Ahmed Shatnawi

Ahmed Shatnawi
Jordan University of Science and Technology | Just · Department of Software Engineering

Associate professor

About

32
Publications
4,408
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
99
Citations
Education
January 2013 - December 2017
University of Wisconsin - Milwaukee
Field of study
  • Computer Science
August 2010 - May 2012
George Mason University
Field of study
  • Software Engineering

Publications

Publications (32)
Conference Paper
Due to the vast and fast growth of the internet, privacy is becoming a concern. Web browser data privacy is a part of the overall users' privacy. Since the attackers took social engineering to the next level, achieving the web browser history data secured from privacy breaches becomes difficult. In this work, we implemented three types of web finge...
Chapter
Fast-flux service networks (FFSNs) continue to be one of the major problems in today’s Internet. It is a mechanism botherders commonly use to provide highly resilient service for their malicious servers while remaining hidden from direct access. This is achieved by configuring many botnet machines to work as proxies that relay traffic between end u...
Article
Large composite integer factorization algorithms still need to be more efficient and, thus, not operate linearly. The RSA popular cryptographic algorithm strength solely depends on factoring the modulus N. This study proposes a technique based on the Fermat factorization theorem to factor modulus N and decreases processing time, obtaining greater a...
Conference Paper
Abstract—Customer reviews on online platforms have grown to become an important source of insight into a company's performance. Food delivery services (FDS) companies aim to effectively use customers’ feedback to identify areas for improvement of customer satisfaction. Although Arabic is becoming one of the most widely used languages on the Interne...
Preprint
Full-text available
Numerous applications that rely on assymmetric cryptography use the RSA algorithm. It can be applied to digital signatures and the encryption of sensitive data. The secure storage of the private key is essential for the algorithm's strength. Finding ways to use factorization or other heuristics to determine the value of the private key was the goal...
Article
Full-text available
The large expansion in network services and applications seen in the last few years requires new network architectures to satisfy an increasing number of users and enhance content delivery. Named Data Networking (NDN) has recently appeared as a new paradigm to solve many shortcomings in the current TCP/IP architecture. Its main characteristics like...
Article
Full-text available
Android applications have recently witnessed a pronounced progress, making them among the fastest growing technological fields to thrive and advance. However, such level of growth does not evolve without some cost. This particularly involves increased security threats that the underlying applications and their users usually fall prey to. As malware...
Chapter
Despite the security policies that organizations follow to defend against cyber crimes, phishing attacks are still among the most popular ways the criminals use to steal user’s credentials. Spear phishing, fake websites, fraudulent emails, smishing, and vishing all fall under the umbrella of phishing attacks. Recent procedures followed by many orga...
Preprint
The number of cyber-attacks have substantially increased over the past decade resulting in huge organizational financial losses. Indeed, it is no longer a matter of "if" but "when" a security incident will take place. A Security Operations Center(SOC) adoption will help in the detection, identification, prevention, and resolution of issues before t...
Article
Full-text available
In recent years, various platforms have witnessed an unprecedented increase in the number of ransomware attacks targeting hospitals, governments, enterprises, and end-users. The purpose of this is to maliciously encrypt documents and files on infected machines, depriving victims of access to their data, whereupon attackers would seek some sort of a...
Conference Paper
In the past decade, mobile devices became necessary for modern civilization and contributed directly to its development stages in defining mobile information access. Nonetheless, along with these rapid developments in modern mobile devices, security issues rise dramatically, and malware is the most concerning of all. Therefore, many studies and res...
Article
Full-text available
Human activity recognition is a thriving field with many applications in several domains. It relies on well-trained artificial intelligence models to provide accurate real-time predictions of various human movements and activities. Human activity recognition utilizes various types of sensors such as video cameras, fixed motion sensors, and those fo...
Article
Roundabouts are introduced at intersections to improve traffic flow and enhance safety. Nevertheless, studies and field observations demonstrated that roundabouts, due to their special design, could significantly affect the efficiency of the overall traffic network, especially in the case of increased traffic volumes. For this reason, researchers a...
Article
Fast Flux service networks (FFSNs) are used by adversaries to provide high availability to malicious servers while keeping them hidden from direct access. In these networks, a large number of botnet machines work as proxies to relay the traffic between end users and a malicious mothership server which is controlled by an adversary. Various mechanis...
Article
Efficient handling for subscribers' initial access to wireless networks is highly needed, particularly when the number of subscribers is expected to be significant, as, for example, in the case of new technologies like the Internet of Things (IoT). This paper provides a set of entry algorithms (based on 802.11 entry protocols) for a Time Division...
Preprint
Fast Flux service networks (FFSNs) are used by adversaries to achieve a high resilient technique for their malicious servers while keeping them hidden from direct access. In this technique, a large number of botnet machines, that are known as flux agents, work as proxies to relay the traffic between end users and a malicious mothership server which...
Article
Full-text available
Identifying the software used in a cybercrime can play a key role in establishing the evidence against the perpetrator in the court of law. This can be achieved by various means, one of which is to utilize the RAM contents. RAM comprises vital information about the current state of a system, including its running processes. Accordingly, the memory...
Conference Paper
In this paper, we describe an enhancement of the Automated Policy Enforcement eXchange framework (APEX) called eAPEX. eAPEX uses version-control information as the basis for a more incremental approach to scanning document text to determine if security policies are being followed. Where APEX requires a full or deep scan of the document each time an...
Article
Full-text available
With continuing increases in the number of Oversize-Overweight (OSOW) vehicle permits issued in recent years, the management and analysis of OSOW permit data is becoming more inefficient and time-consuming. Large quantities of archived OSOW permit data are held by Departments of Transportation (DOTs) across the United States, and manual extraction...
Conference Paper
Securing sensitive digital documents (such as health records, legal reports, government documents, and financial assets) is a critical and challenging task. Unreliable Internet connections, viruses, and compromised file storage systems impose a significant risk on such documents and can compromise their integrity especially when shared across domai...
Article
Full-text available
We propose an adaptive learning machine-based branch predictor – the shadow dynamic finite state machine (SDFSM) – that enables more accurate branch predictions by learning unique branching patterns through a self-modifying technique. SDFSM states represent branch pattern bits. If a state mispredicts a branch, the state is swapped with its shadow s...

Network

Cited By