Cybercrimes during COVID-19 pandemic R Khweiled, M Jazzar, D Eleyan International Journal of Information Engineering and Electronic Business 15 …, 2021 | 41 | 2021 |
Evaluation of machine learning techniques for email spam classification M Jazzar, RF Yousef, D Eleyan International Journal Of Education And Management Engineering 11 (4), 35-42, 2021 | 17 | 2021 |
A novel soft computing inference engine model for intrusion detection M Jazzar, A Jantan IJCSNS International Journal of Computer Science and Network Security 8 (4), 1-9, 2008 | 16 | 2008 |
Using fuzzy cognitive maps to reduce false alerts in som-based intrusion detection sensors M Jazzar, AB Jantan 2008 Second Asia International Conference on Modelling & Simulation (AMS …, 2008 | 15 | 2008 |
An analysis study of IoT and dos attack perspective M Jazzar, M Hamad Proceedings of international conference on intelligent cyber-physical …, 2022 | 14 | 2022 |
An enhanced phishing detection tool using deep learning from URL A Dawabsheh, M Jazzar, A Eleyan, T Bejaoui, S Popoola 2022 International Conference on Smart Applications, Communications and …, 2022 | 11 | 2022 |
Measuring the effectiveness of user and entity behavior analytics for the prevention of insider threats R Yousef, M Jazzar Xi'an Jianzhu Keji Daxue Xuebao/Journal of Xi'an University of Architecture …, 2021 | 11 | 2021 |
Comparing hdd to ssd from a digital forensic perspective M Jazzar, M Hamad Proceedings of International Conference on Intelligent Cyber-Physical …, 2022 | 9 | 2022 |
An improved framework for cyberbullying investigation process on WhatsApp application R Khweiled, M Jazzar J. Xi’an Univ. Archit. Technol 13 (9), 238-246, 2021 | 7 | 2021 |
Towards real-time intrusion detection using fuzzy cognitive maps modeling and simulation M Jazzar, A Jantan 2008 International Symposium on Information Technology 2, 1-6, 2008 | 6 | 2008 |
Smart stick for visually impaired people using raspberry pi with deep learning PS Christopherson, A Eleyan, T Bejaoui, M Jazzar 2022 International Conference on Smart Applications, Communications and …, 2022 | 5 | 2022 |
Social Engineering Attacks: A Phishing Case Simulation A Naser, M Jazzar, D Eleyan, A Eleyan International Journal of Scientific and Technology Research 10 (3), 18-22, 2021 | 5 | 2021 |
An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-driven Diagnosis and Direction M Jazzar, A Jantan Studies in Computational Intelligence (SCI) 149 (ISBN: 978-3-540-70559-8), 39-48, 2008 | 5 | 2008 |
Covid-19 age: Challenges in cybersecurity and possible solution domains Z ALsaed, M Jazzar Journal of Theoretical and Applied Information Technology 99 (11), 2648-2658, 2021 | 4 | 2021 |
An Integrated Framework Implementation For Cloud Forensics Investigation Using Logging Tool Z AlSaed, M Jazzar, A Eleyan, T Bejaoui, S Popoola 2022 International Conference on Smart Applications, Communications and …, 2022 | 3 | 2022 |
Using SQLite Structure Analysis To Retrieve Unsent Messages On WhatsApp Messaging Application R Khweiled, M Jazzar, A Eleyan, T Bejaoui 2022 International Conference on Smart Applications, Communications and …, 2022 | 2 | 2022 |
Computer Network Intrusion Detection: An Integrated Approach Using Self Organizing Maps and Fuzzy Cognitive Maps M Jazzar Lap-Lambert Academic Publishing, 2013 | 2 | 2013 |
On Cloud Data Transaction Security Using Encryption and Intrusion Detection M Jazzar Journal of Cases on Information Technology (JCIT) 19 (4), 13-21, 2017 | 1 | 2017 |
Development and Implementation of Pregnancy Healthcare Mobile Applications: A Case Study M Jazzar, et al International Journal for Research in the Applied Science Engineering …, 2017 | | 2017 |
Development and Implementation of Pregnant Women Mobile App: The Baby Bump M Alrayes, S AlHathal, M Jazzar RUW Conference 2016, 2016 | | 2016 |