseen Alduwayl, M M Hafizur Rahman
MUMSPI: A Model for Usability Measurement of Single-Platform Interface for Multi-Tasking in Big Data Tools
Mony Ho, Sokroeurn Ang, Sopheaktra Huy, Midhunchakkaravarthy Janarthanan
IoT Security Concerns with Non-Fungible Tokens: A Review
Ashwag Alotaibi, Huda Aldawghan, M. M. Hafizur Rahman
PhishGuard: AI-Driven Graph-Based Analysis for Smarter Email Security
Harchana Ramesh, Noris Ismail, Nor Azlina Abd Rahman, Aitizaz Ali
Securing Healthcare Digital Twin with Blockchain: A Systematic Review of Architecture, Threats and Evaluation
Dawood Alalisalem, Hafizur Rahman
A Multi-Layered Adaptive Cybersecurity Framework for the Banking Sector Integrating Next-Gen Firewalls with AI-Driven IDPS
Sokroeurn Ang , Mony Ho , Sopheatra Huy , Midhunchakkaravarthy Janarthanan
A Secure Industrial Internet of Things (IIoT) Framework for Real-Time PI Control and Cloud-Integrated Industrial Monitoring
Huda S. Jaafar, Ali A. Abed, Mahmood A. Al-Shareeda
Securing Trust: Rule-Based Defense Against On/Off and Collusion Attacks in Cloud Environments
Qais Al-Na’amneh, Mahmoud Aljawarneh, Ahmad Saleh Alhazaimeh, Rahaf Hazaymih, Shahid Munir Shah, Walid Dhifallah
Optimizing Intrusion Detection Systems through Benchmarking of Ensemble Classifiers on Diverse Network Attacks
Dena Abu Laila , Mahmoud Aljawarneh , Qais Al-Na’amneh, Rejwan Bin Sulaiman
Responsive Machine Learning Framework and Lightweight Utensil of Prevention of Evasion Attacks in the IoT-Based IDS
Dena Abu Laila
Cyber Security Risk Management for Threats in Wireless LAN: A Literature Review
Michael Saad Alghareeb, Mohammed Almaayah
A Comparative Analysis of Classification Algorithms in Land Cover Mapping: A Study of MLC, Mahalanobis Distance, NNC, and SVM for 2023 and 2018: Case study of Wasit province, central Iraq
Yasir Abdulameer Nayyef Aldabbagh, Ali Ibrahim Zghair Alnasrawi
A Novel Authentication Systems in Vehicular Communication: Challenges and Future Directions
Vugar Abdullayev, Alex Khang, Nazila Ragimova, Mohammed Almaayah
Public-Sector Governance Reform in Saudi Arabia (2020–2025): Legal Modernization, Digital Innovation, and Accountability Outcomes
Suliman Al-Sadan
Secure Blockchain-Based Tracking Storage and Permission Verification of Electronic Health Records
Theyazn H. H. Aldhyani, Mohamed Chahine Ghanem, Mohammad Almaayah
Cybersecurity Challenges in Small and Medium Enterprises: A Scoping Review
Mujtaba Awan, Abu Alam, Muhammad Kamran
Analytical Analysis of Cyber Threats and Defense Mechanisms for Web Application Security
Bashaer Almelehy, Mohammad Ahmad, Ghalia Nassreddine, Mohammed Maayah, Aparna Achanta
Utilizing IDS and IPS to Improve Cybersecurity Monitoring Process
Sokroeurn Ang, Mony Ho, Sopheaktra Huy, Midhunchakkaravarthy Janarthanan
Enhancing Intrusion Detection Systems by Using Machine Learning in Smart Cities: Issues, Challenges and Future Research Direction
Rasha Almarshood, M. M. Hafizur Rahman
The Moderating Role of Institutional Pressures: Adoption of Emerging Technologies in Audit Firms under a Regulated Environment
Mahmoud jaradat
Interpretable Deep Learning-Based AI Framework with Multi-Sequence Attention for Brain Tumor Subtype Classification in MRI Scans
Omar Gheni Abdulateef
A Hybrid Genetic Algorithm and Hidden Markov Model-Based Hashing Technique for Robust Data Security
Aseel AlShuaibi, Muhammad Waqas Arshad, Mohammed Maayah
Security and Privacy Challenges and Solutions in Autonomous Driving Systems: A Comprehensive Review
Giuseppe Lippi, Mahmoud Aljawarneh, Qais Al-Na’amneh, Rahaf Hazaymih, Lachhman Das Dhomeja
Adversarial Attack Detection in Industrial Control Systems Using LSTM-Based Intrusion Detection and Black-Box Defense Strategies
Motaz Abdulaziz Almedires , Ahmed Elkhalil , Mohammed Amin
