Adwan Yaseen
Phone: 00970568929419
Address: Arab American University
Palestine
Address: Arab American University
Palestine
less
Related Authors
Jonathan Zittrain
Harvard University
Beat Signer
Vrije Universiteit Brussel
Julita Vassileva
University of Saskatchewan
John F Dooley
Knox College
Antoine Meyer
Université Gustave Eiffel
Roshan Chitrakar
Nepal College of Information Technology
Lev Manovich
Graduate Center of the City University of New York
Dr. Shadab Alam
Jazan University
PALIMOTE JUSTICE
RIVERS STATE POLYTECHNIC
Ferhat Bozkurt
Ataturk University
Uploads
Papers by Adwan Yaseen
front end web applications, in which heinous SQL statements are inserted (injected) into an entry field, web URL, or web
request for execution. “Query Dictionary Based Mechanism” which help detection of malicious SQL statements by storing a
small pattern of each application query in an application on a unique document, file, or table with a small size, secure
manner, and high performance. This mechanism plays an effective manner for detecting and preventing of SQL Injection
Attack (SQLIA), without impact of application functions and performance on executing and retrieving data. In this paper we
proposed a solution for detecting and preventing SQLIAs by using Query Dictionary Based Mechanism.
communicated to people from professional hackers aiming at fooling users to reveal their sensitive
information, the most popular communication channel to those messages is through users’ emails. This
paper presents an intelligent classification model for detecting phishing emails using knowledge discovery,
data mining and text processing techniques. This paper introduces the concept of phishing terms weighting
which evaluates the weight of phishing terms in each email. The pre-processing phase is enhanced by
applying text stemming and WordNet ontology to enrich the model with word synonyms. The model applied
the knowledge discovery procedures using five popular classification algorithms and achieved a notable
enhancement in classification accuracy; 99.1% accuracy was achieved using the Random Forest algorithm
and 98.4% using J48, which is –to our knowledge- the highest accuracy rate for an accredited data set.
This paper also presents a comparative study with similar proposed classification techniques
(MANETs) is a very critical issue when designing MANET
protocols, since many conditions affects the topology of the network,
one critical condition is nodes power; it affects the node availability
and network connectivity, so that the power of overall nodes should
be used wisely to keep the topology stable and durable as far as
possible. Another condition is the node mobility as nodes of
MANET are mobile for all the time, the third condition is the node
itself where the node operational time is considered to be a new
factor. In our work we propose a new method for finding the best
routing path based on these three factors.
working group as an extension for standard TCP, it adds the
capability to split the TCP connection across multiple paths. It
provides higher availability and improves the throughput
between two multi-address endpoints. Many Linux distributions
have been developed to support MPTCP, most of them are open
source which can be modified and compiled to support different
experimental scenarios. Splitting the single path TCP connection
across multiple paths adds new challenges in paths management
and raises new security threats. Some of these threats include
flooding and hijacking attacks performed by on-path and offpath
attackers. In this article, we propose a new algorithm to
mitigate the flooding and hijacking attacks in MPTCP, the
proposed method allows a stateful processing of the initial SYN
message and it’s following SYN_JOIN messages.
front end web applications, in which heinous SQL statements are inserted (injected) into an entry field, web URL, or web
request for execution. “Query Dictionary Based Mechanism” which help detection of malicious SQL statements by storing a
small pattern of each application query in an application on a unique document, file, or table with a small size, secure
manner, and high performance. This mechanism plays an effective manner for detecting and preventing of SQL Injection
Attack (SQLIA), without impact of application functions and performance on executing and retrieving data. In this paper we
proposed a solution for detecting and preventing SQLIAs by using Query Dictionary Based Mechanism.
communicated to people from professional hackers aiming at fooling users to reveal their sensitive
information, the most popular communication channel to those messages is through users’ emails. This
paper presents an intelligent classification model for detecting phishing emails using knowledge discovery,
data mining and text processing techniques. This paper introduces the concept of phishing terms weighting
which evaluates the weight of phishing terms in each email. The pre-processing phase is enhanced by
applying text stemming and WordNet ontology to enrich the model with word synonyms. The model applied
the knowledge discovery procedures using five popular classification algorithms and achieved a notable
enhancement in classification accuracy; 99.1% accuracy was achieved using the Random Forest algorithm
and 98.4% using J48, which is –to our knowledge- the highest accuracy rate for an accredited data set.
This paper also presents a comparative study with similar proposed classification techniques
(MANETs) is a very critical issue when designing MANET
protocols, since many conditions affects the topology of the network,
one critical condition is nodes power; it affects the node availability
and network connectivity, so that the power of overall nodes should
be used wisely to keep the topology stable and durable as far as
possible. Another condition is the node mobility as nodes of
MANET are mobile for all the time, the third condition is the node
itself where the node operational time is considered to be a new
factor. In our work we propose a new method for finding the best
routing path based on these three factors.
working group as an extension for standard TCP, it adds the
capability to split the TCP connection across multiple paths. It
provides higher availability and improves the throughput
between two multi-address endpoints. Many Linux distributions
have been developed to support MPTCP, most of them are open
source which can be modified and compiled to support different
experimental scenarios. Splitting the single path TCP connection
across multiple paths adds new challenges in paths management
and raises new security threats. Some of these threats include
flooding and hijacking attacks performed by on-path and offpath
attackers. In this article, we propose a new algorithm to
mitigate the flooding and hijacking attacks in MPTCP, the
proposed method allows a stateful processing of the initial SYN
message and it’s following SYN_JOIN messages.