Monther Aldwairi

Orcid: 0000-0003-1150-2404

According to our database1, Monther Aldwairi authored at least 55 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Graph-based data management system for efficient information storage, retrieval and processing.
Inf. Process. Manag., 2023

DocCert: Nostrification, Document Verification and Authenticity Blockchain Solution.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
The Smart in Smart Cities: A Framework for Image Classification Using Deep Learning.
Sensors, 2022

n-Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems.
Trans. Emerg. Telecommun. Technol., 2022

Evaluating Web Search Engines Results for Personalization and User Tracking.
CoRR, 2022

Detecting Malicious Domains Using Statistical Internationalized Domain Name Features in Top Level Domains.
CoRR, 2022

Evaluating virtual laboratory platforms for supporting on-line information security courses.
CoRR, 2022

FALSE: Fake News Automatic and Lightweight Solution.
CoRR, 2022

2021
Multi source retinal fundus image classification using convolution neural networks fusion and Gabor-based texture representation.
Int. J. Comput. Vis. Robotics, 2021

Vector Arithmetic in the Triangular Grid.
Entropy, 2021

Detecting Arabic Fake News Using Machine Learning.
Proceedings of the Second International Conference on Intelligent Data Science Technologies and Applications, 2021

Deceptive Opinions Detection Using New Proposed Arabic Semantic Features.
Proceedings of the Fifth International Conference On Arabic Computational Linguistics, 2021

2020
Efficient and secure flash-based gaming CAPTCHA.
J. Parallel Distributed Comput., 2020

On the Optimality of Route Selection in Grid Wireless Sensor Networks: Theory and Applications.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Dynamic framework to mining Internet of Things for multimedia services.
Expert Syst. J. Knowl. Eng., 2020

Efficient and Secure Flash-based Gaming CAPTCH.
CoRR, 2020

Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection.
CoRR, 2020

Improving the impact of power efficiency in mobile cloud applications using cloudlet model.
Concurr. Comput. Pract. Exp., 2020

Particle Swarm Optimization Based Swarm Intelligence for Active Learning Improvement: Application on Medical Data Classification.
Cogn. Comput., 2020

KPN-based parallelization of Wu-Manber algorithm on multi-core machines.
Clust. Comput., 2020

PhishOut: Effective Phishing Detection Using Selected Features.
Proceedings of the 27th International Conference on Telecommunications, 2020

2019
Fog Computing Enabling Industrial Internet of Things: State-of-the-Art and Research Challenges.
Sensors, 2019

Toward an automatic summarisation of Arabic text depending on rhetorical relations.
Int. J. Reason. based Intell. Syst., 2019

Combining RSS-SVM with genetic algorithm for Arabic opinions analysis.
Int. J. Intell. Syst. Technol. Appl., 2019

Automatic identification of rhetorical relations among intra-sentence discourse segments in Arabic.
Int. J. Intell. Syst. Technol. Appl., 2019

An Efficient Real-Time Data Dissemination Multicast Protocol for Big Data in Wireless Sensor Networks.
J. Grid Comput., 2019

MultiPLZW: A novel multiple pattern matching search in LZW-compressed data.
Comput. Commun., 2019

Detection and Analysis of Drive-by Downloads and Malicious Websites.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Authors' Writing Styles Based Authorship Identification System Using the Text Representation Vector.
Proceedings of the 16th International Multi-Conference on Systems, Signals & Devices, 2019

2018
Energy-Efficient Region Shift Scheme to Support Mobile Sink Group in Wireless Sensor Networks.
Sensors, 2018

Collusion attacks mitigation in internet of things: a fog based model.
Multim. Tools Appl., 2018

Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model.
J. Comput. Sci., 2018

Penetration and Security of OpenSSH Remote Secure Shell Service on Raspberry Pi 2.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Multi-classifier system for authorship verification task using word embeddings.
Proceedings of the 2nd International Conference on Natural Language and Speech Processing, 2018

Characterizing Realistic Signature-based Intrusion Detection Benchmarks.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

Malware detection using DNS records and domain name features.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

An Enhanced AODV Protocol for Avoiding Black Holes in MANET.
Proceedings of the 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, 2018

Detecting Fake News in Social Media Networks.
Proceedings of the 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2018) / The 8th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2018) / Affiliated Workshops, 2018

The Impact of the Number of Eigen-Faces on the Face Recognition Accuracy using Different Distance Measures.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

A Deep Learning Approach for Amazon EC2 Spot Price Prediction.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2017
Feature extraction and selection for Arabic tweets authorship authentication.
J. Ambient Intell. Humaniz. Comput., 2017

Detection of Drive-by Download Attacks Using Machine Learning Approach.
Int. J. Inf. Secur. Priv., 2017

Pattern matching of signature-based IDS using Myers algorithm under MapReduce framework.
EURASIP J. Inf. Secur., 2017

FLUKES: Autonomous Log Forensics, Intelligence and Visualization Tool.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

Detecting Malware Domains: A Cyber-Threat Alarm System.
Proceedings of the Emerging Technologies for Developing Countries, 2017

2016
Bloom Filters Optimized Wu-Manber for Intrusion Detection.
J. Digit. Forensics Secur. Law, 2016

A survey on network simulators in three-dimensional wireless ad hoc and sensor networks.
Int. J. Distributed Sens. Networks, 2016

Authorship attribution of Arabic tweets.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Application of artificial bee colony for intrusion detection systems.
Secur. Commun. Networks, 2015

GFlux: A google-based system for Fast Flux detection.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
A classifier system for predicting RNA secondary structure.
Int. J. Bioinform. Res. Appl., 2014

2012
Function and Data Parallelization of Wu-Manber Pattern Matching for Intrusion Detection Systems.
Netw. Protoc. Algorithms, 2012

2010
IP Lookup using Two-level Indexing and B-Trees.
Proceedings of the 2010 International Conference on Internet Computing, 2010

2009
A Classification System for Predicting RNA Hairpin Loops.
Proceedings of the International Joint Conferences on Bioinformatics, 2009

2005
Configurable string matching hardware for speeding up intrusion detection.
SIGARCH Comput. Archit. News, 2005


  Loading...