default search action
Ja'far Alqatawna
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j7]Louay Karadsheh, Haroun Alryalat, Ja'far Alqatawna, Samer Fawaz Alhawari, Mufleh Amin Al-Jarrah:
The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable. Int. J. Digit. Crime Forensics 14(1): 1-26 (2022) - 2021
- [j6]Monther Khalafat, Ja'far Alqatawna, Rizik M. H. Al-Sayyed, Mohammed Eshtay, Thaeer Kobbaey:
Violence Detection over Online Social Networks: An Arabic Sentiment Analysis Approach. Int. J. Interact. Mob. Technol. 15(14): 90 (2021) - [j5]Wadi' Hijawi, Ja'far Alqatawna, Ala' M. Al-Zoubi, Mohammad A. Hassonah, Hossam Faris:
Android botnet detection using machine learning models based on a comprehensive static analysis approach. J. Inf. Secur. Appl. 58: 102735 (2021) - [j4]Ala' M. Al-Zoubi, Ja'far Alqatawna, Hossam Faris, Mohammad A. Hassonah:
Spam profiles detection on social networks using computational intelligence methods: The effect of the lingual context. J. Inf. Sci. 47(1) (2021) - [c13]Fred N. Kiwanuka, Louay Karadsheh, Ja'far Alqatawna, Anang Hudaya Muhamad Amin:
Modeling Employee Flexible Work Scheduling As A Classification Problem. KES 2021: 3281-3290
2010 – 2019
- 2019
- [c12]Anang Hudaya Muhamad Amin, Ja'far Alqatawna, Sujni Paul, Fred N. Kiwanuka, Imtiaz Ahmad Akhtar:
Improving Event Monitoring in IoT Network Using an Integrated Blockchain-Distributed Pattern Recognition Scheme. BLOCKCHAIN 2019: 134-144 - [c11]Fred N. Kiwanuka, Ja'far Alqatawna, Anang Hudaya Muhamad Amin, Sujni Paul, Hossam Faris:
Towards Automated Comprehensive Feature Engineering for Spam Detection. ICISSP 2019: 429-437 - 2018
- [j3]Ala' M. Al-Zoubi, Hossam Faris, Ja'far Alqatawna, Mohammad A. Hassonah:
Evolving Support Vector Machines using Whale Optimization Algorithm for spam profiles detection on online social networks in different lingual contexts. Knowl. Based Syst. 153: 91-104 (2018) - 2017
- [i1]Wadi' Hijawi, Hossam Faris, Ja'far Alqatawna, Ibrahim Aljarah, Ala' M. Al-Zoubi, Maria Habib:
EMFET: E-mail Features Extraction Tool. CoRR abs/1711.08521 (2017) - 2016
- [c10]Aisha Zaid, Ja'far Alqatawna, Ammar Huneiti:
A Proposed Model for Malicious Spam Detection in Email Systems of Educational Institutes. CCC 2016: 60-64 - [c9]Ja'far Alqatawna, Ali Hadi, Malek Al-Zewairi, Mariam Khader:
A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes. CCC 2016: 65-69 - [c8]Rola Al Halaseh, Ja'far Alqatawna:
Analyzing CyberCrimes Strategies: The Case of Phishing Attack. CCC 2016: 82-88 - [c7]Wedyan Alswiti, Ja'far Alqatawna, Bashar Al-Shboul, Hossam Faris, Heba Hakh:
Users Profiling Using Clickstream Data Analysis and Classification. CCC 2016: 96-99 - 2015
- [j2]Malek Al-Zewairi, Ja'far Alqatawna, Jalal Atoum:
Risk adaptive hybrid RFID access control system. Secur. Commun. Networks 8(18): 3826-3835 (2015) - 2014
- [j1]Omar Sultan Al-Kadi, Osama Al-Kadi, Rizik M. H. Al-Sayyed, Ja'far Alqatawna:
Road scene analysis for determination of road traffic density. Frontiers Comput. Sci. 8(4): 619-628 (2014) - 2010
- [c6]Ja'far Alqatawna, Jawed I. A. Siddiqi, Mohammad Hjouj Btoush:
Security in e-Business - Understanding Customers Perceptions and Concerns. WEBIST (2) 2010: 319-324
2000 – 2009
- 2009
- [c5]Mohammad Hjouj Btoush, Jawed I. A. Siddiqi, Ja'far Alqatawna, Babak Akhgar:
The State of Play in Jordanian E-government Services. ITNG 2009: 1474-1478 - 2008
- [c4]Mohammad Hjouj Btoush, Jawed I. A. Siddiqi, Michael Grimsley, Babak Akhgar, Ja'far Alqatawna:
Comparative Review of e-service Maturity Models: 6I Model. CSREA EEE 2008: 3-9 - [c3]Ja'far Alqatawna, Jawed I. A. Siddiqi, Babak Akhgar, Mohammad Hjouj Btoush:
Towards Holistic Approaches to Secure e-Business: A Critical Review. CSREA EEE 2008: 245-251 - [c2]Ja'far Alqatawna, Jawed I. A. Siddiqi, Babak Akhgar, Mohammad Hjouj Btoush:
A Holistic Framework for Secure e-Business. CSREA EEE 2008: 257-263 - 2007
- [c1]Ja'far Alqatawna, Erik Rissanen, Babak Sadighi Firozabadi:
Overriding of Access Control in XACML. POLICY 2007: 87-95
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint