


default search action
ICCR 2024: Dubai, UAE
- 2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates, February 26-28, 2024. IEEE 2024, ISBN 979-8-3503-9496-2

- Mahmoud Mahfuri, Sameh Ghwanmeh, Liaqat Ali, Hani Q. Al-Zoubi:

Proposal Intelligent Hand Gesture Recognition Using CNN. 1-6 - Hanady Al-Zagheer, Abdullah Kassab AlDa'jah, Qais Hammouri, Hamza Ali Alshawabkeh:

The Role of Internal Knowledge Management Capabilities with the Internet of Things. 1-5 - Sultan Freihat:

The Effect of Pink Marketing Mix Components on Women's Purchasing Decisions Through Digital Channels: Amman L'OREAL Cosmetics Market Serves as Proof. 1-10 - Hayat Fayez Mahmoud Banat, Firas Jamil Alotoum, Tareq Nael Hashem:

Smart Banking Services and Their Impact on the Customers' Intentions to Use Mobile Banking in Commercial Banks: Evidence from UAE. 1-7 - Haider Rasheed Abdulshaheed, Yaseen Saadi Abbas, Jamal F. Tawfeq, Karamath Ateeq, Saif E. A. Alnawayseh, Taher M. Ghazal:

Watermarking and Encryption for Electronic Medical Records (EMR) Security Based on mCloud. 1-7 - Anas Kanaan

, Ahmad AL-Hawamleh, Almuhannad Alorfi, Mohammad Aloun
:
Cybersecurity Resilience for Business: A Comprehensive Model for Proactive Defense and Swift Recovery. 1-7 - Rand Ibrahim Al-Suhimat, Nadia Mohammed Ai, Amer Ibrahim, Nowf O. Maaitah, Nidal A. Al-Dmour:

Review of Security Challenges Encountered in Internet of Things Technology. 1-6 - Khalil Omar, Muhammad Abu Arqoub:

A Comprehensive Model for Securing Metaverse. 1-5 - Eman Alduweib, Muhammad Abu Arqoub, Waseem Alromema:

Automated Machine Learning for Information Management and Information Systems: An Overvie. 1-5 - Anna Piazza

, Srinidhi Vasudevan
, Madeline Carr
:
Am I Hired as a Firefighter? Exploring the Role Ambiguity and Board's Engagements on Job Stress and Perceived Organizational Support of CISOs. 1-9 - Dong Cheol Lee, BooYun Cho, Hae Jin Kim, Yoon Seob Nam:

A Study on the Development of AI-Based Service Platform Specialized for Local Culture. 1-3 - Afnan Asasfeh, Saif E. A. Alnawayseh, Reem AbdElkareem, Mohammed Salahat:

Human Factors In Security Management: Understanding And Mitigating Insider Threats. 1-10 - Rami A. Abdel Rahem, Faisal Al-Akayleh:

Integrative Analysis of Genomic Data Types and AI Methodologies in Healthcare Applications. 1-5 - Amer Ibrahim:

Guarding the Future of Gaming: The Imperative of Cybersecurity. 1-9 - Mounir El Khatib, Yordanka Angelova

, Hamda Kazim:
Digital Transformation Significance on Quality of SMART Services: Innovation, Mobility, Adaptability, Analytical Ability and Trust. 1-4 - Mahmoud Mahfuri, Sameh Ghwanmeh, Rasha Almajed

, Waseem Alhasan
, Mohammed Salahat, Jin Hie Lee, Taher M. Ghazal:
Transforming Cybersecurity in the Digital Era: The Power of AI. 1-8 - Wasef Mater:

Intention to Use ChatGPT from Healthcare Workers: Jordan Case Study. 1-3 - Atif Ali

, Abdul Razzaque, Usama Munir, Hina Shahid, Furqan Wali Khattak, Zain Rajpoot, Muhammad Kamran, Zulqarnain Farid:
AI-Driven Approaches to Cybersecurity: The Impact of Machine and Deep Learning. 1-5 - Mouhammd Alkasassbeh, Ammar Almomani, Amjad Aldweesh, Ahmad Al-Qerem, Mohammad Alauthman, Khalid M. O. Nahar, Beenu Mago:

Cyberbullying Detection Using Deep Learning: A Comparative Study. 1-6 - Turki Al Masaeid

, Rachid Alami, Omar Sattar:
Maintaining Quality Time: A Creative Problem-Solving Strategy for Leaders to Improve Employee Communication. 1-7 - Maryam Alsereidi, Abeer Awadallah, Alreem Alkaabi, Sangyoung Yoon

, Chan Yeob Yeun:
Data Poisoning Against Federated Learning: Comparative Analysis Under Label-Flipping Attacks and GAN-Generated EEG Data. 1-5 - Ayat Alrosan, Waleed Alomoush

