Qasem Abu Al-Haija
Orcid: 0000-0003-2422-0297
According to our database1,
Qasem Abu Al-Haija
authored at least 58 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Maximizing intrusion detection efficiency for IoT networks using extreme learning machine.
Discov. Internet Things, December, 2024
Towards Robust IDSs: An Integrated Approach of Hybrid Feature Selection and Machine Learning.
J. Internet Serv. Inf. Secur., 2024
Optimizing chest tuberculosis image classification with oversampling and transfer learning.
IET Image Process., 2024
XAI-PDF: a robust framework for malicious PDF detection leveraging SHAP-based feature engineering.
Int. Arab J. Inf. Technol., 2024
Hate speech detection in the Arabic language: corpus design, construction, and evaluation.
Frontiers Artif. Intell., 2024
Frontiers Robotics AI, 2024
Forecasting cryptocurrency's buy signal with a bagged tree learning approach to enhance purchase decisions.
Frontiers Big Data, 2024
Analysis of Extreme Learning Machines (ELMs) for intelligent intrusion detection systems: A survey.
Expert Syst. Appl., 2024
2023
Security strategy for autonomous vehicle cyber-physical systems using transfer learning.
J. Cloud Comput., December, 2023
Performance Analysis of Sink Mobility Models for Wireless Sensor Networks: A Comparative Study.
Int. J. Interact. Mob. Technol., September, 2023
Capturing low-rate DDoS attack based on MQTT protocol in software Defined-IoT environment.
Array, September, 2023
An intelligent identification and classification system for malicious uniform resource locators (URLs).
Neural Comput. Appl., August, 2023
Future Internet, May, 2023
A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach.
Sensors, April, 2023
J. Sens. Actuator Networks, February, 2023
Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment.
J. King Saud Univ. Comput. Inf. Sci., January, 2023
Explainable Artificial Intelligence (XAI) for Deep Learning Based Medical Imaging Classification.
J. Imaging, 2023
A novel dataset and lightweight detection system for broken bars induction motors using optimizable neural networks.
Intell. Syst. Appl., 2023
Intell. Converged Networks, 2023
An empirical study on utilizing online k-means clustering for intrusion detection purposes.
Proceedings of the International Conference on Smart Applications, 2023
Enhancing Financial System Resilience Against Cyber Threats via SWIFT Customer Security Framework.
Proceedings of the International Conference on Information Technology, 2023
Proceedings of the International Conference on Information Technology, 2023
Identifying Weaknesses: A Guide to Conducting an Effective Network Vulnerability Assessment.
Proceedings of the 24th International Arab Conference on Information Technology, 2023
2022
Symmetry, 2022
Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model.
Symmetry, 2022
Symmetry, 2022
DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology.
Sensors, 2022
Neural Comput. Appl., 2022
J. Sens. Actuator Networks, 2022
J. Sens. Actuator Networks, 2022
Expert Syst. J. Knowl. Eng., 2022
A Lightweight In-Vehicle Alcohol Detection Using Smart Sensing and Supervised Learning.
Comput., 2022
Explaining Intrusion Detection-Based Convolutional Neural Networks Using Shapley Additive Explanations (SHAP).
Big Data Cogn. Comput., 2022
Proceedings of the 15th International Conference on Security of Information and Networks, 2022
Efficient Machine-Learning Based 3D Face Identification System Under Large Pose Variation.
Proceedings of the Advances in Computational Collective Intelligence, 2022
2021
Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks.
Frontiers Big Data, 2021
2020
Forecasting the Growth of Structures from NMR and X-Ray Crystallography Experiments Released Per Year.
J. Inf. Knowl. Manag., 2020
Int. J. Comput. Aided Eng. Technol., 2020
2019
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019
Proceedings of the Computational Advances in Bio and Medical Sciences, 2019
Cost effective FPGA Implementation of Right-to-Left Modular Exponentiation with NAF-Representation.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019
Performance Analysis of 128-bit Modular Inverse Based Extended Euclidean Using Altera FPGA Kit.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019
Optimization of Cyber System Survivability Under Attacks Using Redundancy of Components.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019
2014
Exact Error Rate Analysis of MIMO-MRC System under Cochannel Interference and Imperfect Channel State Information.
Wirel. Pers. Commun., 2014
A Tiny RSA Cryptosystem based on Arduino Microcontroller Useful for Small Scale Networks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014
Precise error rate analysis of MIMO system with interference and imperfect channel state information.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014
2013
Evaluation Metrics for Wireless Sensor Network Security: Algorithms Review and Software Tool.
J. Comput. Sci., 2013
Cost-effective design for binary Edwards elliptic curves crypto-processor over GF (2<sup>N</sup>) using parallel multipliers and architectures.
Int. J. Inf. Comput. Secur., 2013
IRS for Computer Character Sequences Filtration: a new software tool and algorithm to support the IRS at tokenization process
CoRR, 2013
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013
Case Study: Monitoring of AIR Quality in King Faisal University Using a Microcontroller and WSN.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013