Ismail Altaharwa

Ismail Altaharwa
  • Doctor of Philosophy
  • Professor (Assistant) at University of Jordan

About

74
Publications
14,591
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
840
Citations
Current institution
University of Jordan
Current position
  • Professor (Assistant)
Additional affiliations
August 2014 - present
University of Jordan
Position
  • Professor (Assistant)
November 2006 - September 2009
University of Jordan
Position
  • Lab supervisor
Education
September 2009 - July 2014
National Taiwan University of Science and Technology
Field of study
  • Department of Computer Science and Information Engineering
September 2005 - February 2008
Al-Balqa Applied University
Field of study
  • Computer Science
September 2002 - September 2005
Hashemite University
Field of study
  • Computer Science and it's Applications

Publications

Publications (74)
Article
Full-text available
In recent years, the chaotic logistic map key (CLMK) has been widely used for image encryption due to its ability to generate random and unpredictable sequences of numbers. The CLMK algorithm uses the chaotic logistic map to generate a key stream, which is then used to encrypt the plaintext image. This study proposes an image encryption scheme bas...
Article
Full-text available
Source code authorship attribution is the task of identifying who develops the code based on learning based on the programmer style. It is one of the critical activities which used extensively in different aspects such as computer security, computer law, and plagiarism. This paper attempts to investigate source code authorship attribution by captur...
Article
Full-text available
This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private key (a chaotic map), which is then resized to match the color matrix dimension. The proposed metho...
Article
Full-text available
It is critical to safeguard confidential data, especially secret and private messages. This study introduces a novel data cryptography approach. The new approach will be capable of encrypting and decrypting any communication size. The suggested approach will use a sophisticated private key with a convoluted structure. The private key will have 5 co...
Article
Full-text available
Currently, almost all direct marketing activities take place virtually rather than in person, weakening interpersonal skills at an alarming pace. Furthermore, businesses have been striving to sense and foster the tendency of their clients to accept a marketing offer. The digital transformation and the increased virtual presence forced firms to seek...
Article
Full-text available
Colored digital images are one of the most important types of digital data to be used in many vital applications, which require a safe way to protect them from hacking operations and the danger of intruders and data thieves. This paper presents an effective and safe method for storing digital colored images (CASDC). A high level of protection is pr...
Article
Full-text available
Colored digital images are one of the most important types of digital data to be used in many vital applications, which require a safe way to protect them from hacking operations and the danger of intruders and data thieves. This paper presents an effective and safe method for storing digital colored images (CASDC). A high level of protection is pr...
Article
Full-text available
Recently, spam on online social networks has attracted attention in the research and business world. Twitter has become the preferred medium to spread spam content. Many research efforts attempted to encounter social networks spam. Twitter brought extra challenges represented by the feature space size, and imbalanced data distributions. Usually, th...
Article
Full-text available
Ranking and selecting the most fundamental classes in a software is a critical task for recognizing an inexperienced system. There are several approaches to detect these classes. This paper proposes a statistical-rank based approach that addresses an untouched area of testing coverage usefulness. Testing coverage information is used as new method t...
Article
Software engineering project is the preferred mean to measure competency and practical skills among learners in IT-fields. This study investigates the opportunities to model software engineering project final evaluation and improve early prediction of academic software engineering project failure by considering female student participation as a tea...
Article
Deliverable and course project become the preferred mean to measure learner competency and attainment of intended learning outcomes in IT-fields. Proper setup and evaluation for teamwork projects remains a key challenge for e-learning systems. This study investigates the possibility to improve the early prediction of academic software engineering p...
Article
Full-text available
Featured Application This study attempts to mitigate the effects of highly imbalanced data in realizing an enhanced cost-sensitive prediction model. The model intends to enable telemarketing decision makers in the banking industry to have more insights on their marketing efforts, such that potential clients gain more focus based on quantifiable cos...
Article
Full-text available
Meteorological metrics have been used for weather forecasting and climate prediction. Remote sensing images proved to be a valuable resource to represent the terrain of earth’s surface. Recently, there has been extensive research to model changes on the earth’s landscape including water bodies using remote sensing images. Meanwhile, meteorological...
Article
Full-text available
Meteorological metrics have been used for weather forecasting and climate prediction. Remote sensing images proved to be a valuable resource to represent the terrain of earth’s surface. Recently, there has been extensive research to model changes on the earth’s landscape including water bodies using remote sensing images. Mean- while, meteorologica...
Article
JavaScript obfuscation is a deliberate act of making a script difficult to understand by concealing its purpose. The prevalent use of obfuscation techniques to hide malicious codes and to preserve copyrights of benign scripts resulted in (i) missing detection of malicious scripts that are obfuscated and (ii) raising false alarms due to the benign s...
Conference Paper
JavaScript allows Web-developers to hide intention behind their code inside different looking scripts known as Obfuscated code. Automatic detection of obfuscated code is generally tackled from readability perspective. However, recently obfuscation exhibits patterns that modify both syntax and semantic characteristics while preserving readability ch...
Article
This study attempts to optimize the prediction accuracy of the compressive strength of high-performance concrete (HPC) by comparing data-mining methods. Modeling the dynamics of HPC, which is a highly complex composite material, is extremely challenging. Concrete compressive strength is also a highly nonlinear function of ingredients. Several studi...
Conference Paper
JavaScript code is often obfuscated; given such code, can we tell whether if it is malicious or benign? We propose Obfuscating Causal Relations Finding (OCRF), which addresses this problem. The contributions are the following: (1) careful feature extraction, using domain knowledge (2) no need for de-obfuscation, since our method can be applied to t...
Article
In this work we focus on cloud-based malware detection. We investigate the existing academic and industry cloud-based malware detection solutions, and identify the drawbacks of those solutions. We also recommend a remedy for the drawbacks of those solutions. At the end we provide a summary of our proposed cloud-based anti-malware solution.
Article
Full-text available
In this study we present our initial idea for using genetic algorithms to help a controllable mobile robot to find an optimal path between a starting and ending point in a grid environment. Themobile robot has to find the optimal path which reduces the number of steps to be taken between the starting point and the target ending point. GAs can overc...

Network

Cited By