Muawya Al-Dalaien
Muawya Al-Dalaien
Other namesMuawya Naser, Mu'awya Al-Dalaien, Mu'awya Naser
Princess Sumaya University of Technology
Verified email at - Homepage
Cited by
Cited by
ELBA-IoT: an ensemble learning model for botnet attack detection in IoT networks
Q Abu Al-Haija, M Al-Dala’ien
Journal of Sensor and Actuator Networks 11 (1), 18, 2022
ECG-RNG: A random number generator based on ECG signals and suitable for securing wireless sensor networks
C Camara, P Peris-Lopez, H Martín, M Aldalaien
Sensors 18 (9), 2747, 2018
Design and analysis of a true random number generator based on GSR signals for body sensor networks
C Camara, H Martín, P Peris-Lopez, M Aldalaien
Sensors 19 (9), 2033, 2019
Powering the internet of things with 5G networks
V Mohanan, R Budiarto, I Aldmour
IGI Global, 2017
Security considerations in embedding RFID in'hajj'system
M Naser, M Rafie, R Budiarto, W Alsalihy
European Journal of Scientific Research 42 (1), 133-138, 2010
Gender effect on cloud computing services adoption by university students: case study of Saudi Arabia
AA Almazroi, E Kabbar, M Naser, H Shen
International Journal of Innovation 7 (1), 155-177, 2019
The usage of E-learning instructional technologies in higher education institutions in the United Arab Emirates (UAE).
L Daouk, M Aldalaien
Turkish Online Journal of Educational Technology-TOJET 18 (3), 97-109, 2019
The influence of human resources management processes (HRMPs) to achieving sustainable competitive advantage
MAAL Jarrah, L Karadsheh, M Naser, S Alhawari
Human performance technology: Concepts, methodologies, tools, and …, 2019
Ping flood attack pattern recognition using a K-means algorithm in an Internet of Things (IoT) network
D Stiawan, ME Suryani, MY Idris, MN Aldalaien, N Alsharif, R Budiarto
IEEE Access 9, 116475-116484, 2021
A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model
M Al Majaly, M Rafie, R Budiarto
2009 International Conference on Signal Acquisition and Processing, 103-107, 2009
Cryptography: Protocols, design, and applications
K Lek, N Rajapakse
Nova Science Publishers, 2012
Internet of Things (IoT) security and privacy
MN Al Dalaien, A Bensefia, SA Hoshang, ARA Bathaqili
Powering the Internet of Things With 5G Networks, 247-267, 2018
Security and Privacy in Communication Networks
X Lin, A Ghorbani, K Ren, S Zhu, A Zhang
Springer International Publishing, 2018
A note on the security of PAP
M Naser, P Peris-Lopez, R Budiarto, BR Álvarez
Computer communications 34 (18), 2248-2249, 2011
SLRV: An RFID Mutual Authentication Protocol Conforming to EPC Generation-2 Standard
I Aldmour, R Budiarto, P Peris-Lopez
TELKOMNIKA (Telecommunication Computing Electronics and Control) 13 (3 …, 2015
E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
NA Abuadhmah, M Naser, A Samsudin
Journal of Computer Science 6 (7), 723, 2010
Spyware Identification for Android Systems Using Fine Trees
M Naser, Q Abu Al-Haija
Information 14 (2), 102, 2023
Android Spyware Detection Using Machine Learning: A Novel Dataset
MK Qabalin, M Naser, M Alkasassbeh
Sensors 22 (15), 5765, 2022
Clients Acceptance towards Mobile Banking Application in Jordan Based on TAM Model
YK Shaheen, AM Elian, RF Ibrahim, M Al Dalain
2021 12th International Conference on Information and Communication Systems …, 2021
Vulnerability Analysis of PAP for RFID Tags
M Naser, P Peris-Lopez, M Rafie, J van der Lubbe
arXiv preprint arXiv:1008.3625, 2010
The system can't perform the operation now. Try again later.
Articles 1–20