Ibrahim Obeidat

According to our database1, Ibrahim Obeidat authored at least 18 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel secure cryptography model for data transmission based on Rotor64 technique.
Multim. Tools Appl., April, 2024

2023
A novel machine learning and face recognition technique for fake accounts detection system on cyber social networks.
Multim. Tools Appl., July, 2023

Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning.
Proceedings of the Eighth International Conference on Fog and Mobile Edge Computing, 2023

Utilizing Machine Learning Algorithms for Effectively Detection IoT DDoS Attacks.
Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23), 2023

2022
Towards Data-Driven Network Intrusion Detection Systems: Features Dimensionality Reduction and Machine Learning.
Int. J. Interact. Mob. Technol., July, 2022

2021
An authentication model based on cryptography.
CoRR, 2021

2019
A Secure Encrypted Protocol for Clients' Handshaking in the Same Network.
Int. J. Interact. Mob. Technol., 2019

Intensive Pre-Processing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques.
Int. J. Interact. Mob. Technol., 2019

A smart Geo-Location Job Recommender System Based on Social Media Posts.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

2018
Intensive Preprocessing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques.
CoRR, 2018

2015
Towards improving the performance of distributed virtual memory based reversal cache approach.
Int. J. Comput. Appl. Technol., 2015

2013
An Energy-Efficient Threshold-Based Clustering Protocol for Wireless Sensor Networks.
Wirel. Pers. Commun., 2013

Toward power consumption in wireless sensor networks routing technique.
Int. J. Netw. Virtual Organisations, 2013

Optimal spectrum utilisation in cognitive network using combined spectrum sharing approach: overlay, underlay and trading.
Int. J. Bus. Inf. Syst., 2013

2012
A threshold-based dynamic data replication strategy.
J. Supercomput., 2012

IslandSAT.
Int. J. Adv. Intell. Paradigms, 2012

Improving PAWS by the Island Confinement Method.
Proceedings of the Artificial Intelligence and Soft Computing, 2012

2010
Technology Fears: A Study of e-Commerce Loyalty Perception by Jordanian Customers.
Int. J. Inf. Syst. Serv. Sect., 2010


  Loading...