default search action
Qasem Abu Al-Haija
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Shahad Altamimi, Qasem Abu Al-Haija:
Maximizing intrusion detection efficiency for IoT networks using extreme learning machine. Discov. Internet Things 4(1): 5 (2024) - [j37]Qasem Abu Al-Haija, Shahad Altamimi, Mazen Alwadi:
Analysis of Extreme Learning Machines (ELMs) for intelligent intrusion detection systems: A survey. Expert Syst. Appl. 253: 124317 (2024) - [j36]Raed Alsini, Qasem Abu Al-Haija, Abdulaziz A. Alsulami, Badraddin Alturki, Abdulaziz A. Alqurashi, Mouhamad D. Mashat, Ali Alqahtani, Nawaf Alhebaishi:
Forecasting cryptocurrency's buy signal with a bagged tree learning approach to enhance purchase decisions. Frontiers Big Data 7 (2024) - [j35]Qasem Abu Al-Haija:
Editorial: Artificial intelligence solutions for decision making in robotics. Frontiers Robotics AI 11 (2024) - [j34]Ashraf Ahmad, Mohammad Azzeh, Eman Al Nagi, Qasem Abu Al-Haija, Dana Halabi, Abdullah Aref, Yousef S. Abu Hour:
Hate speech detection in the Arabic language: corpus design, construction, and evaluation. Frontiers Artif. Intell. 7 (2024) - [j33]Mustafa Al-Fayoumi, Qasem Abu Al-Haija, Rakan Armoush, Christine Amareen:
XAI-PDF: a robust framework for malicious PDF detection leveraging SHAP-based feature engineering. Int. Arab J. Inf. Technol. 21(1): 128-146 (2024) - [j32]Ali Alqahtani, Qasem Abu Al-Haija, Abdulaziz A. Alsulami, Badraddin Alturki, Nayef Alqahtani, Raed Alsini:
Optimizing chest tuberculosis image classification with oversampling and transfer learning. IET Image Process. 18(5): 1109-1118 (2024) - [j31]Mohammad Al-Omari, Qasem Abu Al-Haija:
Towards Robust IDSs: An Integrated Approach of Hybrid Feature Selection and Machine Learning. J. Internet Serv. Inf. Secur. 14(2): 47-67 (2024) - 2023
- [j30]Mustafa Al-Fayoumi, Qasem Abu Al-Haija:
Capturing low-rate DDoS attack based on MQTT protocol in software Defined-IoT environment. Array 19: 100316 (2023) - [j29]Anas Abu Taleb, Qasem Abu Al-Haija, Ammar Odeh:
Efficient Mobile Sink Routing in Wireless Sensor Networks Using Bipartite Graphs. Future Internet 15(5): 182 (2023) - [j28]Dina Jibat, Sarah Jamjoom, Qasem Abu Al-Haija, Abdallah Qusef:
A Systematic Review: Detecting Phishing Websites Using Data Mining Models. Intell. Converged Networks 4(4): 326-341 (2023) - [j27]Anas Abu Taleb, Qasem Abu Al-Haija, Ammar Odeh:
Performance Analysis of Sink Mobility Models for Wireless Sensor Networks: A Comparative Study. Int. J. Interact. Mob. Technol. 17(18): 129-142 (2023) - [j26]Muawya Naser, Qasem Abu Al-Haija:
Spyware Identification for Android Systems Using Fine Trees. Inf. 14(2): 102 (2023) - [j25]Wejdan Abu-Elhaija, Qasem Abu Al-Haija:
A novel dataset and lightweight detection system for broken bars induction motors using optimizable neural networks. Intell. Syst. Appl. 17: 200167 (2023) - [j24]Abdulaziz A. Alsulami, Qasem Abu Al-Haija, Badraddin Alturki, Ali Alqahtani, Raed Alsini:
Security strategy for autonomous vehicle cyber-physical systems using transfer learning. J. Cloud Comput. 12(1): 181 (2023) - [j23]Rawan Ghnemat, Sawsan Alodibat, Qasem Abu Al-Haija:
Explainable Artificial Intelligence (XAI) for Deep Learning Based Medical Imaging Classification. J. Imaging 9(9): 177 (2023) - [j22]Salah Zidi, Alaeddine Mihoub, Saeed Mian Qaisar, Moez Krichen, Qasem Abu Al-Haija:
Theft detection dataset for benchmarking and machine learning based classification in a smart grid environment. J. King Saud Univ. Comput. Inf. Sci. 35(1): 13-25 (2023) - [j21]Mahmoud Al-Qudah, Zein Ashi, Mohammad M. Alnabhan, Qasem Abu Al-Haija:
Effective One-Class Classifier Model for Memory Dump Malware Detection. J. Sens. Actuator Networks 12(1): 5 (2023) - [j20]Qasem Abu Al-Haija, Mustafa Al-Fayoumi:
An intelligent identification and classification system for malicious uniform resource locators (URLs). Neural Comput. Appl. 35(23): 16995-17011 (2023) - [j19]Qasem Abu Al-Haija, Manar Alohaly, Ammar Jamil Odeh:
A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach. Sensors 23(7): 3489 (2023) - [c19]Abdelnoor Dabit, Qasem Abu Al-Haija, Mustafa Al-Fayoumi:
Identifying Weaknesses: A Guide to Conducting an Effective Network Vulnerability Assessment. ACIT 2023: 1-6 - [c18]Yaser Alkurdi, Mustafa Al-Fayoumi, Amer Al-badarneh, Qasem Abu Al-Haija:
Enhancing Password Security via Supervised Learning. ICIT 2023: 256-259 - [c17]Khawla Shalabi, Mustafa Al-Fayoumi, Qasem Abu Al-Haija:
Enhancing Financial System Resilience Against Cyber Threats via SWIFT Customer Security Framework. ICIT 2023: 260-265 - [c16]Remah Younisse, Qasem Abu Al-Haija:
An empirical study on utilizing online k-means clustering for intrusion detection purposes. SmartNets 2023: 1-5 - 2022
- [j18]Remah Younisse, Ashraf Ahmad, Qasem Abu Al-Haija:
Explaining Intrusion Detection-Based Convolutional Neural Networks Using Shapley Additive Explanations (SHAP). Big Data Cogn. Comput. 6(4): 126 (2022) - [j17]Qasem Abu Al-Haija, Moez Krichen:
A Lightweight In-Vehicle Alcohol Detection Using Smart Sensing and Supervised Learning. Comput. 11(8): 121 (2022) - [j16]Qasem Abu Al-Haija, Ahmad Al Badawi, Giridhar Reddy Bojja:
Boost-Defence for resilient IoT networks: A head-to-toe approach. Expert Syst. J. Knowl. Eng. 39(10) (2022) - [j15]Qasem Abu Al-Haija, Mu'awya Al-Dala'ien:
ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks. J. Sens. Actuator Networks 11(1): 18 (2022) - [j14]Ashraf Ahmad, Yousef S. Abu Hour, Remah Younisse, Yasmeen Alslman, Eman Al Nagi, Qasem Abu Al-Haija:
MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection. J. Sens. Actuator Networks 11(2): 24 (2022) - [j13]Qasem Abu Al-Haija, Ahmad Al Badawi:
High-performance intrusion detection system for networked UAVs via deep learning. Neural Comput. Appl. 34(13): 10885-10900 (2022) - [j12]Qasem Abu Al-Haija, Ahmad Al Badawi:
Attack-Aware IoT Network Traffic Routing Leveraging Ensemble Learning. Sensors 22(1): 241 (2022) - [j11]Rahmeh Fawaz Ibrahim, Qasem Abu Al-Haija, Ashraf Ahmad:
DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology. Sensors 22(18): 6806 (2022) - [j10]Qasem Abu Al-Haija, Ja'afer Al-Saraireh:
Asymmetric Identification Model for Human-Robot Contacts via Supervised Learning. Symmetry 14(3): 591 (2022) - [j9]Abdulaziz A. Alsulami, Qasem Abu Al-Haija, Ali Alqahtani, Raed Alsini:
Symmetrical Simulation Scheme for Anomaly Detection in Autonomous Vehicles Based on LSTM Model. Symmetry 14(7): 1450 (2022) - [j8]Ammar Jamil Odeh, Ismail Keshta, Qasem Abu Al-Haija:
Analysis of Blockchain in the Healthcare Sector: Application and Issues. Symmetry 14(9): 1760 (2022) - [c15]Souhir Sghaier, Moez Krichen, Abir Othman Elfaki, Qasem Abu Al-Haija:
Efficient Machine-Learning Based 3D Face Identification System Under Large Pose Variation. ICCCI (CCIS Volume) 2022: 273-285 - [c14]Moez Krichen, Mariam Lahami, Qasem Abu Al-Haija:
Formal Methods for the Verification of Smart Contracts: A Review. SIN 2022: 1-8 - 2021
- [j7]Abdelraouf Ishtaiwi, Qasem Abu Al-Haija:
Dynamic Initial Weight Assignment for MaxSAT. Algorithms 14(4): 115 (2021) - [j6]Qasem Abu Al-Haija:
Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks. Frontiers Big Data 4: 782902 (2021) - 2020
