Follow
Ali Hadi
Ali Hadi
Champlain College, VT, USA
Verified email at champlain.edu - Homepage
Title
Cited by
Cited by
Year
Vulnerability scanning of IoT devices in Jordan using Shodan
H Al-Alami, A Hadi, H Al-Bahadili
2017 2nd International Conference on the Applications of Information …, 2017
572017
Network security using hybrid port knocking
H Al-Bahadili, AH Hadi
Ijcsns 10 (8), 8, 2010
442010
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
JA Alaeddin Almubayed, Ali Hadi
International Journal of Computer Network and Information Security (IJCNIS …, 2015
33*2015
Threat hunting using grr rapid response
H Rasheed, A Hadi, M Khader
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
252017
Phishing websites prediction using classification techniques
DR Ibrahim, AH Hadi
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
182017
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files
AH Esraa Alshammari
Cybersecurity and Cyberforensics Conference (CCC), 2016, 55-59, 2016
16*2016
Reviewing and Evaluating Existing File Carving Techniques for JPEG Files
AH Esra’a Alshammary
Cybersecurity & Cyberforensics Conference 2016, 86-91, 2016
14*2016
Transcending the silos through project management office: Knowledge transactions, brokerage roles, and enabling factors
A Hadi, Y Liu, S Li
International Journal of Project Management 40 (2), 142-154, 2022
122022
Vascular obliteration because of endothelial and myointimal growth in COVID‐19 patients
J Valtuena, G Martínez‐García, D Ruiz‐Sánchez, M Garayar‐Cantero, ...
International Journal of Dermatology 60 (1), 73-80, 2021
102021
PDF Forensic Analysis System using YARA
SJ Khitan, A Hadi, J Atoum
International Journal of Computer Science and Network Security 17 (5), 77-85, 2017
102017
Data Exfiltration Techniques and Data Loss Prevention System
H Kilani, M Nasereddin, A Hadi, S Tedmori
Conference: 2019 International Arab Conference on Information Technology (ACIT), 2019
92019
HDFS file operation fingerprints for forensic investigations
M Khader, A Hadi, G Al-Naymat
Digital Investigation 24, 50-61, 2018
92018
Covert Communication Using Port Knocking
AH Mariam Khader, Ali Hadi
Cybersecurity & Cyberforensics Conference 2016, 28-34, 2016
9*2016
Windows forensic investigations using powerforensics tool
A Barakat, A Hadi
2016 Cybersecurity and Cyberforensics Conference (CCC), 41-47, 2016
72016
A preliminary analysis of drive-by email attacks in educational institutes
J Alqatawna, A Hadi, M Al-Zwairi, M Khader
2016 cybersecurity and cyberforensics conference (ccc), 65-69, 2016
72016
Passive DNS Analysis Using Bro-IDS
A Dakhgan, A Hadi, J Al Saraireh, D Alrababah
2017 International Conference on New Trends in Computing Sciences (ICTCS …, 2017
42017
A new technique for file carving on hadoop ecosystem
E Alshammari, G Al-Naymat, A Hadi
2017 International Conference on New Trends in Computing Sciences (ICTCS), 72-77, 2017
42017
Analyzing and Detecting Malicious Content: DOCX Files
AH Ayyad Naser, Mohammad Btoush
International Journal of Computer Science and Information Security (IJCSIS …, 2016
4*2016
Visualizing Clustered Botnet Traffic using t-SNE on Aggregated NetFlows
M Alsadi, AH Hadi
International Conference on new Trends in Computing Sciences, 6, 2017
32017
MLDED: multi-layer data exfiltration detection system
MAA Allawi, A Hadi, A Awajan
2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–20