, Merna Youssef, Abdelrhman W. Nile, Mohanad A. Deif, Rania El-Gohary:
Hyper-Parameters Tuning Using Meta-Heuristic Algorithms for Nurses Stress Detection. 1-5 - Afnan Asasfeh, Leen Tarawneh, Manas Ranjan Pradhan, Nidal A. Al-Dmour:

Privacy and Security Concerns in Big Data. 1-5 - Anum Yazdani, Salima Hamouche, Mohamed Dawood Shamout

:
Innovative Work Behavior and Compassion for New Social Venture Ideation in the era of Artificial Intelligence. 1-5 - Barween Al Kurdi

, Muhammad Turki Alshurideh
, Samer Hamadneh
, Deepak Kalra, Sunita Marwaha, Haitham M. Alzoubi:
Machine Learning Applications in Social Media Marketing: Innovating Customer Engagement and Brand Building. 1-7 - Hussam N. Fakhouri, Basim Alhadidi, Mohammad A. Alsharaiah, Heba Al Naddaf, Ashraf Saleh Alomoush Data:

Critical Evaluation of the Role of Cloud Systems and Networking in the Security and Growth of the Business Market. 1-7 - Hazem M. Al-Najjar

, Nadia Al-Rousan
:
Improving the Efficiency of Smart Grid Scheduling: A Linear Regression Model with Meta Job Information. 1-7 - Abdul Rahman Al Natour

, Hala Zaidan, Yasmeen Said, Hamzah Al-Mawali:
The Role of Forensic Accounting Skills and CAATTs Application in Enhancing Firm's Cyber Resilience. 1-5 - Arab Mahmoud Alshuryfeen, Firas Jamil Alotoum, Yanal Alkilani:

The Impact of Challenges in Metaverse Implementation in Jordan Tourism. 1-8 - Harahm Na, Yoon Seok Chang:

Study on the Policies, Regulations of Drone-Based Logistics. 1-4 - Jamshaid Iqbal Janjua

, Adeel Sabir, Tahir Abbas
, Syed Qasim Abbas, Muhammad Saleem
:
Predictive Analytics and Machine Learning for Electricity Consumption Resilience in Wholesale Power Markets. 1-7 - Qais Al-Na'amneh

, Ammar Almomani, Ahmad Nasayreh, Khalid M. O. Nahar, Hasan Gharaibeh
, Rabia Emhamed Al Mamlook
, Mohammad Alauthman:
Next Generation Image Watermarking via Combined DWT-SVD Technique. 1-10 - Mayyas Al-Remawi, Faisal Aburub:

Clinical Applications of AI in Post-Cancer Rehabilitation. 1-6 - Riktesh Srivastava, Mohd Abu Faiz, Turki Al Masaeid

, Mohammad Inairat, Haitham M. Alzoubi:
Exploring the Adoption of Strategic Information Systems: A Technology Acceptance Model Perspective. 1-5 - Samia Akhtar

, Shabib Aftab
, Munir Ahmad, Baha Ihnaini
:
A Classification Framework for Diabetic Retinopathy Detection Using Transfer Learning. 1-5 - Faisal Al-Akayleh, Mayyas Al-Remawi, Ahmed S. A. Ali Agha

:
AI-Driven Physical Rehabilitation Strategies in Post-Cancer Care. 1-6 - Riktesh Srivastava, Harish Uppilappatta Chennelleri, Babeet Gupta

, Naseem Abidi, Ramakrishna Yanamandra, Ruchi Agarwal:
Reducing the Bullwhip Effect Through Blockchain in Supply Chains: An Analysis Through Technology Acceptance Model. 1-4 - Nuha El-Khalili, May Y. Al-Nashashibi, Salam Al-E'mari:

The Impact of Generative Artificial Intelligence on Learning: A Case Study at the University of Petra. 1-6 - Elyazia Baha, Abdulla Fadhel, Patricia Buenaventura, Chan Yeob Yeun, Jamal Zemerly, Khouloud Eldelbi:

Multimodal Biometric Authentication Systems: Exploring Iris and EEG Data. 1-4 - Mohammad Alauthman, Ahmad Al-Qerem, Mouhammd Alkasassbeh, Nauman Aslam, Amjad Aldweesh:

Malware Threats Targeting Cryptocurrency: A Comparative Study. 1-8 - Anu Vij, Mohit Vij, Maged Farouk, Pranav Kumar

:
Evaluating the Effectiveness of AI-Integrated Digital Marketing on Consumer Behavior, Brand Perception, and Sales Performance. 1-6 - Abedal-Kareem Al-Banna, Hui Fang, Ahmad F. Shubita, Mohammad Arafah

