Shadi Aljawarneh

According to our database1, Shadi Aljawarneh
  • authored at least 30 papers between 2008 and 2018.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns.
Soft Comput., 2018

A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining.
Future Generation Comp. Syst., 2018

Shifted Adaption Homomorphism Encryption for Mobile and Cloud Learning.
Computers & Electrical Engineering, 2018

2017
A resource-efficient encryption algorithm for multimedia big data.
Multimedia Tools Appl., 2017

A new elastic trickle timer algorithm for Internet of Things.
J. Network and Computer Applications, 2017

Pedagogical Indexed Arabic Text in Cloud E-Learning System.
IJCAC, 2017

G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things.
Future Generation Comp. Syst., 2017

Cloud security engineering: Early stages of SDLC.
Future Generation Comp. Syst., 2017

A new agent approach for recognizing research trends in wearable systems.
Computers & Electrical Engineering, 2017

2016
Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud.
J. UCS, 2016

Advanced Research on Software Security Design and Applications.
J. UCS, 2016

A Conceptual Security Framework for Cloud Computing Issues.
IJIIT, 2016

Investigations of automatic methods for detecting the polymorphic worms signatures.
Future Generation Comp. Syst., 2016

2015
Towards the Maturity of Object-Relational Database Technology: Promises and Reality.
IJTD, 2015

Integration of Wireless Technologies in Smart University Campus Environment: Framework Architecture.
IJICTE, 2015

2013
Secure Communication: A Proposed Public Key Watermark System.
IJISP, 2013

BeesAnts: a new nature-inspired routing algorithm.
IJCNDS, 2013

A Secure Data Transmission Mechanism for Cloud Outsourced Data.
IJCAC, 2013

2012
Testing and evaluation of a secure integrity measurement system (SIMS) for remote systems.
Int. Arab J. Inf. Technol., 2012

2011
A web engineering security methodology for e-learning systems.
Network Security, 2011

Searching and Generating Authoring Information: A Hybrid Approach.
IJITWE, 2011

Cloud Security Engineering: Avoiding Security Threats the Right Way.
IJCAC, 2011

A tool for monitoring and tracing multi-agent applications.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

2010
A secure wifi system for wireless networks: an experimental evaluation.
Network Security, 2010

A Semantic Data Validation Service for Web Applications.
JTAER, 2010

A comparison of data encryption algorithms with the proposed algorithm: Wireless security.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

A study of secure deployment of wireless technology in the medical fields.
Proceedings of the 1st International Conference on Intelligent Semantic Web-Services and Applications, 2010

Extracting authoring information based on keywords and semantic search.
Proceedings of the 1st International Conference on Intelligent Semantic Web-Services and Applications, 2010

A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation.
Proceedings of the Fourth International Conference on Digital Society, 2010

2008
An investigation into server-side static and dynamic web content survivability using a web content verification and recovery (WVCR) system.
PhD thesis, 2008


  Loading...