Intelligent techniques for detecting network attacks: review and research directions

M Aljabri, SS Aljameel, RMA Mohammad, SH Almotiri… - Sensors, 2021 - mdpi.com
The significant growth in the use of the Internet and the rapid development of network
technologies are associated with an increased risk of network attacks. Network attacks refer …

Driving sustainable supply chains: Blockchain-enabled eco-efficiency for resilient customs ports

A Ababneh, M Almarashdah, I Jebril… - Uncertain Supply …, 2023 - m.growingscience.com
This paper investigates the driving factors behind sustainable supply chains in Jordan,
focusing on the implementation of blockchain technology, customs ports practices, and …

Taxation and customs strategies in Jordanian supply chain management: Shaping sustainable design and driving environmental responsibility

M Zobi, M Al-Zaqeba, B Jarah - Uncertain Supply Chain …, 2023 - m.growingscience.com
This study explores the role of taxation and customs strategies in promoting sustainable
design and environmental responsibility in supply chain management. The research …

[HTML][HTML] Click fraud detection for online advertising using machine learning

M Aljabri, RMA Mohammad - Egyptian Informatics Journal, 2023 - Elsevier
Advertising corporations have moved their focus to online and in-App advertisements in
response to the expansion of digital technologies and social media. Online advertising …

Intelligent matching: Supply chain management and financial accounting technology

M Al-Zaqeba, N Ineizeh, B Jarah… - Uncertain Supply …, 2022 - m.growingscience.com
The main objective of this paper is to investigate the effect of accounting Fintech, Financial
Technology Matching (FTM) and Supply Chain Management (SCM) in Jordanian …

The effect of reverse factoring financial changes on supply chain

M Al-Zaqeba, B Jarah, S Al-Bazaiah… - Uncertain Supply …, 2022 - m.growingscience.com
The consequences of reverse factoring in a supply chain are examined in this article.
Reverse factoring occurs when a buying firm offers a reduced short-term borrowing rate to a …

Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor

SM Hezavehi, R Rahmani - Journal of Parallel and Distributed Computing, 2023 - Elsevier
Cloud computing environments are indispensable components of the majority of information
technology organizations and users' lives. Despite multiple benefits of cloud computing …

Improved multi-verse optimizer feature selection technique with application to phishing, spam, and denial of service attacks

M Alzaqebah, S Jawarneh… - International …, 2021 - search.proquest.com
Intelligent classification systems proved their merits in different fields including cybersecurity.
However, most cybercrime issues are characterized of being dynamic and not static …

A survey on various security protocols of edge computing

T Bhattacharya, AV Peddi, S Ponaganti… - The Journal of …, 2025 - Springer
Edge computing has emerged as a transformative data processing method by decentralizing
computations and bringing them toward the data source, significantly reducing latency and …

[PDF][PDF] Susceptible exposed infectious recovered-machine learning for COVID-19 prediction in Saudi Arabia

MK Alsmadi, GM Jaradat, SA Abahussain… - International Journal of …, 2023 - academia.edu
Susceptible exposed infectious recovered (SEIR) is among the epidemiological models
used in forecasting the spread of disease in large populations. SEIR is a fitting model for …