关注
Assoc. Prof. Dr. Mahmoud Jazzar
Assoc. Prof. Dr. Mahmoud Jazzar
在 ptuk.edu.ps 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Cybercrimes during COVID-19 pandemic
R Khweiled, M Jazzar, D Eleyan
International Journal of Information Engineering and Electronic Business 15 …, 2021
412021
Evaluation of machine learning techniques for email spam classification
M Jazzar, RF Yousef, D Eleyan
International Journal Of Education And Management Engineering 11 (4), 35-42, 2021
172021
A novel soft computing inference engine model for intrusion detection
M Jazzar, A Jantan
IJCSNS International Journal of Computer Science and Network Security 8 (4), 1-9, 2008
162008
Using fuzzy cognitive maps to reduce false alerts in som-based intrusion detection sensors
M Jazzar, AB Jantan
2008 Second Asia International Conference on Modelling & Simulation (AMS …, 2008
152008
An analysis study of IoT and dos attack perspective
M Jazzar, M Hamad
Proceedings of international conference on intelligent cyber-physical …, 2022
142022
An enhanced phishing detection tool using deep learning from URL
A Dawabsheh, M Jazzar, A Eleyan, T Bejaoui, S Popoola
2022 International Conference on Smart Applications, Communications and …, 2022
112022
Measuring the effectiveness of user and entity behavior analytics for the prevention of insider threats
R Yousef, M Jazzar
Xi'an Jianzhu Keji Daxue Xuebao/Journal of Xi'an University of Architecture …, 2021
112021
Comparing hdd to ssd from a digital forensic perspective
M Jazzar, M Hamad
Proceedings of International Conference on Intelligent Cyber-Physical …, 2022
92022
An improved framework for cyberbullying investigation process on WhatsApp application
R Khweiled, M Jazzar
J. Xi’an Univ. Archit. Technol 13 (9), 238-246, 2021
72021
Towards real-time intrusion detection using fuzzy cognitive maps modeling and simulation
M Jazzar, A Jantan
2008 International Symposium on Information Technology 2, 1-6, 2008
62008
Smart stick for visually impaired people using raspberry pi with deep learning
PS Christopherson, A Eleyan, T Bejaoui, M Jazzar
2022 International Conference on Smart Applications, Communications and …, 2022
52022
Social Engineering Attacks: A Phishing Case Simulation
A Naser, M Jazzar, D Eleyan, A Eleyan
International Journal of Scientific and Technology Research 10 (3), 18-22, 2021
52021
An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-driven Diagnosis and Direction
M Jazzar, A Jantan
Studies in Computational Intelligence (SCI) 149 (ISBN: 978-3-540-70559-8), 39-48, 2008
52008
Covid-19 age: Challenges in cybersecurity and possible solution domains
Z ALsaed, M Jazzar
Journal of Theoretical and Applied Information Technology 99 (11), 2648-2658, 2021
42021
An Integrated Framework Implementation For Cloud Forensics Investigation Using Logging Tool
Z AlSaed, M Jazzar, A Eleyan, T Bejaoui, S Popoola
2022 International Conference on Smart Applications, Communications and …, 2022
32022
Using SQLite Structure Analysis To Retrieve Unsent Messages On WhatsApp Messaging Application
R Khweiled, M Jazzar, A Eleyan, T Bejaoui
2022 International Conference on Smart Applications, Communications and …, 2022
22022
Computer Network Intrusion Detection: An Integrated Approach Using Self Organizing Maps and Fuzzy Cognitive Maps
M Jazzar
Lap-Lambert Academic Publishing, 2013
22013
On Cloud Data Transaction Security Using Encryption and Intrusion Detection
M Jazzar
Journal of Cases on Information Technology (JCIT) 19 (4), 13-21, 2017
12017
Development and Implementation of Pregnancy Healthcare Mobile Applications: A Case Study
M Jazzar, et al
International Journal for Research in the Applied Science Engineering …, 2017
2017
Development and Implementation of Pregnant Women Mobile App: The Baby Bump
M Alrayes, S AlHathal, M Jazzar
RUW Conference 2016, 2016
2016
系统目前无法执行此操作,请稍后再试。
文章 1–20