Follow
Ali Hadi
Ali Hadi
Champlain College, VT, USA
Verified email at champlain.edu - Homepage
Title
Cited by
Cited by
Year
Vulnerability scanning of IoT devices in Jordan using Shodan
H Al-Alami, A Hadi, H Al-Bahadili
2017 2nd International Conference on the Applications of Information …, 2017
692017
Network security using hybrid port knocking
H Al-Bahadili, AH Hadi
Ijcsns 10 (8), 8, 2010
452010
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
JA Alaeddin Almubayed, Ali Hadi
International Journal of Computer Network and Information Security (IJCNIS …, 2015
38*2015
Threat hunting using grr rapid response
H Rasheed, A Hadi, M Khader
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
312017
Phishing websites prediction using classification techniques
DR Ibrahim, AH Hadi
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
232017
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files
AH Esraa Alshammari
Cybersecurity and Cyberforensics Conference (CCC), 2016, 55-59, 2016
18*2016
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files
AH Esra’a Alshammary
Cybersecurity & Cyberforensics Conference 2016, 86-91, 2016
16*2016
PDF Forensic Analysis System using YARA
SJ Khitan, A Hadi, J Atoum
International Journal of Computer Science and Network Security 17 (5), 77-85, 2017
122017
Windows forensic investigations using powerforensics tool
A Barakat, A Hadi
2016 Cybersecurity and Cyberforensics Conference (CCC), 41-47, 2016
112016
Data Exfiltration Techniques and Data Loss Prevention System
H Kilani, M Nasereddin, A Hadi, S Tedmori
Conference: 2019 International Arab Conference on Information Technology (ACIT), 2019
102019
HDFS file operation fingerprints for forensic investigations
M Khader, A Hadi, G Al-Naymat
Digital Investigation 24, 50-61, 2018
92018
Covert Communication Using Port Knocking
AH Mariam Khader, Ali Hadi
Cybersecurity & Cyberforensics Conference 2016, 28-34, 2016
9*2016
Analyzing and Detecting Malicious Content: DOCX Files
AH Ayyad Naser, Mohammad Btoush
International Journal of Computer Science and Information Security (IJCSIS …, 2016
8*2016
A preliminary analysis of drive-by email attacks in educational institutes
J Alqatawna, A Hadi, M Al-Zwairi, M Khader
2016 cybersecurity and cyberforensics conference (ccc), 65-69, 2016
72016
A new technique for file carving on hadoop ecosystem
E Alshammari, G Al-Naymat, A Hadi
2017 International Conference on New Trends in Computing Sciences (ICTCS), 72-77, 2017
62017
Passive DNS Analysis Using Bro-IDS
A Dakhgan, A Hadi, J Al Saraireh, D Alrababah
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
52017
Visualizing Clustered Botnet Traffic using t-SNE on Aggregated NetFlows
M Alsadi, AH Hadi
International Conference on new Trends in Computing Sciences, 6, 2017
42017
MR-VDENCLUE: Varying density clustering using MapReduce
G Al-Naymat, M Khader, MA Al-Betar, R Hriez, A Hadi
Proceedings of SAI Intelligent Systems Conference, 771-788, 2022
32022
Smart parser for identifying and detecting insecure functions
E Al-Shammari, A Hadi, M Qasaimeh
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
32017
Apremilast for lichen planopilaris and frontal fibrosing alopecia: a case series
A Hadi, M Lebwohl
SKIN The Journal of Cutaneous Medicine 1 (1), 32-36, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20