Skip to main content

and
  1. Article

    Correction to: Example‑dependent cost‑sensitive credit cards fraud detection using SMOTE and Bayes minimum risk

    The article Example-dependent cost-sensitive credit cards fraud detection using SMOTE and Bayes minimum risk,

    Doaa Almhaithawi, Assef Jafar, Mohamad Aljnidi in SN Applied Sciences (2020)

  2. Article

    Open Access

    Anomaly detection optimization using big data and deep learning to reduce false-positive

    Anomaly-based Intrusion Detection System (IDS) has been a hot research topic because of its ability to detect new threats rather than only memorized signatures threats of signature-based IDS. Especially after ...

    Khloud Al Jallad, Mohamad Aljnidi, Mohammad Said Desouki in Journal of Big Data (2020)

  3. Article

    Example-dependent cost-sensitive credit cards fraud detection using SMOTE and Bayes minimum risk

    This paper presents fraud detection problem as one of the most common problems in secure banking research field, due to its importance in reducing the losses of banks and e-transactions companies. Our work wil...

    Doaa Almhaithawi, Assef Jafar, Mohamad Aljnidi in SN Applied Sciences (2020)

  4. Article

    Open Access

    A comparative dimensionality reduction study in telecom customer segmentation using deep learning and PCA

    Telecom Companies logs customer’s actions which generate a huge amount of data that can bring important findings related to customer’s behavior and needs. The main characteristics of such data are the large nu...

    Maha Alkhayrat, Mohamad Aljnidi, Kadan Aljoumaa in Journal of Big Data (2020)

  5. Article

    Open Access

    Big data analysis and distributed deep learning for next-generation intrusion detection system optimization

    With the growing use of information technology in all life domains, hacking has become more negatively effective than ever before. Also with develo** technologies, attacks numbers are growing exponentially e...

    Khloud Al Jallad, Mohamad Aljnidi, Mohammad Said Desouki in Journal of Big Data (2019)

  6. No Access

    Chapter and Conference Paper

    ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets)

    This article deals with access control in Mobile Autonomic Networks (MAutoNets), which are basically mobile ad-hoc networks. Our goal is to build an autonomic access control system. We define the Secure Relati...

    Mohamad Aljnidi, Jean Leneutre in Data Privacy Management and Autonomous Spo… (2010)

  7. No Access

    Chapter and Conference Paper

    Autonomic Security for Home Networks

    Home networks are becoming prevalent and interest in their security is increasing. We introduce in this paper an autonomic security model, in which we deal with a home network as an ad hoc network in general, ...

    Mohamad Aljnidi, Jean Leneutre in Self-Organizing Systems (2006)