default search action
ICCR 2024: Dubai, UAE
- 2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates, February 26-28, 2024. IEEE 2024, ISBN 979-8-3503-9496-2
- Mahmoud Mahfuri, Sameh Ghwanmeh, Liaqat Ali, Hani Q. Al-Zoubi:
Proposal Intelligent Hand Gesture Recognition Using CNN. 1-6 - Hanady Al-Zagheer, Abdullah Kassab AlDa'jah, Qais Hammouri, Hamza Ali Alshawabkeh:
The Role of Internal Knowledge Management Capabilities with the Internet of Things. 1-5 - Sultan Freihat:
The Effect of Pink Marketing Mix Components on Women's Purchasing Decisions Through Digital Channels: Amman L'OREAL Cosmetics Market Serves as Proof. 1-10 - Hayat Fayez Mahmoud Banat, Firas Jamil Alotoum, Tareq Nael Hashem:
Smart Banking Services and Their Impact on the Customers' Intentions to Use Mobile Banking in Commercial Banks: Evidence from UAE. 1-7 - Haider Rasheed Abdulshaheed, Yaseen Saadi Abbas, Jamal F. Tawfeq, Karamath Ateeq, Saif E. A. Alnawayseh, Taher M. Ghazal:
Watermarking and Encryption for Electronic Medical Records (EMR) Security Based on mCloud. 1-7 - Anas Kanaan, Ahmad AL-Hawamleh, Almuhannad Alorfi, Mohammad Aloun:
Cybersecurity Resilience for Business: A Comprehensive Model for Proactive Defense and Swift Recovery. 1-7 - Rand Ibrahim Al-Suhimat, Nadia Mohammed Ai, Amer Ibrahim, Nowf O. Maaitah, Nidal A. Al-Dmour:
Review of Security Challenges Encountered in Internet of Things Technology. 1-6 - Khalil Omar, Muhammad Abu Arqoub:
A Comprehensive Model for Securing Metaverse. 1-5 - Eman Alduweib, Muhammad Abu Arqoub, Waseem Alromema:
Automated Machine Learning for Information Management and Information Systems: An Overvie. 1-5 - Anna Piazza, Srinidhi Vasudevan, Madeline Carr:
Am I Hired as a Firefighter? Exploring the Role Ambiguity and Board's Engagements on Job Stress and Perceived Organizational Support of CISOs. 1-9 - Dong Cheol Lee, BooYun Cho, Hae Jin Kim, Yoon Seob Nam:
A Study on the Development of AI-Based Service Platform Specialized for Local Culture. 1-3 - Afnan Asasfeh, Saif E. A. Alnawayseh, Reem AbdElkareem, Mohammed Salahat:
Human Factors In Security Management: Understanding And Mitigating Insider Threats. 1-10 - Rami A. Abdel Rahem, Faisal Al-Akayleh:
Integrative Analysis of Genomic Data Types and AI Methodologies in Healthcare Applications. 1-5 - Amer Ibrahim:
Guarding the Future of Gaming: The Imperative of Cybersecurity. 1-9 - Mounir El Khatib, Yordanka Angelova, Hamda Kazim:
Digital Transformation Significance on Quality of SMART Services: Innovation, Mobility, Adaptability, Analytical Ability and Trust. 1-4 - Mahmoud Mahfuri, Sameh Ghwanmeh, Rasha Almajed, Waseem Alhasan, Mohammed Salahat, Jin Hie Lee, Taher M. Ghazal:
Transforming Cybersecurity in the Digital Era: The Power of AI. 1-8 - Wasef Mater:
Intention to Use ChatGPT from Healthcare Workers: Jordan Case Study. 1-3 - Atif Ali, Abdul Razzaque, Usama Munir, Hina Shahid, Furqan Wali Khattak, Zain Rajpoot, Muhammad Kamran, Zulqarnain Farid:
AI-Driven Approaches to Cybersecurity: The Impact of Machine and Deep Learning. 1-5 - Mouhammd Alkasassbeh, Ammar Almomani, Amjad Aldweesh, Ahmad Al-Qerem, Mohammad Alauthman, Khalid M. O. Nahar, Beenu Mago:
Cyberbullying Detection Using Deep Learning: A Comparative Study. 1-6 - Turki Al Masaeid, Rachid Alami, Omar Sattar:
Maintaining Quality Time: A Creative Problem-Solving Strategy for Leaders to Improve Employee Communication. 1-7 - Maryam Alsereidi, Abeer Awadallah, Alreem Alkaabi, Sangyoung Yoon, Chan Yeob Yeun:
Data Poisoning Against Federated Learning: Comparative Analysis Under Label-Flipping Attacks and GAN-Generated EEG Data. 1-5 - Ayat Alrosan, Waleed Alomoush, Merna Youssef, Abdelrhman W. Nile, Mohanad A. Deif, Rania El-Gohary:
Hyper-Parameters Tuning Using Meta-Heuristic Algorithms for Nurses Stress Detection. 1-5 - Afnan Asasfeh, Leen Tarawneh, Manas Ranjan Pradhan, Nidal A. Al-Dmour:
Privacy and Security Concerns in Big Data. 1-5 - Anum Yazdani, Salima Hamouche, Mohamed Dawood Shamout:
Innovative Work Behavior and Compassion for New Social Venture Ideation in the era of Artificial Intelligence. 1-5 - Barween Al Kurdi, Muhammad Turki Alshurideh, Samer Hamadneh, Deepak Kalra, Sunita Marwaha, Haitham M. Alzoubi:
Machine Learning Applications in Social Media Marketing: Innovating Customer Engagement and Brand Building. 1-7 - Hussam N. Fakhouri, Basim Alhadidi, Mohammad A. Alsharaiah, Heba Al Naddaf, Ashraf Saleh Alomoush Data:
Critical Evaluation of the Role of Cloud Systems and Networking in the Security and Growth of the Business Market. 1-7 - Hazem M. Al-Najjar, Nadia Al-Rousan:
Improving the Efficiency of Smart Grid Scheduling: A Linear Regression Model with Meta Job Information. 1-7 - Abdul Rahman Al Natour, Hala Zaidan, Yasmeen Said, Hamzah Al-Mawali:
The Role of Forensic Accounting Skills and CAATTs Application in Enhancing Firm's Cyber Resilience. 1-5 - Arab Mahmoud Alshuryfeen, Firas Jamil Alotoum, Yanal Alkilani:
The Impact of Challenges in Metaverse Implementation in Jordan Tourism. 1-8 - Harahm Na, Yoon Seok Chang:
Study on the Policies, Regulations of Drone-Based Logistics. 1-4 - Jamshaid Iqbal Janjua, Adeel Sabir, Tahir Abbas, Syed Qasim Abbas, Muhammad Saleem:
Predictive Analytics and Machine Learning for Electricity Consumption Resilience in Wholesale Power Markets. 1-7 - Qais Al-Na'amneh, Ammar Almomani, Ahmad Nasayreh, Khalid M. O. Nahar, Hasan Gharaibeh, Rabia Emhamed Al Mamlook, Mohammad Alauthman:
Next Generation Image Watermarking via Combined DWT-SVD Technique. 1-10 - Mayyas Al-Remawi, Faisal Aburub:
Clinical Applications of AI in Post-Cancer Rehabilitation. 1-6 - Riktesh Srivastava, Mohd Abu Faiz, Turki Al Masaeid, Mohammad Inairat, Haitham M. Alzoubi:
Exploring the Adoption of Strategic Information Systems: A Technology Acceptance Model Perspective. 1-5 - Samia Akhtar, Shabib Aftab, Munir Ahmad, Baha Ihnaini:
A Classification Framework for Diabetic Retinopathy Detection Using Transfer Learning. 1-5 - Faisal Al-Akayleh, Mayyas Al-Remawi, Ahmed S. A. Ali Agha:
AI-Driven Physical Rehabilitation Strategies in Post-Cancer Care. 1-6 - Riktesh Srivastava, Harish Uppilappatta Chennelleri, Babeet Gupta, Naseem Abidi, Ramakrishna Yanamandra, Ruchi Agarwal:
Reducing the Bullwhip Effect Through Blockchain in Supply Chains: An Analysis Through Technology Acceptance Model. 1-4 - Nuha El-Khalili, May Y. Al-Nashashibi, Salam Al-E'mari:
The Impact of Generative Artificial Intelligence on Learning: A Case Study at the University of Petra. 1-6 - Elyazia Baha, Abdulla Fadhel, Patricia Buenaventura, Chan Yeob Yeun, Jamal Zemerly, Khouloud Eldelbi:
Multimodal Biometric Authentication Systems: Exploring Iris and EEG Data. 1-4 - Mohammad Alauthman, Ahmad Al-Qerem, Mouhammd Alkasassbeh, Nauman Aslam, Amjad Aldweesh:
Malware Threats Targeting Cryptocurrency: A Comparative Study. 1-8 - Anu Vij, Mohit Vij, Maged Farouk, Pranav Kumar:
Evaluating the Effectiveness of AI-Integrated Digital Marketing on Consumer Behavior, Brand Perception, and Sales Performance. 1-6 - Abedal-Kareem Al-Banna, Hui Fang, Ahmad F. Shubita, Mohammad Arafah, Amani Eqteeshat, Saif B. Abuaisheh:
The Impact of Stuttering Event Representation on Detection Performance. 1-5 - Hussam N. Fakhouri, Mohammad A. Alsharaiah, Ahmad K. Al Hwaitat, Mohannad Alkalaileh, Fawzi Fayez Dweikat:
Overview of Challenges Faced by Digital Forensic. 1-8 - Atif Ali, Furqan Wali Khattak, Zulqarnain Farid, Hina Shahid, Usama Munir, Hamza Muneer, Ali Raza:
The Hidden Ledger: Understanding Bitcoin's Pseudonymity in Dark Web Transactions. 1-5 - Wassim Safi, Sameh Ghwanmeh, Mahmoud Mahfuri, Waleed T. Al-Sit:
Enhancing Cloud Security: A Comprehensive Review of Machine Learning Approaches. 1-10 - Mohammed I. Nofal, Nasim Matar, Muaadh Mukred, Mohammad Al Khaldy, Bilal Sowan, Trad M. Almalahmeh:
A Framework for Using Blockchain-Enabled Supply Chain Management to Enhance Transparency, Traceability, and Trust. 1-5 - Riktesh Srivastava, Belal Shneikat, Sharon Mendoza, Hamzah Elrehail, Mohammed A. M. Afifi:
Assessing AI Adoption in the Workplace Through the Theory of Planned Behavior. 1-4 - Mohammad Fasha, Faisal Abul Rub, Nasim Matar, Bilal Sowan, Mohammad Al Khaldy, Hussam Barham:
Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents. 1-9 - Dana Masri, Lina Jaber, Rasha Mashal, Firas Albourini, Mohd Abu Alsaoud, Abdallah M. A. Al-Tarawneh:
The Role of Wearables & Technology in Mental Health: Review. 1-5 - Samer Hamadneh, Muhammad Turki Alshurideh, Enass Khalil Alquqa, Amer Hani Al-Kassem, Kakul Agha, Haitham M. Alzoubi:
AI-Driven Talent Acquisition Systems: Transforming Recruitment Strategies in the Digital Age. 1-6 - Safa' Abunasrieh, Huthaifa Abdullah Alqeisi, Dalia Yaser Akileh, Abdallah M. A. Al-Tarawneh:
Exploring the Role of Artificial Intelligence Applications in Developing Clinical Psychological Research: Implications and Future Aspirations. 1-5 - Mounir El Khatib, Mohamed El Baradie, Mariam Bakhit Alrashedi:
AI Capable Emotional Robot Teacher as a New Economical Trend in Education. 1-5 - Saad Zighan:
Navigating the Cyber Landscape: A Framework for Transitioning from Business Continuity to Digital Resilience. 1-6 - Salam Al-E'mari, Yousef K. Sanjalawe, Hamzah Alqudah:
Integrating Enhanced Security Protocols with Moving Object Detection: A Yolo-Based Approach for Real-Time Surveillance. 1-6 - Gouher Ahmed, Amer Ahmed, Muhib Ahmed, Jeya Latha, Pranav Kumar:
Indian Banking Precision Marketing: A Comparative Analysis of Machine Learning Customer Segmentation Algorithms. 1-6 - Mohammad Al Khaldy, Garam Alshdifat, Trad M. Almalahmeh, Amjad Aldweesh:
Blockchain as a Resilient Infrastructure for e-Business Transactions. 1-6 - Shuq Hussein, Salwa Mohammed:
Analyzing the Legal Framework and Implications of Federal Decree-Law No. 34/2021 in Combatting Cyber Blackmail in the UAE. 1-6 - Fahad Ahmed, Areej Fatima, Muhammed Mamoon, Shan Khan:
Identification of the Diabetic Retinopathy Using ResNet-18. 1-6 - Mounir El Khatib, Ahmed Al-Nakeeb, Sara Binkhadim, Omyma Ismail Shehata:
Modern Digitization, Technical Integration, and Social Sustainability: Together Toward Better Quality of Life. 1-5 - Sharif Naser Makhadmeh, Hussam N. Fakhouri, Mohammed Azmi Al-Betar:
A Modified White Shark Optimizer for Gene Selection Optimization Problem. 1-6 - Samia Akhtar, Shabib Aftab, Munir Ahmad, Baha Ihnaini:
A Transfer Learning Based Framework for Diabetic Retinopathy Detection Using Data Fusion. 1-5 - Muhammad Turki Alshurideh, Bilal Zakarneh, Samer Hamadneh, Gouher Ahmed, Channaganu Paramaiah, Haitham M. Alzoubi:
