Yousef Sanjalawe

Yousef Sanjalawe
Verified
Yousef verified their affiliation via an institutional email.
Verified
Yousef verified their affiliation via an institutional email.
  • Department of IT, King Abdullah II School of Information Technology
  • Assistant Professor at University of Jordan

About

53
Publications
21,350
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
370
Citations
Introduction
Dr. Yousef K. Sanjalawe is an accomplished Assistant Professor specializing in Cybersecurity and Cloud Computing. He currently serves at the University of Jordan as an assistant professor. He has an extensive academic and professional background, including previous roles such as Chair of the Cybersecurity Department at the American University of Madaba.
Current institution
University of Jordan
Current position
  • Assistant Professor

Publications

Publications (53)
Article
Full-text available
The connectivity and integration of commodities have transformed many industries through the Internet of Things, enhancing both efficiency and functionality. However, this interconnection has also introduced critical security challenges, necessitating a robust Intrusion Detection System. This paper presents a novel, enhanced method for Intrusion De...
Article
The Cuckoo Search Algorithm (CSA) is an optimization algorithm inspired by the brood parasitism behavior of cuckoo birds. It mimics the reproductive and breeding tactics of cuckoos to tackle optimization challenges. To better handle multi-objective optimization problems (MOPs), a variation called the multi-objective CSA (MOCSA) has been developed....
Article
Full-text available
In the digital era, ensuring data integrity, authenticity, and confidentiality is critical amid growing interconnectivity and evolving security threats. This paper addresses key limitations of traditional steganographic methods, such as limited payload capacity, susceptibility to detection, and lack of robustness against attacks. A novel multi-laye...
Article
Full-text available
Amid the landscape of Cloud Computing (CC), the Cloud Datacenter (DC) stands as a conglomerate of physical servers, whose performance can be hindered by bottlenecks within the realm of proliferating CC services. A linchpin in CC's performance, the Cloud Service Broker (CSB), orchestrates DC selection. Failure to adroitly route user requests with su...
Article
Full-text available
Numerous abnormal transactions have been exposed as a result of targeted attacks on Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting vulnerabilities in smart contracts, malicious users can pursue their own illicit objectives through abnormal transactions. Consequently, identifying these malevolent users, impli...
Article
Full-text available
The interest in selecting an appropriate cloud data center is exponentially increasing due to the popularity and continuous growth of the cloud computing sector. Cloud data center selection challenges are compounded by ever-increasing users' requests and the number of data centers required to execute these requests. Cloud service broker policy defi...
Article
Full-text available
Software-defined networking (SDN) revolutionizes network management by offering centralized control over complex infrastructures, but it also introduces significant security vulnerabilities. particularly Distributed Denial of Service (DDoS) attacks that significantly interrupt network services. The challenge of efficiently detecting DDoS attacks in...
Article
Full-text available
Falls are a major concern, particularly for elderly individuals and vulnerable populations, often leading to severe injuries if not detected promptly. Traditional sensor-based fall detection methods suffer from limitations such as discomfort, maintenance challenges, and susceptibility to false readings. To address these issues, we propose a hybrid...
Article
Full-text available
This paper explores the integration of Artificial Intelligence into 6G networks, focusing on optimizing communication, resource allocation, and enhancing security. As communication systems transition from 5G to 6G, Artificial Intelligence’s role in addressing the increasing complexity of network management becomes pivotal. The paper reviews key AI...
Conference Paper
Full-text available
Blockchain technology has catalyzed a revolutionary shift toward decentralized applications, prominently exemplified by Ethereum’s introduction of smart contracts. A smart contract is a self-executing program running on the Ethereum Virtual Machine (EVM), designed to automate and ensure trust in transactions, bypassing traditional intermediaries. N...
Article
Full-text available
Intrusion detection systems (IDS) play a pivotal role in network security and anomaly detection and are significantly impacted by the feature selection (FS) process. As a significant task in machine learning and data analysis, FS is directed toward pinpointing a subset of pertinent features that primarily influence the target variable. This paper p...
Article
Full-text available
This study introduces the Orbit Weighting Scheme (OWS), a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval (IR) models, which have traditionally relied on weighting schemes like tf-idf and BM25. These conventional methods often struggle with accurately capturing document relevance, leading to inef...
Article
Full-text available
The advent of the Internet of Things (IoT) has significantly altered human interaction with the environment, enabling smart ecosystems that simplify day-today activities. Despite these benefits, the expansion of IoT technology has also escalated security and privacy vulnerabilities, necessitating robust network protection mechanisms. This paper int...
Article
Full-text available
Smartphones, digital cameras, and other imaging devices generate vast amounts of high-resolution colored images daily, stored on devices equipped with multi-core central processing units or on the cloud. Safeguarding these images from potential attackers has become a pressing concern. This paper introduces a set of six innovative image ciphers desi...
Conference Paper
The escalating prevalence of cyber-activities under-scores the compelling need for advanced protective mechanisms, with Intrusion Detection Systems (IDS) emerging as a pivotal line of defense. Within the operational domain of IDS, the judicious selection of features plays a critical role in enhancing system accuracy and efficiency. This paper initi...
Conference Paper
Full-text available
This paper presents a novel approach to enhancing real-time surveillance systems using an augmented YOLO (You Only Look Once) v8 architecture. The primary focus is on integrating advanced security features into the YOLO framework to improve the detection and analysis of moving objects in various surveillance scenarios. The key enhancements include...
Article
Full-text available
Auto-scaler system enables high Quality of Service (QoS) with low cost to survive in a competitive market. Indeed, the auto-scaling of Virtual Network Functionality (VNFs) can adaptively allocate the Cloud resources for various VNFs based on workload demands at any time. However, the intensity of workload is dynamically changed because of the varia...
Article
Full-text available
