Malik Qasaimeh

Orcid: 0000-0003-1303-4501

According to our database1, Malik Qasaimeh authored at least 23 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A systematic review of detection and prevention techniques of SQL injection attacks.
Inf. Secur. J. A Glob. Perspect., July, 2023

2022
Advanced security testing using a cyber-attack forecasting model: A case study of financial institutions.
J. Softw. Evol. Process., 2022

2021
A Scoring System for Information Security Governance Framework Using Deep Learning Algorithms: A Case Study on the Banking Sector.
ACM J. Data Inf. Qual., 2021

Software Design and Experimental Evaluation of a Reduced AES for IoT Applications.
Future Internet, 2021

Analysis of Android Applications Permissions.
Proceedings of the DATA'21: International Conference on Data Science, 2021

Assessment of Machine Learning Security: The Case of Healthcare Data.
Proceedings of the DATA'21: International Conference on Data Science, 2021

2020
Attack based DoS attack detection using multiple classifier.
CoRR, 2020

Fast and Reliable DDoS Detection using Dimensionality Reduction and Machine Learning.
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020

2019
Investigating the Capability of Agile Processes to Support Medical Devices Regulations: The Case of XP, Scrum, and FDD with EU MDR Regulations.
Proceedings of the Intelligent Computing Methodologies - 15th International Conference, 2019

Toward an early assessment for Ransomware attack vulnerabilities.
Proceedings of the Second International Conference on Data Science, 2019

The status of information security systems in banking sector from social engineering perspective.
Proceedings of the Second International Conference on Data Science, 2019

Minimizing the ambiguities in medical devices regulations based on software requirement engineering techniques.
Proceedings of the Second International Conference on Data Science, 2019

A new architecture for voice interconnection using packet switched network.
Proceedings of the Second International Conference on Data Science, 2019

2018
Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security.
Multim. Tools Appl., 2018

Performance of Generating Dialogs from Ontology and Context.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2017
Randomness Analysis of DES Ciphers Produced with Various Dynamic Arrangements.
J. Comput. Sci., 2017

HIPAA Security and Privacy Rules Auditing in Extreme Programming Environments.
Int. J. Inf. Syst. Serv. Sect., 2017

A Group Leader Location Hiding Technique for VANETs.
Int. J. Distributed Syst. Technol., 2017

2016
Investigating Vincenti Engineering Principles in Support to the Auditing of Measurement Processes in Agile Organizations.
J. Softw., 2016

2013
An Audit Model for ISO 9001 Traceability Requirements in Agile-XP Environments.
J. Softw., 2013

2010
Investigation of the Capability of XP to Support the Requirements of ISO 9001 Software Process Certification.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

2008
Comparing Agile Software Processes Based on the Software Development Project Requirements.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

2007
Statistical mesh distributions for 3D object topology.
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007


  Loading...