Artificial Intelligence in Identifying Market Opportunities: Revolutionizing Entrepreneurial Strategy and Innovation. 1-6 - Ibrahim Atoum, Nisreen Innab, Faisal Alghayadh, Mona Alahmari, Reem Alrowili, Afnan Alshehri:
Comprehensive Rubrics for Evaluating Computer-Related Capstones. 1-5 - Faisal Al-Akayleh, Ahmed S. A. Ali Agha:
Trust, Ethics, and User-Centric Design in AI-Integrated Genomics. 1-6 - May Y. Al-Nashashibi, Mohammad Alauthman, Wael Hadi:
Machine Learning for Enhanced Autism Screening: A Comparative Evaluation of Classification Algorithms. 1-7 - Malini Mittal Bishnoi, Swamynathan Ramakrishnan, Shanmugan Joghee, Anand Kumar, N. Thilagavathi:
Intervention of AI and Social Engineering in the Education Sector of Ethiopia. 1-5 - Mohammad Al Khaldy, Faisal Aburub, Nasim Matar, Muhmmad Islam Nofal, Bilal Sowan, Mohammed Fasha:
Securing Digital Finance: Applying Machine Learning for Fraud Analysis. 1-7 - Saeed Hameed Aldulaimi, Marwan Abdeldayem, Ibrahim A. Abu AlSondos, Khaleel Ibrahim Al-Daoud, Soha Salem El Mokdad, Muhammad Salem Al-Tamimi:
Intelligent Computing in Islamic Banking and the Role of Intellectual Capital Investment. 1-4 - Jamal Zraqou, Wesam Alkhadour, Wael Hadi:
Vegetation Change Detection in Amman, Jordan Using Remote Sensing and GIS. 1-7 - Mohit Vij, Anu Vij, Pranav Kumar, Beenish Shameem:
Impact of AI-Driven Customer Insights on Brand Engagement and Loyalty in Tourism Marketing. 1-6 - Khalil Omar, Yaser Saleh, Ghassan Farid Issa:
Challenges of Distance Learning During the Coronavirus (COVID-19) Pandemic A Case Study of the University of Petra. 1-6 - Jassim Ahmad Al-Gasawneh, Malek Alsoud, Zead M. Alhawamdeh, Tomader Jamil Bani-Ata, Mahmoud Alghizzawi, Mohammad Khalaf Daoud:
Exploring the Influence of Digital Marketing Strategies on Enhancing Customer Satisfaction in Contemporary Business Environments. 1-7 - Abdelraouf Ishtaiwi, Wael Hadi, Ahmad Al-Qerem:
Realizing the Potential of Metaverse to Revolutionize the Future of Healthcare. 1-5 - BooYun Cho, Gwihyeon Boo, Ahram Cho:
The Productization Process with Informatized and Tangibilized Modularization. 1-3 - Riktesh Srivastava, Mohd Abu Faiz, Joghee Shanmugan, Deepak Kalra, Anwar Al-Gasaymeh:
Technological Advancements in Marketing: A Comprehensive Review of Sentiment Analysis for Enhanced Consumer Engagement. 1-4 - Atif Ali, Awais Zia, Abdul Razzaque, Hina Shahid, Haroon Tariq Sheikh, Muhammad Saleem, Farhan Yousaf, Salman Muneer:
Enhancing Cybersecurity with Artificial Neural Networks: A Study on Threat Detection and Mitigation Strategies. 1-5 - Amer Ibrahim, Wael Ali, Nidal A. Al-Dmour, Taher M. Ghazal:
Revolutionizing Human Assessment: AI-Driven Analysis of SQ, EQ, and IQ. 1-7 - Shamma Alshebli, Muna Alshehhi, Chan Yeob Yeun:
Investigating How Data Poising Attacks Can Impact An EEG-Based Federated Learning Model. 1-6 - Victor Obarafor, Mandi Qi, Leishi Zhang:
Feed-forward ANN with Random Forest Technique for Identifying Malicious Internet of Things Network Intrusion. 1-6 - Salam Al-E'mari, Yousef K. Sanjalawe, Tahani Alqurashi:
Comparative Evaluation of Bio-Inspired Feature Selection Methods in Intrusion Detection. 1-6 - Salam Al-E'mari, Yousef K. Sanjalawe, Sharif Makhadmeh, Hamzah Alqudah:
Digital Forensics Meets Blockchain: Enhancing Evidence Authenticity and Traceability. 1-6 - Anum Yazdani, Salima Hamouche, Zakariya Chabani, Mohamed Dawood Shamout:
New Social Venture Ideation of the Future Generation of Entrepreneurs: Conceptual Model Exploring the Effects of Compassion, Innovative Work Behavior, and ICTs. 1-5 - Saeed Hameed Aldulaimi, Marwan Abdeldayem, Ibrahim A. Abu AlSondos, Laiali Almazaydeh, Ibrahim Ali Alnajjar, Alaa S. Mushtaha:
