{
"id" : "neb08aae9",
"class" : "Person",
"name" : "Alsmadi, Izzat",
"primaryEmail" : "ialsmadi@tamusa.edu",
"orcidId" : "0000-0001-7832-5081",
"preferredTitle" : "TEES Researcher at TAMU-San Antonio",
"positions" : [ {
"id" : "nc3e82091",
"label" : "Associate Professor, Department of Computing and Cyber-Security",
"type" : "FacultyPosition",
"organizations" : [ {
"id" : "n0ca9c1ed-a800-11e9-bf6d-00155d562649",
"label" : "Texas A&M University – San Antonio - (San Antonio, Txas, United States)"
}, {
"id" : "n0ca9c1ed-a800-11e9-bf6d-00155d562649",
"label" : "Texas A&M University – San Antonio - (San Antonio, Texas, United States)"
} ]
}, {
"id" : "nf106cfa8",
"label" : "TEES Researcher at TAMU-San Antonio",
"type" : "FacultyPosition",
"organizations" : [ {
"id" : "n616c5db9",
"label" : "TEES Regional Divisions",
"parent" : [ {
"id" : "n952c84ff",
"label" : "Texas A&M Engineering Experiment Station (TEES)"
} ]
} ]
} ],
"overview" : "Izzat Alsmadi is an Associate Professor in the department of computing and cyber security at the Texas A&M, San Antonio. He has his master and PhD in Software Engineering from North Dakota State University in 2006 and 2008 respectively.
He has more than 100 conference and journal publications. His research interests include: Cyber intelligence, Cyber security, Software security, software testing, social networks and software defined networking. He is lead author, editor in several books including: Springer, The NICE Cyber Security Framework Cyber Security Intelligence and Analytics, 2019, Practical Information Security: A Competency-Based Education Course, 2018, Information Fusion for Cyber-Security Analytics (Studies in Computational Intelligence), 2016.",
"researchAreas" : [ {
"id" : "nfst01124185",
"label" : "Software engineering"
}, {
"id" : "nfst00872484",
"label" : "Computer security"
}, {
"id" : "nfst01122901",
"label" : "Social sciences--Data processing"
} ],
"hrJobTitle" : "Tees Researcher",
"keywords" : [ "Wireless Data Networks", "Estimation", "Data Mining", "Dispersion", "Inter-annotator Agreement", "Cohen's Kappa Measure", "Dataset Preparation", "Arabic Sentiment Analysis", "Fake News Detection", "Social Networks", "Misinformation", "Machine Learning", "4704 Linguistics", "47 Language, Communication And Culture", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Disease Breakout Prediction", "Search Queries", "Google Trends", "Epidemiology", "4612 Software Engineering", "46 Information And Computing Sciences", "4 Quality Education", "46 Information And Computing Sciences", "3901 Curriculum And Pedagogy", "39 Education", "Pediatric", "Patient Safety", "4609 Information Systems", "4612 Software Engineering", "4602 Artificial Intelligence", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Software Defined Networking", "Software Testing", "Petri Net", "Model Based Testing", "Firewalls", "Vulnerabilities", "Shodan", "Internet Of Things (iot)", "Vulnerability Assessment", "Fault Prone Modules", "Prediction Algorithms", "Software Quality", "Software Mining", "Clustering", "Data Mining", "Correlation", "Benchmark Network Dataset", "Intrusion Detection System (ids)", "Large-scale Attacks", "Internet Of Things (iot)", "Deep Learning", "Machine Learning", "46 Information And Computing Sciences", "Graph Algorithms", "Network Embedding", "Cryptocurrency", "Blockchain", "Machine Learning", "Statistical Machine Translation", "Arabic Mt", "Quran Machine Translation", "Language Automatic Evaluation", "Machine Translation", "Code Metrics", "Open Source", "4611 Machine Learning", "46 Information And Computing Sciences", "Neurosciences", "Brain Computer Interface", "Bci", "Eeg", "Machine Learning", "11 Sustainable Cities And Communities", "Prevention", "Arabic Web Spam", "Link Spam", "In-link", "Out-link", "Web Metrics", "Web Spam", "Intrusion Detection System (ids)", "Large-scale Attacks", "Internet Of Things (iot)", "Data Analytics", "Deep Learning", "Object Detection", "Detection Accuracy", "Models Accuracy Comparison", "Mobilenet", "Ssd", "Computer Vision", "Machine Learning", "Keras", "Deep Learning", "Efficientdet", "Thermal Images", "Resnet", "Tensorflow 2.0", "Neural Networks", "Daesh", "Online Social Networks (osn)", "Terrorist Organizations", "Isil", "Twitter", "Isis", "Machine Learning", "4612 Software Engineering", "46 Information And Computing Sciences", "Adversarial Attacks", "Dos Saturation Attacks", "Machine Learning-based Detection Systems", "Software-defined Networking", "Design Patterns", "Sdn", "Software Design", "Component", "Openflo", "Sdn Architecture", "Design Principles", "Web Ranking", "Web Popularity", "University Ranking", "Google Scholar", "Decision Making Units", "Variable Return To Scale Model", "Hospitals Efficiency", "Constant Return To Scale Model", "Data Envelopment Analysis", "Data Mining", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "4611 Machine Learning", "46 Information And Computing Sciences", "Bioengineering", "Mutation Testing", "Neural Text Generation", "Machine Learning Security", "Machine Text Detection", "Taxonomy", "Adversarial Machine Learning (aml)", "Text Analysis", "Natural Languages", "Hate Speech", "Machine Learning (ml)", "Fake News", "Computational Modeling", "Social Networking (online)", "Security", "Natural Language Processing (NLP)", "Linguistics", "Ids", "Ensemble Learning", "Network Security", "Iot", "Cybersecurity", "Gui Testing", "Test Case Generation", "Test Automation", "4610 Library And Information Studies", "46 Information And Computing Sciences", "Emails Classification", "Content Classification", "Subject Classification", "Document Similarity", "Document Classification", "Feature Extraction", "3102 Bioinformatics And Computational Biology", "Genetics", "31 Biological Sciences", "4604 Cybersecurity And Privacy", "4606 Distributed Computing And Systems Software", "46 Information And Computing Sciences", "4905 Statistics", "49 Mathematical Sciences", "4609 Information Systems", "3503 Business Systems In Context", "46 Information And Computing Sciences", "35 Commerce, Management, Tourism And Services", "Institutional Ranking", "Internet Popularity", "Internet Presence", "Google Trends", "Searching Space Optimization", "Shallow Learning", "Protein Search Engine", "Msms Filters", "Deep Learning", "Big Data", "Machine Learning", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Cancer", "Sql Injection", "Websites Testing", "Malware Analysis", "4611 Machine Learning", "4605 Data Management And Data Science", "3 Good Health And Well Being", "46 Information And Computing Sciences", "Requirements Validation", "Systematics", "Protocols", "Bibliographies", "Requirements Quality", "Systematic Literature Review", "Stakeholders", "Tools", "Requirements Engineering", "Requirements Analysis", "Software", "Validation Techniques", "Genetic Testing", "Patient Safety", "2.2 Factors Relating To The Physical Environment", "2 Aetiology", "Genetics", "Prevention", "High Throughput Mass Spectrometry", "Data Flood", "Peak-sampling", "Ground Truth", "Data Reduction", "Big Data", "Proteomics", "Gui Metrics", "Interface Usability", "Layout Complexity", "Interactive Forms", "On-line Education", "Classical Education", "Chi-square Test", "Human Computer Interaction", "Significant Values", "E-learning", "Information Technology", "Learning Performance", "Communication Media", "Online Social Networks", "Social Capital", "Privacy", "Trust", "Arabic Web Spam Detection", "Content Features", "Arabic Web Spam", "Arabic Content Features", "Web Spam", "Web Spam Detection", "4606 Distributed Computing And Systems Software", "46 Information And Computing Sciences", "Patient Safety", "Genetics", "Arabic Language Processing", "Google N-gram Viewer", "Corpus", "3505 Human Resources And Industrial Relations", "35 Commerce, Management, Tourism And Services", "Arabic Content Features", "Web Spam", "Web Spam Detection", "Machine Learning", "4612 Software Engineering", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Computers", "4404 Development Studies", "3903 Education Systems", "39 Education", "44 Human Society", "38 Economics", "3801 Applied Economics", "Prevention", "Object Oriented Relational Database", "Software Quality", "Metrics", "Malware Detection", "Signature Base", "Malware Analysis", "Machine Learning", "4604 Cybersecurity And Privacy", "4606 Distributed Computing And Systems Software", "46 Information And Computing Sciences", "4604 Cybersecurity And Privacy", "4407 Policy And Administration", "46 Information And Computing Sciences", "44 Human Society", "4408 Political Science", "Websites Attac", "Cross Site Scripting", "Websites Vulnerability", "Sql Injectio", "Component", "Weather Prediction", "Evolution Analysis", "Prediction Models", "Data Analysis", "Data Mining", "Big Data", "Climate Change", "Ensemble Feature Selection", "Internet Of Things (iot)", "Intrusion Detection", "Information Security", "Timeline Prediction", "Coronavirus Disease", "Covid-19 Pandemic", "Arabic Air-writing Recognition", "Recognition", "Ocr", "Deep Learning", "Machine Learning", "4 Quality Education", "Clinical Research", "Named Data Networking", "Congestion Control", "Quality Of Service", "Computational Intelligence", "Natural Language Processing (NLP)", "Stemming", "Information Retrieval", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Policy Managements", "Islamic Financial Systems", "Xacml", "Islamic Banking", "4006 Communications Engineering", "46 Information And Computing Sciences", "40 Engineering", "4612 Software Engineering", "46 Information And Computing Sciences", "Computer Vision Systems", "Video Stream Adaptation", "Optimization", "Availability Of Video Communication", "Video Communications", "Ai-based Computer Vision Systems", "Artificial Intelligence-based Systems", "Rate-energy-accuracy Trade-offs", "Multi-objective Function", "Power Consumption", "User Sessions", "And Test Automation", "Graphical User Interface (gui)", "Software Testing", "Dynamic Features", "Social Engineering", "Url", "Phishing", "Features", "Machine Learning", "4606 Distributed Computing And Systems Software", "3102 Bioinformatics And Computational Biology", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "31 Biological Sciences", "4608 Human-centred Computing", "46 Information And Computing Sciences", "And Google Trends", "Users’ Search Queries", "Stock Prediction", "Security Policies", "Software Defined Networking", "4604 Cybersecurity And Privacy", "46 Information And Computing Sciences", "Rural Health", "4609 Information Systems", "3503 Business Systems In Context", "46 Information And Computing Sciences", "35 Commerce, Management, Tourism And Services", "Query Processing And Indexing", "Search Engines", "Information Retrieval", "Page Ranking", "Cross-lingual Information Retrieval (clir)", "Conformance Testing", "Fault-based Testing", "Software Testing Requirements", "Ad-hoc Networks", "Wireless Networks", "Arabic Spam", "Link-based Techniques", "Arabic Link Spam", "Arabic Text Classification", "And Analysis", "Social Networks", "Opinion Mining", "Sentiment Analysis", "Big Data", "E-content/e-course", "And Web-based Authoring Tools", "E-lecture", "E-learning", "Networking And Information Technology R&d (nitrd)", "Patient Safety", "Health Services", "3 Good Health And Well Being", "Clinical Research", "4609 Information Systems", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "40 Engineering", "Clinical Research", "3102 Bioinformatics And Computational Biology", "Genetics", "31 Biological Sciences", "4604 Cybersecurity And Privacy", "4606 Distributed Computing And Systems Software", "46 Information And Computing Sciences", "And Gui Modelling", "Test Case Execution And Verification", "Random Test Case Generation", "Mutation Testing", "Test Case Generation", "Analytical", "Social Distancing", "Prediction", "Covid-19", "Indicators Of Compromise", "Cyber Intelligence", "4612 Software Engineering", "46 Information And Computing Sciences", "Bioengineering", "Statistical Analysis And Beta-globin Genes", "Dna Similarity", "Dna Sequences", "Lcs", "4612 Software Engineering", "Dental/oral And Craniofacial Disease", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Shodan", "Cwe", "Assessment", "Industrial Systems", "Vulnerability", "Opinion Mining", "Opinion Polarity", "Opinion Subjectivity", "Sentiment Analysis", "Arabic Sentiment Analysis", "Large-scale Attacks", "Internet Of Things (iot)", "Deep Learning", "Machine Learning", "Russian Troll Tweets;social Bots", "Botometer;information Credibility", "Online Social Networks", "Network Slicing", "Hpc", "Sdn", "Outlink", "Trust Metrics", "Popularity", "In-link", "Web Metrics", "Credibility", "Generic Health Relevance", "3 Good Health And Well Being", "Behavioral And Social Science", "Network Traffic", "Protein Search Engine", "Msms Filters", "Data Reduction", "Deep Learning", "Cloud Computing", "Adaptive E-learning", "Collaborative Tagging", "Mathml", "Folksonomies", "Semantic Web", "Reducibility Matrix", "Neural Network Estimation", "Order Model Reduction", "Two-time-scale Systems", "Dominant Poles", "Making Of Arabic Corpus", "Arabic Reference Corpus", "Maktoob Yahoo", "Sa", "Opinion Mining", "4612 Software Engineering", "46 Information And Computing Sciences", "Access Control Mis-configuration", "Access Control", "Snort", "4611 Machine Learning", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Document-level", "Arabic Text Classification", "Arabic", "Social Network", "Sentiment Analysis", "Gdpr", "Privacy", "Blockchain", "Graph Mining, Denial Of Service Attacks", "Security Architecture", "Software Defined Networks", "Intrusion Detection", "Information Security", "Ehr Analysis", "Ochin Dataset", "Predictive Modeling", "Machine Learning", "4 Quality Education", "Tree Structure", "Trie", "Radix Tree", "Branch Factor", "Data Structure", "Indexing", "Information Retrieval", "Technology & Engineering", "Cybersecurity Curriculum Design", "Cybersecurity Education", "Nice Framework", "4613 Theory Of Computation", "4612 Software Engineering", "46 Information And Computing Sciences", "4609 Information Systems", "3503 Business Systems In Context", "46 Information And Computing Sciences", "35 Commerce, Management, Tourism And Services", "Credibility Assessment", "Online Social Networks", "Information Credibility", "Networking And Information Technology R&d", "Networking And Information Technology R&d (nitrd)", "4612 Software Engineering", "46 Information And Computing Sciences", "4612 Software Engineering", "46 Information And Computing Sciences", "Nids", "Feature Selection And Quality", "Vulnerability Assessment", "Industrial Systems", "Yahoo!