


default search action
ICIT 2025: Amman, Jordan
- 12th International Conference on Information Technology, ICIT 2025, Amman, Jordan, May 27-30, 2025. IEEE 2025, ISBN 979-8-3315-0894-4
- Ahmad Abumihsan, Majdi Owda, Amani Yousef Owda, Fathi Gasir, Mobarak A. Abu Mohsen, Lampros K. Stergioulas:
A Novel Deep Learning Approach for Enhanced Ischemic Brain Stroke Detection from CT Images Using Deep Feature Extraction and Optimized Feature Selection. 1-6 - Hisham Hussein, Zaid Al Muala:
Fuzzy control of processes with long transportation delay - A comparative study. 1-6 - Mobarak Abumohsen, Enrique Costa-Montenegro, Silvia García-Méndez, Amani Yousef Owda, Majdi Owda:
Advanced Deep Learning Techniques for Accurate Lung Cancer Detection and Classification. 7-12 - Noura Abulail, Amani Yousef Owda, Majdi Owda:
Real-Time Detection and Analysis of Facial Movement Disorders Using MediaPipe and OpenCV: A Streamlit-Based Framework. 13-18 - Marah Radi Hawa, Majdi Owda, Amani Yousef Owda:
Enhancing Digital Investigation: The Role of Generative AI (ChatGPT) in Evidence Identification and Analysis in Digital Forensics. 19-26 - Roa Omar Baddad, Amani Yousef Owda, Majdi Owda:
Customer Segmentation for Targeted Campaigns Using RFM Analysis and K-Means Clustering. 27-32 - Shadi AlZu'bi, Muder Almiani, Yaser Jararweh:
Agentic AI for Healthcare: Solutions to Intelligent Patient Care. 33-38 - Fatimah Alaliwat, Lena Alqahtani, Manar Alzahrani, Nouf Alamoudi, Shaima Hakami, Abdulrahman Alharby, Nawaf Alharbi:
OTuHunt: An Aggregated Threat Hunting & Intelligence Platform for OT/ICS Environment and MSSP Services. 39-46 - Fatimah Alaliwat, Lena Alqahtani, Manar Alzahrani, Nouf Alamoudi, Shaima Hakami, Abdulrahman Alharby:
Detection of Adversarial Evasion Attack on AI Model Running on IoT Devices. 47-54 - Jawad H. Alkhateeb, Rashiq Rafiq Marie:
Holy Quran Reciter Classification and Recognition Using Convolutional Neural Network: A Deep Learning Approach. 55-60 - C. S. Santhosh, Sharath Kumar R, Nisha P, Narendra Khatri, Harish Sharma, Bablu Kumar Singh:
Deep Learning-Based Automated Diagnosis and Classification of Rice Leaf Diseases Using CNN Architectures for Sustainable Agriculture. 61-66 - Moatasim Mahmoud, Stamatia Rizou, Andreas S. Panayides, Pavlos I. Lazaridis, George K. Karagiannidis, Nikolaos V. Kantartzis, Zaharias D. Zaharis:
STAV360: A Dataset for Subjective Tile-based Assessment of 360° Videos. 67-72 - Yahya Alhaj Maz, Mohammed Anbar, Selvakumar Manickam, Mosleh M. Abualhaj:
Utilizing Deep Learning, Ensemble Learning, and Transfer Learning for Enhancing Security in Internet of Things Networks through Intrusion Detection Systems. 73-76 - Mohmmad Husien Almajali, Ala' A. Masarweh, Ihab Fahmi Rayyan:
Evaluating Administrative Accountability for Artificial Intelligence Application Errors in Jordan: Legal and Ethical Implications. 77-83 - Insaf Kraidia, Samir Brahim Belhaouari:
Towards Robust SEA Detection: Leveraging Model Diversity and Randomization Against Adversarial Attacks. 84-90 - Alaa F. Sheta, Walaa H. Elashmwai, Abdelkarim Baareh, Peter Rausch, Emad S. Othman:
Medical Image Analysis for Brain Tumor Classification Using CNN Architecture. 91-98 - Abdinasir Hirsi Abdi
, Jafar Ismail Mohamed, Abubakar Abdi Warsame, Abdirizak Abdullahi Khalif, Lukman Audah, Adeb Salh, Salman Ahmed, Diani Galih Saputri, Abdiaziz Mohamed Abdirahman:
A Survey of Supervised, Unsupervised, and Ensemble Learning Approaches for DDoS Detection in SDN. 99-104 - Iqbal M. Batiha, Louiza Diabi, Adel Ouannas, Iqbal H. Jebril, Jamal Oudetallah, Shaher Momani:
Control of Chaos in Memristives Systems Using Fractional Discrete Calculus. 105-108 - Iqbal H. Jebril, Khadidja Dibi, Imane Zoua, Adel Ouannas, Amina-Aicha Khennaoui, Iqbal M. Batiha:
Incommensurate Fractional Computer Virus System: Control and Simulation. 109-113 - Ayman M. Abdalla, Qasem H. Makki, Ahmad A. Mazhar:
Image Encryption Using Circular-Shifting, Permutation Expansions and XOR. 114-119 - Iqbal H. Jebril, Louiza Diabi, Adel Ouannas, Iqbal M. Batiha, Wasim Audeh, Shaher Momani:
Synchronization of Fractional Discrete Memristives Models. 120-123 - Abdulrahman A. Alkannad, Ahmad Al Smadi, Wael Alzyadat:
Multi-crackNet: A Deep Learning Framework for Multi-Class Crack Detection in Concrete Structures. 124-129 - Reem Edwan:
A Novel Approach for Solving Space Fractional Heat Equations with Variable Coefficients Using the Crank-Nicolson Method. 130-133 - Omar Almomani, Adeeb Alsaaidah, Mohammed Amin Almaiah, Abdullah Alzaqebah, Mosleh M. Abualhaj, Wael Jumah Alzyadat:
Evaluating Machine Learning Classifiers for Detecting Distributed Denial of Service Attacks. 134-140 - Sibaram Prasad Panda
:
Securing 5G Critical Interfaces: A Zero Trust Approach for Next-Generation Network Resilience. 141-146 - Ghaith Al-Shawabkeh, Mohammad Abdalaziz, Amjed Al-Mousa:
A Two-Stage Hierarchical Skin Lesion Classification Using Transfer Learning. 147-153 - Rajanbir Singh Tucker, Muhammad Nadeem, Shahbaz Pervez:
Real-Time Detection and Mitigation of GPS Spoofing in UAV Systems. 154-160 - Muhammad Nadeem, Rashid Mustafa, Pierre E. Abi-Char, Rajanbir Singh Tucker:
A Study of Security Threats in IoT Network Layer using MQTT and TLS. 161-166 - Shanzay Alam, Misha Fakhar, Fatima Khalid, Saeed Mian Qaisar, Usman Haider:
Image Similarity Assessment Using Node Degree Distribution. 167-172 - Amer Dababneh, Hamzah O. Al-Khawaldeh, Iqbal H. Jebril, Iqbal M. Batiha, Shaher Momani:
Fractional Bernoulli Equation with Ujlayan-Dixit operator. 173-176 - Rama Rasheed, Azeza A L. Abdallah, Andaleeb M. Abu Kamel:
Distribution of Renyi Entropy from Nakagami Distribution Sample. 177-180 - Adel Sufyan Hussain, Zedan Z. Mashikhin, Naaman Omar Yaseen, Ma'Mon Abu Hammad, Emad A. Az-Zo'bi, Mohammad A. Tashtoush:
Hybrid Deep Learning Framework for Estimating the Occurrence Rate of the Inverse Exponential Process: A Comparative Analysis of LSTM, ANN, and Traditional Methods. 181-187 - Muthanna Subhi Sulaiman, Adel Sufyan Hussain, Ma'Mon Abu Hammad, Mohammad A. Tashtoush, Emad A. Az-Zo'bi, Rana Noaman Abbas:
Parameters Estimation in a Non-Homogeneous Poisson Process with Fuzzy Data Through a Modified Fuzzy Maximum Likelihood Approach Using Artificial Intelligence. 188-195 - Ahmad H. Al-Omari:
Penetration Testing of a Merchant Payment Platform; Systemic Vulnerabilities and Compliance-Centric Mitigation. 196-200 - Mohammad Bassam AbuRass, Rehab Aburass, Marwa Fayiz Hamza:
A Comparative Study of Machine Learning Algorithms for Credit Card Fraud Detection. 201-206 - Qusai Y. Shambour, Moh'd Khaled Yousef Shambour, Yousef Alrabanah, Mosleh M. Abualhaj:
Leveraging Feature Selection and Explainable AI for Effective Autism Screening. 207-212 - Ala' M. Al-Zoubi, Katrina Sundus, Tarek Kanan:
