Ja'afer Al-Saraireh
Ja'afer Al-Saraireh
Autres nomsJaafer Al Saraireh
Adresse e-mail validée de
Citée par
Citée par
A new authentication protocol for UMTS mobile networks
J Al-Saraireh, S Yousef
EURASIP Journal on wireless communications and networking 2006, 1-10, 2006
Extension of authentication and key agreement protocol (AKA) for universal mobile telecommunication system (UMTS)
ALS Ja'afer, Y Sufian
International Journal of Theoretical and Applied Computer Sciences 1 (1 …, 2006
Asymmetric Identification Model for Human-Robot Contacts via Supervised Learning
AAH Qasem, J Al-Saraireh
Symmetry 14 (3), 1-19, 2022
Analytical model for authentication transmission overhead between entities in mobile networks
S Yousef
Computer communications 30 (8), 1713-1720, 2007
An Efficient Approach for Query Processing Over Encrypted Database
AEAQPOE Database
Journal of Computer Science 13 (10), 548-557, 2017
An enhancement of authentication protocol and key agreement (AKA) for 3G mobile networks
ALF Mustafa, ALS Ja’afer
International Journal of Security (IJS) 5 (1), 35-51, 2011
Enhancement mobile security and user confidentiality for umts
J Al-Saraireh, S Yousef, M Al Nabhan
Second European Conference on Mobile Governement, 2006
A novel approach for detecting advanced persistent threats
J Al-Saraireh
Egyptian Informatics Journal 23 (4), 45-55, 2022
Keystroke and swipe biometrics fusion to enhance smartphones authentication
J Al-Saraireh, MR AlJa'afreh
Computers & Security 125, 103022, 2023
Image encryption scheme based on filter bank and lifting
S Saraireh, Y Al-Sbou, O Alsmadi
Int'l J. of Communications, Network and System Sciences 2014, 2014
Efficient detection of hacker community based on twitter data using complex networks and machine learning algorithm
A Al-Tarawneh, J Al-Saraireh
Journal of Intelligent & Fuzzy Systems 40 (6), 12321-12337, 2021
Analysis and enhancement of authentication algorithms in mobile networks
J AL-Saraireh, S Justus Yousef, MAL Nabhan
Journal of applied Sciences 6 (4), 872-877, 2006
Integration of Hash -Crypto- Steganography for Efficient Security Technique
MS Saleh Saraireh, Jaafer Al-Saraireh
International Journal of Circuits, Systems and Signal Processing 12, 274-278, 2018
Passive DNS Analysis Using Bro-IDS
D Hadi, A., AL-Saraireh, J., Dakhgan, A. and Rababh
The International Conference on New Trends in Computing Sciences (ICTCS …, 2017
Analyses authentication and keyagreement (AKA) protocol for UMTS mobile networks
S Yousef
2006 Proceedings of the First Mobile Computing and Wireless Communication …, 2006
TCP protocol and red gateway supporting the QoS of multimedia transmission over wireless networks
M Al-Nabhan, S Yousef, J Al-Saraireh
Inform. Technol. J 5, 689-697, 2006
Asymmetric Identification Model for Human-Robot Contacts via Supervised Learning. Symmetry 2022, 14, 591
Q Abu Al-Haija, J Al-Saraireh
Threat led advanced persistent threat penetration test
A Masarweh, J Al-Saraireh
International Journal of Security and Networks 17 (3), 203-219, 2022
A Novel Adaptive Contention Window Scheme for IEEE 802.11 MAC Protocol
M Saraireh, ALS Ja'afer, S Saraireh
Trends in Applied Sciences Research 9 (6), 275, 2014
Authentication transmission overhead between entities in mobile networks
ALS Ja’afer, S Yousef
IJCSNS 6 (3B), 150, 2006
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20