Qasem Abu Al-Haija

Orcid: 0000-0003-2422-0297

According to our database1, Qasem Abu Al-Haija authored at least 50 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
XAI-PDF: a robust framework for malicious PDF detection leveraging SHAP-based feature engineering.
Int. Arab J. Inf. Technol., 2024

2023
Security strategy for autonomous vehicle cyber-physical systems using transfer learning.
J. Cloud Comput., December, 2023

Performance Analysis of Sink Mobility Models for Wireless Sensor Networks: A Comparative Study.
Int. J. Interact. Mob. Technol., September, 2023

Capturing low-rate DDoS attack based on MQTT protocol in software Defined-IoT environment.
Array, September, 2023

An intelligent identification and classification system for malicious uniform resource locators (URLs).
Neural Comput. Appl., August, 2023

Efficient Mobile Sink Routing in Wireless Sensor Networks Using Bipartite Graphs.
Future Internet, May, 2023

A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach.
Sensors, April, 2023

Effective One-Class Classifier Model for Memory Dump Malware Detection.
J. Sens. Actuator Networks, February, 2023

Spyware Identification for Android Systems Using Fine Trees.
Inf., February, 2023

Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

Explainable Artificial Intelligence (XAI) for Deep Learning Based Medical Imaging Classification.
J. Imaging, 2023

A novel dataset and lightweight detection system for broken bars induction motors using optimizable neural networks.
Intell. Syst. Appl., 2023

An empirical study on utilizing online k-means clustering for intrusion detection purposes.
Proceedings of the International Conference on Smart Applications, 2023

Enhancing Financial System Resilience Against Cyber Threats via SWIFT Customer Security Framework.
Proceedings of the International Conference on Information Technology, 2023

Enhancing Password Security via Supervised Learning.
Proceedings of the International Conference on Information Technology, 2023

Identifying Weaknesses: A Guide to Conducting an Effective Network Vulnerability Assessment.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

2022
Analysis of Blockchain in the Healthcare Sector: Application and Issues.
Symmetry, 2022

Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model.
Symmetry, 2022

Asymmetric Identification Model for Human-Robot Contacts via Supervised Learning.
Symmetry, 2022

DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology.
Sensors, 2022

Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning.
Sensors, 2022

High-performance intrusion detection system for networked UAVs via deep learning.
Neural Comput. Appl., 2022

ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks.
J. Sens. Actuator Networks, 2022

MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection.
J. Sens. Actuator Networks, 2022

Boost-Defence for resilient IoT networks: A head-to-toe approach.
Expert Syst. J. Knowl. Eng., 2022

A Lightweight In-Vehicle Alcohol Detection Using Smart Sensing and Supervised Learning.
Comput., 2022

Explaining Intrusion Detection-Based Convolutional Neural Networks Using Shapley Additive Explanations (SHAP).
Big Data Cogn. Comput., 2022

Formal Methods for the Verification of Smart Contracts: A Review.
Proceedings of the 15th International Conference on Security of Information and Networks, 2022

Efficient Machine-Learning Based 3D Face Identification System Under Large Pose Variation.
Proceedings of the Advances in Computational Collective Intelligence, 2022

2021
Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks.
Frontiers Big Data, 2021

Dynamic Initial Weight Assignment for MaxSAT.
Algorithms, 2021

2020
Forecasting the Growth of Structures from NMR and X-Ray Crystallography Experiments Released Per Year.
J. Inf. Knowl. Manag., 2020

Design alternatives of Euclidian greatest common divisor with enhanced architecture.
Int. J. Comput. Aided Eng. Technol., 2020

2019
Pipelined Implementation of Millar-Rabin Primality Tester Using Altera FPGA Kit.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Forecasting Model for the Annual Growth of Cryogenic Electron Microscopy Data.
Proceedings of the Computational Advances in Bio and Medical Sciences, 2019

Cost effective FPGA Implementation of Right-to-Left Modular Exponentiation with NAF-Representation.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

Performance Analysis of 128-bit Modular Inverse Based Extended Euclidean Using Altera FPGA Kit.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

Optimization of Cyber System Survivability Under Attacks Using Redundancy of Components.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

Supervised Regression Study for Electron Microscopy Data.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

2014
Exact Error Rate Analysis of MIMO-MRC System under Cochannel Interference and Imperfect Channel State Information.
Wirel. Pers. Commun., 2014

A Tiny RSA Cryptosystem based on Arduino Microcontroller Useful for Small Scale Networks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Efficient FPGA Implementation of RSA Coprocessor Using Scalable Modules.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Precise error rate analysis of MIMO system with interference and imperfect channel state information.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

2013
Evaluation Metrics for Wireless Sensor Network Security: Algorithms Review and Software Tool.
J. Comput. Sci., 2013

Cost-effective design for binary Edwards elliptic curves crypto-processor over GF (2<sup>N</sup>) using parallel multipliers and architectures.
Int. J. Inf. Comput. Secur., 2013

IRS for Computer Character Sequences Filtration: a new software tool and algorithm to support the IRS at tokenization process
CoRR, 2013

An Engineering Design of 4-bit Special Purpose Microprogrammed Processor.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

Case Study: Monitoring of AIR Quality in King Faisal University Using a Microcontroller and WSN.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

An 8-bit Scientific Calculator based Intel 8086 Virtual Machine Emulator.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

Hardware Design and Software Simulation for Four Classical Cryptosystems.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013


  Loading...