Robust Information Security for Strengthening HR in Organizations. 1-5 - Kamal Singh, Brijesh Kumar:
A STRIDE-Based Secure Framework for Software-Defined Networking. 1-6 - Ali Mohd Ali, Shadi Nashwan, Ahmad Al-Qerem, Ammar Almomani, Mahmoud Al Sakhnini, Amjad Aldweesh:
Machine Learning Models for Brain Signal Classification: A Focus on EEG Analysis in Epilepsy Cases. 1-8 - Bara'ah Jaber, Dima Kriwiesh, Muna Abu AlRagheb:
A Blockchain Framework in the Banking Sector Based in e-KYC System Conceptual Framework. 1-4 - Nadia Mohammad Alnawafleh, Amer Ibrahim, Manas Ranjan Pradhan:
Review of the Mechanisms Used to Protect the Big Data from Attacks. 1-4 - Nouf Alsuwaidi, Nouf Alharmoodi, Hussam Al Hamadi:
The Transformative Impact of Zero-Trust Architecture on Healthcare Security. 1-8 - Alessio Faccia, Rania Itani, Ahmed Eltweri, Leena Wanganoo, Luigi Pio Leonardo Cavaliere:
Technologies Integration With Semantic Web Techniques For Business Valuation: Identifying Equities' Intrinsic Value Without Market Bias. 1-11 - Kiran Tangri, Amer Ibrahim, Nouf Majid Sultan Eid Saeed, Abedallah Zaid Abualkishik, Reem AbdElkareem Alomoush, Abdallah M. A. Al-Tarawneh:
Gamified Learning: Understanding the Influence of Video Game Behaviour on Sustainable Energy Education. 1-7 - Enass Khalil Alquqa, Muhammad Turki Alshurideh, Jamil H. Alalami, Rahul Sharma, Robinson Joseph, Haitham M. Alzoubi:
The Role of AI in Enhancing Financial Forecasting Accuracy: Transforming Modren Accounting Practices. 1-6 - Osama M. Dorgham, Sanad Aburass, Ghassan F. Issa:
Framework for Enhanced Digital Image Transmission Security: Integrating Hu Moments, Digital Watermarking, and Cryptographic Hashing for Integrity Verification. 1-5 - Malak Mohammad Ghaith, Ghada Hammad Al-Rawashdeh, Mohammad Abdalkarim Alzuod, Yahya Mohammad Ghaith, Firas Jamil Alotoum, Abdullah A. M. AlSokkar, Jassim A. Al-Gasawneh, Mahmoud Alghizzawi:
Examining the Effects of Digital Payment and Impulsive Buying on Purchase Intention. 1-7 - Swamynathan Ramakrishnan, Malini Mittal Bishnoi, Shanmugan Joghee, Jijitha S, Anand Kumar:
Social Engineering: Role of Teachers in Cohabitation of AI with Education. 1-6 - Mousa Ajouz, Maha Shehadeh, Rania Jabarin, Shereen Abu Sharar, Shahd Jawabra, Waad Salman:
Is FinTech Catalyst or Constraint for Banking Performance? 1-5 - Hind Abu-tarboush, Jin Hie Lee, Maha M. Al-Shrouf, Nowf O. Maaitah, Nidal A. Al-Dmour:
Blockchain and its Integration with IoT Security. 1-4 - Hazem M. Al-Najjar, Nadia Al-Rousan:
Enhancing Image Security with Rossler Attractor-Based Encryption. 1-7 - Riktesh Srivastava, Nizar M. F. Sahawneh, Mohammad Inairat, Ali A. Alzoubi, Sudhakar Kota:
Analyzing the Adoption of Digital Technology-Enabled E-Financial Services for Sustainable Development: A UTAUT2 Model Perspective. 1-5 - Nouf Majid Sultan Eid Saeed, Amer Ibrahim, Liaqat Ali, Nidal A. Al-Dmour, Abdul Salam Mohammed, Taher M. Ghazal:
Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network Security: A Comprehensive Literature Review. 1-7 - Mohammad Alauthman, Abdelraouf Ishtaiwi, Ali Al Maqousi, Wael Hadi:
A Framework for Cybersecurity in the Metaverse. 1-8 - Masar H. AlDuhisat, Hala G. AlKhresha, Nidal A. Al-Dmour, Karamath Ateeq, Omer N. Maaitah:
Role of Cloud Computing in Education. 1-4 - Bara'ah Jaber, Najed Alrawashdeh, Heba Al-Malahmeh:
Oil Price Fluctuation and CryptocurrenciesReturn Conceptual Framework. 1-4 - Ahmad F. Shubita, Abedal-Kareem Al-Banna, Nesreen Otoum:
