Saleh Aldaajeh

Saleh Aldaajeh
  • PhD
  • Senior Researcher at United Arab Emirates University

About

11
Publications
13,642
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
244
Citations
Introduction
As an Assistant Professor in Information Security and Software Engineering, my research focuses on enhancing cybersecurity and secure software development. I specialize in using machine learning, cryptography, and formal methods to identify vulnerabilities and create robust defenses against cyber-attacks. Currently, I am developing AI-driven systems for real-time threat detection and secure software architectures. My goal is to create a safer digital environment and inspire the next generation
Current institution
United Arab Emirates University
Current position
  • Senior Researcher
Additional affiliations
February 2013 - April 2024
Institute of Applied Technology
Position
  • Specialist Quality Assurance
June 2011 - February 2013
Abu Dhabi Polytechnic
Position
  • Lecturer
July 2010 - June 2011
Al-Zaytoonah University of Jordan
Position
  • Sr. Lecturer
Education
October 2019 - April 2024
United Arab Emirates University
Field of study
  • Information Systems and Security
January 2008 - March 2010
Blekinge Institute of Technology
Field of study
  • Software Engineering
October 2003 - June 2007
Petra University
Field of study
  • Computer Science

Publications

Publications (11)
Article
Full-text available
Embedded systems are used in many critical applications of our daily life. The increased complexity of embedded systems and the tightened safety regulations posed on them and the scope of the environment in which they operate are driving the need of more dependable embedded systems. Therefore, achieving a high level of quality and dependability to...
Article
Full-text available
Outsourcing software development work activities has brought many benefits to software development projects, such as, reduced development cost and time. Managing the application of this strategy is a key characteristic in its own or in its implications. Accurate effort estimation is crucial to software development projects success, especially in gl...
Article
Full-text available
The understanding of software products quality attributes relationships' nature impersonates a focal role in sustaining a sufficient level of quality to software products and their development processes. In order to conduct correct tradeoffs between software development solutions and therefore develop a software system in a cost effective way, we n...
Article
Full-text available
The rapid development of Digital Twin (DT) technology has underlined challenges in resource-constrained mobile devices, especially in the application of extended realities (XR), which includes Augmented Reality (AR) and Virtual Reality (VR). These challenges lead to computational inefficiencies that negatively impact user experience when dealing wi...
Article
Full-text available
In the contemporary ever-evolving digital landscape, the paramount importance of fortifying national cybersecurity for safeguarding national security is unequivocal. Cybersecurity stands as a critically strategic field, demanding in-depth strategic planning. This research delves into the complexities of cybersecurity strategy, evaluation, and its m...
Article
Full-text available
Although cyber technologies benefit our society, there are also some related cybersecurity risks. For example, cybercriminals may exploit vulnerabilities in people, processes, and technologies during trying times, such as the ongoing COVID-19 pandemic, to identify opportunities that target vulnerable individuals, organizations (e.g., medical facili...
Article
Full-text available
Digital information and telecommunication technologies have not only become essential to individuals’ daily lives but also to a nation’s sustained economic growth, societal well-being, critical infrastructure resilience, and national security. Consequently, the protection of a nation’s cyber sovereignty from malicious acts is a major concern. This...
Article
Full-text available
Embedded systems operational environment poses tightened and usually conflicted design requirements. Software architects aim at introducing effective tradeoff methods to select the most appropriate design solutions to comply with the software specifications of an embedded system. When defining the software architecture for critical embedded systems...
Article
Full-text available
Understanding quality attributes relationships impersonates a vital role in sustaining a sufficient level of quality to a software system. Furthermore, calibrating the relationships between system's quality attributes will not only affect its quality but also may reduce the development cost. However, this paper introduces a framework to explore the...

Network

Cited By