Amid the landscape of Cloud Computing (CC), the Cloud Datacenter (DC) stands as a conglomerate of physical servers, whose performance can be hindered by bottlenecks within the realm of proliferating CC services. A linchpin in CC’s performance, the Cloud Service Broker (CSB), orchestrates DC selection. Failure to adroitly route user requests with su...
Article
Full-text available
In recent years, there has been an increasing interest in employing chaotic-based random number generators for cryptographic purposes. However, many of these generators produce sequences that lack the necessary strength for cryptographic systems, such as Tent-Map. However, these generators still suffer from common issues when generating random numb...
Article
Full-text available
In recent years, there has been an increasing interest in employing chaotic-based random number generators for cryptographic purposes. However, many of these generators produce sequences that lack the necessary strength for cryptographic systems, such as Tent-Map. However, these generators still suffer from common issues when generating random numb...
Article
Full-text available
The Onion Router (TOR) network is a decentralized system of volunteer-run servers that aims to protect the anonymity and privacy of users by routing their internet traffic through a series of nodes. Individuals who use the TOR network may employ obfuscated traffic to conceal their internet activity from network administrators or security systems at...
Article
Full-text available
Intrusion Detection System (IDS) in the cloud Computing (CC) environment has received paramount interest over the last few years. Among the latest approaches, Deep Learning (DL)-based IDS methods allow the discovery of attacks with the highest performance. In the CC environment, Distributed Denial of Service (DDoS) attacks are widespread. The cloud...
Article
Full-text available
Numerous abnormal transactions have been exposed as a result of targeted attacks on Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting vulnerabilities in smart contracts, malicious users can pursue their own illicit objectives through abnormal transactions. Consequently, identifying these malevolent users, impli...
Article
Nowadays, the world is increasingly becoming more connected and dependent on the Internet and Internet-based services. One of the main challenges of interconnectedness is the security of applications and networks from malicious actors. The security challenge is further compounded by the exponential growth of threats and the increase in attack vecto...
Article
With the fast advancement in digital news, fake news has already caused grave threats to the public’s actual judgment and credibility, in specific, with the wide use of social networking platforms, which provide a rich environment for the generation and dissemination of fake news. To cope with these challenges, several techniques were proposed to d...
Article
Full-text available
Software testing is an essential part of the software development life cycle. However, due to limited time and resources, extensive testing of highly configurable software is impractical. In addition, extensive testing can lead to combinatorial explosion problems, where test cases grow exponentially with the increase in software input. Because of t...
Article
Full-text available
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the...
Article
Full-text available
The interest in selecting an appropriate cloud data center is exponentially increasing due to the popularity and continuous growth of the cloud computing sector. Cloud data center selection challenges are compounded by ever-increasing users’ requests and the number of data centers required to execute these requests. Cloud service broker policy defi...
Article
Full-text available
The Software-Defined Networking (SDN) technology improves network management over existing technology via centralized network control. The SDN provides a perfect platform for researchers to solve traditional network’s outstanding issues. However, despite the advantages of centralized control, concern about its security is rising. The more tradition...
Article
Full-text available
The number of network users and devices has exponentially increased in the last few decades, giving rise to sophisticated security threats while processing users’ and devices’ network data. Software-Defined Networking (SDN) introduces many new features, but none is more revolutionary than separating the control plane from the data plane. The separa...
Article
With the advancement of information technologies, the digitalisation of education has taken place in the form of High Impact Educational Practices (HIEPs). However, the COVID-19 outbreak in 2020 led to transition from traditional education to online education. However, while online education tools serve different educational purposes they are still...
Chapter
Full-text available
A few datasets of blockchain networks are available to be used in evaluating intrusion detection systems, and some of the proposed detection systems are evaluated as self-generated blockchain transactions’ datasets. These blockchain datasets use an unsuitable representation, which mainly depends on transaction format, and they contain non-qualified...
Chapter
Full-text available
With the growing volume of network throughput, packet transmission and security threats and attacks in Fog computing, the study of Intrusion Detection Systems (IDSs) in this environment has grabbed a lot of attention in the computer science field in general, and security field in particular. Since Fog, computing can be depicted as an emerging cloud...
Chapter
Full-text available
For the time being, the advances of the Internet technologies in respect of a wide-spread development and the fixed nature of traditional networks have the restricted capacity to satisfy organizational business requirements. Software-Defined Networking (SDN) as a new network architecture presented to overcome these challenges and issues of the exis...
Article
Full-text available
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from the data plane that incidentally provides better features and functionalities to detect and deal...
Article
One of the most critical issues of all of networks types that integrate the both of wired and wireless technologies is the performance and applicability of the electronic authentication and identification techniques. These schemes involve various technologies of different levels of security. This research presents a comparative study of six IDAM av...
Article
In last decades, the continuous enhancements of computational power have produced a massive data flow. Big data has been becoming more understandable as well as becoming more available. For instance, the famous online social networks, such as Facebook, and twitter, serve about 560 billion page views everyone’s month. They also store new number of i...
Article
Cloud computing is a new development of grid, parallel, and distributed computing with visualization techniques. It is changing the IT industry in a prominent way. Cloud computing has grown due to its advantages like storage capacity, resources pooling and multi-tenancy. On the other hand, the cloud is an open environment and since all the services...

Network

Cited By