Follow
Muawya Al-Dalaien
Muawya Al-Dalaien
Other namesMuawya Naser, Mu'awya Al-Dalaien, Mu'awya Naser
Princess Sumaya University of Technology
Verified email at PSUT.edu.jo - Homepage
Title
Cited by
Cited by
Year
ELBA-IoT: An ensemble learning model for botnet attack detection in IoT networks
Q Abu Al-Haija, M Al-Dala’ien
Journal of Sensor and Actuator Networks 11 (1), 18, 2022
732022
ECG-RNG: A random number generator based on ECG signals and suitable for securing wireless sensor networks
C Camara, P Peris-Lopez, H Martín, M Aldalaien
Sensors 18 (9), 2747, 2018
302018
Design and analysis of a true random number generator based on GSR signals for body sensor networks
C Camara, H Martín, P Peris-Lopez, M Aldalaien
Sensors 19 (9), 2033, 2019
232019
The usage of E-learning instructional technologies in higher education institutions in the United Arab Emirates (UAE).
L Daouk, M Aldalaien
Turkish Online Journal of Educational Technology-TOJET 18 (3), 97-109, 2019
222019
Gender effect on cloud computing services adoption by university students: case study of Saudi Arabia
AA Almarazroi, E Kabbar, M Naser, H Shen
International Journal of Innovation: IJI Journal 7 (1), 155-177, 2019
222019
Security considerations in embedding RFID in'hajj'system
M Naser, M Rafie, R Budiarto, W Alsalihy
European Journal of Scientific Research 42 (1), 133-138, 2010
212010
Android spyware detection using machine learning: a novel dataset
MK Qabalin, M Naser, M Alkasassbeh
sensors 22 (15), 5765, 2022
192022
Powering the internet of things with 5G networks
V Mohanan, R Budiarto, I Aldmour
IGI Global, 2017
192017
Ping flood attack pattern recognition using a K-means algorithm in an Internet of Things (IoT) network
D Stiawan, ME Suryani, MY Idris, MN Aldalaien, N Alsharif, R Budiarto
IEEE Access 9, 116475-116484, 2021
152021
The influence of human resources management processes (HRMPs) to achieving sustainable competitive advantage
MAAL Jarrah, L Karadsheh, M Naser, S Alhawari
Human performance technology: Concepts, methodologies, tools, and …, 2019
112019
Cryptography: Protocols, design, and applications
K Lek, N Rajapakse
Nova Science Publishers, 2012
72012
A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model
M Al Majaly, M Rafie, R Budiarto
2009 International Conference on Signal Acquisition and Processing, 103-107, 2009
72009
Internet of Things (IoT) security and privacy
MN Al Dalaien, A Bensefia, SA Hoshang, ARA Bathaqili
Powering the Internet of Things With 5G Networks, 247-267, 2018
42018
A Secure Framework for Blockchain Transactions Protection.
WN Al-Sharu, MK Qabalin, M Naser, OA Saraerh
Comput. Syst. Sci. Eng. 45 (2), 1095-1111, 2023
32023
Security and Privacy in Communication Networks
X Lin, A Ghorbani, K Ren, S Zhu, A Zhang
Springer International Publishing, 2018
32018
A note on the security of PAP
M Naser, P Peris-Lopez, R Budiarto, BR Álvarez
Computer communications 34 (18), 2248-2249, 2011
32011
A grounded theory of selecting lean and agile practices for software development
MK Alqudah, R Razali, MK Alqudah, MN Al Dalaien, HM Alabool, ...
Journal of Software: Evolution and Process, e2539, 2023
22023
Spyware Identification for Android Systems Using Fine Trees
M Naser, Q Abu Al-Haija
Information 14 (2), 102, 2023
22023
SLRV: An RFID Mutual Authentication Protocol Conforming to EPC Generation-2 Standard
I Aldmour, R Budiarto, P Peris-Lopez
TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (3 …, 2015
22015
E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
NA Abuadhmah, M Naser, A Samsudin
Journal of Computer Science 6 (7), 723, 2010
22010
The system can't perform the operation now. Try again later.
Articles 1–20