King Hussein School of Computing Sciences

Malek Al-Zewairi

Publications
  1. Al-Zewairi, M., Hamdan, S., & Al Fayoumi, M. (2017). Enhanced Multi-keyed Risk Adaptive Hybrid RFID Access Control System. In the 18th International Arab Conference on Information Technology (ACIT'2017). IEEE.

 

  1. Al-Zewairi, M., Almajali, S., & Awajan, A. (2017). Experimental Evaluation of a Multi-Layer Feed-Forward Artificial Neural Network Classifier for Network Intrusion Detection System. In 2017 International Conference on New Trends in Computing Sciences (ICTCS) (pp. 167-172). IEEE. https://doi.org/10.1109/ICTCS.2017.29
  2. Al-Zewairi, M., & Naymat, G. (2017). Spotting the Islamist Radical within: Religious Extremists Profiling in the United State. Procedia Computer Science, 113(Supplement C), 162–169. https://doi.org/10.1016/j.procs.2017.08.336
  3. Suleiman, D., Al-Zewairi, M., & Naymat, G. (2017). An Empirical Evaluation of Intelligent Machine Learning Algorithms under Big Data Processing Systems. Procedia Computer Science, 113(Supplement C), 539–544. https://doi.org/10.1016/j.procs.2017.08.270
  4. Al-Zewairi, M., Suleiman, D., & Almajali, S. (2017). An Experimental Software Defined Security Controller for Software Defined Network. In 2017 Fourth International Conference on Software Defined Systems (SDS) (pp. 32–36). IEEE. https://doi.org/10.1109/SDS.2017.7939137
  5. Al-Zewairi, M., Biltawi, M., Etaiwi, W., & Shaout, A. (2017). Agile Software Development Methodologies: Survey of Surveys. Journal of Computer and Communications, 05(05), 74. https://doi.org/10.4236/jcc.2017.55007
  6. Hadi, A., & Al-Zewairi, M. (2017). Using IPython for Teaching Web Scraping. In Social Media Shaping e-Publishing and Academia (pp. 47–54). Springer, Cham. https://doi.org/10.1007/978-3-319-55354-2_5
  7. Alqatawna, J., Hadi, A., Al-Zwairi, M., & Khader, M. (2016). A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes. In 2016 Cybersecurity and Cyberforensics Conference (CCC) (pp. 65–69). IEEE. https://doi.org/10.1109/CCC.2016.16
  8. Al-Zewairi, M., Suleiman, D., & Shaout, A. (2016). Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System. In 2016 Cybersecurity and Cyberforensics Conference (CCC) (pp. 1–7). IEEE. https://doi.org/10.1109/CCC.2016.9
  9. Al-Qura’n, R., Hadi, A., Atoum, J., & Al-Zewairi, M. (2015). Ultrasurf Traffic Classification: Detection and Prevention. International Journal of Communications, Network and System Sciences, 08(08), 304. https://doi.org/10.4236/ijcns.2015.88030
  10. Al-Zewairi, M., Alqatawna, J. ’far, & Atoum, J. (2015). Risk Adaptive Hybrid RFID Access Control System. Security and Communication Networks, 8(18), 3826–3835. https://doi.org/10.1002/sec.1303
  11. Alqatawna, J., Faris, H., Jaradat, K., Al-Zewairi, M., & Adwan, O. (2015). Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution. International Journal of Communications, Network and System Sciences, 08(05), 118. https://doi.org/10.4236/ijcns.2015.85014
  12. Al-Zewairi, M., Alqatawna, J., & Al-Kadi, O. (2011). Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database. In 2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT) (pp. 1–6). https://doi.org/10.1109/AEECT.2011.6132520
Research Interest
  • Network Security
  • RFID and Smart Card Security
  • Cyber Threat Intelligence
  • Intelligence and Security Informatics