Skip to main content

Showing 1–9 of 9 results for author: Aldwairi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.09136  [pdf

    cs.CR

    DocCert: Nostrification, Document Verification and Authenticity Blockchain Solution

    Authors: Monther Aldwairi, Mohamad Badra, Rouba Borghol

    Abstract: Many institutions and organizations require nostrification and verification of qualification as a prerequisite for hiring. The idea is to recognize the authenticity of a copy or digital document issued by an institution in a foreign country and detect forgeries. Certificates, financial records, health records, official papers and others are often required to be attested from multiple entities in d… ▽ More

    Submitted 13 October, 2023; originally announced October 2023.

    Comments: The Fifth International Conference on Blockchain Computing and Applications (BCCA 2023), held in Conjunction with Kuwait Fintech and Blockchain Summit 2023, 24,26 Oct 2023, Kuwait City, Kuwait

  2. arXiv:2211.11518  [pdf

    cs.IR cs.CR

    Evaluating Web Search Engines Results for Personalization and User Tracking

    Authors: Shamma Rashed, Tasnim Said, Amal Abdulrahman, Arsiema Yohannes, Monther Aldwairi

    Abstract: Recently, light has been shed on the trend of personalization, which comes into play whenever different search results are being tailored for a group of users who have issued the same search query. The unpalatable fact that myriads of search results are being manipulated has perturbed a horde of people. With regards to that, personalization can be instrumental in spurring the Filter Bubble effects… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Journal ref: 14th Annual Conference on Undergraduate Research on Applied Computing (ZURC2022)

  3. arXiv:2211.08020  [pdf, other

    cs.CR

    Detecting Malicious Domains Using Statistical Internationalized Domain Name Features in Top Level Domains

    Authors: Alshaima Almarzooqi, Jawahir Mahmoud, Bayena Alzaabi, Arsiema Ghebremichael, Monther Aldwairi

    Abstract: The Domain Name System (DNS) is a core Internet service that translates domain names into IP addresses. It is a distributed database and protocol with many known weaknesses that subject to countless attacks including spoofing attacks, botnets, and domain name registrations. Still, the debate between security and privacy is continuing, that is DNS over TLS or HTTP, and the lack of adoption of DNS s… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Journal ref: 14th Annual Conference on Undergraduate Research on Applied Computing (ZURC2022)

  4. arXiv:2208.12612  [pdf

    cs.CY cs.CR

    Evaluating virtual laboratory platforms for supporting on-line information security courses

    Authors: Monther Aldwairi

    Abstract: Distance education had existed for a long time, then it has undergone a renaissance with the advent of computers and the Internet. Distance education relied on physically delivered material and assessments to students, who work offline at home. More recently, online learning or e-learning introduced virtual classrooms, assessments, online tests and transformed the classroom an into interactive onl… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

    Journal ref: Global Journal of Engineering Education,Volume 24, Number 2, 2022

  5. arXiv:2208.07686  [pdf

    cs.LG cs.AI

    FALSE: Fake News Automatic and Lightweight Solution

    Authors: Fatema Al Mukhaini, Shaikhah Al Abdoulie, Aisha Al Kharuosi, Amal El Ahmad, Monther Aldwairi

    Abstract: Fake news existed ever since there was news, from rumors to printed media then radio and television. Recently, the information age, with its communications and Internet breakthroughs, exacerbated the spread of fake news. Additionally, aside from e-Commerce, the current Internet economy is dependent on advertisements, views and clicks, which prompted many developers to bait the end users to click l… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

    Journal ref: THE IEEE INTERNATIONAL CONFERENCE ON INDUSTRY 4.0, ARTIFICIAL INTELLIGENCE, AND COMMUNICATIONS TECHNOLOGY, 2022

  6. arXiv:2004.09789  [pdf, other

    cs.CR

    PhishOut: Effective Phishing Detection Using Selected Features

    Authors: Suhail Paliath, Mohammad Abu Qbeitah, Monther Aldwairi

    Abstract: Phishing emails are the first step for many of today's attacks. They come with a simple hyperlink, request for action or a full replica of an existing service or website. The goal is generally to trick the user to voluntarily give away his sensitive information such as login credentials. Many approaches and applications have been proposed and developed to catch and filter phishing emails. However,… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

    Comments: 2020 27th International Conference on Telecommunications (ICT), p. 5, Kuta, Bali

  7. arXiv:2004.04497  [pdf, other

    cs.CR

    Efficient and Secure Flash-based Gaming CAPTCH

    Authors: Monther Aldwairi, Suaad Mohammed, Megana Lakshmi Padmanabhan

    Abstract: With the growth of connectivity to smart grids, new applications, and the changing interaction between customer and energy clouds, clouds are more vulnerable to denial-of-service attacks. Efficient detection methods are required to authenticate, detect and control attackers. Completely Automated Public Turing test to tell Computers and Humans Apart, CAPTCHA, is one efficient tool to thwart denial… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

    Journal ref: Journal of Parallel and Distributed Computing, 2020

  8. arXiv:2003.00405  [pdf

    cs.CR

    Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection

    Authors: Monther Aldwairi, Yahya Flaifel, Khaldoon Mhaidat

    Abstract: Network intrusion detection systems and antivirus software are essential in detecting malicious network traffic and attacks such as denial-of-service and malwares. Each attack, worm or virus has its own distinctive signature. Signature-based intrusion detection and antivirus systems depend on pattern matching to look for possible attack signatures. Pattern matching is a very complex task, which re… ▽ More

    Submitted 1 March, 2020; originally announced March 2020.

    Comments: 6 pages

    Journal ref: International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), 28-29th January 2018, Tamil Nadu, India

  9. arXiv:2002.08007  [pdf, other

    cs.CR

    Detection and Analysis of Drive-by Downloads and Malicious Websites

    Authors: Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi

    Abstract: A drive by download is a download that occurs without users action or knowledge. It usually triggers an exploit of vulnerability in a browser to downloads an unknown file. The malicious program in the downloaded file installs itself on the victims machine. Moreover, the downloaded file can be camouflaged as an installer that would further install malicious software. Drive by downloads is a very go… ▽ More

    Submitted 9 April, 2020; v1 submitted 19 February, 2020; originally announced February 2020.

    Journal ref: Seventh International Symposium on Security in Computing and Communications (SSCC'19), December 18-21, 2019, Trivandrum, Kerala, India