Follow
Muawya Naser
Muawya Naser
King Hussein School of Computing Sciences
Verified email at PSUT.edu.jo - Homepage
Title
Cited by
Cited by
Year
ECG-RNG: A random number generator based on ECG signals and suitable for securing wireless sensor networks
C Camara, P Peris-Lopez, H Martín, M Aldalaien
Sensors 18 (9), 2747, 2018
262018
Design and analysis of a true random number generator based on GSR signals for body sensor networks
C Camara, H Martín, P Peris-Lopez, M Aldalaien
Sensors 19 (9), 2033, 2019
212019
ELBA-IoT: an ensemble learning model for botnet attack detection in IoT networks
Q Abu Al-Haija, M Al-Dala’ien
Journal of Sensor and Actuator Networks 11 (1), 18, 2022
202022
Security considerations in embedding RFID in'hajj'system
M Naser, M Rafie, R Budiarto, W Alsalihy
European Journal of Scientific Research 42 (1), 133-138, 2010
182010
Gender effect on cloud computing services adoption by university students: case study of Saudi Arabia
AA Almazroi, E Kabbar, M Naser, H Shen
International Journal of Innovation 7 (1), 155-177, 2019
142019
Ping flood attack pattern recognition using a K-means algorithm in an Internet of Things (IoT) network
D Stiawan, ME Suryani, MY Idris, MN Aldalaien, N Alsharif, R Budiarto
IEEE Access 9, 116475-116484, 2021
92021
The influence of human resources management processes (HRMPs) to achieving sustainable competitive advantage
MAAL Jarrah, L Karadsheh, M Naser, S Alhawari
Human performance technology: Concepts, methodologies, tools, and …, 2019
92019
Cryptography: Protocols, design, and applications
K Lek, N Rajapakse
Nova Science Publishers, 2012
62012
A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model
M Al Majaly, M Rafie, R Budiarto
2009 International Conference on Signal Acquisition and Processing, 103-107, 2009
52009
Internet of Things (IoT) security and privacy
MN Al Dalaien, A Bensefia, SA Hoshang, ARA Bathaqili
Powering the Internet of Things With 5G Networks, 247-267, 2018
42018
A note on the security of PAP
M Naser, P Peris-Lopez, R Budiarto, BR Álvarez
Computer communications 34 (18), 2248-2249, 2011
32011
SLRV: An RFID Mutual Authentication Protocol Conforming to EPC Generation-2 Standard
I Aldmour, R Budiarto, P Peris-Lopez
TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (3 …, 2015
22015
E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
NA Abuadhmah, M Naser, A Samsudin
Journal of Computer Science 6 (7), 723, 2010
22010
Clients Acceptance towards Mobile Banking Application in Jordan Based on TAM Model
YK Shaheen, AM Elian, RF Ibrahim, M Al Dalain
2021 12th International Conference on Information and Communication Systems …, 2021
12021
Vulnerability Analysis of PAP for RFID Tags
M Naser, P Peris-Lopez, M Rafie, J van der Lubbe
arXiv preprint arXiv:1008.3625, 2010
12010
Android Spyware Detection Using Machine Learning: A Novel Dataset
MK Qabalin, M Naser, M Alkasassbeh
Sensors 22 (15), 5765, 2022
2022
New Block Cipher Encryption Based On OTP Algorithm
J Al-Nemri, M Naser
2022 International Conference on Engineering & MIS (ICEMIS), 1-6, 2022
2022
The Law Applicable to P2P Networks on National and International Bases for Violating Intellectual Property Rights
ZK Al-Enizi, M Naser
International Journal of Cyber Warfare and Terrorism (IJCWT) 12 (1), 1-10, 2022
2022
Problems of Proving the Electronic Arbitration Agreement in Applicable International Laws and Agreements
MN Al Dalaien, Z Al Enizi, A Al Dalaien
Journal of Applied Security Research, 1-27, 2021
2021
GPS Week Number Rollover Timestamp Complement
MK Qabalin, M Naser, WM Hawajreh, S Abu-Zaideh
Sensors 21 (23), 7826, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20