Technological and Societal Shifts in Virtual Worlds: A Comparative Perspective. 1-5 - Sharif Naser Makhadmeh, Ammar Kamal Abasi, Mohammed Azmi Al-Betar:
Marine Predators Algorithm for Energy Scheduling Problem Using Renewable Energy. 1-6 - Khowla Khaliq, Nor Zairah Ab Rahim, Khalid Hamid, Muhammad Ibrar, Uzair Ahmad, Muhammad Ubaid Ullah:
Ransomware Attacks: Tools and Techniques for Detection. 1-5 - Farah Abu-Dabaseh, Mahmoud Alghizzawi, Baker Ibrahim Alkhlaifat, Abd Alrahman Ratib Ezmigna, Amro Alzghoul, Abdullah A. M. AlSokkar, Jassim A. Al-Gasawneh:
Enhancing Privacy and Security in Decentralized Social Systems: Blockchain-Based Approach. 1-6 - Suhad Ibraheem Kadhem, Yitong Niu, Jamal F. Tawfeq, Ahmed Dheyaa Radhi, Karamath Ateeq, Saif E. A. Alnawayseh:
Cloud-Based 3D Virtual Interactive Lab Design. 1-6 - Amaal Al-Amawi, Alaa Al-Sarabi, Majdi Alsaaideh, Iman Akour, Heba Al-Malahmeh:
Digital Marketing and the Impact of Social Media on Achieving Positive Expectations. 1-5 - Sanad Aburass, Osama M. Dorgham, Jamil Al Shaqsi, Maha Abu Rumman, Ahmed Al Zarouni:
Optimizing Customer Response Prediction in Auto Insurance: A Comparative Study of Machine Learning Models. 1-7 - Nisreen Innab, Ibrahim Atoum, Faisal Alghayadh, Marwan Abu-Zanona, Nouf Alrubayyi, Fatima Basudan, Afnan Alshehri:
Intrusion Detection System Mechanisms in Cloud Computing: Techniques and Opportunities. 1-5 - Razan Hamzeh, Faisal Aburub:
Big Data Analytics Capabilities and Decision-Making in Jordan's Telecommunications Sector. 1-6 - Sardar Shan Ali Naqvi, Yuancheng Li, Muhammad Uzair:
DDoS Attack Detection in Smart Grid Networks Using Visual Features. 1-5 - Baha Ihnaini, Samia Akhtar, Munir Ahmad, Shabib Aftab:
Data Fusion Based Ensemble Transfer Learning Approach to Detect Diabetic Retinopathy. 1-5 - Mayyas Al-Remawi, Rami A. Abdel Rahem:
Applications of AI in Biomedical Genomics and Pharmaceuticals. 1-5 - Shamma Alshebli, Chan Yeob Yeun:
Examining the Security Landscape of Mobile Payment Systems. 1-5 - Yazan Oroud, Hameed Alumany:
The Impact of Institutional Ownership on the Nexus Between Big Data Analytics and Financial Reporting Quality. 1-5 - Mue I:
An Analysis on Strategic Objectives of the Issuance of the Digital Renminbi. 1-4 - Zil e Huma, Jawad Ahmad, Hussam Al Hamadi, Baraq Ghaleb, William J. Buchanan, Sana Ullah Jan:
ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT. 1-6 - Ali Mohammad Alenezi, Mohammad A. K. Alsmairat, Nikolina Ljepava:
Integrating the Triple Pillar: AI Marketing's Pathway to Enhancing Industry 5.0 Through Sustainability, Resilience, and Customer Engagement. 1-7 - Hossam M. J. Mustafa, Mohammad H. Al-Zyod:
Cloud Computing Malware Detection Using Feature Selection Based on Optimized White Shark Algorithm (WSO). 1-6 - Sharif Naser Makhadmeh, Yousef K. Sanjalawe, Hussam N. Fakhouri:
Intrusion Detection System using Modified Arithmetic Optimization Algorithm for Large-scale IoT. 1-6 - Abdelraouf Ishtaiwi, Ali Al Maqousi, Amjad Aldweesh:
Securing Emerging IoT Environments with Super Learner Ensembles. 1-7 - Lina Abdallah Abu Lebdeh, Raed A. Said:
The Interdependencies of Emotional Intelligence of Project Manager and a Successful Delivery of Innovation - Evidence from UAE. 1-6 - Hazem M. Al-Najjar, Nadia Al-Rousan:
Decision Tree-Based IoT Botnet Attack Detection. 1-5 - Mounir El Khatib, Shaima Al Harmoodi, Yordanka Angelova:
Virtual Reality as a Hub for Innovation - Correlations and Interdependencies. 1-5 - Mohanad A. Dief, Waleed Alomoush, Hani H. Attar, Osama Ahmed Khashan, Ahmed A. A. Solyman, Rania Elgohary:
PID Controller Tuning Using Multi-Objective Ant Colony Optimization for Blood Glucose Level of a Diabetic Patient. 1-10 - Mohammad Alauthman, Amjad Aldweesh, Ahmad Al-Qerem:
IoT Security Challenges in Modern Smart Cities. 1-6 - Mohamed Dawood Shamout, Haitham M. Alzoubi, Hamzah Elrehail, Rania Itani, Anwar Al-Gasaymeh, Maged Farouk:
Streamlining E-Commerce and Last-Mile Delivery for Enhanced Customer Satisfaction: An In-Depth Analysis of Amazon's Strategies. 1-8 - Raneem Jaber, Mohamad A. Alnuaimi, Haitham M. Alzoubi, Osama A. Thawabeh:
Intelligent Job Satisfaction Role in Enhancing the Nexus Between Organizational Commitment and Job Performance Optimization in Pharmaceutical Manufacturing Industry. 1-9 - Abdalrahman Alrefai, Rolania ElBanna, Carla Al Ghaddaf, Ibrahim A. Abu AlSondos, Elham Mahmoud Chehaimi, Ibrahim Ali Alnajjar:
The Role of IoT in Sustainable Digital Transformation: Applications and Challenges. 1-4 - Ala M. Abu-Samaha, Maria Yousef:
Hybrid PSO-Naive Bayes Algorithm Based COVID-19 Prediction Model. 1-4 - Haya Alhunaity, Hala Alsuhimat, Nidal A. Al-Dmour, Tariq Barjes Al-bloush, Omer N. Maaitah:
Mechanisms for Protecting Information in E-Government. 1-5 - Abdallah M. A. Al-Tarawneh:
An Analysis of the Positive and Negative Effects of Cyberpsychotherapy: A Systematic Review. 1-4 - Shujah Ur Rehman, Sania Safdar, Yasir Aawais Butt, Muhamad Intisar Ullah Khan Sumbal, Atif Ali, Muhammad Adnan Khan, Muhammad Asif:
Smart Exact String Matching Algorithm Specifically for DNA Sequencing. 1-5 - Nasim Matar, Bilal Sowan, Amneh Al-Jaber:
Evaluating Models Performance for Credit Risk Detection for Imbalanced Data. 1-6 - Waseem Alhasan, Muhammad Wannous, Abedallah Zaid Abualkishik, Mohammad Rustom Al Nasar, Liaqat Ali, Hani Q. Al-Zoubi:
An In-Depth Examination of Cybersecurity: Unveiling Contemporary Trends and Recent Advancements in the World of Cyber Threats. 1-11 - Khalil Omar, Saif Abu-Aishah, Izzeddin Matar, Duha Al Smadi, Hussam Fakhouri, Muhammad Abu Arqoub:
Analyzing Jordanian Higher Education Instructors' Perception Towards Metaverse Based Education. 1-6 - Atif Ali, Shahzad Ahmed, Muhammad Hussain, Talat Ahmad Bhutta, Ali Raza, Muhammad Waqas Nadeem, Yasir Khan Jadoon, Farman Ali:
The Synergy of Artificial Intelligence and Cybersecurity. 1-5 - Bilal Sowan, Nasim Matar, Faisal Aburub, Mohammed Fasha, Mohammad Al Khaldy, Muhmmad Islam Nofal, Amneh Al-Jaber:
PDF Malware Detection: A Hybrid Approach Using Random Forest and K-Nearest Neighbors. 1-6 - Naeem Akhtar Malik, Amir Mohammad Delshadi, Muhammad Ibrar, Khalid Hamid, Muhammad Aamir, Fahad Ahmed, Gulzar Ahmad:
Behavior and Characteristics of Ransomware - A Survey. 1-5 - Ali Mohd Ali, Shadi Nashwan, Ahmad Al-Qerem, Amjad Aldweesh, Mohammad Alauthman, Zenab Elgamal, Ammar Almomani:
CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models. 1-5 - Fadi Ayoub:
Data Mining Techniques from Social Media and Credit Card Risk Scoring Model "An Empirical Study on the Jordanian Commercial Banks". 1-3 - Abduljaleel Al-Hasnawi, Yitong Niu, Jamal F. Tawfeq, Manas Ranjan Pradhan, Mohammed Salahat, Taher M. Ghazal:
IoT Security Frameworks: A Comparative Review with a Focus on Privacy. 1-10 - Suhad Ibraheem Kadhem, Yitong Niu, Jamal F. Tawfeq, Saif E. A. Alnawayseh, Waleed T. Al-Sit:
3D Remote Laboratory Design Based on Interactive Mobile Learning. 1-9 - Kristian Siautama, Rudy Rudy, Dicky Hida Syahchari:
