Address resolution protocol spoofing attacks and security approaches: A survey S Hijazi, MS Obaidat Security and Privacy 2 (1), e49, 2019 | 37 | 2019 |
A New Detection and Prevention System for ARP Attacks Using Static Entry S Hijazi, MS Obaidat IEEE Systems Journal 13 (3), 2732-2738, 2019 | 28 | 2019 |
On the logical foundation of a personalized medical prescription system S Hijazi, N Obeid, KE Sabri IEEE Access 8, 6471-6483, 2019 | 9 | 2019 |
Study of Performance Evaluation of Binary Search on Merge Sorted Array Using Different Strategies SW Hijazi, M Qatawneh International Journal of Modern Education and Computer Science 9 (12), 1, 2017 | 4 | 2017 |
Verification of web content integrity: Detection and recovery security approach using colored petri nets S Hijazi, A Hudaib International Journal of Computer Network and Information Security 9 (10), 1, 2018 | 3 | 2018 |
Using petri nets to verify design model: a survey S Hijazi, A Hudaib 2017 International Conference on Computational Science and Computational …, 2017 | 3 | 2017 |
On drug dosage control using description defeasible logic S Hijazi, N Obeid, R Jabri 2017 International Conference on Computational Science and Computational …, 2017 | 3 | 2017 |
Enhanced AODV Protocol for Detection and Prevention of Blackhole Attack in Mobile Ad Hoc Network S Hijazi, M Moshref, S Al-Sharaeh INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16 (1), 7535-7547, 2017 | 3 | 2017 |
Search for Articles M Moshref, S Hijazi, A Sleit, A Sharieh IJEM 14 (3), 2024 | | 2024 |
Detecting and Preventing Common Web Application Vulnerabilities: A Comprehensive Approach N Odeh, S Hijazi | | |