Issa Al-Aiash

According to our database1, Issa Al-Aiash authored at least 6 papers between 2023 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Optimized digital watermarking: Harnessing the synergies of Schur matrix factorization, DCT, and DWT for superior image ownership proofing.
Multim. Tools Appl., May, 2025

Simulation-based framework for authenticating SCADA systems and cyber threat security in edge-based autonomous environments.
Simul. Model. Pract. Theory, 2025

2024
Detection of Trojan Horse in the Internet of Things: Comparative Evaluation of Machine Learning Approaches.
Proceedings of the International Conference on Multimedia Computing, 2024

Design and Simulation of a Network Infrastructure for a Multi-Branch Organization Using Cisco Packet Tracer.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Harnessing ML and NLP for Enhanced Cybersecurity: A Comprehensive Approach for Phishing Email Detection.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

2023
A Novel Machine Learning Cyber Approach for Detecting WannaLocker Ransomware Attack on Android Devices.
Proceedings of the International Conference on Information Technology, 2023


  Loading...