A Comparison Study on Logistic Services Between Indonesia, Malaysia, and Singapore for Support E-Commerce. 1-5 - Firas Omar, Laila Ashour, Arch. Rawan Khattab, Taghreed Abu Hamdan:
Implementing Corporate Social Responsibility for Sustainable Education: A Comprehensive Case Study Analysis. 1-5 - Hussam N. Fakhouri, Basim Alhadidi, Khalil Omar, Sharif Naser Makhadmeh, Faten Hamad, Niveen Z. Halalsheh:
AI-Driven Solutions for Social Engineering Attacks: Detection, Prevention, and Response. 1-8 - Mounir El Khatib, Ahmed Ankit, Wesal Bin Yarouf, Meera Al Marri:
From Functional to Projectized Organizations - PMO- Is it a Necessity? 1-5 - Rawadieh Tassnim, Reem Ali Tawfic Ja'far, Abdallah M. A. Al-Tarawneh:
Analyzing the Challenges Facing Digital Mental Health (DMH) Between Aspiration and Reality. 1-5 - Wurood A. Jbara, Jamila H. Soud:
DeepFake Detection Based VGG-16 Model. 1-6 - Nidal Al Salhi:
The Impact of Organizational Learning Capability on Organizational Agility. 1-6 - Nuha El-Khalili, Muhammad Abu Arqoub, Mohammad Al-shaikh Hasan, Abed Alkarim Banna, Mohammad Arafah:
Empowering Learning Analytics with Business Intelligence. 1-6 - Zakariya Chabani, Widad Chabani, Mohamed Dawood Shamout, Salima Hamouche:
Exploring Global Innovation Networks' Impact on UAE Manufacturing: Insights from Medium-Scale Multinationals in the Global Value Chain. 1-5 - Rachid Alami, Turki Al Masaeid, Agata Stachowicz-Stanusch:
Exploring the Accuracy of Machine Learning Models in Predicting Toxic Leadership: A Case Study in the IT Industry. 1-5 - Etaf Alkasasbeh, Aseel AlQadi, Lateefa Moien Alkilani, Abdallah M. A. Al-Tarawneh:
Analyzing the Psychological, Social and Cognitive Impact of Digital Learning in Different Educational Environments. 1-4 - Hanady Al-Zagheer, Ibrahim Abu Nahleh, Qais Hammouri, Hamza Ali Alshawabkeh:
Artificial Intelligence in Identifying Market Opportunities: Revolutionizing Entrepreneurial Strategy and Innovation. 1-4 - Faisal Aburub, Ahmed S. A. Ali Agha:
AI-Driven Psychological Support and Cognitive Rehabilitation Strategies in Post-Cancer Care. 1-6 - Ammara Muhammad Shafi, Samar Mouti:
Advisory System Using Sentiment Analysis (ASSA) for Improved Student Feedback and Academic Advising. 1-7 - Ahsan Waseem, Mohd Azhan Umar Kamil, Abhisehek Bhardwaj, Abdul Razim, Mohammed Abdul Qadeer, Taher M. Ghazal:
Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Reception and Signal Decoding. 1-7 - Wael Ali, Rachid Alami, Mohammad A. K. Alsmairat, Turki Fahed Al Masaeid:
Consensus or Controversy: Examining AI's Impact on Academic Integrity, Student Learning, and Inclusivity Within Higher Education Environments. 1-5 - Beenish Shameem, Pranav Kumar, Anu Vij, Mohit Vij, Sultan Al Shehri Vij, Haitham M. Alzoubi:
Assessing the Adoption of Technology in Banking Services in India: A Structural Equation Modeling Analysis. 1-9 - Dani Itani, Rania Itani, Ahmed Ae Eltweri, Alessio Faccia, Leena Wanganoo:
Enhancing Cybersecurity Through Compliance and Auditing: A Strategic Approach to Resilience. 1-10 - Srinidhi Vasudevan, Anna Piazza:
Adoption of Bitcoin as a Payment Method: An Empirical Investigation of UK Small and Medium Businesses. 1-5 - Ahsan Waseem, Mohd Bilal, Abhishek Bhardwaj, M. Saad Bin Arif, Taher M. Ghazal:
Cryptocurrency-Enabled Energy Trading in Micro-Grid Using Blockchain Technology. 1-7 - Pranav Kumar, Neyara Radwan, Mohit Vij, Anu Vij:
The Role of Robotics in Enhancing Service Quality, Efficiency, and Customer Satisfaction in the Hospitality Industry. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.