Issa Al-Aiash
According to our database1,
Issa Al-Aiash
authored at least 6 papers
between 2023 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Optimized digital watermarking: Harnessing the synergies of Schur matrix factorization, DCT, and DWT for superior image ownership proofing.
Multim. Tools Appl., May, 2025
Simulation-based framework for authenticating SCADA systems and cyber threat security in edge-based autonomous environments.
Simul. Model. Pract. Theory, 2025
2024
Detection of Trojan Horse in the Internet of Things: Comparative Evaluation of Machine Learning Approaches.
Proceedings of the International Conference on Multimedia Computing, 2024
Design and Simulation of a Network Infrastructure for a Multi-Branch Organization Using Cisco Packet Tracer.
Proceedings of the 25th International Arab Conference on Information Technology, 2024
Harnessing ML and NLP for Enhanced Cybersecurity: A Comprehensive Approach for Phishing Email Detection.
Proceedings of the 25th International Arab Conference on Information Technology, 2024
2023
A Novel Machine Learning Cyber Approach for Detecting WannaLocker Ransomware Attack on Android Devices.
Proceedings of the International Conference on Information Technology, 2023