Suha Afaneh

Orcid: 0009-0009-0126-7157

According to our database1, Suha Afaneh authored at least 11 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Energy Efficiency Optimization in the IoT using Whale Optimization Algorithm and Simulated Annealing.
Proceedings of the 12th International Conference on Information Technology, 2025

2024
Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media Scams.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

The power of Network Penetration Testing.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Cloud Security: Analyzing Threats and Challenges.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

An Overview of Tools and Techniques in Network Forensics.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Main Confidentiality Challenges in Network Security: A Literature Review.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Digital Evidence and Forensic Tools in Cyber Law: A Comprehensive Analysis.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Using Artificial Intelligence Techniques in Law Enforcement: A Survey.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

2023
Security Challenges Review in Agile and DevOps Practices.
Proceedings of the International Conference on Information Technology, 2023

2022
An Intelligent Cloud Service Composition Optimization Using Spider Monkey and Multistage Forward Search Algorithms.
Symmetry, 2022

2013
Virus detection using clonal selection algorithm with Genetic Algorithm (VDC algorithm).
Appl. Soft Comput., 2013


  Loading...