, Amani Eqteeshat, Saif B. Abuaisheh:
The Impact of Stuttering Event Representation on Detection Performance. 1-5 - Hussam N. Fakhouri, Mohammad A. Alsharaiah, Ahmad K. Al Hwaitat, Mohannad Alkalaileh, Fawzi Fayez Dweikat:

Overview of Challenges Faced by Digital Forensic. 1-8 - Atif Ali

, Furqan Wali Khattak, Zulqarnain Farid, Hina Shahid, Usama Munir, Hamza Muneer, Ali Raza:
The Hidden Ledger: Understanding Bitcoin's Pseudonymity in Dark Web Transactions. 1-5 - Wassim Safi, Sameh Ghwanmeh, Mahmoud Mahfuri, Waleed T. Al-Sit:

Enhancing Cloud Security: A Comprehensive Review of Machine Learning Approaches. 1-10 - Mohammed I. Nofal, Nasim Matar

, Muaadh Mukred
, Mohammad Al Khaldy
, Bilal Sowan
, Trad M. Almalahmeh:
A Framework for Using Blockchain-Enabled Supply Chain Management to Enhance Transparency, Traceability, and Trust. 1-5 - Riktesh Srivastava, Belal Shneikat, Sharon Mendoza, Hamzah Elrehail, Mohammed A. M. Afifi:

Assessing AI Adoption in the Workplace Through the Theory of Planned Behavior. 1-4 - Mohammad Fasha, Faisal Abul Rub, Nasim Matar, Bilal Sowan, Mohammad Al Khaldy, Hussam Barham:

Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents. 1-9 - Dana Masri, Lina Jaber, Rasha Mashal, Firas Albourini, Mohd Abu Alsaoud, Abdallah M. A. Al-Tarawneh

:
The Role of Wearables & Technology in Mental Health: Review. 1-5 - Samer Hamadneh

, Muhammad Turki Alshurideh
, Enass Khalil Alquqa
, Amer Hani Al-Kassem, Kakul Agha, Haitham M. Alzoubi:
AI-Driven Talent Acquisition Systems: Transforming Recruitment Strategies in the Digital Age. 1-6 - Safa' Abunasrieh, Huthaifa Abdullah Alqeisi, Dalia Yaser Akileh, Abdallah M. A. Al-Tarawneh

:
Exploring the Role of Artificial Intelligence Applications in Developing Clinical Psychological Research: Implications and Future Aspirations. 1-5 - Mounir El Khatib, Mohamed El Baradie, Mariam Bakhit Alrashedi:

AI Capable Emotional Robot Teacher as a New Economical Trend in Education. 1-5 - Saad Zighan

:
Navigating the Cyber Landscape: A Framework for Transitioning from Business Continuity to Digital Resilience. 1-6 - Salam Al-E'mari, Yousef K. Sanjalawe, Hamzah Alqudah

:
Integrating Enhanced Security Protocols with Moving Object Detection: A Yolo-Based Approach for Real-Time Surveillance. 1-6 - Gouher Ahmed, Amer Ahmed, Muhib Ahmed, Jeya Latha, Pranav Kumar

:
Indian Banking Precision Marketing: A Comparative Analysis of Machine Learning Customer Segmentation Algorithms. 1-6 - Mohammad Al Khaldy

, Garam Alshdifat, Trad M. Almalahmeh, Amjad Aldweesh:
Blockchain as a Resilient Infrastructure for e-Business Transactions. 1-6 - Shuq Hussein, Salwa Mohammed

:
Analyzing the Legal Framework and Implications of Federal Decree-Law No. 34/2021 in Combatting Cyber Blackmail in the UAE. 1-6 - Fahad Ahmed

, Areej Fatima, Muhammed Mamoon, Shan Khan:
Identification of the Diabetic Retinopathy Using ResNet-18. 1-6 - Mounir El Khatib, Ahmed Al-Nakeeb, Sara Binkhadim, Omyma Ismail Shehata:

Modern Digitization, Technical Integration, and Social Sustainability: Together Toward Better Quality of Life. 1-5 - Sharif Naser Makhadmeh, Hussam N. Fakhouri, Mohammed Azmi Al-Betar:

A Modified White Shark Optimizer for Gene Selection Optimization Problem. 1-6 - Samia Akhtar

, Shabib Aftab
, Munir Ahmad, Baha Ihnaini
:
A Transfer Learning Based Framework for Diabetic Retinopathy Detection Using Data Fusion. 1-5 - Muhammad Turki Alshurideh

, Bilal Zakarneh, Samer Hamadneh
, Gouher Ahmed, Channaganu Paramaiah, Haitham M. Alzoubi:
Artificial Intelligence in Identifying Market Opportunities: Revolutionizing Entrepreneurial Strategy and Innovation. 1-6 - Ibrahim Atoum