Artificial Intelligence in Auditing: Transforming Processes for Enhanced Effectiveness
Ahmad Hardan, Mohammad Ghabayen
Secure IoT-Based Real-Time Water Level Monitoring System Using ESP32 for Critical Infrastructure
Mahmood A. Al-Shareeda, Ahmed Mohammed Ali, Mustafa Adel Hammoud, Zaid Haider Muhammad Kazem, Muslim Aqeel Hussein
Classification of threats and countermeasures of cloud computing
Rasha Almanasir, Deyaa Al-solomon, Saif Indrawes, Mohammed Almaiah, Umar Islam, Marwan Alshar'e
Analyzing Cybersecurity Risks and Threats in IT Infrastructure based on NIST Framework
Osama Aljumaiah, Weiwei Jiang, Santosh Reddy Addula, Mohammed Amin Almaiah
Unveiling the Causes of Fatal Road Accidents in Iraq: An Association Rule Mining Approach Using the Apriori Algorithm
Malath Riyadh Alboalebrah, Salam Al-augby
Risk Assessment for Identifying Threats, vulnerabilities and countermeasures in Cloud Computing
Santosh Reddy Addula, Sajedeh Norozpour, Mohammed Amin
Unsupervised text feature selection approach based on improved Prairie dog algorithm for the text clustering
Mohammad Alshinwan, Abdul Ghafoor Memon, Mohamed Chahine Ghanem, Mohammed Almaayah
The Strategic Importance of Intellectual Capital and Cloud Accounting: The Interactive Role in Enhancing the Financial Performance
Mohammad Ghabayen
Assessment of cybersecurity threats and defense mechanisms in wireless sensor networks
Elham Alotaibi, Rejwan Bin Sulaiman, Mohammed Almaiah
Machine Learning for Cybersecurity Issues : A systematic Review
Aseel Alshuaibi, Mohammed Almaayah, Aitizaz Ali
The Role of Artificial Intelligence in Bodybuilding: A Systematic Review of Applications, Challenges, and Future Prospects
Mahmood A. Al-Shareeda, Ahmed Abdulazeez Obaid, Amjad Abdul Hamid Almaji
Vehicular Ad-hoc Networks (VANETs): A Key Enabler for Smart Transportation Systems and Challenges
Haitham Albinhamad, Abdullah Alotibi, Ali Alagnam, Mohammed Almaiah, Said Salloum
Corporate Governance and Financial Performance: The Moderating Role of Ownership Concentration in Indonesian Industrial Firms (2019– 2024)
Ahmad lith Fheikh
Mitigating Information Leakage Risks in Secure Multiparty Computation through Function Hiding
Udit Mamodiya, Vandana Ahuja, Indra Kishor, Amer Alqutaish, Rami Shehab, Mansour Obeidat
Applying risk analysis for determining threats and countermeasures in workstation domain
Rama Soliman Mousa, Rami Shehab
Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions
Almaha Adel Almuqren
Editorial: Jordanian Journal of Informatics and Computing
Shahed Almobydeen
A Cost-Effective Embedded Weather Monitoring System for Airport Air Traffic Control Applications
Kamil Audah Kareem, Mahmood A. Al-Shareeda
Securing API Ecosystems in Banking: A Critical Review of Cyber Risks, Control Frameworks, and Future Trends
Sopheaktra Huy, Sokroeurn Ang, Mony Ho, Vivekanandam Balasubramaniam
Geometry-Aware Multi-view Malware Detection Using Gromov–Wasserstein Fusion
Vijay Kalmani, Vedant Jadhav, Amer Alqutaish, Ghada Alradwan
A Low-Complexity Li-Fi Communication Framework for Short-Range Text Transmission
Kamil Audah Kareem, Mahmood A. Al-Shareeda
An Empirical Analysis of Small Enterprise Development Strategies and Supply Chain Performance in Telecommunications
Iman Hawi, Mahmood A. Al-Shareeda
Metaheuristic-Driven Feature Selection with SVM and KNN for Robust DDoS Attack Detection: A Comparative Study
Rejwan Bin Sulaiman, Ansam Khraisat
Model-Based Systems Engineering Cybersecurity Risk Assessment for Industrial Control Systems Leveraging NIST Risk Management Framework Methodology
Alexander Gampel , Timothy Eveleigh
A Novel Permissioned Blockchain Approach for Scalable and Privacy-Preserving IoT Authentication
Santosh Reddy Addula, Aitizaz Ali