A Comprehensive Survey on Intrusion Detection Systems in IoT: Challenges and Future Directions. 213-218 - Hamza Alzaareer, Waseem Ghazi Alshanti:
Analytical Solution of a Modified KdV Equation via Atomic Decomposition. 219-222 - Khaled M. Musa, Mohammad Abdallah:
Cloud Services Cyberattacks: Most Infectious Viruses and Method of Infections. 223-227 - Rahmeh Ibrahim, Ashraf Qaddomi:
A Novel Genetic Algorithm-Optimized Selective Encryption for Enhanced Privacy in Medical Imaging. 228-235 - Safaa Y. Al-Adwan, Salwani Abdullah, Mohammed Alweshah, Wandeep Kaur:
The Impact of Instance Reduction on Classification Process in Intrusion Detection. 236-241 - Nasim Matar, Feras Alnaimat, Ahmad Al-Qerem, Shadi Nashwan, Issam Jebreen:
Optimizing Multimodal Feature Alignment for Enhanced Text-to-Video Retrieval Performance. 242-246 - Andrew Reeves, Hang Dong
:
Robustness of Question Answering Systems in the Biomedical Domain: a study of the BioASQ dataset. 247-252 - Rand N. Albustanji, Ahmad Alkhatib, Ameen Shaheen:
Technical and Ethical Strategies to Prevent Machine Learning Models from Exploiting Personally Identifiable Information (PII). 253-257 - Ala Alobeidyeen:
Information Dissemination Modeling for Connected Autonomous Vehicles (CAVs) at Urban Intersections Using Percolation Approach. 258-262 - Tawfiq Jallad, Ma'mon Abu Hammad:
Geometric Hyperplane Intersection Solver: A Matrix-Inversion-Free Framework with Quantum-Neuroevolutionary Enhancements. 263-271 - Mohamed Fezari, Ali Al-Dahoud, Mohamed Tahar Gossa, Mohamed Akram Bensaid, Ahmad Al-Dahoud:
Exploring SBC with Kinect And machine Learning for Indoor Mobile Robot Design and Monitoring. 272-276 - Ahmad Nabot, Feras Alnaimat, Issam Jebreen, Ahmad Al-Qerem, Ali Mohd Ali:
AI for Software Project Management: Predicting Delivery Times & Resource Allocation. 277-284 - Ameera Jaradat, Salem Alhatamleh, Mohammad Amin, Hatem Malkawi:
AI-Driven Feature Selection for Enhanced Heart Disease Prediction. 285-289 - Virendra Gawande:
AI and Blockchain: Transforming Data Security in Higher Education Institutions. 290-296 - Bushra Al-Smadi, Bassam H. Hammo, Hossam Faris:
Addressing Class Imbalance in Arabic Medical Questions using Ensembles and SMOTE. 297-303 - Farhan Abdel-Fattah, Khalid A. Farhan, Seraj Fayyad:
Detecting double-spending attack in Blockchain Networks using k-nearest neighbor algorithm. 304-308 - Haitham Qawaqneh, Habes Alsamir:
An Analytical Approach to Fixed Point results for Sehgal Guseman Contraction in Extended b-Metric Spaces. 309-311 - Don Roosan, Rubayat Khan, Saif Nirzhor, Avik Mahata, Hasiba M. Khan:
Harnessing Quantum Gradient Machine Learning to Decode Subtelomeric Methylation in Telomere Maintenance Pathways. 312-316 - Mark Angelo T. Mercado, Juliet O. Niega, Oliver A. Medina, Jovette A. Pecayo, John Ceazar C. Bello, John Maverick V. Detera:
Development of Industrial Machine Temperature Monitoring System for Semiconductor Company A. 317-323 - Jalal Kiswani, Mohammad Abdallah:
Service Diversification and Employment Opportunities in a Rapidly Evolving Sector: Jordan as a Case Study. 324-328 - Oliver A. Medina, Mark Angelo T. Mercado, Juliet O. Niega, Arsenio N. Arellano, Toni May M. Sabater, John R. Rejano:
Development of an Examination Checker using OMR for Multiple Choice Test Evaluator in National University, Philippines. 329-333 - Mohammad Abdallah, Amir Ngah, Anas Al-Rahamneh, Daniel Staegemann:
AI-Based Program Slicing: Techniques, Tools, and Comparative Analysis. 334-338 - Hassan Al-Zoubi, Mais Jaradat, Mohammad Al-kafaween, Hamza Hzayen, Bayan Tayem:
Characterization of some results of surfaces and their properties in the Euclidean 3-space. 339-342 - Mossa'B Ibrahim, Pablo Gervás, Gonzalo Méndez:
SAHDA: A Semantic-Aware Hybrid Approach for Arabic Spell Checking with Domain Adaptation. 343-348 - Ghassan Kanaan, Mariam Dabaeen, Raed K. Kanaan, Ghazi Kanaan, Salahiddin Altrahat, Ibrahim Atoum:
Improving the Classification of Arabic Tweet Sentiment Using Word Embedding Models. 349-352 - Ghassan Kanaan, Motaz Zghoul, Ghazi Kanaan, Ala' M. Al-Zoubi, Tarek Kanan:
Arabic Email Spam Detection Using Machine Learning and Deep Learning: A Comparative Study. 353-357 - Ceselia Alyawanseh, Renad Alwahsh, Ameen Shaheen:
Modern Architectural Patterns for Scalable Learning Management Systems: Integrating Microservices Client-Server, and Databases Management. 358-362 - Maqsood Mahmud, Ghayur Ahmad, Zahra Afridi:
AI in Employee Performance Management: Process Mining for Enhancing Productivity and Growth. 363-368 - Ameen Shaheen, Ala'a Al-Shaikh, Abdallah Sameer Damra, Mohammad Rasmi Al-Mousa, Sami Askar, Suha Afaneh:
Energy Efficiency Optimization in the IoT using Whale Optimization Algorithm and Simulated Annealing. 369-374 - Adi El-Dalahmeh, Eman Abu Mariah:
Schnorr-Based Authentication Framework for Secure Vehicle to Vehicle Communication. 375-380 - Sunshine O. Casido, Jaydee C. Ballaho
, Edwin I. Arip:
Tree-Based Machine Learning Models for Phishing Email Detection. 381-386 - Katrina Sundus, Ala' M. Al-Zoubi, Eyad Hailat, Bassam Hammo:
Predicting Breast Cancer Recurrence Using Machine Learning Models: A Comparative Study. 387-392 - Marwa Fayiz Hamza, Rehab Bassam AbuRass, Mohammad Bassam AbuRass, Tamara Baker Jber:
Agile Project Management Optimization with AI technology: Challenges and Impact. 393-397 - Omran Salem, Marwa Fayiz Hamza, Akram M. Zeki:
Evaluating the Effectiveness of Cybersecurity Training: Key Elements, Best Strategies, and Future Prospects. 398-403 - Abdallah Altrad:
IoT Medical Network Security System Based Explainable AI Model. 404-409 - Israa Al Badarneh, Bassam H. Hammo, Omar S. Al-Kadi:
A Transformer-Based Deep Learning Model for Arabic Image Captioning. 410-415 - Yousef Jaradat, Mohammad Ahmad Alia, Mohammad Z. Masoud, Ahmad A. Manasrah, Ismael Jannoud, Omar Alheyasat:
Beyond One-Size-Fits-All: Comparing and Selecting Regression Metrics for Robust Model Assessment. 416-422 - Gana Sawalhi, Bisan Nasser, Mais Khatib:
IoT Cybersecurity Policies: A Comparative Analysis. 423-427 - Mohammad Z. Masoud, Nabeel A. Abu Shaban, Alia A. Mahmoud:
Predicting DC Motor Speed Using Acoustic Analysis: A Comparison of Neural Networks and Convolutional Neural Networks. 428-433 - Ahmad M. Manasrah, Nezar Qudah, Yousef Jaradat, Mohammad Z. Masoud, Mohammad Jaradat:
Evaluating the Economic Impact of On-Grid and Off-Grid Solar PV Systems in Homes. 434-438 - Mohammd Abdul Jawad, Mohammad Z. Masoud, Álvaro Álesanco, José García:
A Distributed Brute-Force Attack and Misleading Countermeasure for Securing ModbusTCP Implementations in PLCs. 439-443 - Nadia Shamsulddin Abdulsattar
:
Pneumonia Classification from X-ray Images with Convolutional Neural Network. 444-450 - Mohamad Al Omari, Mojtaba Eslahi, Amine Ammar, Rani El Meouche, Laure Ducoulombier, Laurent Guillaumat:
Comparison of ML Methods for Analyzing Scaffolding Behavior: A Case Study on Safety and Multimodal Results. 451-457 - Adnan A. Hnaif, Faid AlNoor Fawareh, Rania Saadeh, Hamed Fawareh, Ahmad Qazza, Belal Zaqaibeh:
Impact of Aboodh Power Series Algorithm for Integral Equations. 458-464 - Ahmad Abdel-Hafez, Areej Yousef:
A Dataset of Media Articles on ChatGPT. 465-470 - Emad Al-Shawakfa, Majd Alzahrawi, Rami Malkawi:
A Deep Learning Approach to Predict User Experience Writing Faults in Mobile Applications' Interfaces. 471-476 - Firas Omar, Mohammad R. Hassan, Shadi Nashwan, Ahmad Al-Qerem, Ali Mohd Ali:
Artificial Intelligence Innovations and Strategic Insights for a Smart Retail Transformation. 477-483 - Abeer Malkawi, Azrina Kamaruddin:
Toward Enhancing Outdoor Mobility Assistive Technologies for People with Vision Impairment: Experts' Perspective. 484-489 - Yousra Odeh, Rana Yousef:
A Phase-Based and Student-Centric Requirements Classification Framework for Software Engineering Education in the Metaverse. 490-494 - Waseem Ghazi Alshanti, Ma'mon Abu Hammad, Hamza Alzaareer, Hassan Al-Zoubi, Ahmad Alshanty:
Conformable Fractional Derivative of a Vector Field. 495-498 - Balqees Aldabaybah, Ali Rodan:
Characteristics-Based Sampling Technique for Highly Imbalanced Large Scale Datasets. 499-505 - Waseem Al Mashaelh, Alaa Al-Zboon, Rania Saadeh, Alaa Al-Wadi, Ahmad Qazza, Iqbal H. Jebril:
Complex Sawi Integral Transform and Some Applications. 506-510 - Mohammad Abdel-Majeed, Ahmad Maraqa, Moath Abu-Mahmoud, Othman Milad, Shorouq Al-Awawdeh:
Dublejli: AI-Based Adaptive and Multi-Lingual Video Dubbing System. 511-516 - Ouahab Adelwhab, Hautia Cherifa:
Evaluating the Performance of Three IHS-based Pansharpening Techniques. 517-521 - Irene Izco, Adrian Serrano, Javier Faulin:
Power Optimization of Urban Logistics with Autonomous Delivery Robots. 522-527 - Duha Al-Darras
, Bashar Al-Shboul, Nadim Obeid:
Towards Using Ontology-Based Systems for Explainable Medical Diagnosis in Nutrition Domain. 528-533 - Tarek Kanan, Ceselia Alyawanseh, Ghassan Kanaan, Nesreen A. Hamad:
Enhancing Security and Reliability in IoT Smart Homes via Advanced Engineering Testing Methodologies. 534-539 - Anas Ali Alkasasbeh:
Machine Learning Approach to Detect Blackhole Attack over MANETs. 540-545 - Mohammad Z. Masoud, Yousef Jaradat, Mais A. Alhawawsheh, Ismael Jannoud, Rashed Alsakarnah:
Smartphone Communication Strategies for Legacy Industrial Systems: A Study of ModbusTCP and Local Server Solutions. 546-551 - Sukruthi Sanampudi, Chandra Prabha, Sampann Raheja, Sudeepa Roy, Raghavendra G. Ambekar:
Hybrid Crime Data-driven Route Optimization System for Safer Urban Navigation. 552-557 - Long Vu Pham, Vanha Tran, Truongminh Ngo:
Celebrity Hairstyle Recommendation System with Hairstyle Transfer. 558-564 - Iyas Qaddara, Enas Naffar, Abdallah Hyassat, Amneh Kenanah, Yousef Alrabanah, Mosleh M. Abualhaj, Rania Alzubaidi:
Arabic News Text Summarization: An Extractive Technique. 571-576 - Ishtiaque Mahmood, Mahammad Mastan, Zunysha Naveed, Hamza Iftikhar, Wakeel Ahmad, Syed M. Adnan:
AzureIQ-RAG: Hybrid RAG System for Automated Information Retrieval and Semantic Query Answering Using Azure AI. 577-583 - Reem Amro, Ahmad Althunibat, Bilal Hawashin:
Evaluating the Impact of Dataset Size on the Accuracy of Arabic Software Requirements Classification Using AraBERT. 584-589 - Anas Abu-Doleh:
GenoCGC: A Hybrid CNN and Graph-based Transformer Model for Genomic Sequence Classification. 590-595 - Anas Al-Rahamneh, José Javier Astrain:
The Synergy of Cognitive Cities and Open Data in Advancing Sustainable Urban Mobility: A Case Study of Pamplona, Spain. 596-601 - Mousa Salah, Mohammad Abdallah, Mustafa Alrifaee, Basem Alokush, Khalid Mohammad Jaber:
The Role of 360-Degree Photos in Enhancing User Experience and Site Documentation on Google Maps. 602-608 - Anis Faeza binti Faisal, Hussam Mizher, Syahrir Zaini, Qasem M. Abdallah, Mohammad Abdallah:
Knowledge, Attitude, and Practice Toward AI Use Among Health Profession Students in a Malaysian Public University. 609-614 - Hamzeh Abdelfattah Awad Alassaf, Fadi Bani Ahmad, Haitham Qawaqneh:
The Degree of Awareness of Engineering, Science and Mathematics Teachers of The Importance of Using Internet of Things Technology In The Educational Process. 615-619 - Safaa Hriez, Mohammad Hmidan:
Temperature Forecasting for High-Temperature Data Centers: Enhancing Energy Efficiency Through Predictive Modeling. 620-625 - Qasem M. Abdallah, Farah Al-Daghistani, Hussam Mizher, Mohammad Abdallah, Asad A. Abukhalil:
The Role of Large Language Models in Personalized Obesity Management: Opportunities and Challenges. 626-630 - Laila Barqawi, Sewar Al-Rashdan:
The Impact of AI on Women's Roles in the Workplace: A Legal Gender Perspective. 631-634 - Khalid Mohammad Jaber, Mousa Salah, Al Rifaee Mustafa, Naji AlQbailat, Issa Bassem, AbuElzeet Ashour:
ChatGPT Vs. DeepSeek: A Comparative Analysis of AI Models for Enhancing Virtual Reality Experiences. 635-643 - Mohammad Lafi, Khalid A. Farhan, Ahmad Abusukhon:
Machine Learning Model for Fault Prediction in Object-Oriented Systems. 644-646 - Haidar Jabbar, Samir Al-janabi:
Securing Smart Supply Chains with Adaptive AI Agents: A Virtual Simulation Framework. 647-652 - Yasmin AlHowail, Meshaal Alqahtani, Atiq Waliullah Siddiqui:
Enhancing Project Selection Process Via Machine Learning. 653-658 - Dongwei Wang, Sally I. McClean, Ian R. McChesney, Zeeshan Muhammad Tariq:
Process Duration Modeling and Concept Drift Detection using Phase-Type Distributions. 659-664 - Zhi Chen
, Sally I. McClean, Zeeshan Muhammad Tariq, Nektarios Georgalas, Adeshola Adefila:
Integrating IT Infrastructure Metrics into Business Process Mining: A Telecommunications Industry Case Study. 665-670 - Towfeeq Fairooz, Aleeha Iftikhar, Zeeshan Tariq
, Sally I. McClean, Ian R. McChesney
:
Enhancing Process Mining on Sparse Event Logs: A Simulation-Driven Academic Case Study. 671-676 - Syed Arshad Raza, Atiq Waliullah Siddiqui, Zeeshan Tariq:
Analyzing the Impact of COVID-19 on Gas Demand Markets: A Process Analytics Perspective. 677-682 - Bilal Ahmed Lodhi, Zeeshan Tariq, Hanif Ullah:
BalancedCL: A Balanced Contrastive Learning Framework for Process Mining with Multi-Head Attention. 683-688 - Layla Albdour, Ahmad Sharieh:
Scalable IoT Security: Machine Learning-Based Threat Identification Using Crawler-Collected Data. 689-696 - Amjed Zraiqat, Alaa Al-Wadi, Rania Saadeh, Alaa Al-Zboon, Iqbal H. Jebril, Ahmad Qazza:
A New Analytical Approach to Fractional Calculus via Mittag-Leffler Functions and the complex Sawi Transform. 697-701 - Baraa Khamayseh, Nabil Arman, Faisal Khamayseh:
A Heuristic-Based Approach for Classifying Functional and Non-functional Arabic Security Requirements. 702-708

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.