, Nisreen Innab
, Faisal Alghayadh, Mona Alahmari, Reem Alrowili, Afnan Alshehri:
Comprehensive Rubrics for Evaluating Computer-Related Capstones. 1-5 - Faisal Al-Akayleh, Ahmed S. A. Ali Agha

:
Trust, Ethics, and User-Centric Design in AI-Integrated Genomics. 1-6 - May Y. Al-Nashashibi, Mohammad Alauthman, Wael Hadi:

Machine Learning for Enhanced Autism Screening: A Comparative Evaluation of Classification Algorithms. 1-7 - Malini Mittal Bishnoi, Swamynathan Ramakrishnan, Shanmugan Joghee, Anand Kumar, N. Thilagavathi:

Intervention of AI and Social Engineering in the Education Sector of Ethiopia. 1-5 - Mohammad Al Khaldy

, Faisal Aburub, Nasim Matar
, Muhmmad Islam Nofal, Bilal Sowan
, Mohammed Fasha:
Securing Digital Finance: Applying Machine Learning for Fraud Analysis. 1-7 - Saeed Hameed Aldulaimi

, Marwan Abdeldayem
, Ibrahim A. Abu AlSondos
, Khaleel Ibrahim Al-Daoud
, Soha Salem El Mokdad
, Muhammad Salem Al-Tamimi:
Intelligent Computing in Islamic Banking and the Role of Intellectual Capital Investment. 1-4 - Jamal Zraqou, Wesam Alkhadour, Wael Hadi:

Vegetation Change Detection in Amman, Jordan Using Remote Sensing and GIS. 1-7 - Mohit Vij, Anu Vij, Pranav Kumar

, Beenish Shameem:
Impact of AI-Driven Customer Insights on Brand Engagement and Loyalty in Tourism Marketing. 1-6 - Khalil Omar, Yaser Saleh, Ghassan Farid Issa:

Challenges of Distance Learning During the Coronavirus (COVID-19) Pandemic A Case Study of the University of Petra. 1-6 - Jassim Ahmad Al-Gasawneh, Malek Alsoud, Zead M. Alhawamdeh, Tomader Jamil Bani-Ata, Mahmoud Alghizzawi, Mohammad Khalaf Daoud:

Exploring the Influence of Digital Marketing Strategies on Enhancing Customer Satisfaction in Contemporary Business Environments. 1-7 - Abdelraouf Ishtaiwi

, Wael Hadi, Ahmad Al-Qerem:
Realizing the Potential of Metaverse to Revolutionize the Future of Healthcare. 1-5 - BooYun Cho, Gwihyeon Boo, Ahram Cho:

The Productization Process with Informatized and Tangibilized Modularization. 1-3 - Riktesh Srivastava, Mohd Abu Faiz, Shanmugan Joghee, Deepak Kalra, Anwar Al-Gasaymeh:

Technological Advancements in Marketing: A Comprehensive Review of Sentiment Analysis for Enhanced Consumer Engagement. 1-4 - Atif Ali

, Awais Zia, Abdul Razzaque, Hina Shahid, Haroon Tariq Sheikh, Muhammad Saleem
, Farhan Yousaf, Salman Muneer
:
Enhancing Cybersecurity with Artificial Neural Networks: A Study on Threat Detection and Mitigation Strategies. 1-5 - Amer Ibrahim, Wael Ali, Nidal A. Al-Dmour, Taher M. Ghazal:

Revolutionizing Human Assessment: AI-Driven Analysis of SQ, EQ, and IQ. 1-7 - Shamma Alshebli, Muna Alshehhi, Chan Yeob Yeun:

Investigating How Data Poising Attacks Can Impact An EEG-Based Federated Learning Model. 1-6 - Victor Obarafor, Mandi Qi, Leishi Zhang:

Feed-forward ANN with Random Forest Technique for Identifying Malicious Internet of Things Network Intrusion. 1-6 - Salam Al-E'mari, Yousef K. Sanjalawe, Tahani Alqurashi

:
Comparative Evaluation of Bio-Inspired Feature Selection Methods in Intrusion Detection. 1-6 - Salam Al-E'mari, Yousef K. Sanjalawe, Sharif Naser Makhadmeh

, Hamzah Alqudah
:
Digital Forensics Meets Blockchain: Enhancing Evidence Authenticity and Traceability. 1-6 - Anum Yazdani, Salima Hamouche, Zakariya Chabani, Mohamed Dawood Shamout

:
New Social Venture Ideation of the Future Generation of Entrepreneurs: Conceptual Model Exploring the Effects of Compassion, Innovative Work Behavior, and ICTs. 1-5 - Saeed Hameed Aldulaimi