-maktoob", "Information Retreival", "Opinion Analysis", "Knowledge Engineering", "Social Networks", "Data Mining", "Coupling Metrics", "Object-oriented Designs", "Software Faults", "Design Metrics", "4610 Library And Information Studies", "46 Information And Computing Sciences", "Coupling Metrics", "Object-oriented Designs", "Software Faults", "Design Metrics", "Access Control Framework", "Security And Privacy", "Autonomous Driving And Communication", "Vehicle-to-vehicle Access Control", "Intelligent Transportation Systems", "4609 Information Systems", "4608 Human-centred Computing", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Graph Models", "Attack Models", "Flooding Attacks", "Security Controls", "Network Security", "Software Defined Networking", "3903 Education Systems", "39 Education", "3 Good Health And Well Being", "Prevention", "Information Retrieval Index", "Indexing", "Huffman Code", "Retrieval Efficiency", "Search Engine Index", "And Index Compression", "Online Social Networks", "Information Credibility", "Predictive Models", "Feature Extraction", "3903 Education Systems", "3902 Education Policy, Sociology And Philosophy", "4 Quality Education", "39 Education", "Clinical Research", "Protein Tertiary Structure", "Casp Dataset", "Protein Structure Prediction", "Protein Structure", "Technology & Engineering", "4604 Cybersecurity And Privacy", "46 Information And Computing Sciences", "Model Interpretation", "Intrusion Detection System (ids)", "Internet Of Things (iot)", "Deep Learning", "Feature Extraction", "Content-based", "Link-based", "Arabic Web Spam", "Information Retrieval", "Prevention", "Generic Health Relevance", "3 Good Health And Well Being", "Capitol Riot", "Coup", "Trump", "4 Quality Education", "3901 Curriculum And Pedagogy", "39 Education", "Pediatric", "Software Defined Networks Or Networking (sdn)", "Policy Management", "Change Impact", "Text Generation", "Adversarial Machine Learning", "Market Research", "Gan", "Machine Learning Algorithms", "Generative Adversarial Networks", "Generators", "Training", "Security", "Cs.cl", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "Cs.lg", "Cs.cl", "4602 Artificial Intelligence", "46 Information And Computing Sciences", "4612 Software Engineering", "46 Information And Computing Sciences", "Bioengineering", "Cs.si", "Web Searching", "Query", "Arabic Web Searches", "Search Trends", "Search Engine", "News & World Report", "Educational Administration", "University Rankings", "Institutional Evaluation", "Educational Assessment", "Higher Education", "U", "S", "Users' Search Queries", "Stock Prediction", "Google Trends", "Insincere Questions", "Meta-textual Features", "Text Mining", "Online Social Networks", "Deep Learning", "Ns-2", "Network Simulators", "Software Definition Network", "Omnet Plus", "Ns-3", "Test Case Quality", "Mutation Testing", "Software Testing", "Closed And Open Set Recognition", "Unknown Attacks", "Zero-day Attacks", "Anomaly Detection", "Intrusion Detection", "4605 Data Management And Data Science", "46 Information And Computing Sciences", "46 Information And Computing Sciences", "3701 Atmospheric Sciences", "37 Earth Sciences", "13 Climate Action", "Bitcoin", "Cryptocurrency", "Blockchain", "Machine Learning", "4609 Information Systems", "3503 Business Systems In Context", "46 Information And Computing Sciences", "35 Commerce, Management, Tourism And Services", "Ensembling", "Iot", "Feature Selection", "Cybersecurity", "Intrusion Detection", "3 Good Health And Well Being", "Prevention", "U.s. News & World Report Rankings", "Student Debt", "College Affordability", "College Rankings", "Higher Education", "Universities", "4704 Linguistics", "5204 Cognitive And Computational Psychology", "52 Psychology", "47 Language, Communication And Culture", "3 Good Health And Well Being", "Users Search Queries", "Stock Prediction", "Google Trends", "Separation Of Concerns", "Process And People", "Software Engineering", "Project", "Product", "Ontology", "Vulnerability", "Universities", "Risk", "Network Security", "Snort", "Rule-based Detection", "Intrusion Detection Systems", "Vulnerability Assessment", "Vulnerability", "Naive Bayes Classifier (nb)", "Stemming", "Text Classification", "Arabic Text Classification", "Decision Tree", "Support Vector Machine (svm)", "Natural Language Processing", "4612 Software Engineering", "Comparative Effectiveness Research", "46 Information And Computing Sciences", "Bioengineering", "Babylon Translator", "Google Translator", "Bleu", "Machine Translation", "Arabic", "Component", "Web Search Engine", "Ir Query Log Analysis", "Web Log", "Search Trends", "Jordan", "4612 Software Engineering", "46 Information And Computing Sciences", "Network Security", "Snort", "Rule-based Detection", "Intrusion Detection Systems", "Vulnerability Assessment", "Vulnerability", "3903 Education Systems", "39 Education", "Clinical Research", "4602 Artificial Intelligence", "46 Information And Computing Sciences", "Security In Online Social Networks", "Groups Collaboration", "Weighted Cliques", "Osn Groups Detection", "Vanet", "Autonomous Vehicles", "Resource Allocation", "4612 Software Engineering", "4606 Distributed Computing And Systems Software", "46 Information And Computing Sciences", "Information Authentication", "Hashing Algorithms", "Documents' Automatic Evaluation", "Information Retreival", "Component", "Security", "Search Engines", "5201 Applied And Developmental Psychology", "52 Psychology", "46 Information And Computing Sciences", "Bioengineering", "Web Evaluation", "Web Accessibility", "Web Testing", "Web Ranking", "3605 Screen And Digital Media", "4701 Communication And Media Studies", "47 Language, Communication And Culture", "36 Creative Arts And Writing", "4608 Human-centred Computing", "46 Information And Computing Sciences", "Basic Behavioral And Social Science", "Behavioral And Social Science", "Clinical Research", "Software Defined Security", "Networking", "Network Security", "Software Defined Networking", "Security", "Location-based Services", "Regions-of-interest Discovering", "Location Prediction", "Markov Chain", "Benchmark Network Datasets", "Unknown Attacks", "Intrusion Detection System (ids)", "Internet Of Things (iot)", "Deep Learning", "39 Education", "40 Engineering", "Learning Models", "Disinformation", "Coronavirus", "Misinformation", "Covid-19", "Mers-cov Infection Virus", "Sentimental Analysis", "Hadoop", "Component", "Social Networks", "Opinion Mining", "Big Data", "Cs.lg", "Cs.cr", "4610 Library And Information Studies", "46 Information And Computing Sciences", "Disease Breakout Prediction", "Search Queries", "Google Trends", "Component", "Epidemiology", "Ics", "Industrial Control System Security", "Cyber-physical System Security", "CPS", "Anomaly Detection", "Deep Learning", "Neural Networks", "Machine Learning", "Covid‐19", "Gender Of Patients", "Global Growth Rate", "Social Distancing", "Predictive Modeling", "Network Access Controls", "Firewall Roles Misconfiguration", "Network Firewalls", "Gui Controls' Graph", "And Test Automation", "Genetic Algorithms", "Test Case Generation", "Test Case Quality", "Ad-hoc Networks", "Mutation Testing", "Wireless Networks", "4407 Policy And Administration", "44 Human Society", "4408 Political Science", "Covid19; Drug Design; Mathematical Formulation Of Drug", "English Mt", "Automatic Evaluation Of Machine Translation", "Statistical Mt", "Arabic Mt", "Bleu", "Health Information Systems (his)", "Relative Performance", "Data Envelopment Analysis (dea)", "Data Mining", "4610 Library And Information Studies", "46 Information And Computing Sciences", "Prevention", "Audio Sentiments", "Arabic Textual Classification", "Document Level", "Social Networks", "Opinion Mining", "Sentiment Analysis", "Social Engineering", "Url", "Adversarial Deep Learning", "Phishing", "Features", "Machine Learning", "Information Management", "Information Retrieval", "Coupling And Complexity Metrics", "Software Mining", "Software Faults", "Object Oriented Designs", "Design Metrics", "Source Code Analysis", "Data Mining", "4612 Software Engineering", "4606 Distributed Computing And Systems Software", "46 Information And Computing Sciences", "Evaluation Metrics", "Warm-started Models", "Abstractive Summarization", "Novelty", "Deep Learning", "Arabic Text Analysis", "Document-level", "Arabic Multi-media Classification", "Arabic Text Classification", "Social Network", "Opinion Mining", "Sentiment Analysis", "Big Data", "Abstractive Summarization", "Pre-trained Models", "Sequence-to-sequence", "Reinforcement Learning" ],
"educationAndTraining" : [ {
"id" : "neb08aae9_be69a083-b399-11e9-adb7-00155d9b610c_7cf8eee1",
"label" : "EducationalProcess",
"name" : "M.S. Master of Science",
"organization" : {
"id" : "nbe69a083-b399-11e9-adb7-00155d9b610c",
"label" : "North Dakota State University - (Fargo, North Dakota, United States)"
},
"field" : "Software Engineering",
"abbreviation" : "M.S.",
"endDate" : "2005-01-01T00:00:00",
"isDateSuppressed" : "display_education_year"
}, {
"id" : "neb08aae9_be69a083-b399-11e9-adb7-00155d9b610c_730827c3",
"label" : "EducationalProcess",
"name" : "Ph.D. Doctor of Philosophy",
"organization" : {
"id" : "nbe69a083-b399-11e9-adb7-00155d9b610c",
"label" : "North Dakota State University - (Fargo, North Dakota, United States)"
},
"field" : "Software Engineering",
"abbreviation" : "Ph.D.",
"endDate" : "2008-01-01T00:00:00",
"isDateSuppressed" : "display_education_year"
}, {
"id" : "neb08aae9_a5d8e7d3-b3ae-11e9-adb7-00155d9b610c_2d0e9044",
"label" : "EducationalProcess",
"name" : "B.Sc. Bachelor of Science",
"organization" : {
"id" : "na5d8e7d3-b3ae-11e9-adb7-00155d9b610c",
"label" : "Mutah University - (Karak, Jordan)"
},
"field" : "Electrical Engineering/Telecommunications",
"abbreviation" : "B.Sc.",
"endDate" : "1994-01-01T00:00:00",
"isDateSuppressed" : "display_education_year"
}, {
"id" : "neb08aae9_8e7434e3-b39b-11e9-adb7-00155d9b610c_7cf8eee1",
"label" : "EducationalProcess",
"name" : "M.S. Master of Science",
"organization" : {
"id" : "n8e7434e3-b39b-11e9-adb7-00155d9b610c",
"label" : "University of Phoenix - (Phoenix, Arizona, United States)"
},
"field" : "Computer Information Systems",
"abbreviation" : "M.S.",
"endDate" : "2003-01-01T00:00:00",
"isDateSuppressed" : "display_education_year"
} ],
"awardsAndHonors" : [ {
"id" : "nc428ac0d-315a-11ee-8bda-005056bb4fb7",
"label" : "Junior Scholarly Research or Artistic Achievement Award"
} ],
"publications" : [ {
"id" : "n543685SE",
"label" : "Building a Standard Dataset for Arabic Sentiment Analysis: Identifying Potential Annotation Pitfalls",
"type" : "ConferencePaper",
"publicationDate" : "2016-11-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n766987SE",
"label" : "The requirements for building an e-commerce infrastructure",
"type" : "AcademicArticle",
"publicationDate" : "2009-01-01T00:00:00"
}, {
"id" : "n543742SE",
"label" : "A Systematic Literature Review on Software-Defined Networking",
"type" : "Chapter",
"publicationDate" : "2017-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n766803SE",
"label" : "Evaluating Alternative Structures for Prefix Trees",
"type" : "ConferencePaper",
"publicationDate" : "2014-01-01T00:00:00"
}, {
"id" : "n766861SE",
"label" : "Using XML Trees to Represent GUI States.",
"type" : "ConferencePaper",
"publicationDate" : "2008-01-01T00:00:00"
}, {
"id" : "n543604SE",
"label" : "IoT security threats analysis based on components, layers and devices",
"type" : "AcademicArticle",
"publicationDate" : "2019-06-01T00:00:00",
"publisher" : "Society for Makers, Artist, Researchers and Technologists",
"venue" : { }
}, {
"id" : "n766884SE",
"label" : "An Approach to Evaluate Traceability between Software Documentation and Source Code",
"type" : "AcademicArticle"
}, {
"id" : "n766941SE",
"label" : "Interaction-Based Reputation Model in Online Social Networks",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-01T00:00:00"
}, {
"id" : "n543662SE",
"label" : "Model-Based Testing of SDN Firewalls: A Case Study",
"type" : "ConferencePaper",
"publicationDate" : "2015-07-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543627SE",
"label" : "IoT and the Risk of Internet Exposure: Risk Assessment using Shodan Queries",
"type" : "ConferencePaper",
"publicationDate" : "2019-06-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n596902SE",
"label" : "A comprehensive deep learning benchmark for IoT IDS",
"type" : "AcademicArticle",
"publicationDate" : "2022-03-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n543707SE",
"label" : "Evaluation of Cost Estimation Metrics: Towards a Unified Terminology",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "Faculty of Electrical Engineering and Computing, Univ. of Zagreb",
"venue" : { }
}, {
"id" : "n766929SE",
"label" : "Generation of Test Cases From Websites User Sessions",
"type" : "AcademicArticle"
}, {
"id" : "n674547SE",
"label" : "Malware analysis and multi-label category detection issues: Ensemble-based approaches",
"type" : "ConferencePaper",
"publicationDate" : "2022-01-07T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766781SE",
"label" : "Toward Agile Interactive Software Development Process Models for Crowd Source Projects",
"type" : "Chapter",
"publicationDate" : "2013-01-01T00:00:00"
}, {
"id" : "n543718SE",
"label" : "Evaluating the importance of the weight factors in DEA optimisation",
"type" : "AcademicArticle",
"publicationDate" : "2015-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n612498SE",
"label" : "Benchmark Assessment for DeepSpeed Optimization Library",
"type" : "GreyLiterature",
"publicationDate" : "2022-02-11T00:00:00"
}, {
"id" : "n766770SE",
"label" : "Frameworks for Refined Practice",
"type" : "Book"
}, {
"id" : "n543753SE",
"label" : "Evaluation of Spam Impact on Arabic Websites Popularity",
"type" : "AcademicArticle",
"publicationDate" : "2015-04-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n598030SE",
"label" : "Performance Comparison of Several Deep Learning-Based Object Detection Algorithms Utilizing Thermal Images",
"type" : "ConferencePaper",
"publicationDate" : "2021-11-17T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543696SE",
"label" : "Protein interaction based features' extraction",
"type" : "AcademicArticle",
"publicationDate" : "2017-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n766838SE",
"label" : "Simulation Based Load Testing In Web Services",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T00:00:00"
}, {
"id" : "n543593SE",
"label" : "Deceiving Machine Learning-Based Saturation Attack Detection Systems in SDN",
"type" : "ConferencePaper",
"publicationDate" : "2020-11-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766872SE",
"label" : "A Framework for Monitoring the Execution of Distributed Multi-agent Programs",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n543650SE",
"label" : "Software Code Security: Lesson Plans",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n543616SE",
"label" : "Integration of Data Envelopment Analysis and Clustering Methods",
"type" : "AcademicArticle",
"publicationDate" : "2020-03-01T00:00:00",
"publisher" : "World Scientific Publishing",
"venue" : { }
}, {
"id" : "n753461SE",
"label" : "Enhancing Neural Text Detector Robustness with mu Attacking and RR-Training",
"type" : "AcademicArticle",
"publicationDate" : "2023-01-01T00:00:00",
"publisher" : "MDPI",
"venue" : { }
}, {
"id" : "n566658SE",
"label" : "Mis-Configurations in Network Security Access Controls",
"type" : "GreyLiterature",
"publicationDate" : "2021-01-01T00:00:00"
}, {
"id" : "n549760SE",
"label" : "Ensemble Detection Model for IoT IDS",
"type" : "AcademicArticle",
"publicationDate" : "2021-12-01T00:00:00",
"publisher" : "Elsevier"
}, {
"id" : "n543731SE",
"label" : "Improving the Sensitivity of Research Publication Indices Using Exponential Function and the Area under Curve",
"type" : "AcademicArticle",
"publicationDate" : "2014-05-31T00:00:00",
"publisher" : "Global Vision Press",
"venue" : { }
}, {
"id" : "n543754SE",
"label" : "Clustering and classification of email contents",
"type" : "AcademicArticle",
"publicationDate" : "2015-01-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n543674SE",
"label" : "Evaluating Graphical and Statistical Techniques for Measuring Similarity in DNA Sequences",
"type" : "AcademicArticle",
"publicationDate" : "2012-05-01T00:00:00"
}, {
"id" : "n766976SE",
"label" : "Supporting Agile Methodologies in Practice: A Study of Pakistani Software Industry",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-01T00:00:00"
}, {
"id" : "n543697SE",
"label" : "Software fault proneness prediction: a comparative study between bagging, boosting, and stacking ensemble and base learner methods",
"type" : "AcademicArticle",
"publicationDate" : "2017-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n543892SE",
"label" : "Does Size Matter? An Evaluation of Institutional Internet Ranking Metrics",
"type" : "AcademicArticle",
"publicationDate" : "2019-08-23T00:00:00"
}, {
"id" : "n583743SE",
"label" : "Event Detection in Twitter: A Content and Time-Based Analysis",
"type" : "GreyLiterature",
"publicationDate" : "2021-10-18T00:00:00"
}, {
"id" : "n543638SE",
"label" : "Erratum",
"type" : "Chapter",
"publicationDate" : "2018-04-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n543615SE",
"label" : "IT Risk and Security Management",
"type" : "Chapter",
"publicationDate" : "2020-04-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n548800SE",
"label" : "Towards Centralized MS/MS Spectra Preprocessing: An Empirical Evaluation of Peptides Search Engines using Ground Truth Datasets",
"type" : "ConferencePaper",
"publicationDate" : "2017-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n543720SE",
"label" : "Students performance between classical and online education: a comparative study",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n766885SE",
"label" : "An object oriented framework for user interface test automation",
"type" : "AcademicArticle",
"publicationDate" : "2007-01-01T00:00:00"
}, {
"id" : "n766942SE",
"label" : "Issues related to the detection of source code plagiarism in students assignments",
"type" : "AcademicArticle",
"publicationDate" : "2014-01-01T00:00:00"
}, {
"id" : "n548799SE",
"label" : "Google N-Gram Viewer does not Include Arabic Corpus! Towards N-Gram Viewer for Arabic Corpus",
"type" : "AcademicArticle",
"publicationDate" : "2018-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n543663SE",
"label" : "Information Analysis to Study Interactions Between Different Genes and Diseases",
"type" : "ConferencePaper",
"publicationDate" : "2017-05-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n545076SE",
"label" : "Using XML for User Interface Documentation and Differential Evaluation",
"type" : "AcademicArticle",
"publicationDate" : "2010-01-01T00:00:00",
"publisher" : "Asian Research Publication Network",
"venue" : { }
}, {
"id" : "n543706SE",
"label" : "Jordan E-Government Challenges and Progresses",
"type" : "AcademicArticle",
"publicationDate" : "2010-02-01T00:00:00",
"publisher" : "International Association of Online Engineering (IAOE)",
"venue" : { }
}, {
"id" : "n649968SE",
"label" : "A Review of Software Quality Methodologies",
"type" : "Chapter",
"publicationDate" : "2012-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n543649SE",
"label" : "Network Security",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n766998SE",
"label" : "Using Spec Explorer for Automatic Checking of Constraints in Software a $ eg$ Controlled Systems",
"type" : "AcademicArticle",
"publicationDate" : "2011-01-01T00:00:00"
}, {
"id" : "n766928SE",
"label" : "Fast Arabic Query Matching for Compressed Arabic Inverted Indices",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n766769SE",
"label" : "Building a GUI Test Automation Framework Using the Data Model: Introduction, Related Work, The GUI Modeler, Test Case Generation, Selection & Prioritization, GUI Test Harness Execution & Verification",
"type" : "Book",
"publicationDate" : "2008-01-01T00:00:00"
}, {
"id" : "n568876SE",
"label" : "Fault-based testing for discovering SQL injection vulnerabilities in web applications",
"type" : "AcademicArticle",
"publicationDate" : "2021-08-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n545077SE",
"label" : "Advanced Automated Software Testing: Frameworks for Refined Practice",
"type" : "Book",
"publicationDate" : "2012-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n766771SE",
"label" : "Knowledge-Based Processes in Software Development",
"type" : "Book",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n543717SE",
"label" : "A framework for teaching software engineering introductory courses",
"type" : "AcademicArticle",
"publicationDate" : "2011-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n655591SE",
"label" : "Benchmark Assessment for Optimization Andacceleration Libraries in Deep Learning-Based Models",
"type" : "AcademicArticle",
"publicationDate" : "2022-06-27T00:00:00",
"publisher" : "Research Square Platform LLC"
}, {
"id" : "n589313SE",
"label" : "Authentication Mechanisms for E-Voting",
"type" : "Chapter",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n766813SE",
"label" : "Evaluation of Web spam behaviour on Arabic Websites popularity",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T00:00:00"
}, {
"id" : "n583812SE",
"label" : "Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions",
"type" : "GreyLiterature",
"publicationDate" : "2021-10-01T00:00:00"
}, {
"id" : "n766794SE",
"label" : "Building a SOA ontology for universities websites",
"type" : "ConferencePaper"
}, {
"id" : "n543672SE",
"label" : "The Analysis of Large-Scale Climate Data: Jordan Case Study",
"type" : "ConferencePaper",
"publicationDate" : "2014-11-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { },
"tags" : "13 Climate Action"
}, {
"id" : "n543695SE",
"label" : "Protein interaction based features' extraction",
"type" : "AcademicArticle",
"publicationDate" : "2017-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n766997SE",
"label" : "Using RFID to enhance mobile banking security",
"type" : "AcademicArticle",
"publicationDate" : "2010-01-01T00:00:00"
}, {
"id" : "n766951SE",
"label" : "Mobile agents modelling using UML",
"type" : "AcademicArticle",
"publicationDate" : "2015-01-01T00:00:00"
}, {
"id" : "n543592SE",
"label" : "Towards the design of real-time autonomous IoT NIDS",
"type" : "AcademicArticle",
"publicationDate" : "2021-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n543617SE",
"label" : "A model for reputation rank in online social networks and its applications",
"type" : "AcademicArticle",
"publicationDate" : "2020-03-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n543743SE",
"label" : "Building an Islamic financial information system based on policy managements",
"type" : "AcademicArticle",
"publicationDate" : "2015-10-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n543661SE",
"label" : "Evaluating the Correlation Between Software Defect and Design Coupling Metrics",
"type" : "ConferencePaper",
"publicationDate" : "2012-05-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766940SE",
"label" : "Infeasible Paths Detection Using Static Analysis",
"type" : "AcademicArticle"
}, {
"id" : "n565710SE",
"label" : "Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective function",
"type" : "AcademicArticle",
"publicationDate" : "2022-02-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n543605SE",
"label" : "Towards A Deeper NTRU Analysis: A Multi Modal Analysis",
"type" : "AcademicArticle",
"publicationDate" : "2020-06-01T00:00:00",
"publisher" : "Academy and Industry Research Collaboration Center (AIRCC)",
"venue" : { }
}, {
"id" : "n543640SE",
"label" : "Web and Database Security",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n596903SE",
"label" : "Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages",
"type" : "ConferencePaper",
"publicationDate" : "2021-10-03T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n543732SE",
"label" : "Detecting Arabic Cloaking Web Pages Using Hybrid Techniques",
"type" : "AcademicArticle",
"publicationDate" : "2013-11-30T00:00:00",
"publisher" : "Global Vision Press",
"venue" : { }
}, {
"id" : "n674546SE",
"label" : "Practical web security testing: Evolution of web application modules and open source testing tools",
"type" : "ConferencePaper",
"publicationDate" : "2022-01-07T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543893SE",
"label" : "The Rise of Search Terms to Predict Stock Price Movements",
"type" : "AcademicArticle",
"publicationDate" : "2020-01-01T00:00:00"
}, {
"id" : "n748900SE",
"label" : "Security Policies Automation in Software Defined Networking",
"type" : "AcademicArticle",
"publicationDate" : "2023-03-11T00:00:00"
}, {
"id" : "n548801SE",
"label" : "Network Parallelization in HPC Clusters",
"type" : "ConferencePaper",
"publicationDate" : "2016-01-01T11:11:11"
}, {
"id" : "n543744SE",
"label" : "Online integrity and authentication checking for Quran electronic versions",
"type" : "AcademicArticle",
"publicationDate" : "2017-01-01T00:00:00",
"publisher" : "Emerald",
"venue" : { }
}, {
"id" : "n543721SE",
"label" : "Mobile agents modelling using UML",
"type" : "AcademicArticle",
"publicationDate" : "2015-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n766886SE",
"label" : "An Ontological Teaching Of Software Engineering; Separation of Concerns",
"type" : "AcademicArticle"
}, {
"id" : "n543606SE",
"label" : "Mutation Testing Framework for Ad-hoc Networks Protocols",
"type" : "ConferencePaper",
"publicationDate" : "2020-05-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n548798SE",
"label" : "Evaluating Social Context in Arabic Opinion Mining",
"type" : "AcademicArticle",
"publicationDate" : "2018-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n543705SE",
"label" : "Challenges of Utilizing E-Learning Systems in Public Universities in Jordan",
"type" : "AcademicArticle",
"publicationDate" : "2010-01-01T00:00:00",
"publisher" : "International Association of Online Engineering (IAOE)",
"venue" : { }
}, {
"id" : "n649969SE",
"label" : "How Much Automation can be Done in Testing?",
"type" : "Chapter",
"publicationDate" : "2012-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n705530SE",
"label" : "Research in OCHIN Community Health Dataset: A Systematic Literature Review",
"type" : "GreyLiterature"
}, {
"id" : "n543651SE",
"label" : "Security and Access Controls: Lesson Plans",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n766930SE",
"label" : "Global Journal on Technology",
"type" : "AcademicArticle",
"publicationDate" : "2015-01-01T00:00:00"
}, {
"id" : "n543684SE",
"label" : "Evaluating graphical and statistical techniques for measuring similarity in DNA sequences",
"type" : "ConferencePaper",
"publicationDate" : "2012-05-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n655590SE",
"label" : "New and Efficient Lightweight Cryptography Algorithm for Mobile and Web Applications",
"type" : "AcademicArticle",
"publicationDate" : "2022-01-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n543716SE",
"label" : "The integration of access control levels based on SDN",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n709066SE",
"label" : "Big Data and Blockchain for Cybersecurity Applications: Challenges and Solutions",
"type" : "Chapter",
"publicationDate" : "2023-03-14T00:00:00",
"publisher" : "Taylor & Francis"
}, {
"id" : "n766907SE",
"label" : "Comparing Two Novelty Detection Models for Arabic Text Based on Sentence Level Information Patterns",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n638873SE",
"label" : "Analytical and Predictive Model for the impact of social distancing on COVID-19 pandemic",
"type" : "ConferencePaper",
"publicationDate" : "2022-06-23T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543628SE",
"label" : "Towards Building Actionable Indicators of Compromise Based on a Collaboration Model",
"type" : "ConferencePaper",
"publicationDate" : "2019-05-10T00:00:00",
"publisher" : "SPIE, the international society for optics and photonics",
"venue" : { }
}, {
"id" : "n697255SE",
"label" : "Cyber Readiness Assessment in Rural Areas: A Systematic Literature Review",
"type" : "AcademicArticle",
"publicationDate" : "2022-12-01T00:00:00"
}, {
"id" : "n543755SE",
"label" : "Similarity Evaluation of DNA Sequences Based on Nucleotides Similarity",
"type" : "ConferencePaper",
"publicationDate" : "2012-04-03T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n649970SE",
"label" : "Website Performance Measurement: Process and Product Metrics",
"type" : "Chapter",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n766952SE",
"label" : "MQVC: Measuring quranic verses similarity and sura classification using N-gram",
"type" : "AcademicArticle",
"publicationDate" : "2014-01-01T00:00:00"
}, {
"id" : "n543673SE",
"label" : "Automatic Coverage Evaluation For a Medical Expert System",
"type" : "ConferencePaper",
"publicationDate" : "2012-04-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766870SE",
"label" : "A comparative study of web usage and searches at Yarmouk University and Jordan",
"type" : "AcademicArticle",
"publicationDate" : "2011-01-01T00:00:00"
}, {
"id" : "n543591SE",
"label" : "Machine learning approaches to IoT security: A systematic literature review",
"type" : "AcademicArticle",
"publicationDate" : "2021-06-01T00:00:00",
"publisher" : "Elsevier"
}, {
"id" : "n504896SE",
"label" : "How Many Bots in Russian Troll Tweets?",
"type" : "AcademicArticle",
"publicationDate" : "2020-11-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n766836SE",
"label" : "Separation of concerns in teaching software engineering",
"type" : "ConferencePaper",
"publicationDate" : "2010-01-01T00:00:00"
}, {
"id" : "n543639SE",
"label" : "Network slicing to improve multicasting in HPC clusters",
"type" : "AcademicArticle",
"publicationDate" : "2018-09-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n766782SE",
"label" : "A topical classification of Quranic Arabic text",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T00:00:00"
}, {
"id" : "n693109SE",
"label" : "CASP Dataset and Protein Structures Prediction",
"type" : "GreyLiterature",
"publicationDate" : "2022-01-01T00:00:00"
}, {
"id" : "n548792SE",
"label" : "Order model reduction for two-time-scale systems based on neural network estimation",
"type" : "ConferencePaper",
"publicationDate" : "2007-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n578215SE",
"label" : "Websites Security Policies Implementation Using Alloy Analyzer",
"type" : "GreyLiterature",
"publicationDate" : "2021-01-01T00:00:00"
}, {
"id" : "n543733SE",
"label" : "Using Mutation to Enhance GUI Testing Coverage",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n543699SE",
"label" : "Test Cases Reduction and Selection Optimization in Testing Web Services",
"type" : "AcademicArticle",
"publicationDate" : "2012-10-23T00:00:00",
"publisher" : "MECS Publisher",
"venue" : { }
}, {
"id" : "n766955SE",
"label" : "New Methods for DNA Sequence Similarity Analysis.",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n543894SE",
"label" : "Mis-Configurations in Network Security Access Controls",
"type" : "AcademicArticle",
"publicationDate" : "2021-03-01T00:00:00"
}, {
"id" : "n543630SE",
"label" : "Applications of a Model to Evaluate and Utilize Users Interactions in Online Social Networks",
"type" : "Chapter",
"publicationDate" : "2019-02-01T00:00:00",
"publisher" : "Taylor & Francis"
}, {
"id" : "n543653SE",
"label" : "Towards Centralized MS/MS Spectra Preprocessing: An Empirical Evaluation of Peptides Search Engines Using Ground Truth Datasets",
"type" : "ConferencePaper",
"publicationDate" : "2017-10-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543676SE",
"label" : "Sentiment Analysis of Arabic Social Media Content: A Comparative Study",
"type" : "ConferencePaper",
"publicationDate" : "2013-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543596SE",
"label" : "Designing privacy-friendly data repositories: a framework for a blockchain that follows the GDPR",
"type" : "AcademicArticle",
"publicationDate" : "2020-12-17T00:00:00",
"publisher" : "Emerald",
"venue" : { }
}, {
"id" : "n766875SE",
"label" : "A Novel Method to Evaluate Romanization Systems: The Case of Romanizing Arabic Proper Nouns",
"type" : "AcademicArticle"
}, {
"id" : "n748901SE",
"label" : "Research in OCHIN Community Health Dataset: A Systematic Literature Review",
"type" : "AcademicArticle",
"publicationDate" : "2023-02-21T00:00:00"
}, {
"id" : "n543745SE",
"label" : "Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach",
"type" : "AcademicArticle",
"publicationDate" : "2017-02-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n548802SE",
"label" : "KP-Trie Algorithm for Update and Search Operations",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n545078SE",
"label" : "Practical Information Security A Competency-Based Education Course",
"type" : "Book",
"publicationDate" : "2018-02-07T00:00:00",
"publisher" : "Springer"
}, {
"id" : "n543722SE",
"label" : "A software development process for open source and open competition projects",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n567563SE",
"label" : "Fault-based testing for discovering SQL injection vulnerabilities in web applications",
"type" : "AcademicArticle",
"publicationDate" : "2021-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n766778SE",
"label" : "Knowledge Management and Semantic Web Services",
"type" : "Chapter",
"publicationDate" : "2013-01-01T00:00:00"
}, {
"id" : "n543665SE",
"label" : "Software Attributes That Impact Popularity",
"type" : "ConferencePaper",
"publicationDate" : "2017-05-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543756SE",
"label" : "Empirical Evidences in Software-Defined Network Security: A Systematic Literature Review",
"type" : "Chapter",
"publicationDate" : "2017-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n766893SE",
"label" : "Avaliao multilngue e de localizao de motores de busca de sites e busca por palavras-chave",
"type" : "AcademicArticle",
"publicationDate" : "2010-01-01T00:00:00"
}, {
"id" : "n543704SE",
"label" : "Building an e-Commerce Infrastructure in Jordan: Challenges and Requirements",
"type" : "AcademicArticle",
"publicationDate" : "2010-09-01T00:00:00",
"publisher" : "International Association of Online Engineering (IAOE)",
"venue" : { }
}, {
"id" : "n766817SE",
"label" : "GUI structural metrics and testability testing",
"type" : "ConferencePaper",
"publicationDate" : "2007-01-01T00:00:00"
}, {
"id" : "n649966SE",
"label" : "Evaluating the impact of software metrics on defects prediction. Part 2",
"type" : "AcademicArticle",
"publicationDate" : "2014-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n766882SE",
"label" : "Advanced Automated Software Testing",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n543715SE",
"label" : "The use of educational games for learning basic math skills in early classes",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n419772SE",
"label" : "Rating news claims: Feature selection and evaluation.",
"type" : "AcademicArticle",
"publicationDate" : "2019-12-01T00:00:00",
"publisher" : "American Institute of Mathematical Sciences (AIMS)",
"venue" : { }
}, {
"id" : "n543629SE",
"label" : "Is Bigger, Better? Exploring U.S. News Graduate Education Program Rankings and Internet Characteristics",
"type" : "AcademicArticle",
"publicationDate" : "2019-05-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { },
"tags" : "4 Quality Education"
}, {
"id" : "n543734SE",
"label" : "Improving Image Retrieval Through a Collection of Fast and Simple Visual Features Extraction",
"type" : "AcademicArticle",
"publicationDate" : "2014-09-01T00:00:00",
"publisher" : "Natural Sciences Publishing",
"venue" : { }
}, {
"id" : "n545079SE",
"label" : "Information Fusion for Cyber-Security Analytics Preface",
"type" : "Book",
"publicationDate" : "2017-10-21T00:00:00",
"publisher" : "Springer"
}, {
"id" : "n543641SE",
"label" : "Introduction to Information Security",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n543757SE",
"label" : "SDN-Based Real-Time IDS/IPS Alerting System",
"type" : "Chapter",
"publicationDate" : "2017-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n649965SE",
"label" : "OLAWSDS: An Online Arabic Web Spam Detection System",
"type" : "AcademicArticle",
"publicationDate" : "2014-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n612683SE",
"label" : "Ensemble Models for Intrusion Detection System Classification.",
"type" : "AcademicArticle",
"publicationDate" : "2022-01-01T00:00:00",
"publisher" : "Institute for Project Management Pvt. Ltd"
}, {
"id" : "n766818SE",
"label" : "GUI Test Automation Framework.",
"type" : "ConferencePaper",
"publicationDate" : "2007-01-01T00:00:00"
}, {
"id" : "n566661SE",
"label" : "RBAC for Healthcare-Infrastructure and data storage",
"type" : "GreyLiterature",
"publicationDate" : "2020-10-01T00:00:00",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n588911SE",
"label" : "Capitol Riot Analysis",
"type" : "AcademicArticle",
"publicationDate" : "2021-11-01T00:00:00"
}, {
"id" : "n766829SE",
"label" : "Predicting protein subcellular localization with reduced feature set",
"type" : "ConferencePaper",
"publicationDate" : "2014-01-01T00:00:00"
}, {
"id" : "n607590SE",
"label" : "Adversarial Machine Learning in Text Processing: A Literature Survey",
"type" : "AcademicArticle",
"publicationDate" : "2022-01-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n688120SE",
"label" : "A Mutation-based Text Generation for Adversarial Machine Learning Applications",
"type" : "GreyLiterature",
"publicationDate" : "2022-12-20T00:00:00"
}, {
"id" : "n543688SE",
"label" : "Study The Impact of Improving Source Code on Software Metrics",
"type" : "ConferencePaper",
"publicationDate" : "2012-05-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n586634SE",
"label" : "Capitol Riot Analysis",
"type" : "GreyLiterature",
"publicationDate" : "2021-01-01T00:00:00"
}, {
"id" : "n543607SE",
"label" : "US News & World ReportBest Colleges rankings: Which institutional metrics contribute to sustained stratification?",
"type" : "AcademicArticle",
"publicationDate" : "2020-09-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n766956SE",
"label" : "ON IMPROVING TEST AUTO",
"type" : "AcademicArticle",
"publicationDate" : "2011-01-01T00:00:00"
}, {
"id" : "n766931SE",
"label" : "GUI path oriented test generation algorithms",
"type" : "AcademicArticle",
"publicationDate" : "2007-01-01T00:00:00"
}, {
"id" : "n543595SE",
"label" : "Combining Blockchain and Machine Learning to Forecast Cryptocurrency Prices",
"type" : "ConferencePaper",
"publicationDate" : "2020-11-05T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543677SE",
"label" : "An Interactive Predictive System for Weather Forecasting",
"type" : "ConferencePaper",
"publicationDate" : "2012-05-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"tags" : "13 Climate Action"
}, {
"id" : "n543723SE",
"label" : "Checking the efficiency of integrity tests in distributed and parallel database",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n548803SE",
"label" : "PCA, Random-Forest and Pearson Correlation for Dimensionality Reduction in IoT IDS",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T00:00:00"
}, {
"id" : "n543618SE",
"label" : "Disease Outbreak Detection Using Search Keywords Patterns",
"type" : "ConferencePaper",
"publicationDate" : "2020-03-01T00:00:00",
"publisher" : "EasyChair",
"venue" : { },
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n543895SE",
"label" : "College Affordability and U.S. News & World Report Rankings: Analyzing National and Regional Differences",
"type" : "AcademicArticle",
"publicationDate" : "2020-01-01T00:00:00"
}, {
"id" : "n543652SE",
"label" : "The Ontology of Malwares",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n543620SE",
"label" : "Popular Search Terms and Stock Price Prediction",
"type" : "ConferencePaper",
"publicationDate" : "2019-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766779SE",
"label" : "Software Development Methodologies for Cloud Computing",
"type" : "Chapter",
"publicationDate" : "2013-01-01T00:00:00"
}, {
"id" : "n543643SE",
"label" : "Network Forensics: Lesson Plans",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n543608SE",
"label" : "Toward Effective Cybersecurity Education in Saudi Arabia",
"type" : "Chapter",
"publicationDate" : "2020-05-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n766839SE",
"label" : "Spam detection methods for Arabic web pages",
"type" : "ConferencePaper",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n543703SE",
"label" : "The Effect of Stemming on Arabic Text Classification: An Empirical Study",
"type" : "AcademicArticle",
"publicationDate" : "2011-07-01T00:00:00",
"publisher" : "IGI Global",
"venue" : { }
}, {
"id" : "n649967SE",
"label" : "Studying and analysing students web search behaviours within three Jordanian universities",
"type" : "AcademicArticle",
"publicationDate" : "2014-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n588913SE",
"label" : "Dark Web Analytics: A Comparative Study of Feature Selection and Prediction Algorithms",
"type" : "AcademicArticle",
"publicationDate" : "2022-01-07T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766894SE",
"label" : "Building a user interface test automation framework using the data model",
"type" : "AcademicArticle",
"publicationDate" : "2008-01-01T00:00:00"
}, {
"id" : "n766965SE",
"label" : "Requirements and Challenges for Building a National Open Security Lab",
"type" : "AcademicArticle",
"publicationDate" : "2015-01-01T00:00:00"
}, {
"id" : "n543686SE",
"label" : "Improving Understandability In Teaching Of Software Engineering And Connectivity With The Industry",
"type" : "ConferencePaper",
"publicationDate" : "2011-04-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543714SE",
"label" : "Video spam and public opinion in current Middle Eastern conflicts",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n543735SE",
"label" : "The Automatic Evaluation of Website Metrics and State",
"type" : "AcademicArticle",
"publicationDate" : "2010-10-01T00:00:00",
"publisher" : "IGI Global",
"venue" : { }
}, {
"id" : "n766791SE",
"label" : "Arabic/English sentiment analysis: an empirical study",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T00:00:00"
}, {
"id" : "n639970SE",
"label" : "Improving Novelty of Abstractive Summarization Via Warm-Starting",
"type" : "GreyLiterature",
"publicationDate" : "2022-01-01T00:00:00"
}, {
"id" : "n543675SE",
"label" : "Techniques to Preserve the Integrity of The Electronic Versions of the Nobel Quran",
"type" : "ConferencePaper",
"publicationDate" : "2013-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n566660SE",
"label" : "Adversarial Machine Learning in Text Analysis and Generation",
"type" : "GreyLiterature",
"publicationDate" : "2021-01-01T00:00:00"
}, {
"id" : "n578214SE",
"label" : "Formal Modeling of Online-Based Voting",
"type" : "GreyLiterature",
"publicationDate" : "2021-01-01T00:00:00"
}, {
"id" : "n543654SE",
"label" : "A Model Based Approach for the Extraction of Network Forensic Artifacts",
"type" : "ConferencePaper",
"publicationDate" : "2017-11-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543746SE",
"label" : "Security of Software Defined Networks: A survey",
"type" : "AcademicArticle",
"publicationDate" : "2015-09-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n766780SE",
"label" : "The Distribution of Testing Activities in Web Services and SOA Environment",
"type" : "Chapter",
"publicationDate" : "2013-01-01T00:00:00"
}, {
"id" : "n629366SE",
"label" : "A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks",
"type" : "AcademicArticle",
"publicationDate" : "2022-06-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n543687SE",
"label" : "The Evaluation of The Public Opinion A Case study: MERS-CoV infection Virus in KSA",
"type" : "ConferencePaper",
"publicationDate" : "2014-12-08T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766828SE",
"label" : "Plagiarism Detection based on studying correlation between Author, Title, and Content",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T00:00:00"
}, {
"id" : "n766966SE",
"label" : "Security Challenges For Expanding E-governments Services",
"type" : "AcademicArticle",
"publicationDate" : "2011-01-01T00:00:00"
}, {
"id" : "n543664SE",
"label" : "Collaboration Networks of Levantine Biomedical Researchers",
"type" : "ConferencePaper",
"publicationDate" : "2014-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543594SE",
"label" : "Mutation Testing to Validate Networks Protocols",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-20T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543724SE",
"label" : "E-government website security concerns and citizens' adoption",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n543896SE",
"label" : "Data Analytics and Assessment of the Drugs for COVID-19",
"type" : "AcademicArticle",
"publicationDate" : "2020-09-01T00:00:00"
}, {
"id" : "n543619SE",
"label" : "Review of Analysis on IoT Components, Devices and Layers Security",
"type" : "ConferencePaper",
"publicationDate" : "2019-11-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n548804SE",
"label" : "DEA based decision support system for public hospitals in Jordan",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T00:00:00"
}, {
"id" : "n543747SE",
"label" : "A Conceptual Organization for Websites Metrics and E-Government Websites: A Case Study",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00",
"publisher" : "IGI Global",
"venue" : { }
}, {
"id" : "n693110SE",
"label" : "Fake News Detection and Machine Learning, Ethical Issues: A systematic Literature Review",
"type" : "GreyLiterature",
"publicationDate" : "2022-01-01T00:00:00"
}, {
"id" : "n594923SE",
"label" : "Generating Optimal Attack Paths in Generative Adversarial Phishing",
"type" : "ConferencePaper",
"publicationDate" : "2021-11-03T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766988SE",
"label" : "The specifications of E-Commerce Secure System using Z",
"type" : "AcademicArticle"
}, {
"id" : "n566659SE",
"label" : "An ontological analysis of misinformation in online social networks",
"type" : "GreyLiterature",
"publicationDate" : "2021-02-01T00:00:00"
}, {
"id" : "n543758SE",
"label" : "The Correlation between Source Code Analysis Change Recommendations and Software Metrics",
"type" : "ConferencePaper",
"publicationDate" : "2012-04-03T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n543642SE",
"label" : "Mobile and Wireless Security: Lesson Plans",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n767001SE",
"label" : "Website usability evaluation and search engine optimization for eighty Arab university websites",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n543702SE",
"label" : "Polarity Classification of Arabic Sentiments",
"type" : "AcademicArticle",
"publicationDate" : "2016-07-01T00:00:00",
"publisher" : "IGI Global",
"venue" : { }
}, {
"id" : "n543698SE",
"label" : "A link and Content Hybrid Approach for Arabic Web Spam Detection",
"type" : "AcademicArticle",
"publicationDate" : "2012-12-01T00:00:00",
"publisher" : "MECS Publisher",
"venue" : { }
}, {
"id" : "n588912SE",
"label" : "Formal Modeling of Online-Based Voting",
"type" : "AcademicArticle",
"publicationDate" : "2021-10-01T00:00:00"
}, {
"id" : "n543631SE",
"label" : "The NICE Cyber Security Framework, Cyber Security Intelligence and Analytics",
"type" : "Book",
"publicationDate" : "2019-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n766910SE",
"label" : "Dependency Graph and Metrics for Defects Prediction",
"type" : "AcademicArticle"
}, {
"id" : "n548805SE",
"label" : "Dispersion-based prediction framework for estimating missing values in wireless sensor networks",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n697252SE",
"label" : "Fake News Detection and Machine Learning, Ethical Issues: A systematic Literature Review",
"type" : "AcademicArticle",
"publicationDate" : "2022-12-01T00:00:00"
}, {
"id" : "n543610SE",
"label" : "Can Users Search Trends Predict People Scares or Disease Breakout? An Examination of Infectious Skin Diseases in the United States.",
"type" : "AcademicArticle",
"publicationDate" : "2020-01-01T00:00:00",
"publisher" : "Sage Publications",
"venue" : { },
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n543599SE",
"label" : "multilingual and location evaluation of search engines for websites and searched for keywords",
"type" : "AcademicArticle",
"publicationDate" : "2011-01-01T00:00:00",
"publisher" : "Faculdade de Filosofia e Cincias",
"venue" : { }
}, {
"id" : "n543679SE",
"label" : "Designing an Interactive Multimedia Learning System for the Children of Primary Schools in Jordan",
"type" : "ConferencePaper",
"publicationDate" : "2011-04-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"tags" : "4 Quality Education"
}, {
"id" : "n766993SE",
"label" : "Using a Model Checker for the Verification of the GUI Implementation",
"type" : "AcademicArticle",
"publicationDate" : "2009-01-01T00:00:00"
}, {
"id" : "n543713SE",
"label" : "Lexicon-based sentiment analysis of Arabic tweets",
"type" : "AcademicArticle",
"publicationDate" : "2015-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n543736SE",
"label" : "A Business Classifier to Detect Readability Metrics on Software Games and Their Types",
"type" : "AcademicArticle",
"publicationDate" : "2013-10-01T00:00:00",
"publisher" : "IGI Global",
"venue" : { }
}, {
"id" : "n543759SE",
"label" : "Evaluating the change of software fault behavior with dataset attributes based on categorical correlation",
"type" : "AcademicArticle",
"publicationDate" : "2011-08-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n766775SE",
"label" : "SOFTWARE METRICS, TOWARD BUILDING PREDICTION MODELS",
"type" : "Book",
"publicationDate" : "2008-01-01T00:00:00"
}, {
"id" : "n580825SE",
"label" : "Anomaly detection in blockchain using network representation and machine learning",
"type" : "AcademicArticle",
"publicationDate" : "2022-03-01T00:00:00",
"publisher" : "Wiley",
"venue" : { }
}, {
"id" : "n649963SE",
"label" : "An Automatic Evaluation for Online Machine Translation: Holy Quran Case Study",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n766970SE",
"label" : "Software Engineering Ontology Separation of Concerns: Introduction, Software Processes, People, Tools, The Software Product, The Project, Software Metrics.",
"type" : "AcademicArticle",
"publicationDate" : "2009-01-01T00:00:00"
}, {
"id" : "n543691SE",
"label" : "Open source evolution analysis",
"type" : "ConferencePaper",
"publicationDate" : "2006-01-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n594921SE",
"label" : "Towards Building a Data Science Testbed for Cyber Community",
"type" : "GreyLiterature",
"publicationDate" : "2021-01-01T00:00:00"
}, {
"id" : "n614123SE",
"label" : "A Comparitive Study of Machine Learning Algorithms for Identifying Mental States from EEG Recordings",
"type" : "ConferencePaper",
"publicationDate" : "2022-01-29T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n766982SE",
"label" : "The Development of Several Algorithms to Improve Test Case Generation",
"type" : "AcademicArticle"
}, {
"id" : "n543644SE",
"label" : "Security and Risk Management and Planning: Lesson Plans",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature",
"tags" : "11 Sustainable Cities and Communities"
}, {
"id" : "n556300SE",
"label" : "Towards building data analytics benchmarks for IoT intrusion detection",
"type" : "AcademicArticle",
"publicationDate" : "2022-06-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n543609SE",
"label" : "A model for reputation rank in online social networks and its applications",
"type" : "AcademicArticle",
"publicationDate" : "2020-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n543587SE",
"label" : "Pro-ISIS Tweets Analysis Using Machine Learning Techniques",
"type" : "ConferencePaper",
"publicationDate" : "2020-12-13T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766820SE",
"label" : "Implementing a Metrics Program MOUSE will help you",
"type" : "ConferencePaper",
"publicationDate" : "2009-01-01T00:00:00"
}, {
"id" : "n543668SE",
"label" : "Web Structural Metrics Evaluation",
"type" : "ConferencePaper",
"publicationDate" : "2010-09-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n566664SE",
"label" : "Annotations, Collaborative Tagging, and Searching Mathematics in E-Learning",
"type" : "GreyLiterature",
"publicationDate" : "2012-11-01T00:00:00"
}, {
"id" : "n543725SE",
"label" : "Software Design Principles to Enhance SDN Architecture",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-01T00:00:00",
"publisher" : "The Science and Information Organization",
"venue" : { }
}, {
"id" : "n766912SE",
"label" : "Effective generation of test cases using genetic algorithms and optimization theory",
"type" : "AcademicArticle",
"publicationDate" : "2010-01-01T00:00:00"
}, {
"id" : "n543633SE",
"label" : "Examining University Ranking Metrics: Articulating Issues of Size and Web Dependency",
"type" : "ConferencePaper",
"publicationDate" : "2018-09-08T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n594922SE",
"label" : "URL Links Malicious Classification Towards Autonomous Threat Detection Systems",
"type" : "Chapter",
"publicationDate" : "2022-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n732386SE",
"label" : "Optimization of deep learning models: benchmark and analysis",
"type" : "AcademicArticle",
"publicationDate" : "2023-04-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n766981SE",
"label" : "The automatic grading for online exams in Arabic with essay questions using statistical and computational linguistics techniques",
"type" : "AcademicArticle",
"publicationDate" : "2009-01-01T00:00:00"
}, {
"id" : "n674655SE",
"label" : "Adversarial NLP for Social Network Applications: Attacks, Defenses, and Research Directions",
"type" : "AcademicArticle",
"publicationDate" : "2022-01-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n604835SE",
"label" : "Towards Automatic Rule Conflict Detection in Snort",
"type" : "Chapter",
"publicationDate" : "2022-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n548794SE",
"label" : "GUI path oriented test generation algorithms",
"type" : "ConferencePaper",
"publicationDate" : "2007-01-01T00:00:00"
}, {
"id" : "n578213SE",
"label" : "Formal Modeling of Banking Policies using Alloy Analyzer",
"type" : "GreyLiterature",
"publicationDate" : "2021-01-01T00:00:00"
}, {
"id" : "n543701SE",
"label" : "Toward Security Test Automation for Event Driven GUI Web Contents",
"type" : "AcademicArticle",
"publicationDate" : "2012-06-01T00:00:00",
"publisher" : "MECS Publisher",
"venue" : { }
}, {
"id" : "n543760SE",
"label" : "Implications for Website Trust and Credibility Assessment",
"type" : "AcademicArticle",
"publicationDate" : "2012-10-01T00:00:00",
"publisher" : "IGI Global",
"venue" : { }
}, {
"id" : "n543655SE",
"label" : "Deep vs. Shallow Learning-based Filters of MSMS Spectra in Support of Protein Search Engines.",
"type" : "ConferencePaper",
"publicationDate" : "2017-11-13T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n543632SE",
"label" : "Website security analysis: variation of detection methods and decisions",
"type" : "ConferencePaper",
"publicationDate" : "2018-04-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n578190SE",
"label" : "Challenges of Software Requirements Quality Assurance and Validation: A Systematic Literature Review",
"type" : "AcademicArticle",
"publicationDate" : "2021-01-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n786208SE",
"label" : "U2-Net: A Very-Deep Convolutional Neural Network for Detecting Distracted Drivers",
"type" : "AcademicArticle",
"publisher" : "MDPI",
"venue" : { }
}, {
"id" : "n548806SE",
"label" : "GUI Structural Metrics",
"type" : "AcademicArticle",
"publicationDate" : "2011-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n766879SE",
"label" : "A Survey of impact and citation indices: Limitations and issues",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n766797SE",
"label" : "Combating Arabic web spam using content analysis",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T00:00:00"
}, {
"id" : "n295009SE",
"label" : "Privacy and Social Capital in Online Social Networks",
"type" : "ConferencePaper",
"publicationDate" : "2016-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543737SE",
"label" : "Content-based analysis to detect Arabic web spam",
"type" : "AcademicArticle",
"publicationDate" : "2012-06-01T00:00:00",
"publisher" : "Sage Publications",
"venue" : { }
}, {
"id" : "n543712SE",
"label" : "The impact of using pair programming: a case study",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n543680SE",
"label" : "Network Parallelization in HPC Clusters",
"type" : "ConferencePaper",
"publicationDate" : "2016-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n693106SE",
"label" : "Balanced Datasets for IoT IDS",
"type" : "GreyLiterature",
"publicationDate" : "2022-12-15T00:00:00"
}, {
"id" : "n543621SE",
"label" : "Using Data Analytics to Filter Insincere Posts from Online Social Networks A Case Study: Quora Insincere Questions",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T00:00:00",
"publisher" : "HICSS Conference Office",
"venue" : { }
}, {
"id" : "n649974SE",
"label" : "Using Machine Learning Algorithms to Detect Content-based Arabic Web Spam",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n588692SE",
"label" : "Formal Modeling of Banking Policies using Alloy Analyzer",
"type" : "AcademicArticle",
"publicationDate" : "2021-10-01T00:00:00"
}, {
"id" : "n543748SE",
"label" : "Predicting Software Projects Cost Estimation Based on Mining Historical Data",
"type" : "AcademicArticle",
"publicationDate" : "2012-04-10T00:00:00",
"publisher" : "Hindawi",
"venue" : { }
}, {
"id" : "n766880SE",
"label" : "A Topical Classification of Hadith Arabic Text",
"type" : "AcademicArticle",
"publicationDate" : "2014-01-01T00:00:00"
}, {
"id" : "n588910SE",
"label" : "Websites Security Policies Implementation Using Alloy Analyzer",
"type" : "AcademicArticle",
"publicationDate" : "2021-10-01T00:00:00"
}, {
"id" : "n649976SE",
"label" : "Automating the Collection of Object Relational Database Metrics",
"type" : "AcademicArticle",
"publicationDate" : "2011-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n614124SE",
"label" : "New Waves of Cyber Attacks in the Time of COVID19",
"type" : "Chapter",
"publicationDate" : "2022-03-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n543700SE",
"label" : "Textual Manipulation for SQL Injection Attacks",
"type" : "AcademicArticle",
"publicationDate" : "2013-11-07T00:00:00",
"publisher" : "MECS Publisher",
"venue" : { }
}, {
"id" : "n543689SE",
"label" : "The Malware Detection Challenge of Accuracy",
"type" : "ConferencePaper",
"publicationDate" : "2016-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766945SE",
"label" : "Lean Development: A Tool for Knowledge Management",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T00:00:00"
}, {
"id" : "n543666SE",
"label" : "Websites Input Validation and Input Misuse Based Attacks",
"type" : "ConferencePaper",
"publicationDate" : "2016-08-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543646SE",
"label" : "Disk and Computer Forensics: Lesson Plans",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n543586SE",
"label" : "Analysis and Prediction of COVID-19 Timeline and Infection Rates",
"type" : "ConferencePaper",
"publicationDate" : "2020-12-10T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { },
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n791799SE",
"label" : "Recognition of Arabic Air-Written Letters: Machine Learning, Convolutional Neural Networks, and Optical Character Recognition (OCR) Techniques.",
"type" : "AcademicArticle",
"publicationDate" : "2023-11-28T00:00:00",
"publisher" : "MDPI",
"venue" : { }
}, {
"id" : "n566663SE",
"label" : "Does Size Matter? An Evaluation of Institutional Internet Ranking Metrics",
"type" : "GreyLiterature",
"publicationDate" : "2019-01-01T00:00:00",
"tags" : "4 Quality Education"
}, {
"id" : "n543726SE",
"label" : "A QoS Solution for NDN in the Presence of Congestion Control Mechanism",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-01T00:00:00",
"publisher" : "The Science and Information Organization",
"venue" : { }
}, {
"id" : "n543634SE",
"label" : "Testing Assessment of Group Collaborations in OSNs",
"type" : "Chapter",
"publicationDate" : "2019-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n543749SE",
"label" : "A novel root based Arabic stemmer",
"type" : "AcademicArticle",
"publicationDate" : "2015-04-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n766831SE",
"label" : "Robust Channel Estimation for Spectrally Efficient FDM System",
"type" : "ConferencePaper",
"publicationDate" : "2012-04-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n693108SE",
"label" : "Resource Allocation Methods in Vanets:a Systematic Literature Review",
"type" : "GreyLiterature",
"publicationDate" : "2023-01-03T00:00:00"
}, {
"id" : "n766936SE",
"label" : "Improving Enterprise Access Security Using RFID",
"type" : "AcademicArticle",
"publicationDate" : "2011-01-01T00:00:00"
}, {
"id" : "n543657SE",
"label" : "Interaction-based Reputation Model in Online Social Networks",
"type" : "ConferencePaper",
"publicationDate" : "2016-01-01T00:00:00",
"publisher" : "SciTePress"
}, {
"id" : "n766992SE",
"label" : "User Interface Design in Isolation from Underlying Code and Environment",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-01T00:00:00"
}, {
"id" : "n548793SE",
"label" : "Using user sessions for test case generation and execution",
"type" : "ConferencePaper",
"publicationDate" : "2008-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n543623SE",
"label" : "Extraction of Essential Genes Based on Network Attributes",
"type" : "AcademicArticle",
"publicationDate" : "2019-12-01T00:00:00",
"publisher" : "Medwell Publications",
"venue" : { }
}, {
"id" : "n543711SE",
"label" : "The Introduction of Several User Interface Structural Metrics to Make Test Automation More Effective",
"type" : "AcademicArticle",
"publicationDate" : "2009-07-13T00:00:00",
"publisher" : "Bentham Science Publishers",
"venue" : { }
}, {
"id" : "n766968SE",
"label" : "Separation of concerns in teaching software engineering",
"type" : "AcademicArticle",
"publicationDate" : "2010-01-01T00:00:00"
}, {
"id" : "n766788SE",
"label" : "An opinion analysis tool for colloquial and standard Arabic",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T00:00:00"
}, {
"id" : "n693107SE",
"label" : "Cyber Readiness Assessment in Rural Areas: A Systematic Literature Review",
"type" : "GreyLiterature",
"publicationDate" : "2022-01-01T00:00:00"
}, {
"id" : "n766853SE",
"label" : "The usage of formal methods in Quran search system",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T00:00:00"
}, {
"id" : "n609426SE",
"label" : "Towards Building a Data Science Testbed for Cyber Community",
"type" : "AcademicArticle",
"publicationDate" : "2021-03-01T00:00:00"
}, {
"id" : "n543750SE",
"label" : "Evaluating Google queries based on language preferences",
"type" : "AcademicArticle",
"publicationDate" : "2011-06-01T00:00:00",
"publisher" : "Sage Publications",
"venue" : { }
}, {
"id" : "n543645SE",
"label" : "Web Forensics-Chapter Competencies",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n543738SE",
"label" : "Evaluating Arabic Spam Classifiers Using Link Analysis",
"type" : "ConferencePaper",
"publicationDate" : "2012-04-03T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n543622SE",
"label" : "Features Quality Impact on Cyber Physical Security Systems",
"type" : "ConferencePaper",
"publicationDate" : "2019-10-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766892SE",
"label" : "Automatic model based methods to improve test effectiveness",
"type" : "AcademicArticle",
"publicationDate" : "2010-01-01T00:00:00"
}, {
"id" : "n766969SE",
"label" : "SNAMS-2015 Organizing Committee General Co-Chairs",
"type" : "AcademicArticle"
}, {
"id" : "n543678SE",
"label" : "Enhancing Query Retrieval Efficiency Using BGIT Coding Bigram Based Index Term coding applied to Arabic Language",
"type" : "ConferencePaper",
"publicationDate" : "2012-05-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766787SE",
"label" : "An Object Oriented Framework for User Interface Test Automation",
"type" : "ConferencePaper"
}, {
"id" : "n543611SE",
"label" : "Information Systems Security Management",
"type" : "Chapter",
"publicationDate" : "2020-04-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n649975SE",
"label" : "Using Test Case Mutation to Evaluate the Model of the User Interface",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n543667SE",
"label" : "The utilization of user sessions in testing",
"type" : "ConferencePaper",
"publicationDate" : "2008-05-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n545072SE",
"label" : "CyberSecurity Education Based on NICE Framework: Issues and Challenges",
"type" : "AcademicArticle",
"publicationDate" : "2018-07-01T00:00:00",
"publisher" : "Information Systems Audit and Control Association",
"venue" : { }
}, {
"id" : "n766776SE",
"label" : "The Automatic Evaluation of Website Metrics and State",
"type" : "Book",
"publisher" : "IGI Global"
}, {
"id" : ":n543600SE",
"label" : "College Affordability and U.S. News & World Report Rankings",
"type" : "AcademicArticle",
"publicationDate" : "2020-04-01T00:00:00",
"publisher" : "STAR Scholars Network",
"venue" : { }
}, {
"id" : "n543585SE",
"label" : "Vulnerability assessment of industrial systems using Shodan",
"type" : "AcademicArticle",
"publicationDate" : "2022-06-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n766864SE",
"label" : "Web services testing challenges and approaches",
"type" : "ConferencePaper",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n649964SE",
"label" : "Opinion Mining and Analysis for Arabic Language",
"type" : "AcademicArticle",
"publicationDate" : "2014-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n766819SE",
"label" : "GUIs test cases reduction using sequential patterns",
"type" : "ConferencePaper",
"publicationDate" : "2009-01-01T00:00:00"
}, {
"id" : "n543690SE",
"label" : "The Evaluation of Trust and Credibility Metrics: Websites of Jordanian Universities and E-Government Portals as a Case Study",
"type" : "ConferencePaper",
"publicationDate" : "2013-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n566662SE",
"label" : "Data Analytics and Assessment of the Drugs for COVID-19",
"type" : "GreyLiterature",
"publicationDate" : "2020-01-01T00:00:00",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n543727SE",
"label" : "Annotations, Collaborative Tagging, and Searching Mathematics in E-Learning",
"type" : "AcademicArticle",
"publicationDate" : "2011-01-01T00:00:00",
"publisher" : "The Science and Information Organization",
"venue" : { }
}, {
"id" : "n543656SE",
"label" : "Deep Learning-based MSMS Spectra Reduction in Support of Running Multiple Protein Search Engines on Cloud.",
"type" : "ConferencePaper",
"publicationDate" : "2017-11-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n545073SE",
"label" : "A Prototype for a Standard Arabic Sentiment Analysis Corpus",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-15T00:00:00",
"venue" : { }
}, {
"id" : "n543601SE",
"label" : "Exploring hackers assets",
"type" : "ConferencePaper",
"publicationDate" : "2020-09-21T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)",
"tags" : "16 Peace, Justice and Strong Institutions"
}, {
"id" : "n543710SE",
"label" : "Automatic Learning of Arabic Text Categorization",
"type" : "AcademicArticle",
"publicationDate" : "2015-06-30T00:00:00",
"publisher" : "Global Vision Press",
"venue" : { }
}, {
"id" : "n766800SE",
"label" : "Documents Similarities Algorithms for Research Papers Authenticity",
"type" : "ConferencePaper",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n766823SE",
"label" : "Incorporating Arabic Corpus into Google N-gram Viewer: Initial Results",
"type" : "ConferencePaper",
"publicationDate" : "2014-01-01T00:00:00"
}, {
"id" : "n782564SE",
"label" : "Recognition of Arabic Air-Written Letters: Machine Learning, Convolutional Neural Networks, and Optical Character Recognition (OCR) Techniques",
"type" : "GreyLiterature",
"publicationDate" : "2023-09-27T00:00:00"
}, {
"id" : "n766858SE",
"label" : "Using metrics to evaluate user interfaces automatically",
"type" : "ConferencePaper",
"publicationDate" : "2009-01-01T00:00:00"
}, {
"id" : "n543613SE",
"label" : "Training, Education, and Awareness",
"type" : "Chapter",
"publicationDate" : "2020-04-01T00:00:00",
"publisher" : "Springer Nature",
"tags" : "4 Quality Education"
}, {
"id" : "n766898SE",
"label" : "Building and evaluating an opinion analysis tool for standard and colloquial Arabic language",
"type" : "AcademicArticle",
"publicationDate" : "2008-01-01T00:00:00"
}, {
"id" : "n543636SE",
"label" : "Cybersecurity Programs in Saudi Arabia: Issues and Recommendations",
"type" : "ConferencePaper",
"publicationDate" : "2018-04-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"tags" : "4 Quality Education"
}, {
"id" : "n766961SE",
"label" : "Predicting Protein Subcellular Localization with Reduced Feature Set",
"type" : "AcademicArticle"
}, {
"id" : "n543682SE",
"label" : "Model checking aspect-oriented design specification",
"type" : "ConferencePaper",
"publicationDate" : "2007-07-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n509503SE",
"label" : "Toward Autonomous and Collaborative Information-Credibility-Assessment Systems",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n583813SE",
"label" : "Dark Web Analytics : A Comparative Study of Feature Selection and Prediction Algorithms",
"type" : "GreyLiterature",
"publicationDate" : "2021-01-01T00:00:00"
}, {
"id" : "n543739SE",
"label" : "Activities and Trends in Testing Graphical User Interfaces Automatically",
"type" : "AcademicArticle",
"publicationDate" : "2010-12-15T00:00:00",
"publisher" : "Science Alert",
"venue" : { }
}, {
"id" : "n766887SE",
"label" : "Analyzing the popular words to evaluate spam in Arabic web pages",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n548797SE",
"label" : "Features Quality Impact on Cyber Physical Security Systems",
"type" : "ConferencePaper",
"publicationDate" : "2019-01-01T00:00:00"
}, {
"id" : "n543647SE",
"label" : "Mobile Forensics",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n543671SE",
"label" : "SPAR: A System to Detect Spam in Arabic Opinions",
"type" : "ConferencePaper",
"publicationDate" : "2013-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n649972SE",
"label" : "Design and code coupling assessment based on defects prediction. Part 1",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n543635SE",
"label" : "Interactive based Access Control Framework for Connected Vehicle Communication",
"type" : "ConferencePaper",
"publicationDate" : "2018-06-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n543660SE",
"label" : "Using XML files to document the user interfaces of applications",
"type" : "ConferencePaper",
"publicationDate" : "2009-03-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543612SE",
"label" : "Software Management",
"type" : "Chapter",
"publicationDate" : "2020-04-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n709065SE",
"label" : "Security Policies Automation in Software Defined Networking",
"type" : "GreyLiterature"
}, {
"id" : "n543683SE",
"label" : "Identifying DoS Attacks on Software Defined Networks : A Relation Context Approach",
"type" : "ConferencePaper",
"publicationDate" : "2016-04-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n543658SE",
"label" : "The Effects of Neural Networks Training Factors on Stock Price Prediction Errors",
"type" : "ConferencePaper",
"publicationDate" : "2012-01-01T00:00:00",
"publisher" : "ACTA Press"
}, {
"id" : "n649959SE",
"label" : "Opinion Mining: A Tool for Understanding Customers - Challenges and Approaches",
"type" : "Chapter",
"publicationDate" : "2017-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n543597SE",
"label" : "COVID-19 Candidate Treatments, a Data Analytics Approach",
"type" : "ConferencePaper",
"publicationDate" : "2020-10-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n543740SE",
"label" : "Query Retrieval Enhancement Based on Huffman Index Terms Encoding",
"type" : "ConferencePaper",
"publicationDate" : "2012-04-03T00:00:00",
"publisher" : "Association for Computing Machinery (ACM)"
}, {
"id" : "n543602SE",
"label" : "Behavioral-based malware clustering and classification",
"type" : "AcademicArticle",
"publicationDate" : "2019-06-01T00:00:00",
"publisher" : "Society for Makers, Artist, Researchers and Technologists",
"venue" : { }
}, {
"id" : "n697254SE",
"label" : "CASP Dataset and Protein Structures Prediction",
"type" : "AcademicArticle",
"publicationDate" : "2022-12-31T00:00:00"
}, {
"id" : "n596904SE",
"label" : "Models versus Datasets: Reducing Bias through Building a Comprehensive IDS Benchmark",
"type" : "AcademicArticle",
"publicationDate" : "2021-01-01T00:00:00",
"publisher" : "MDPI",
"venue" : { }
}, {
"id" : "n649971SE",
"label" : "Lean Development: A Tool for Knowledge Management in Software Development Process",
"type" : "Chapter",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n543590SE",
"label" : "An Ensemble Feature Selection Method for IoT IDS",
"type" : "ConferencePaper",
"publicationDate" : "2020-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543709SE",
"label" : "Studying the Impact of Using Multimedia Interactive Programs on Children's Ability to Learn Basic Math Skills",
"type" : "AcademicArticle",
"publicationDate" : "2013-09-01T00:00:00",
"publisher" : "Sage Publications",
"venue" : { },
"tags" : "4 Quality Education"
}, {
"id" : "n543728SE",
"label" : "Approaches for Testing and Evaluation of XACML Policies",
"type" : "AcademicArticle",
"publicationDate" : "2014-07-31T00:00:00",
"publisher" : "NADIA",
"venue" : { }
}, {
"id" : "n766783SE",
"label" : "An Interactive DEA Based Management System for Hospitals",
"type" : "ConferencePaper",
"publicationDate" : "2011-01-01T00:00:00"
}, {
"id" : "n766772SE",
"label" : "How Much Automation can be done in Testing?",
"type" : "Book",
"publicationDate" : "2014-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n766984SE",
"label" : "THE EFFECTS OF NEURAL NETWORKS TRAINING FACTORS ON STOCK PRICE PREDICTION ERRORS",
"type" : "AcademicArticle"
}, {
"id" : "n649960SE",
"label" : "Strategic Uses of Social Media for Improved Customer Retention",
"type" : "Book",
"publicationDate" : "2017-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n667492SE",
"label" : "Synthetic Text Detection: Systemic Literature Review",
"type" : "GreyLiterature",
"publicationDate" : "2022-10-01T00:00:00"
}, {
"id" : "n543963SE",
"label" : "An ontological analysis of misinformation in online social networks",
"type" : "AcademicArticle",
"publicationDate" : "2021-02-22T00:00:00"
}, {
"id" : "n766812SE",
"label" : "Evaluating the security of software defined network controllers",
"type" : "ConferencePaper",
"publicationDate" : "2015-01-01T00:00:00"
}, {
"id" : "n543751SE",
"label" : "Examining Web Search Trends Across Arab Countries",
"type" : "AcademicArticle",
"publicationDate" : "2012-09-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n543624SE",
"label" : "Using Popular Search Terms in Stock Price Prediction",
"type" : "ConferencePaper",
"publicationDate" : "2019-10-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766868SE",
"label" : "Workshop 3: The 1st international workshop on big data and social networking management and security (BDSN-2013) Part II",
"type" : "ConferencePaper"
}, {
"id" : "n543589SE",
"label" : "Classifying insincere questions on Question Answering (QA) websites: meta-textual features and word embedding",
"type" : "AcademicArticle",
"publicationDate" : "2021-01-02T00:00:00",
"publisher" : "Taylor & Francis",
"venue" : { }
}, {
"id" : "n705531SE",
"label" : "Zero-day attack detection: a systematic literature review",
"type" : "AcademicArticle",
"publicationDate" : "2023-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n543694SE",
"label" : "Evaluating network test scenarios for network simulators systems",
"type" : "AcademicArticle",
"publicationDate" : "2017-10-01T00:00:00",
"publisher" : "Sage Publications",
"venue" : { }
}, {
"id" : "n766973SE",
"label" : "STUDYING RELATIONS BETWEEN WEBSITES STRUCTURAL AND POPULARITY METRICS",
"type" : "AcademicArticle"
}, {
"id" : "n782563SE",
"label" : "Warm-Starting for Improving the Novelty of Abstractive Summarization",
"type" : "AcademicArticle",
"publicationDate" : "2023-01-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n548796SE",
"label" : "Moral minds: How nature designed our universal sense of right and wrong",
"type" : "AcademicArticle",
"publicationDate" : "2006-10-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n766939SE",
"label" : "Indexing of Arabic documents automatically based on lexical analysis",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n543681SE",
"label" : "Vulnerability Assessments: A Case Study of Jordanian Universities",
"type" : "ConferencePaper",
"publicationDate" : "2015-01-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766888SE",
"label" : "Annotaions, Collaborative Tagging, and Semantic Search in E-Learning",
"type" : "AcademicArticle"
}, {
"id" : "n543752SE",
"label" : "Separation of Concerns in Teaching Software Engineering",
"type" : "Chapter",
"publicationDate" : "2010-01-01T00:00:00",
"publisher" : "Springer Nature",
"tags" : "4 Quality Education"
}, {
"id" : "n752044SE",
"label" : "USING SNORT IN SQL INJECTION ATTACKS",
"type" : "AcademicArticle",
"publicationDate" : "2020-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n543669SE",
"label" : "Selecting a Standard Set of Attributes for Cost Estimation of Software Projects",
"type" : "ConferencePaper",
"publicationDate" : "2012-05-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n649973SE",
"label" : "Evaluating English to Arabic Machine Translation Using BLEU",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n543598SE",
"label" : "PCA, Random-Forest and Pearson Correlation for Dimensionality Reduction in IoT IDS",
"type" : "ConferencePaper",
"publicationDate" : "2020-01-12T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n545074SE",
"label" : "Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "SERSC",
"venue" : { }
}, {
"id" : "n604834SE",
"label" : "Adversarial Machine Learning, Research Trends and Applications",
"type" : "Chapter",
"publicationDate" : "2022-01-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n766774SE",
"label" : "Software Development Methodologies for Cloud Computing",
"type" : "Book",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n543626SE",
"label" : "Using Maximum Weighted Cliques in the Detection of Sub-communities' Behaviors in OSNs",
"type" : "Chapter",
"publicationDate" : "2020-10-01T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n697253SE",
"label" : "Resource Allocation Methods in VANETs: A systematic literature review",
"type" : "AcademicArticle",
"publicationDate" : "2022-12-01T00:00:00"
}, {
"id" : "n766905SE",
"label" : "Climate Change above the Cloud: Accelerating Climate Change Research with Cloud Computing Infrastructure",
"type" : "AcademicArticle"
}, {
"id" : "n543729SE",
"label" : "Test Cases Selection Based on Source Code Features Extraction",
"type" : "AcademicArticle",
"publicationDate" : "2014-01-31T00:00:00",
"publisher" : "Global Vision Press",
"venue" : { }
}, {
"id" : "n543708SE",
"label" : "Effective pair programming practice: toward improving student learning in software engineering class",
"type" : "AcademicArticle",
"publicationDate" : "2013-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { },
"tags" : "4 Quality Education"
}, {
"id" : "n766971SE",
"label" : "Software Metrics: Toward building proxy models. By",
"type" : "AcademicArticle",
"publicationDate" : "2006-01-01T00:00:00"
}, {
"id" : "n649962SE",
"label" : "Evaluating Web Accessibility Metrics for Jordanian Universities",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-01T00:00:00",
"venue" : { }
}, {
"id" : "n543692SE",
"label" : "Sentiment Analysis of Arabic Social Media Content: A Comparative Study",
"type" : "ConferencePaper",
"publicationDate" : "2013-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543637SE",
"label" : "Regions-of-interest discovering and predicting in smartphone environments",
"type" : "AcademicArticle",
"publicationDate" : "2018-07-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n701987SE",
"label" : "Mutation-Based Adversarial Attacks on Neural Text Detectors",
"type" : "GreyLiterature",
"publicationDate" : "2023-02-11T00:00:00"
}, {
"id" : "n680829SE",
"label" : "Fake or not? Automated detection of COVID-19 misinformation and disinformation in social networks and digital media.",
"type" : "AcademicArticle",
"publicationDate" : "2022-11-25T00:00:00",
"publisher" : "Springer Nature",
"venue" : { }
}, {
"id" : "n543719SE",
"label" : "Students performance between classical and online education: a comparative study",
"type" : "AcademicArticle",
"publicationDate" : "2016-01-01T00:00:00",
"publisher" : "Inderscience Publishers",
"venue" : { }
}, {
"id" : "n543962SE",
"label" : "Adversarial Machine Learning in Text Analysis and Generation",
"type" : "AcademicArticle",
"publicationDate" : "2021-01-13T00:00:00"
}, {
"id" : "n545075SE",
"label" : "Automatic Code Homework Grading Based on Concept Extraction",
"type" : "AcademicArticle",
"publicationDate" : "2011-01-01T00:00:00",
"publisher" : "SERSC",
"venue" : { }
}, {
"id" : "n766773SE",
"label" : "Process and Product Metrics",
"type" : "Book"
}, {
"id" : "n543625SE",
"label" : "Users' Internet Searches as Proxies for Disease Escalation Trends",
"type" : "ConferencePaper",
"publicationDate" : "2019-01-27T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"tags" : "3 Good Health and Well-Being"
}, {
"id" : "n543588SE",
"label" : "Machine Learning Methods for Anomaly Detection in Industrial Control Systems",
"type" : "ConferencePaper",
"publicationDate" : "2020-12-13T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n766927SE",
"label" : "Extended Topical Classification of Hadith Arabic Text",
"type" : "AcademicArticle"
}, {
"id" : "n592694SE",
"label" : "Misconfiguration in Firewalls and Network Access Controls: Literature Review",
"type" : "AcademicArticle",
"publicationDate" : "2021-01-01T00:00:00",
"publisher" : "MDPI",
"venue" : { }
}, {
"id" : "n766867SE",
"label" : "WEBSITES AND WEBPAGES CREDIBILITY AND TRUST EVALUATION",
"type" : "ConferencePaper",
"publicationDate" : "2013-01-01T00:00:00"
}, {
"id" : "n543648SE",
"label" : "Encryption and Information Protection/Integrity and Concealment Methods: Lesson Plans",
"type" : "Chapter",
"publicationDate" : "2018-01-01T00:00:00",
"publisher" : "Springer Nature"
}, {
"id" : "n677780SE",
"label" : "Data-driven analysis and predictive modeling on COVID-19.",
"type" : "AcademicArticle",
"publicationDate" : "2022-12-25T00:00:00",
"publisher" : "Wiley",
"venue" : { }
}, {
"id" : "n543693SE",
"label" : "USING GENETIC ALGORITHMS FOR TEST CASE GENERATION AND SELECTION OPTIMIZATION",
"type" : "ConferencePaper",
"publicationDate" : "2010-05-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)",
"venue" : { }
}, {
"id" : "n766972SE",
"label" : "String matching evaluation methods for DNA comparison",
"type" : "AcademicArticle",
"publicationDate" : "2012-01-01T00:00:00"
}, {
"id" : "n649961SE",
"label" : "User Interface Design in Isolation from Underlying Code and Environment",
"type" : "Chapter",
"publicationDate" : "2017-01-01T00:00:00",
"publisher" : "IGI Global"
}, {
"id" : "n566665SE",
"label" : "Indexing of Arabic documents automatically based on lexical analysis",
"type" : "GreyLiterature",
"publicationDate" : "2012-05-01T00:00:00"
}, {
"id" : "n543670SE",
"label" : "Evaluating English To Arabic Machine Translators",
"type" : "ConferencePaper",
"publicationDate" : "2013-12-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543659SE",
"label" : "Arabic Sentiment Polarity Identification Using a Hybrid Approach",
"type" : "ConferencePaper",
"publicationDate" : "2015-04-01T00:00:00",
"publisher" : "Institute of Electrical and Electronics Engineers (IEEE)"
}, {
"id" : "n543741SE",
"label" : "Query classification and study of university students' search trends",
"type" : "AcademicArticle",
"publicationDate" : "2012-04-20T00:00:00",
"publisher" : "Emerald",
"venue" : { }
}, {
"id" : "n543603SE",
"label" : "The Analysis of Sub-Communities Behavior in Social Networks",
"type" : "AcademicArticle",
"publicationDate" : "2019-06-01T00:00:00",
"publisher" : "Society for Makers, Artist, Researchers and Technologists",
"venue" : { }
}, {
"id" : "n543730SE",
"label" : "Impact of Programming Features on Code Readability",
"type" : "AcademicArticle",
"publicationDate" : "2013-11-30T00:00:00",
"publisher" : "Global Vision Press",
"venue" : { }
}, {
"id" : "n680923SE",
"label" : "Improving Novelty of Abstractive Summarization Via Warm-Starting",
"type" : "AcademicArticle"
}, {
"id" : "n766994SE",
"label" : "USING FORMAL METHOD FOR GUI MODEL VERIFICATION",
"type" : "AcademicArticle"
}, {
"id" : "n596905SE",
"label" : "Deep reinforcement and transfer learning for abstractive text summarization: A review",
"type" : "AcademicArticle",
"publicationDate" : "2022-01-01T00:00:00",
"publisher" : "Elsevier",
"venue" : { }
}, {
"id" : "n543614SE",
"label" : "System Administration",
"type" : "Chapter",
"publicationDate" : "2020-04-01T00:00:00",
"publisher" : "Springer Nature"
} ],
"editorOf" : [ {
"id" : "n545077SE",
"label" : "Advanced Automated Software Testing: Frameworks for Refined Practice",
"type" : "Book",
"publisher" : "IGI Global",
"date" : "2012-01-01T00:00:00"
} ],
"email" : "ialsmadi@tamusa.edu",
"firstName" : "Izzat",
"lastName" : "Alsmadi",
"organizations" : [ "Texas A&M University – San Antonio - (San Antonio, Txas, United States)", "Texas A&M University – San Antonio - (San Antonio, Texas, United States)", "TEES Regional Divisions" ],
"schools" : [ "Texas A&M Engineering Experiment Station (TEES)" ],
"netid" : "ialsmadi",
"uid" : "9a66941ac14f5b1d25d6ab9d66022fa6",
"featuredProfileDisplay" : "true",
"publicationToInterfolio" : "true",
"image" : "https://vivo.library.tamu.edu/vivo/file/n50589/226004448.jpg",
"thumbnail" : "https://vivo.library.tamu.edu/vivo/file/n85833/thumbnail_226004448.jpg",
"modTime" : "Sun Dec 24 16:03:18 UTC 2023",
"type" : [ "FacultyMember" ],
"_links" : {
"self" : {
"href" : "https://api.library.tamu.edu/scholars-discovery/individual/neb08aae9"
},
"individual" : {
"href" : "https://api.library.tamu.edu/scholars-discovery/individual/neb08aae9"
}
}
}