About
53
Publications
21,350
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
370
Citations
Introduction
Dr. Yousef K. Sanjalawe is an accomplished Assistant Professor specializing in Cybersecurity and Cloud Computing. He currently serves at the University of Jordan as an assistant professor. He has an extensive academic and professional background, including previous roles such as Chair of the Cybersecurity Department at the American University of Madaba.
Current institution
Publications
Publications (53)
The connectivity and integration of commodities have transformed many industries through the Internet of Things, enhancing both efficiency and functionality. However, this interconnection has also introduced critical security challenges, necessitating a robust Intrusion Detection System. This paper presents a novel, enhanced method for Intrusion De...
The Cuckoo Search Algorithm (CSA) is an optimization algorithm inspired by the brood parasitism behavior of cuckoo birds. It mimics the reproductive and breeding tactics of cuckoos to tackle optimization challenges. To better handle multi-objective optimization problems (MOPs), a variation called the multi-objective CSA (MOCSA) has been developed....
In the digital era, ensuring data integrity, authenticity, and confidentiality is critical amid growing interconnectivity and evolving security threats. This paper addresses key limitations of traditional steganographic methods, such as limited payload capacity, susceptibility to detection, and lack of robustness against attacks. A novel multi-laye...
Amid the landscape of Cloud Computing (CC), the Cloud Datacenter (DC) stands as a conglomerate of physical servers, whose performance can be hindered by bottlenecks within the realm of proliferating CC services. A linchpin in CC's performance, the Cloud Service Broker (CSB), orchestrates DC selection. Failure to adroitly route user requests with su...
Numerous abnormal transactions have been exposed as a result of targeted attacks on Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting vulnerabilities in smart contracts, malicious users can pursue their own illicit objectives through abnormal transactions. Consequently, identifying these malevolent users, impli...
The interest in selecting an appropriate cloud data center is exponentially increasing due to the popularity and continuous growth of the cloud computing sector. Cloud data center selection challenges are compounded by ever-increasing users' requests and the number of data centers required to execute these requests. Cloud service broker policy defi...
Software-defined networking (SDN) revolutionizes network management by offering centralized control over complex infrastructures, but it also introduces significant security vulnerabilities. particularly Distributed Denial of Service (DDoS) attacks that significantly interrupt network services. The challenge of efficiently detecting DDoS attacks in...
Falls are a major concern, particularly for elderly individuals and vulnerable populations, often leading to severe injuries if not detected promptly. Traditional sensor-based fall detection methods suffer from limitations such as discomfort, maintenance challenges, and susceptibility to false readings. To address these issues, we propose a hybrid...
This paper explores the integration of Artificial Intelligence into 6G networks, focusing on optimizing communication, resource allocation, and enhancing security. As communication systems transition from 5G to 6G, Artificial Intelligence’s role in addressing the increasing complexity of network management becomes pivotal. The paper reviews key AI...
Blockchain technology has catalyzed a revolutionary shift toward decentralized applications, prominently exemplified by Ethereum’s introduction of smart contracts. A smart contract is a self-executing program running on the Ethereum Virtual Machine (EVM), designed to automate and ensure trust in transactions, bypassing traditional intermediaries. N...
Intrusion detection systems (IDS) play a pivotal role in network security and anomaly detection and are significantly impacted by the feature selection (FS) process. As a significant task in machine learning and data analysis, FS is directed toward pinpointing a subset of pertinent features that primarily influence the target variable. This paper p...
This study introduces the Orbit Weighting Scheme (OWS), a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval (IR) models, which have traditionally relied on weighting schemes like tf-idf and BM25. These conventional methods often struggle with accurately capturing document relevance, leading to inef...
The advent of the Internet of Things (IoT) has significantly altered human interaction with the environment, enabling smart ecosystems that simplify day-today activities. Despite these benefits, the expansion of IoT technology has also escalated security and privacy vulnerabilities, necessitating robust network protection mechanisms. This paper int...
Smartphones, digital cameras, and other imaging devices generate vast amounts of high-resolution colored images daily, stored on devices equipped with multi-core central processing units or on the cloud. Safeguarding these images from potential attackers has become a pressing concern. This paper introduces a set of six innovative image ciphers desi...
The escalating prevalence of cyber-activities under-scores the compelling need for advanced protective mechanisms, with Intrusion Detection Systems (IDS) emerging as a pivotal line of defense. Within the operational domain of IDS, the judicious selection of features plays a critical role in enhancing system accuracy and efficiency. This paper initi...
This paper presents a novel approach to enhancing real-time surveillance systems using an augmented YOLO (You Only Look Once) v8 architecture. The primary focus is on integrating advanced security features into the YOLO framework to improve the detection and analysis of moving objects in various surveillance scenarios. The key enhancements include...
Auto-scaler system enables high Quality of Service (QoS) with low cost to survive in a competitive market. Indeed, the auto-scaling of Virtual Network Functionality (VNFs) can adaptively allocate the Cloud resources for various VNFs based on workload demands at any time. However, the intensity of workload is dynamically changed because of the varia...
Amid the landscape of Cloud Computing (CC), the Cloud Datacenter (DC) stands as a conglomerate of physical servers, whose performance can be hindered by bottlenecks within the realm of proliferating CC services. A linchpin in CC’s performance, the Cloud Service Broker (CSB), orchestrates DC selection. Failure to adroitly route user requests with su...
In recent years, there has been an increasing interest in employing chaotic-based random number generators for cryptographic purposes. However, many of these generators produce sequences that lack the necessary strength for cryptographic systems, such as Tent-Map. However, these generators still suffer from common issues when generating random numb...
In recent years, there has been an increasing interest in employing chaotic-based random number generators for cryptographic purposes. However, many of these generators produce sequences that lack the necessary strength for cryptographic systems, such as Tent-Map. However, these generators still suffer from common issues when generating random numb...
The Onion Router (TOR) network is a decentralized system of volunteer-run servers that aims to protect the anonymity and privacy
of users by routing their internet traffic through a series of nodes. Individuals who use the TOR network may employ obfuscated
traffic to conceal their internet activity from network administrators or security systems at...
Intrusion Detection System (IDS) in the cloud Computing (CC) environment has received paramount interest over the last few years. Among the latest approaches, Deep Learning (DL)-based IDS methods allow the discovery of attacks with the highest performance. In the CC environment, Distributed Denial of Service (DDoS) attacks are widespread. The cloud...
Numerous abnormal transactions have been exposed as a result of targeted attacks on Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting vulnerabilities in smart contracts, malicious users can pursue their own illicit objectives through abnormal transactions. Consequently, identifying these malevolent users, impli...
Nowadays, the world is increasingly becoming more connected and dependent on the Internet and Internet-based services. One of the main challenges of interconnectedness is the security of applications and networks from malicious actors. The security challenge is further compounded by the exponential growth of threats and the increase in attack vecto...
With the fast advancement in digital news, fake news has already caused grave threats to the public’s actual judgment and credibility, in specific, with the wide use of social networking platforms, which provide a rich environment for the generation and dissemination of fake news. To cope with these challenges, several techniques were proposed to d...
Software testing is an essential part of the software development life cycle. However, due to limited time and resources, extensive testing of highly configurable software is impractical. In addition, extensive testing can lead to combinatorial explosion problems, where test cases grow exponentially with the increase in software input. Because of t...
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the...
The interest in selecting an appropriate cloud data center is exponentially increasing due to the popularity and continuous growth of the cloud computing sector. Cloud data center selection challenges are compounded by ever-increasing users’ requests and the number of data centers required to execute these requests. Cloud service broker policy defi...
The Software-Defined Networking (SDN) technology improves network management over existing technology via centralized network control. The SDN provides a perfect platform for researchers to solve traditional network’s outstanding issues. However, despite the advantages of centralized control, concern about its security is rising. The more tradition...
The number of network users and devices has exponentially increased in the last few decades, giving rise to sophisticated security threats while processing users’ and devices’ network data. Software-Defined Networking (SDN) introduces many new features, but none is more revolutionary than separating the control plane from the data plane. The separa...
With the advancement of information technologies, the digitalisation of education has taken place in the form of High Impact Educational Practices (HIEPs). However, the COVID-19 outbreak in 2020 led to transition from traditional education to online education. However, while online education tools serve different educational purposes they are still...
A few datasets of blockchain networks are available to be used in evaluating intrusion detection systems, and some of the proposed detection systems are evaluated as self-generated blockchain transactions’ datasets. These blockchain datasets use an unsuitable representation, which mainly depends on transaction format, and they contain non-qualified...
With the growing volume of network throughput, packet transmission and security threats and attacks in Fog computing, the study of Intrusion Detection Systems (IDSs) in this environment has grabbed a lot of attention in the computer science field in general, and security field in particular. Since Fog, computing can be depicted as an emerging cloud...
For the time being, the advances of the Internet technologies in respect of a wide-spread development and the fixed nature of traditional networks have the restricted capacity to satisfy organizational business requirements. Software-Defined Networking (SDN) as a new network architecture presented to overcome these challenges and issues of the exis...
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from the data plane that incidentally provides better features and functionalities to detect and deal...
One of the most critical issues of all of networks types that integrate the both of wired and wireless technologies is the performance and applicability of the electronic authentication and identification techniques. These schemes involve various technologies of different levels of security. This research presents a comparative study of six IDAM av...
In last decades, the continuous enhancements of computational power have produced a massive data flow.
Big data has been becoming more understandable as well as becoming more available. For instance, the
famous online social networks, such as Facebook, and twitter, serve about 560 billion page views
everyone’s month. They also store new number of i...
Cloud computing is a new development of grid,
parallel, and distributed computing with visualization
techniques. It is changing the IT industry in a prominent
way. Cloud computing has grown due to its advantages like
storage capacity, resources pooling and multi-tenancy. On
the other hand, the cloud is an open environment and since
all the services...