, Marwan Abdeldayem
, Ibrahim A. Abu AlSondos
, Laiali Almazaydeh
, Ibrahim Ali Alnajjar
, Alaa S. Mushtaha
:
Robust Information Security for Strengthening HR in Organizations. 1-5 - Kamal Singh, Brijesh Kumar

:
A STRIDE-Based Secure Framework for Software-Defined Networking. 1-6 - Ali Mohd Ali

, Shadi Nashwan, Ahmad Al-Qerem, Ammar Almomani, Mahmoud Al Sakhnini, Amjad Aldweesh:
Machine Learning Models for Brain Signal Classification: A Focus on EEG Analysis in Epilepsy Cases. 1-8 - Bara'ah Jaber, Dima Kriwiesh, Muna Abu AlRagheb:

A Blockchain Framework in the Banking Sector Based in e-KYC System Conceptual Framework. 1-4 - Nadia Mohammad Alnawafleh, Amer Ibrahim, Manas Ranjan Pradhan:

Review of the Mechanisms Used to Protect the Big Data from Attacks. 1-4 - Nouf Alsuwaidi, Nouf Alharmoodi, Hussam M. N. Al Hamadi

:
The Transformative Impact of Zero-Trust Architecture on Healthcare Security. 1-8 - Alessio Faccia

, Rania Itani, Ahmed Eltweri
, Leena Wanganoo, Luigi Pio Leonardo Cavaliere:
Technologies Integration With Semantic Web Techniques For Business Valuation: Identifying Equities' Intrinsic Value Without Market Bias. 1-11 - Kiran Tangri, Amer Ibrahim, Nouf Majid Sultan Eid Saeed, Abedallah Zaid Abualkishik, Reem AbdElkareem Alomoush

, Abdallah M. A. Al-Tarawneh:
Gamified Learning: Understanding the Influence of Video Game Behaviour on Sustainable Energy Education. 1-7 - Enass Khalil Alquqa

, Muhammad Turki Alshurideh
, Jamil H. Alalami, Rahul Sharma, Robinson Joseph, Haitham M. Alzoubi:
The Role of AI in Enhancing Financial Forecasting Accuracy: Transforming Modren Accounting Practices. 1-6 - Osama M. Dorgham, Sanad Aburass, Ghassan F. Issa:

Framework for Enhanced Digital Image Transmission Security: Integrating Hu Moments, Digital Watermarking, and Cryptographic Hashing for Integrity Verification. 1-5 - Malak Mohammad Ghaith, Ghada Hammad Al-Rawashdeh, Mohammad Abdalkarim Alzuod, Yahya Mohammad Ghaith, Firas Jamil Alotoum, Abdullah A. M. AlSokkar, Jassim A. Al-Gasawneh, Mahmoud Alghizzawi:

Examining the Effects of Digital Payment and Impulsive Buying on Purchase Intention. 1-7 - Swamynathan Ramakrishnan, Malini Mittal Bishnoi, Shanmugan Joghee, Jijitha S, Anand Kumar:

Social Engineering: Role of Teachers in Cohabitation of AI with Education. 1-6 - Mousa Ajouz

, Maha Shehadeh
, Rania Jabarin, Shereen Abu Sharar, Shahd Jawabra, Waad Salman:
Is FinTech Catalyst or Constraint for Banking Performance? 1-5 - Hind Abu-tarboush, Jin Hie Lee, Maha M. Al-Shrouf, Nowf O. Maaitah, Nidal A. Al-Dmour:

Blockchain and its Integration with IoT Security. 1-4 - Hazem M. Al-Najjar

, Nadia Al-Rousan
:
Enhancing Image Security with Rossler Attractor-Based Encryption. 1-7 - Riktesh Srivastava, Nizar M. F. Sahawneh, Mohammad Inairat, Ali A. Alzoubi, Sudhakar Kota:

Analyzing the Adoption of Digital Technology-Enabled E-Financial Services for Sustainable Development: A UTAUT2 Model Perspective. 1-5 - Nouf Majid Sultan Eid Saeed, Amer Ibrahim, Liaqat Ali, Nidal A. Al-Dmour, Abdul Salam Mohammed, Taher M. Ghazal:

Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network Security: A Comprehensive Literature Review. 1-7 - Mohammad Alauthman, Abdelraouf Ishtaiwi

, Ali Al Maqousi, Wael Hadi:
A Framework for Cybersecurity in the Metaverse. 1-8 - Masar H. AlDuhisat, Hala G. AlKhresha, Nidal A. Al-Dmour, Karamath Ateeq, Omer N. Maaitah:

Role of Cloud Computing in Education. 1-4 - Bara'ah Jaber, Najed Alrawashdeh, Heba Al-Malahmeh:

Oil Price Fluctuation and CryptocurrenciesReturn Conceptual Framework. 1-4 - Ahmad F. Shubita, Abedal-Kareem Al-Banna, Nesreen Otoum:

Technological and Societal Shifts in Virtual Worlds: A Comparative Perspective. 1-5 - Sharif Naser Makhadmeh, Ammar Kamal Abasi, Mohammed Azmi Al-Betar:

Marine Predators Algorithm for Energy Scheduling Problem Using Renewable Energy. 1-6 - Khowla Khaliq, Nor Zairah Ab Rahim, Khalid Hamid, Muhammad Ibrar, Uzair Ahmad, Muhammad Ubaid Ullah:

Ransomware Attacks: Tools and Techniques for Detection. 1-5 - Farah Abu-Dabaseh, Mahmoud Alghizzawi, Baker Ibrahim Alkhlaifat, Abd Alrahman Ratib Ezmigna, Amro Alzghoul

, Abdullah A. M. AlSokkar, Jassim A. Al-Gasawneh:
Enhancing Privacy and Security in Decentralized Social Systems: Blockchain-Based Approach. 1-6 - Suhad Ibraheem Kadhem, Yitong Niu

, Jamal F. Tawfeq, Ahmed Dheyaa Radhi, Karamath Ateeq, Saif E. A. Alnawayseh:
Cloud-Based 3D Virtual Interactive Lab Design. 1-6 - Amaal Al-Amawi, Alaa Al-Sarabi, Majdi Alsaaideh, Iman Akour, Heba Al-Malahmeh:

Digital Marketing and the Impact of Social Media on Achieving Positive Expectations. 1-5 - Sanad Aburass, Osama M. Dorgham, Jamil Al Shaqsi

, Maha Abu Rumman, Ahmed Al Zarouni:
Optimizing Customer Response Prediction in Auto Insurance: A Comparative Study of Machine Learning Models. 1-7 - Nisreen Innab

, Ibrahim Atoum
, Faisal Alghayadh, Marwan Abu-Zanona, Nouf Alrubayyi, Fatima Basudan, Afnan Alshehri:
Intrusion Detection System Mechanisms in Cloud Computing: Techniques and Opportunities. 1-5 - Razan Hamzeh, Faisal Aburub:

Big Data Analytics Capabilities and Decision-Making in Jordan's Telecommunications Sector. 1-6 - Sardar Shan Ali Naqvi

, Yuancheng Li
, Muhammad Uzair:
DDoS Attack Detection in Smart Grid Networks Using Visual Features. 1-5 - Baha Ihnaini

, Samia Akhtar
, Munir Ahmad, Shabib Aftab
:
Data Fusion Based Ensemble Transfer Learning Approach to Detect Diabetic Retinopathy. 1-5 - Mayyas Al-Remawi, Rami A. Abdel Rahem:

Applications of AI in Biomedical Genomics and Pharmaceuticals. 1-5 - Shamma Alshebli, Chan Yeob Yeun:

Examining the Security Landscape of Mobile Payment Systems. 1-5 - Yazan Oroud

, Hameed Alumany:
The Impact of Institutional Ownership on the Nexus Between Big Data Analytics and Financial Reporting Quality. 1-5 - Mue I

:
An Analysis on Strategic Objectives of the Issuance of the Digital Renminbi. 1-4 - Zil e Huma, Jawad Ahmad, Hussam M. N. Al Hamadi

, Baraq Ghaleb, William J. Buchanan, Sana Ullah Jan:
ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT. 1-6 - Ali Mohammad Alenezi, Mohammad A. K. Alsmairat, Nikolina Ljepava:

Integrating the Triple Pillar: AI Marketing's Pathway to Enhancing Industry 5.0 Through Sustainability, Resilience, and Customer Engagement. 1-7 - Hossam M. J. Mustafa, Mohammad H. Al-Zyod:

Cloud Computing Malware Detection Using Feature Selection Based on Optimized White Shark Algorithm (WSO). 1-6 - Sharif Naser Makhadmeh, Yousef K. Sanjalawe, Hussam N. Fakhouri:

Intrusion Detection System using Modified Arithmetic Optimization Algorithm for Large-scale IoT. 1-6 - Abdelraouf Ishtaiwi

, Ali Al Maqousi, Amjad Aldweesh:
Securing Emerging IoT Environments with Super Learner Ensembles. 1-7 - Lina Abdallah Abu Lebdeh, Raed A. Said:

The Interdependencies of Emotional Intelligence of Project Manager and a Successful Delivery of Innovation - Evidence from UAE. 1-6 - Hazem M. Al-Najjar

, Nadia Al-Rousan
:
Decision Tree-Based IoT Botnet Attack Detection. 1-5 - Mounir El Khatib, Shaima Al Harmoodi

, Yordanka Angelova
:
Virtual Reality as a Hub for Innovation - Correlations and Interdependencies. 1-5 - Mohanad A. Dief, Waleed Alomoush

, Hani H. Attar, Osama Ahmed Khashan, Ahmed A. A. Solyman, Rania Elgohary:
PID Controller Tuning Using Multi-Objective Ant Colony Optimization for Blood Glucose Level of a Diabetic Patient. 1-10 - Mohammad Alauthman, Amjad Aldweesh, Ahmad Al-Qerem:

IoT Security Challenges in Modern Smart Cities. 1-6 - Mohamed Dawood Shamout

, Haitham M. Alzoubi, Hamzah Elrehail, Rania Itani, Anwar Al-Gasaymeh, Maged Farouk:
Streamlining E-Commerce and Last-Mile Delivery for Enhanced Customer Satisfaction: An In-Depth Analysis of Amazon's Strategies. 1-8 - Raneem Jaber, Mohamad A. Alnuaimi, Haitham M. Alzoubi, Osama A. Thawabeh:

Intelligent Job Satisfaction Role in Enhancing the Nexus Between Organizational Commitment and Job Performance Optimization in Pharmaceutical Manufacturing Industry. 1-9 - Abdalrahman Alrefai, Rolania ElBanna, Carla Al Ghaddaf, Ibrahim A. Abu AlSondos

, Elham Mahmoud Chehaimi, Ibrahim Ali Alnajjar:
The Role of IoT in Sustainable Digital Transformation: Applications and Challenges. 1-4 - Ala M. Abu-Samaha, Maria Yousef

:
Hybrid PSO-Naive Bayes Algorithm Based COVID-19 Prediction Model. 1-4 - Haya Alhunaity, Hala Alsuhimat, Nidal A. Al-Dmour, Tariq Barjes Al-bloush, Omer N. Maaitah:

Mechanisms for Protecting Information in E-Government. 1-5 - Abdallah M. A. Al-Tarawneh

:
An Analysis of the Positive and Negative Effects of Cyberpsychotherapy: A Systematic Review. 1-4 - Shujah Ur Rehman, Sania Safdar, Yasir Aawais Butt, Muhamad Intisar Ullah Khan Sumbal, Atif Ali

, Muhammad Adnan Khan, Muhammad Asif:
Smart Exact String Matching Algorithm Specifically for DNA Sequencing. 1-5 - Nasim Matar

, Bilal Sowan
, Amneh Al-Jaber:
Evaluating Models Performance for Credit Risk Detection for Imbalanced Data. 1-6 - Waseem Alhasan

, Muhammad Wannous, Abedallah Zaid Abualkishik, Mohammad Rustom Al Nasar, Liaqat Ali, Hani Q. Al-Zoubi:
An In-Depth Examination of Cybersecurity: Unveiling Contemporary Trends and Recent Advancements in the World of Cyber Threats. 1-11 - Khalil Omar, Saif Abu-Aishah, Izzeddin Matar, Duha Al Smadi, Hussam Fakhouri, Muhammad Abu Arqoub:

Analyzing Jordanian Higher Education Instructors' Perception Towards Metaverse Based Education. 1-6 - Atif Ali

, Shahzad Ahmed, Muhammad Hussain, Talat Ahmad Bhutta, Ali Raza, Muhammad Waqas Nadeem, Yasir Khan Jadoon, Farman Ali:
The Synergy of Artificial Intelligence and Cybersecurity. 1-5 - Bilal Sowan

, Nasim Matar
, Faisal Aburub, Mohammed Fasha, Mohammad Al Khaldy
, Muhmmad Islam Nofal, Amneh Al-Jaber:
PDF Malware Detection: A Hybrid Approach Using Random Forest and K-Nearest Neighbors. 1-6 - Naeem Akhtar Malik, Amir Mohammad Delshadi, Muhammad Ibrar, Khalid Hamid, Muhammad Aamir, Fahad Ahmed

, Gulzar Ahmad:
Behavior and Characteristics of Ransomware - A Survey. 1-5 - Ali Mohd Ali

, Shadi Nashwan, Ahmad Al-Qerem, Amjad Aldweesh, Mohammad Alauthman, Zenab Elgamal, Ammar Almomani:
CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models. 1-5 - Fadi Ayoub

:
Data Mining Techniques from Social Media and Credit Card Risk Scoring Model "An Empirical Study on the Jordanian Commercial Banks". 1-3 - Abduljaleel Al-Hasnawi, Yitong Niu

, Jamal F. Tawfeq, Manas Ranjan Pradhan, Mohammed Salahat, Taher M. Ghazal:
IoT Security Frameworks: A Comparative Review with a Focus on Privacy. 1-10 - Suhad Ibraheem Kadhem, Yitong Niu

