
Ahmed ShatnawiJordan University of Science and Technology | Just · Department of Software Engineering
Ahmed Shatnawi
Associate professor
About
32
Publications
4,408
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
99
Citations
Introduction
Education
January 2013 - December 2017
August 2010 - May 2012
Publications
Publications (32)
Due to the vast and fast growth of the internet, privacy is becoming a concern. Web browser data privacy is a part of the overall users' privacy. Since the attackers took social engineering to the next level, achieving the web browser history data secured from privacy breaches becomes difficult. In this work, we implemented three types of web finge...
Fast-flux service networks (FFSNs) continue to be one of the major problems in today’s Internet. It is a mechanism botherders commonly use to provide highly resilient service for their malicious servers while remaining hidden from direct access. This is achieved by configuring many botnet machines to work as proxies that relay traffic between end u...
Large composite integer factorization algorithms still need to be more efficient and, thus, not operate linearly. The RSA popular cryptographic algorithm strength solely depends on factoring the modulus N. This study proposes a technique based on the Fermat factorization theorem to factor modulus N and decreases processing time, obtaining greater a...
Abstract—Customer reviews on online platforms have grown to become an important source of insight into a company's performance. Food delivery services (FDS) companies aim to effectively use customers’ feedback to identify areas for improvement of customer satisfaction. Although Arabic is becoming one of the most widely used languages on the Interne...
Numerous applications that rely on assymmetric cryptography use the RSA algorithm. It can be applied to digital signatures and the encryption of sensitive data. The secure storage of the private key is essential for the algorithm's strength. Finding ways to use factorization or other heuristics to determine the value of the private key was the goal...
The large expansion in network services and applications seen in the last few years requires
new network architectures to satisfy an increasing number of users and enhance content delivery. Named
Data Networking (NDN) has recently appeared as a new paradigm to solve many shortcomings in the current
TCP/IP architecture. Its main characteristics like...
Android applications have recently witnessed a pronounced progress, making them among the fastest growing technological fields to thrive and advance. However, such level of growth does not evolve without some cost. This particularly involves increased security threats that the underlying applications and their users usually fall prey to. As malware...
Despite the security policies that organizations follow to defend against cyber crimes, phishing attacks are still among the most popular ways the criminals use to steal user’s credentials. Spear phishing, fake websites, fraudulent emails, smishing, and vishing all fall under the umbrella of phishing attacks. Recent procedures followed by many orga...
The number of cyber-attacks have substantially increased over the past decade resulting in huge organizational financial losses. Indeed, it is no longer a matter of "if" but "when" a security incident will take place. A Security Operations Center(SOC) adoption will help in the detection, identification, prevention, and resolution of issues before t...
In recent years, various platforms have witnessed an unprecedented increase in the number of ransomware attacks targeting hospitals, governments, enterprises, and end-users. The purpose of this is to maliciously encrypt documents and files on infected machines, depriving victims of access to their data, whereupon attackers would seek some sort of a...
In the past decade, mobile devices became necessary for modern civilization and contributed directly to its development stages in defining mobile information access. Nonetheless, along with these rapid developments in modern mobile devices, security issues rise dramatically, and malware is the most concerning of all. Therefore, many studies and res...
Human activity recognition is a thriving field with many applications in several domains. It relies on well-trained artificial intelligence models to provide accurate real-time predictions of various human movements and activities. Human activity recognition utilizes various types of sensors such as video cameras, fixed motion sensors, and those fo...
Roundabouts are introduced at intersections to improve traffic flow and enhance safety. Nevertheless, studies and field observations demonstrated that roundabouts, due to their special design, could significantly affect the efficiency of the overall traffic network, especially in the case of increased traffic volumes. For this reason, researchers a...
Fast Flux service networks (FFSNs) are used by adversaries to provide high availability to malicious servers while keeping them hidden from direct access. In these networks, a large number of botnet machines work as proxies to relay the traffic between end users and a malicious mothership server which is controlled by an adversary. Various mechanis...
Efficient handling for subscribers' initial access to wireless networks is highly needed, particularly when the number of subscribers is expected to be significant, as, for example, in the case of new technologies like the Internet of Things (IoT). This paper provides a set of entry
algorithms (based on 802.11 entry protocols) for a Time Division...
Fast Flux service networks (FFSNs) are used by adversaries to achieve a high resilient technique for their malicious servers while keeping them hidden from direct access. In this technique, a large number of botnet machines, that are known as flux agents, work as proxies to relay the traffic between end users and a malicious mothership server which...
Identifying the software used in a cybercrime can play a key role in establishing the evidence against the perpetrator in the court of law. This can be achieved by various means, one of which is to utilize the RAM contents. RAM comprises vital information about the current state of a system, including its running processes. Accordingly, the memory...
In this paper, we describe an enhancement of the Automated Policy Enforcement eXchange framework (APEX) called eAPEX. eAPEX uses version-control information as the basis for a more incremental approach to scanning document text to determine if security policies are being followed. Where APEX requires a full or deep scan of the document each time an...
With continuing increases in the number of Oversize-Overweight (OSOW) vehicle permits issued in recent years, the management and analysis of OSOW permit data is becoming more inefficient and time-consuming. Large quantities of archived OSOW permit data are held by Departments of Transportation (DOTs) across the United States, and manual extraction...
Securing sensitive digital documents (such as health records, legal reports, government documents, and financial assets) is a critical and challenging task. Unreliable Internet connections, viruses, and compromised file storage systems impose a significant risk on such documents and can compromise their integrity especially when shared across domai...
We propose an adaptive learning machine-based branch predictor – the shadow dynamic finite state machine (SDFSM) – that enables more accurate branch predictions by learning unique branching patterns through a self-modifying technique. SDFSM states represent branch pattern bits. If a state mispredicts a branch, the state is swapped with its shadow s...