


default search action
Monther Aldwairi
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Ashwaq Khalil, Moath Jarrah
, Monther Aldwairi:
Hybrid Neural Network Models for Detecting Fake News Articles. Hum. Centric Intell. Syst. 4(1): 136-146 (2024) - 2023
- [j30]Monther Aldwairi
, Moath H. A. Jarrah, Naseem Mahasneh, Baghdad Al-khateeb:
Graph-based data management system for efficient information storage, retrieval and processing. Inf. Process. Manag. 60(2): 103165 (2023) - [c20]Monther Aldwairi, Mohamad Badra, Rouba Borghol:
DocCert: Nostrification, Document Verification and Authenticity Blockchain Solution. BCCA 2023: 652-657 - [i9]Monther Aldwairi, Mohamad Badra, Rouba Borghol:
DocCert: Nostrification, Document Verification and Authenticity Blockchain Solution. CoRR abs/2310.09136 (2023) - 2022
- [j29]Monther Aldwairi
, Duaa Alansari:
n-Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j28]Rabiah Al-qudah
, Yaser M. Khamayseh
, Monther Aldwairi
, Sarfraz Khan:
The Smart in Smart Cities: A Framework for Image Classification Using Deep Learning. Sensors 22(12): 4390 (2022) - [e1]Hakim Hacid
, Monther Aldwairi
, Mohamed Reda Bouadjenek
, Marinella Petrocchi
, Noura Faci
, Fatma Outay
, Amin Beheshti
, Lauritz Thamsen
, Hai Dong
:
Service-Oriented Computing - ICSOC 2021 Workshops - AIOps, STRAPS, AI-PA and Satellite Events, Dubai, United Arab Emirates, November 22-25, 2021, Proceedings. Lecture Notes in Computer Science 13236, Springer 2022, ISBN 978-3-031-14134-8 [contents] - [i8]Fatema Al Mukhaini, Shaikhah Al Abdoulie, Aisha Al Kharuosi, Amal El Ahmad, Monther Aldwairi:
FALSE: Fake News Automatic and Lightweight Solution. CoRR abs/2208.07686 (2022) - [i7]Monther Aldwairi:
Evaluating virtual laboratory platforms for supporting on-line information security courses. CoRR abs/2208.12612 (2022) - [i6]Alshaima Almarzooqi, Jawahir Mahmoud, Bayena Alzaabi, Arsiema Ghebremichael, Monther Aldwairi:
Detecting Malicious Domains Using Statistical Internationalized Domain Name Features in Top Level Domains. CoRR abs/2211.08020 (2022) - [i5]Shamma Rashed, Tasnim Said, Amal Abdulrahman, Arsiema Yohannes, Monther Aldwairi:
Evaluating Web Search Engines Results for Personalization and User Tracking. CoRR abs/2211.11518 (2022) - 2021
- [j27]Khaled H. Abuhmaidan
, Monther Aldwairi
, Benedek Nagy
:
Vector Arithmetic in the Triangular Grid. Entropy 23(3): 373 (2021) - [j26]Radia Touahri, Nabiha Azizi
, Nacer Eddine Hammami, Monther Aldwairi, Nacer Eddine Benzebouchi, Ouided Moumene:
Multi source retinal fundus image classification using convolution neural networks fusion and Gabor-based texture representation. Int. J. Comput. Vis. Robotics 11(4): 401-428 (2021) - [c19]Amel Ziani
, Nabiha Azizi
, Didier Schwab, Djamel Zenakhra, Monther Aldwairi, Nassira Chekkai
, Nawel Zemmal, Marwa Hadj Salah:
Deceptive Opinions Detection Using New Proposed Arabic Semantic Features. ACLING 2021: 29-36 - [c18]Ashwaq Khalil, Moath H. A. Jarrah, Monther Aldwairi, Yaser Jararweh:
Detecting Arabic Fake News Using Machine Learning. IDSTA 2021: 171-177 - 2020
- [j25]Monther Aldwairi
, Abdulmughni Y. Hamzah, Moath H. A. Jarrah
:
KPN-based parallelization of Wu-Manber algorithm on multi-core machines. Clust. Comput. 23(2): 725-734 (2020) - [j24]Nawel Zemmal
, Nabiha Azizi
, Mokhtar Sellami, Soraya Cheriguene
, Amel Ziani
, Monther Aldwairi, Nadjette Dendani:
Particle Swarm Optimization Based Swarm Intelligence for Active Learning Improvement: Application on Medical Data Classification. Cogn. Comput. 12(5): 991-1010 (2020) - [j23]Lo'ai Tawalbeh
, Mohammad Tawalbeh, Monther Aldwairi:
Improving the impact of power efficiency in mobile cloud applications using cloudlet model. Concurr. Comput. Pract. Exp. 32(21) (2020) - [j22]Yaser M. Khamayseh
, Wail Mardini
, J. William Atwood
, Monther Aldwairi:
Dynamic framework to mining Internet of Things for multimedia services. Expert Syst. J. Knowl. Eng. 37(5) (2020) - [j21]Yaser M. Khamayseh, Wail Mardini, Monther Aldwairi, Hussein T. Mouftah:
On the Optimality of Route Selection in Grid Wireless Sensor Networks: Theory and Applications. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(2): 87-105 (2020) - [j20]Monther Aldwairi, Suaad Mohammed, Megana Lakshmi Padmanabhan:
Efficient and secure flash-based gaming CAPTCHA. J. Parallel Distributed Comput. 142: 27-35 (2020) - [c17]Suhail Paliath, Mohammad Abu Qbeitah, Monther Aldwairi:
PhishOut: Effective Phishing Detection Using Selected Features. ICT 2020: 1-5 - [i4]Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi:
Detection and Analysis of Drive-by Downloads and Malicious Websites. CoRR abs/2002.08007 (2020) - [i3]Monther Aldwairi, Yahya Flaifel, Khaldoon Mhaidat:
Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection. CoRR abs/2003.00405 (2020) - [i2]Monther Aldwairi, Suaad Mohammed, Megana Lakshmi Padmanabhan:
Efficient and Secure Flash-based Gaming CAPTCH. CoRR abs/2004.04497 (2020) - [i1]Suhail Paliath, Mohammad Abu Qbeitah, Monther Aldwairi:
PhishOut: Effective Phishing Detection Using Selected Features. CoRR abs/2004.09789 (2020)
2010 – 2019
- 2019
- [j19]Monther Aldwairi, Abdulmughni Y. Hamzah, Moath H. A. Jarrah
:
MultiPLZW: A novel multiple pattern matching search in LZW-compressed data. Comput. Commun. 145: 126-136 (2019) - [j18]Beomsu Kim
, Monther Aldwairi
, Ki-Il Kim
:
An Efficient Real-Time Data Dissemination Multicast Protocol for Big Data in Wireless Sensor Networks. J. Grid Comput. 17(2): 341-355 (2019) - [j17]Mohammed Eshtay, Azzam Sleit, Monther Aldwairi:
Implementing bi-Temporal Properties into various NoSQL Database Categories. Int. J. Comput. 18: 45-52 (2019) - [j16]Amel Ziani
, Nabiha Azizi
, Djamel Zenakhra, Soraya Cheriguene
, Monther Aldwairi:
Combining RSS-SVM with genetic algorithm for Arabic opinions analysis. Int. J. Intell. Syst. Technol. Appl. 18(1/2): 152-178 (2019) - [j15]Samira Lagrini, Nabiha Azizi
, Mohammed Redjimi, Monther Aldwairi:
Automatic identification of rhetorical relations among intra-sentence discourse segments in Arabic. Int. J. Intell. Syst. Technol. Appl. 18(3): 281-302 (2019) - [j14]Samira Lagrini, Nabiha Azizi
, Mohammed Redjimi, Monther Aldwairi:
Toward an automatic summarisation of Arabic text depending on rhetorical relations. Int. J. Reason. based Intell. Syst. 11(3): 203-214 (2019) - [j13]Rabeea Basir, Saad B. Qaisar, Mudassar Ali
, Monther Aldwairi
, Muhammad Ikram Ashraf
, Aamir Mahmood
, Mikael Gidlund
:
Fog Computing Enabling Industrial Internet of Things: State-of-the-Art and Research Challenges. Sensors 19(21): 4807 (2019) - [c16]Nacer Eddine Benzebouchi
, Nabiha Azizi, Nacer Eddine Hammami, Didier Schwab, Mohammed Chiheb Eddine Khelaifia, Monther Aldwairi:
Authors' Writing Styles Based Authorship Identification System Using the Text Representation Vector. SSD 2019: 371-376 - [c15]Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi:
Detection and Analysis of Drive-by Downloads and Malicious Websites. SSCC 2019: 72-86 - 2018
- [j12]Shadi A. Aljawarneh
, Monther Aldwairi
, Muneer O. Bani Yassein
:
Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25: 152-160 (2018) - [j11]Qussai Yaseen
, Monther Aldwairi
, Yaser Jararweh, Mahmoud Al-Ayyoub, Brij B. Gupta
:
Collusion attacks mitigation in internet of things: a fog based model. Multim. Tools Appl. 77(14): 18249-18268 (2018) - [j10]Yongbin Yim
, Kyong Hoon Kim, Monther Aldwairi
, Ki-Il Kim
:
Energy-Efficient Region Shift Scheme to Support Mobile Sink Group in Wireless Sensor Networks. Sensors 18(1): 90 (2018) - [c14]Hana' Al-Theiabat, Mahmoud Al-Ayyoub, Mohammad A. Alsmirat
, Monther Aldwairi:
A Deep Learning Approach for Amazon EC2 Spot Price Prediction. AICCSA 2018: 1-5 - [c13]Yousef Shatnawi, Mohammad A. Alsmirat
, Mahmoud Al-Ayyoub, Monther Aldwairi:
The Impact of the Number of Eigen-Faces on the Face Recognition Accuracy using Different Distance Measures. AICCSA 2018: 1-5 - [c12]Monther Aldwairi, Ali Alwahedi:
Detecting Fake News in Social Media Networks. EUSPN/ICTH 2018: 215-222 - [c11]Qussai M. Yaseen
, Monther Aldwairi
:
An Enhanced AODV Protocol for Avoiding Black Holes in MANET. FNC/MobiSPC 2018: 371-376 - [c10]Khulood Al Messabi, Monther Aldwairi, Ayesha Al Yousif, Anoud Thoban, Fatna Belqasmi:
Malware detection using DNS records and domain name features. ICFNDS 2018: 29:1-29:7 - [c9]Monther Aldwairi, Mohammad A. Alshboul
, Asmaa Seyam:
Characterizing Realistic Signature-based Intrusion Detection Benchmarks. ICIT 2018: 97-103 - [c8]Nacer Eddine Benzebouchi
, Nabiha Azizi, Monther Aldwairi
, Nadir Farah
:
Multi-classifier system for authorship verification task using word embeddings. ICNLSP 2018: 1-6 - [c7]Hesham H. Alsaadi
, Monther Aldwairi
, May Al Taei, Mansoor AlBuainain, Maktoom AlKubaisi:
Penetration and Security of OpenSSH Remote Secure Shell Service on Raspberry Pi 2. NTMS 2018: 1-5 - 2017
- [j9]Monther Aldwairi, Ansam M. Abu-Dalo, Moath H. A. Jarrah
:
Pattern matching of signature-based IDS using Myers algorithm under MapReduce framework. EURASIP J. Inf. Secur. 2017: 9 (2017) - [j8]Monther Aldwairi
, Musaab Hasan
, Zayed Balbahaith:
Detection of Drive-by Download Attacks Using Machine Learning Approach. Int. J. Inf. Secur. Priv. 11(4): 16-28 (2017) - [j7]Mahmoud Al-Ayyoub, Yaser Jararweh, Abdullateef Rabab'ah, Monther Aldwairi
:
Feature extraction and selection for Arabic tweets authorship authentication. J. Ambient Intell. Humaniz. Comput. 8(3): 383-393 (2017) - [c6]Khalifa AlRoum, Abdulhakim Alolama, Rami Kamel, May El Barachi
, Monther Aldwairi
:
Detecting Malware Domains: A Cyber-Threat Alarm System. AFRICATEK 2017: 181-191 - [c5]Monther Aldwairi
, Hesham H. Alsaadi
:
FLUKES: Autonomous Log Forensics, Intelligence and Visualization Tool. ICFNDS 2017: 33:1-33:6 - 2016
- [j6]SeokYoon Kang, Monther Aldwairi
, Ki-Il Kim
:
A survey on network simulators in three-dimensional wireless ad hoc and sensor networks. Int. J. Distributed Sens. Networks 12(9) (2016) - [j5]Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
:
Bloom Filters Optimized Wu-Manber for Intrusion Detection. J. Digit. Forensics Secur. Law 11(4): 5-22 (2016) - [c4]Abdullateef Rabab'ah, Mahmoud Al-Ayyoub, Yaser Jararweh, Monther Aldwairi
:
Authorship attribution of Arabic tweets. AICCSA 2016: 1-6 - 2015
- [j4]Monther Aldwairi
, Yaser M. Khamayseh
, Mohammad Al-Masri:
Application of artificial bee colony for intrusion detection systems. Secur. Commun. Networks 8(16): 2730-2740 (2015) - [c3]Basheer Al-Duwairi, Ahmad T. Al-Hammouri
, Monther Aldwairi
, Vern Paxson:
GFlux: A google-based system for Fast Flux detection. CNS 2015: 755-756 - 2014
- [j3]Monther Aldwairi
, Bashar Al-Hajasad, Yaser M. Khamayseh
:
A classifier system for predicting RNA secondary structure. Int. J. Bioinform. Res. Appl. 10(3): 307-320 (2014) - 2012
- [j2]Mazen Kharbutli, Monther Aldwairi, Abdullah Mughrabi:
Function and Data Parallelization of Wu-Manber Pattern Matching for Intrusion Detection Systems. Netw. Protoc. Algorithms 4(3): 46-61 (2012) - 2010
- [c2]Monther Aldwairi, Noor Al-Tarazi:
IP Lookup using Two-level Indexing and B-Trees. International Conference on Internet Computing 2010: 306-310
2000 – 2009
- 2009
- [c1]Monther Aldwairi
, Rehab M. Duwairi, Wafa'a Alqarqaz:
A Classification System for Predicting RNA Hairpin Loops. IJCBS 2009: 109-115 - 2005
- [j1]Monther Aldwairi, Thomas M. Conte
, Paul D. Franzon
:
Configurable string matching hardware for speeding up intrusion detection. SIGARCH Comput. Archit. News 33(1): 99-107 (2005)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint