Vulnerability scanning of IoT devices in Jordan using Shodan H Al-Alami, A Hadi, H Al-Bahadili 2017 2nd International Conference on the Applications of Information …, 2017 | 61 | 2017 |
Network security using hybrid port knocking H Al-Bahadili, AH Hadi Ijcsns 10 (8), 8, 2010 | 44 | 2010 |
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning JA Alaeddin Almubayed, Ali Hadi International Journal of Computer Network and Information Security (IJCNIS …, 2015 | 36* | 2015 |
Threat hunting using grr rapid response H Rasheed, A Hadi, M Khader 2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017 | 29 | 2017 |
Phishing websites prediction using classification techniques DR Ibrahim, AH Hadi 2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017 | 20 | 2017 |
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files AH Esraa Alshammari Cybersecurity and Cyberforensics Conference (CCC), 2016, 55-59, 2016 | 17* | 2016 |
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files AH Esra’a Alshammary Cybersecurity & Cyberforensics Conference 2016, 86-91, 2016 | 15* | 2016 |
PDF Forensic Analysis System using YARA SJ Khitan, A Hadi, J Atoum International Journal of Computer Science and Network Security 17 (5), 77-85, 2017 | 11 | 2017 |
Windows forensic investigations using powerforensics tool A Barakat, A Hadi 2016 Cybersecurity and Cyberforensics Conference (CCC), 41-47, 2016 | 11 | 2016 |
HDFS file operation fingerprints for forensic investigations M Khader, A Hadi, G Al-Naymat Digital Investigation 24, 50-61, 2018 | 9 | 2018 |
Covert Communication Using Port Knocking AH Mariam Khader, Ali Hadi Cybersecurity & Cyberforensics Conference 2016, 28-34, 2016 | 9* | 2016 |
Data Exfiltration Techniques and Data Loss Prevention System H Kilani, M Nasereddin, A Hadi, S Tedmori Conference: 2019 International Arab Conference on Information Technology (ACIT), 2019 | 8 | 2019 |
A preliminary analysis of drive-by email attacks in educational institutes J Alqatawna, A Hadi, M Al-Zwairi, M Khader 2016 cybersecurity and cyberforensics conference (ccc), 65-69, 2016 | 7 | 2016 |
Analyzing and Detecting Malicious Content: DOCX Files AH Ayyad Naser, Mohammad Btoush International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 6* | 2016 |
Passive DNS Analysis Using Bro-IDS A Dakhgan, A Hadi, J Al Saraireh, D Alrababah 2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017 | 4 | 2017 |
A new technique for file carving on hadoop ecosystem E Alshammari, G Al-Naymat, A Hadi 2017 International Conference on New Trends in Computing Sciences (ICTCS), 72-77, 2017 | 4 | 2017 |
Visualizing Clustered Botnet Traffic using t-SNE on Aggregated NetFlows M Alsadi, AH Hadi International Conference on new Trends in Computing Sciences, 6, 2017 | 3 | 2017 |
Apremilast for lichen planopilaris and frontal fibrosing alopecia: a case series A Hadi, M Lebwohl SKIN The Journal of Cutaneous Medicine 1 (1), 32-36, 2017 | 3 | 2017 |
Using IPython for Teaching Web Scraping A Hadi, M Al-Zewairi Social Media Shaping e-Publishing and Academia, 47-54, 2017 | 3 | 2017 |
MLDED: multi-layer data exfiltration detection system MAA Allawi, A Hadi, A Awajan 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015 | 3 | 2015 |