Shadi Aljawarneh

According to our database1, Shadi Aljawarneh authored at least 35 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





Securing Collaborative Deep Learning in Industrial Applications Within Adversarial Scenarios.
IEEE Trans. Industrial Informatics, 2018

A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns.
Soft Comput., 2018

A multithreaded programming approach for multimedia big data: encryption system.
Multimedia Tools Appl., 2018

Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model.
J. Comput. Science, 2018

A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining.
Future Generation Comp. Syst., 2018

Shifted Adaption Homomorphism Encryption for Mobile and Cloud Learning.
Computers & Electrical Engineering, 2018

Introduction to the special section on New Trends in Data Mining, Games Engineering and Database Systems.
Computers & Electrical Engineering, 2018

Introduction to the special section on new trends in data mining, games engineering and database systems.
Computers & Electrical Engineering, 2018

A resource-efficient encryption algorithm for multimedia big data.
Multimedia Tools Appl., 2017

A new elastic trickle timer algorithm for Internet of Things.
J. Network and Computer Applications, 2017

Pedagogical Indexed Arabic Text in Cloud E-Learning System.
IJCAC, 2017

G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things.
Future Generation Comp. Syst., 2017

Cloud security engineering: Early stages of SDLC.
Future Generation Comp. Syst., 2017

A new agent approach for recognizing research trends in wearable systems.
Computers & Electrical Engineering, 2017

Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud.
J. UCS, 2016

Advanced Research on Software Security Design and Applications.
J. UCS, 2016

A Conceptual Security Framework for Cloud Computing Issues.
IJIIT, 2016

Investigations of automatic methods for detecting the polymorphic worms signatures.
Future Generation Comp. Syst., 2016

Towards the Maturity of Object-Relational Database Technology: Promises and Reality.
IJTD, 2015

Integration of Wireless Technologies in Smart University Campus Environment: Framework Architecture.
IJICTE, 2015

Secure Communication: A Proposed Public Key Watermark System.
IJISP, 2013

BeesAnts: a new nature-inspired routing algorithm.
IJCNDS, 2013

A Secure Data Transmission Mechanism for Cloud Outsourced Data.
IJCAC, 2013

Testing and evaluation of a secure integrity measurement system (SIMS) for remote systems.
Int. Arab J. Inf. Technol., 2012

A web engineering security methodology for e-learning systems.
Network Security, 2011

Searching and Generating Authoring Information: A Hybrid Approach.
IJITWE, 2011

Cloud Security Engineering: Avoiding Security Threats the Right Way.
IJCAC, 2011

A tool for monitoring and tracing multi-agent applications.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

A secure wifi system for wireless networks: an experimental evaluation.
Network Security, 2010

A Semantic Data Validation Service for Web Applications.
JTAER, 2010

A comparison of data encryption algorithms with the proposed algorithm: Wireless security.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

A study of secure deployment of wireless technology in the medical fields.
Proceedings of the 1st International Conference on Intelligent Semantic Web-Services and Applications, 2010

Extracting authoring information based on keywords and semantic search.
Proceedings of the 1st International Conference on Intelligent Semantic Web-Services and Applications, 2010

A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation.
Proceedings of the Fourth International Conference on Digital Society, 2010

An investigation into server-side static and dynamic web content survivability using a web content verification and recovery (WVCR) system.
PhD thesis, 2008