Framework for Node Detection in Cloud Computing: A Multi-Metric Approach Integrating Security, Availability, and Latency Factors
Mohammed Maayah
Insider Threats in Banking Sector: Detection, Prevention, and Mitigation
Sopheaktra Huy, Sokroeurn Ang, Mony Ho, Vivekanandam Balasubramaniam
Designing a Robust Machine Learning-Based Framework for Secure Data Transmission in Internet of Things (IoT) Environments: A Multifaceted Approach to Security Challenges
Omar Gheni Abdulateef, Atheer Joudah, Muna Ghazi Abdulsahib, Hussein Alrammahi
The Role of Simulating Digital Threats through Interactive Theater Performances
Hayder Jaafar Aldaghlawy, Mahmood A. Al-Shareeda
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Siti Dhalila Mohd Satar, Masnida Hussin, Mohamad Afendee Mohamed , Nazirah Abd Hamid, Mohd Fadzil Abd Kadir, Roslinda Muda, Joshua Samual
Leveraging ACO, GA, and GWO for Enhancing Port Scan Attack Detection Using Machine Learning
Mohammed Amin Almaiah, Rajan Kadel
A Comparative Analysis of Machine Learning Models on Detecting Malware in Android Devices
Alagesh Leroy Chandran, Joshua Samual, Seyedmostafa Safavi, Aitizaz Ali
Comprehensive Study of SQL Injection Attacks Mitigation Methods and Future Directions
Mohammed Al-olaqi, Ahmed Al-gailani, M M Hafizur Rahman
Cyber Intelligence & Moroccan National Security: What Strategy for Managing & Mitigating Cyber Threats against Future Sporting Events
Kezzoute Mhammed
Editorial: STAP Journal of Security Risk Management
Mohammed Amin Almaiah
Cyber Security in Data Breaches
Ayed Aldossary, Talal Algirim, Ibrahim Almubarak, Khalid Almuhish
Secure Offline Smart Office Automation System Using ESP32 and Bluetooth Control Architecture
Mahmood A. Al-Shareeda, Ahmed Nader Jafer, Mohammed Tahseen Hashem, Murtaza Salman Fajr
Enhancing DDoS Attack Detection and Mitigation in SDN Using Advanced Machine Learning Techniques
Nathaniel Frederick, Aitizaz Ali
A Comprehensive Review of Machine Learning Approaches for Android Malware Detection
Aneesha Davarasan, Joshua Samual, Kulothunkan Palansundram, Aitizaz Ali
Examining the Moderating Effect of Organizational Leadership between Management Accounting on Environmental Performance
Mukhled Hassan Assi Olimat, Ahmad Omar Hardan
Secure IoT-Based Smart Agriculture System Using Wireless Sensor Networks for Remote Environmental Monitoring
Mahmood A. Al-Shareeda, Laith Badr Najm, Ali Ahmed Hassan, Sajjad Mushtaq, Hussein Abdul Ali
A Comprehensive Review of Security and Privacy Challenges and Solutions in Autonomous Driving Systems
Mohammed Amin, Youakim Badr, Qais Al-Na’amneh, Mahmoud Aljawarneh, Rahaf Hazaymih, Shahid Munir Shah
Cyber Risk Management in the Internet of Things: Frameworks, Models, and Best Practices
Mohammed Almaayah, Rejwan Bin Sulaiman
Editorial: STAP Journal of Security Risk Management
Mohammad Amin Almaiah
Assessing the Nexus between Digital Transformation and Internal Audit Quality: A Study of Industrial Companies on the Amman Stock Exchange
Ahmad Omar Hardan
Exploring the Influence of Supplier Management on Supply Chain Flexibility
Abdallah O. Mohmmad ALHusban, Ahmad Omar Hardan
The Impact of Green Innovation on Spain Banks' Sustainability
Hatem Bader Abdallah kouni
Editorial: Jordanian Journal of Informatics and Computing
Shahed Almobydeen
Analyzing Cybersecurity Threats on Mobile Phones
Sara Alsahaim, Mohammed Maayah
A Systematic Review of Security Risk Management for Banking Systems
Aitizaz Ali, Rami Shehab
Secure Framework for Land Record Management using Blockchain Technology
Sarah Alyounis, Muhammad Mehboob Yasin
Towards Trustworthy IoT Systems: Cybersecurity Threats, Frameworks, and Future Directions
Thanaa Alsalem , Mohammed Amin
Editorial: STAP Journal of Security Risk Management
Mohammed Amin Almaiah