Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Ahmad K. Al Hwaitat"'
Publikováno v:
Applied Sciences, Vol 14, Iss 19, p 9142 (2024)
The increasing sophistication and frequency of cyber threats necessitate the development of advanced techniques for detecting and mitigating attacks. This paper introduces a novel cybersecurity-focused Multi-Layer Perceptron (MLP) trainer that utiliz
Externí odkaz:
https://doaj.org/article/17ac92d95b3d4e22bb28ca173bba1457
Publikováno v:
Applied Sciences, Vol 14, Iss 18, p 8280 (2024)
This paper presents a novel hybrid optimization algorithm that combines JADE Adaptive Differential Evolution with Artificial Protozoa Optimizer (APO) to solve complex optimization problems and detect attacks. The proposed Hybrid APO-JADE Algorithm le
Externí odkaz:
https://doaj.org/article/c2f1808493904b38917156464c7e82ac
Publikováno v:
Symmetry, Vol 16, Iss 8, p 966 (2024)
In this paper, we introduce a novel optimization algorithm called the OX optimizer, inspired by oxen animals, which are characterized by their great strength. The OX optimizer is designed to address the challenges posed by complex, high-dimensional o
Externí odkaz:
https://doaj.org/article/1a2bf912b3d149f3a2113b7f28d267f5
Autor:
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara, Ahmad K. Al Hwaitat
Publikováno v:
Information, Vol 15, Iss 1, p 27 (2024)
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors
Externí odkaz:
https://doaj.org/article/fcc33dd3790f4c7a8470fa880acfc92c
Autor:
Mohammad Hashem Ryalat, Hussam N. Fakhouri, Jamal Zraqou, Faten Hamad, Mamon S. Alzboun, Ahmad K. Al hwaitat
Publikováno v:
International Journal of Advanced Computer Science and Applications. 14
Autor:
Saher Manaseer, Ahmad K. Al Hwaitat, Imad Salah, Rizik M. H. Al-Sayyed, Sarah E. Shukri, Hamed S. Al-Bdour
Publikováno v:
Journal of Experimental & Theoretical Artificial Intelligence. 34:749-780
PSO is a remarkable tool for solving several optimisation problems, like global optimisation and many real-life problems. It generally explores global optimal solution via exploiting the particle –...
Autor:
Ahmad K. Al Hwaitat
Publikováno v:
International Journal of Advanced Trends in Computer Science and Engineering. 9:247-254
Autor:
Aitizaz Ali, Muhammad Fermi Pasha, Ong Huey Fang, Rahim Khan, Mohammed Amin Almaiah, Ahmad K. Al Hwaitat
Publikováno v:
Big Data Intelligence for Smart Applications ISBN: 9783030879532
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::35133a042c6b9564f65938c6c3439eeb
https://doi.org/10.1007/978-3-030-87954-9_13
https://doi.org/10.1007/978-3-030-87954-9_13
Autor:
Mohammed Amin Almaiah, Omar Almomani, Adeeb Alsaaidah, Shaha Al-Otaibi, Nabeel Bani-Hani, Ahmad K. Al Hwaitat, Ali Al-Zahrani, Abdalwali Lutfi, Ali Bani Awad, Theyazn H. H. Aldhyani
Publikováno v:
Electronics; Volume 11; Issue 21; Pages: 3571
The growing number of security threats has prompted the use of a variety of security techniques. The most common security tools for identifying and tracking intruders across diverse network domains are intrusion detection systems. Machine Learning cl
Autor:
Rania M.Asaifi, Ahmad K. Al Hwaitat, Ahmad Althunibat, Mohammed Amin Almaiah, Rizik M. Al-Sayed, Khalid K. Adhim, Omar Almomani, Adeeb Alsaaidah, Mohammed Al-Zahrani
Publikováno v:
International Journal of Advanced Computer Science and Applications. 11
Jamming attack is one of the most common threats on wireless networks through sending a high-power signal to the network in order to corrupt legitimate packets. To address Jamming attacks problem, the Particle Swarm Optimization (PSO) algorithm is us