Ja'far Alqatawna

Orcid: 0000-0001-8744-4517

According to our database1, Ja'far Alqatawna authored at least 21 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable.
Int. J. Digit. Crime Forensics, 2022

2021
Violence Detection over Online Social Networks: An Arabic Sentiment Analysis Approach.
Int. J. Interact. Mob. Technol., July, 2021

Spam profiles detection on social networks using computational intelligence methods: The effect of the lingual context.
J. Inf. Sci., 2021

Android botnet detection using machine learning models based on a comprehensive static analysis approach.
J. Inf. Secur. Appl., 2021

Modeling Employee Flexible Work Scheduling As A Classification Problem.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

2019
Towards Automated Comprehensive Feature Engineering for Spam Detection.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Improving Event Monitoring in IoT Network Using an Integrated Blockchain-Distributed Pattern Recognition Scheme.
Proceedings of the Blockchain and Applications - International Congress, 2019

2018
Evolving Support Vector Machines using Whale Optimization Algorithm for spam profiles detection on online social networks in different lingual contexts.
Knowl. Based Syst., 2018

2017
EMFET: E-mail Features Extraction Tool.
CoRR, 2017

2016
A Proposed Model for Malicious Spam Detection in Email Systems of Educational Institutes.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

Analyzing CyberCrimes Strategies: The Case of Phishing Attack.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

Users Profiling Using Clickstream Data Analysis and Classification.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

2015
Risk adaptive hybrid RFID access control system.
Secur. Commun. Networks, 2015

2014
Road scene analysis for determination of road traffic density.
Frontiers Comput. Sci., 2014

2010
Security in e-Business - Understanding Customers Perceptions and Concerns.
Proceedings of the WEBIST 2010, 2010

2009
The State of Play in Jordanian E-government Services.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
Comparative Review of e-service Maturity Models: 6I Model.
Proceedings of the 2008 International Conference on E-Learning, 2008

A Holistic Framework for Secure e-Business.
Proceedings of the 2008 International Conference on E-Learning, 2008

Towards Holistic Approaches to Secure e-Business: A Critical Review.
Proceedings of the 2008 International Conference on E-Learning, 2008

2007
Overriding of Access Control in XACML.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007


  Loading...