, Jamal F. Tawfeq, Saif E. A. Alnawayseh, Waleed T. Al-Sit:
3D Remote Laboratory Design Based on Interactive Mobile Learning. 1-9 - Kristian Siautama, Rudy Rudy

, Dicky Hida Syahchari:
A Comparison Study on Logistic Services Between Indonesia, Malaysia, and Singapore for Support E-Commerce. 1-5 - Firas Omar, Laila Ashour, Arch. Rawan Khattab, Taghreed Abu Hamdan:

Implementing Corporate Social Responsibility for Sustainable Education: A Comprehensive Case Study Analysis. 1-5 - Hussam N. Fakhouri, Basim Alhadidi, Khalil Omar, Sharif Naser Makhadmeh, Faten Hamad, Niveen Z. Halalsheh:

AI-Driven Solutions for Social Engineering Attacks: Detection, Prevention, and Response. 1-8 - Mounir El Khatib, Ahmed Ankit, Wesal Bin Yarouf, Meera Al Marri:

From Functional to Projectized Organizations - PMO- Is it a Necessity? 1-5 - Rawadieh Tassnim, Reem Ali Tawfic Ja'far, Abdallah M. A. Al-Tarawneh

:
Analyzing the Challenges Facing Digital Mental Health (DMH) Between Aspiration and Reality. 1-5 - Wurood A. Jbara, Jamila H. Soud:

DeepFake Detection Based VGG-16 Model. 1-6 - Nidal Al Salhi:

The Impact of Organizational Learning Capability on Organizational Agility. 1-6 - Nuha El-Khalili, Muhammad Abu Arqoub, Mohammad Al-shaikh Hasan, Abed Alkarim Banna, Mohammad Arafah

:
Empowering Learning Analytics with Business Intelligence. 1-6 - Zakariya Chabani, Widad Chabani, Mohamed Dawood Shamout

, Salima Hamouche:
Exploring Global Innovation Networks' Impact on UAE Manufacturing: Insights from Medium-Scale Multinationals in the Global Value Chain. 1-5 - Rachid Alami

, Turki Al Masaeid
, Agata Stachowicz-Stanusch
:
Exploring the Accuracy of Machine Learning Models in Predicting Toxic Leadership: A Case Study in the IT Industry. 1-5 - Etaf Alkasasbeh, Aseel AlQadi, Lateefa Moien Alkilani, Abdallah M. A. Al-Tarawneh

:
Analyzing the Psychological, Social and Cognitive Impact of Digital Learning in Different Educational Environments. 1-4 - Hanady Al-Zagheer, Ibrahim Abu Nahleh, Qais Hammouri, Hamza Ali Alshawabkeh:

Artificial Intelligence in Identifying Market Opportunities: Revolutionizing Entrepreneurial Strategy and Innovation. 1-4 - Faisal Aburub, Ahmed S. A. Ali Agha

:
AI-Driven Psychological Support and Cognitive Rehabilitation Strategies in Post-Cancer Care. 1-6 - Ammara Muhammad Shafi, Samar Mouti

:
Advisory System Using Sentiment Analysis (ASSA) for Improved Student Feedback and Academic Advising. 1-7 - Ahsan Waseem, Mohd Azhan Umar Kamil

, Abhisehek Bhardwaj, Abdul Razim, Mohammed Abdul Qadeer, Taher M. Ghazal:
Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Reception and Signal Decoding. 1-7 - Wael Ali, Rachid Alami, Mohammad A. K. Alsmairat, Turki Fahed Al Masaeid:

Consensus or Controversy: Examining AI's Impact on Academic Integrity, Student Learning, and Inclusivity Within Higher Education Environments. 1-5 - Beenish Shameem, Pranav Kumar

, Anu Vij, Mohit Vij, Sultan Al Shehri Vij, Haitham M. Alzoubi:
Assessing the Adoption of Technology in Banking Services in India: A Structural Equation Modeling Analysis. 1-9 - Dani Itani, Rania Itani, Ahmed Ae Eltweri

, Alessio Faccia
, Leena Wanganoo:
Enhancing Cybersecurity Through Compliance and Auditing: A Strategic Approach to Resilience. 1-10 - Srinidhi Vasudevan

, Anna Piazza
:
Adoption of Bitcoin as a Payment Method: An Empirical Investigation of UK Small and Medium Businesses. 1-5 - Ahsan Waseem, Mohd Bilal

, Abhishek Bhardwaj, M. Saad Bin Arif, Taher M. Ghazal:
Cryptocurrency-Enabled Energy Trading in Micro-Grid Using Blockchain Technology. 1-7 - Pranav Kumar

, Neyara Radwan, Mohit Vij, Anu Vij:
The Role of Robotics in Enhancing Service Quality, Efficiency, and Customer Satisfaction in the Hospitality Industry. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














