Intelligent techniques for detecting network attacks: review and research directions
The significant growth in the use of the Internet and the rapid development of network
technologies are associated with an increased risk of network attacks. Network attacks refer …
technologies are associated with an increased risk of network attacks. Network attacks refer …
Driving sustainable supply chains: Blockchain-enabled eco-efficiency for resilient customs ports
This paper investigates the driving factors behind sustainable supply chains in Jordan,
focusing on the implementation of blockchain technology, customs ports practices, and …
focusing on the implementation of blockchain technology, customs ports practices, and …
Taxation and customs strategies in Jordanian supply chain management: Shaping sustainable design and driving environmental responsibility
This study explores the role of taxation and customs strategies in promoting sustainable
design and environmental responsibility in supply chain management. The research …
design and environmental responsibility in supply chain management. The research …
[HTML][HTML] Click fraud detection for online advertising using machine learning
M Aljabri, RMA Mohammad - Egyptian Informatics Journal, 2023 - Elsevier
Advertising corporations have moved their focus to online and in-App advertisements in
response to the expansion of digital technologies and social media. Online advertising …
response to the expansion of digital technologies and social media. Online advertising …
Intelligent matching: Supply chain management and financial accounting technology
The main objective of this paper is to investigate the effect of accounting Fintech, Financial
Technology Matching (FTM) and Supply Chain Management (SCM) in Jordanian …
Technology Matching (FTM) and Supply Chain Management (SCM) in Jordanian …
The effect of reverse factoring financial changes on supply chain
The consequences of reverse factoring in a supply chain are examined in this article.
Reverse factoring occurs when a buying firm offers a reduced short-term borrowing rate to a …
Reverse factoring occurs when a buying firm offers a reduced short-term borrowing rate to a …
Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor
SM Hezavehi, R Rahmani - Journal of Parallel and Distributed Computing, 2023 - Elsevier
Cloud computing environments are indispensable components of the majority of information
technology organizations and users' lives. Despite multiple benefits of cloud computing …
technology organizations and users' lives. Despite multiple benefits of cloud computing …
Improved multi-verse optimizer feature selection technique with application to phishing, spam, and denial of service attacks
M Alzaqebah, S Jawarneh… - International …, 2021 - search.proquest.com
Intelligent classification systems proved their merits in different fields including cybersecurity.
However, most cybercrime issues are characterized of being dynamic and not static …
However, most cybercrime issues are characterized of being dynamic and not static …
A survey on various security protocols of edge computing
T Bhattacharya, AV Peddi, S Ponaganti… - The Journal of …, 2025 - Springer
Edge computing has emerged as a transformative data processing method by decentralizing
computations and bringing them toward the data source, significantly reducing latency and …
computations and bringing them toward the data source, significantly reducing latency and …
[PDF][PDF] Susceptible exposed infectious recovered-machine learning for COVID-19 prediction in Saudi Arabia
MK Alsmadi, GM Jaradat, SA Abahussain… - International Journal of …, 2023 - academia.edu
Susceptible exposed infectious recovered (SEIR) is among the epidemiological models
used in forecasting the spread of disease in large populations. SEIR is a fitting model for …
used in forecasting the spread of disease in large populations. SEIR is a fitting model for …