Vulnerability scanning of IoT devices in Jordan using Shodan H Al-Alami, A Hadi, H Al-Bahadili 2017 2nd International Conference on the Applications of Information …, 2017 | 57 | 2017 |
Network security using hybrid port knocking H Al-Bahadili, AH Hadi Ijcsns 10 (8), 8, 2010 | 44 | 2010 |
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning JA Alaeddin Almubayed, Ali Hadi International Journal of Computer Network and Information Security (IJCNIS …, 2015 | 33* | 2015 |
Threat hunting using grr rapid response H Rasheed, A Hadi, M Khader 2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017 | 25 | 2017 |
Phishing websites prediction using classification techniques DR Ibrahim, AH Hadi 2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017 | 18 | 2017 |
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files AH Esraa Alshammari Cybersecurity and Cyberforensics Conference (CCC), 2016, 55-59, 2016 | 16* | 2016 |
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files AH Esra’a Alshammary Cybersecurity & Cyberforensics Conference 2016, 86-91, 2016 | 14* | 2016 |
Transcending the silos through project management office: Knowledge transactions, brokerage roles, and enabling factors A Hadi, Y Liu, S Li International Journal of Project Management 40 (2), 142-154, 2022 | 12 | 2022 |
Vascular obliteration because of endothelial and myointimal growth in COVID‐19 patients J Valtuena, G Martínez‐García, D Ruiz‐Sánchez, M Garayar‐Cantero, ... International Journal of Dermatology 60 (1), 73-80, 2021 | 10 | 2021 |
PDF Forensic Analysis System using YARA SJ Khitan, A Hadi, J Atoum International Journal of Computer Science and Network Security 17 (5), 77-85, 2017 | 10 | 2017 |
Data Exfiltration Techniques and Data Loss Prevention System H Kilani, M Nasereddin, A Hadi, S Tedmori Conference: 2019 International Arab Conference on Information Technology (ACIT), 2019 | 9 | 2019 |
HDFS file operation fingerprints for forensic investigations M Khader, A Hadi, G Al-Naymat Digital Investigation 24, 50-61, 2018 | 9 | 2018 |
Covert Communication Using Port Knocking AH Mariam Khader, Ali Hadi Cybersecurity & Cyberforensics Conference 2016, 28-34, 2016 | 9* | 2016 |
Windows forensic investigations using powerforensics tool A Barakat, A Hadi 2016 Cybersecurity and Cyberforensics Conference (CCC), 41-47, 2016 | 7 | 2016 |
A preliminary analysis of drive-by email attacks in educational institutes J Alqatawna, A Hadi, M Al-Zwairi, M Khader 2016 cybersecurity and cyberforensics conference (ccc), 65-69, 2016 | 7 | 2016 |
Passive DNS Analysis Using Bro-IDS A Dakhgan, A Hadi, J Al Saraireh, D Alrababah 2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017 | 4 | 2017 |
A new technique for file carving on hadoop ecosystem E Alshammari, G Al-Naymat, A Hadi 2017 International Conference on New Trends in Computing Sciences (ICTCS), 72-77, 2017 | 4 | 2017 |
Analyzing and Detecting Malicious Content: DOCX Files AH Ayyad Naser, Mohammad Btoush International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 4* | 2016 |
Visualizing Clustered Botnet Traffic using t-SNE on Aggregated NetFlows M Alsadi, AH Hadi International Conference on new Trends in Computing Sciences, 6, 2017 | 3 | 2017 |
MLDED: multi-layer data exfiltration detection system MAA Allawi, A Hadi, A Awajan 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015 | 3 | 2015 |