关注
Dr. Sherin Hijazi
标题
引用次数
引用次数
年份
Address resolution protocol spoofing attacks and security approaches: A survey
S Hijazi, MS Obaidat
Security and Privacy 2 (1), e49, 2019
372019
A New Detection and Prevention System for ARP Attacks Using Static Entry
S Hijazi, MS Obaidat
IEEE Systems Journal 13 (3), 2732-2738, 2019
282019
On the logical foundation of a personalized medical prescription system
S Hijazi, N Obeid, KE Sabri
IEEE Access 8, 6471-6483, 2019
92019
Study of Performance Evaluation of Binary Search on Merge Sorted Array Using Different Strategies
SW Hijazi, M Qatawneh
International Journal of Modern Education and Computer Science 9 (12), 1, 2017
42017
Verification of web content integrity: Detection and recovery security approach using colored petri nets
S Hijazi, A Hudaib
International Journal of Computer Network and Information Security 9 (10), 1, 2018
32018
Using petri nets to verify design model: a survey
S Hijazi, A Hudaib
2017 International Conference on Computational Science and Computational …, 2017
32017
On drug dosage control using description defeasible logic
S Hijazi, N Obeid, R Jabri
2017 International Conference on Computational Science and Computational …, 2017
32017
Enhanced AODV Protocol for Detection and Prevention of Blackhole Attack in Mobile Ad Hoc Network
S Hijazi, M Moshref, S Al-Sharaeh
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16 (1), 7535-7547, 2017
32017
Search for Articles
M Moshref, S Hijazi, A Sleit, A Sharieh
IJEM 14 (3), 2024
2024
Detecting and Preventing Common Web Application Vulnerabilities: A Comprehensive Approach
N Odeh, S Hijazi
系统目前无法执行此操作,请稍后再试。
文章 1–10