- [j5]Qasem Abu Al-Haija, Mohammad M. Asad, Ibrahim Marouf, Mahmoud A. Smadi:
Design alternatives of Euclidian greatest common divisor with enhanced architecture. Int. J. Comput. Aided Eng. Technol. 13(4): 425-436 (2020) - [j4]Kamal Al Nasr, Qasem Abu Al-Haija:
Forecasting the Growth of Structures from NMR and X-Ray Crystallography Experiments Released Per Year. J. Inf. Knowl. Manag. 19(1): 2040004:1-2040004:12 (2020)
2010 – 2019
- 2019
- [c13]Qasem Abu Al-Haija, Kamal Al Nasr:
Supervised Regression Study for Electron Microscopy Data. BIBM 2019: 2661-2668 - [c12]Qasem Abu Al-Haija, Swastik Brahma:
Optimization of Cyber System Survivability Under Attacks Using Redundancy of Components. CISS 2019: 1-6 - [c11]Mohammad M. Asad, Ibrahim Marouf, Qasem Abu Al-Haija, Abdullah AlShuaibi:
Performance Analysis of 128-bit Modular Inverse Based Extended Euclidean Using Altera FPGA Kit. EUSPN/ICTH 2019: 543-548 - [c10]Ibrahim Marouf, Mohammad M. Asad, Qasem Abu Al-Haija, Abdullah AlShuaibi:
Cost effective FPGA Implementation of Right-to-Left Modular Exponentiation with NAF-Representation. EUSPN/ICTH 2019: 549-554 - [c9]Qasem Abu Al-Haija, Kamal Al Nasr:
Forecasting Model for the Annual Growth of Cryogenic Electron Microscopy Data. ICCABS 2019: 147-158 - [c8]Qasem Abu Al-Haija, Ibrahim Marouf, Mohammad M. Asad, Pankaj Mishra:
Pipelined Implementation of Millar-Rabin Primality Tester Using Altera FPGA Kit. SSCC 2019: 237-246 - 2014
- [j3]Mahmoud A. Smadi, Qasem Abu Al-Haija, Awni Itradat:
Exact Error Rate Analysis of MIMO-MRC System under Cochannel Interference and Imperfect Channel State Information. Wirel. Pers. Commun. 79(2): 847-859 (2014) - [c7]Mahmoud A. Smadi, Qasem Abu Al-Haija:
Precise error rate analysis of MIMO system with interference and imperfect channel state information. CCECE 2014: 1-5 - [c6]Qasem Abu Al-Haija, Mashhoor Al Tarayrah, Hasan Al-Qadeeb, Abdulmohsen Al-Lwaimi:
A Tiny RSA Cryptosystem based on Arduino Microcontroller Useful for Small Scale Networks. FNC/MobiSPC 2014: 639-646 - [c5]Qasem Abu Al-Haija, Mahmoud A. Smadi, Monther Al-Ja'fari, Abdullah Al-Shua'ibi:
Efficient FPGA Implementation of RSA Coprocessor Using Scalable Modules. FNC/MobiSPC 2014: 647-654 - 2013
- [j2]Qasem Abu Al-Haija, Ahmad Al Badawi:
Cost-effective design for binary Edwards elliptic curves crypto-processor over GF (2N) using parallel multipliers and architectures. Int. J. Inf. Comput. Secur. 5(3): 236-250 (2013) - [j1]Qasem Abu Al-Haija, Mohamed H. Shwehdi, Muhammad Banat:
Evaluation Metrics for Wireless Sensor Network Security: Algorithms Review and Software Tool. J. Comput. Sci. 9(5): 635-645 (2013) - [c4]Qasem Abu Al-Haija, Hanan Al-Mubarak, Abdulla Al-Humam:
Hardware Design and Software Simulation for Four Classical Cryptosystems. EUSPN/ICTH 2013: 500-505 - [c3]Qasem Abu Al-Haija, Saleh Al-Abdulatif, Mohaned Al-Ghofaily:
An 8-bit Scientific Calculator based Intel 8086 Virtual Machine Emulator. EUSPN/ICTH 2013: 506-511 - [c2]Qasem Abu Al-Haija, Hasan Al-Amri, Mohamed Al-Nashri, Sultan Al-Muhaisen:
An Engineering Design of 4-bit Special Purpose Microprogrammed Processor. EUSPN/ICTH 2013: 512-516 - [c1]Qasem Abu Al-Haija, Hasan Al-Qadeeb, Abdulmohsen Al-Lwaimi:
Case Study: Monitoring of AIR Quality in King Faisal University Using a Microcontroller and WSN. EUSPN/ICTH 2013: 517-521 - [i1]Ahmad Al Badawi, Qasem Abu Al-Haija:
IRS for Computer Character Sequences Filtration: a new software tool and algorithm to support the IRS at tokenization process. CoRR abs/1303.0407 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint