Follow
Malik Qasaimeh
Title
Cited by
Cited by
Year
A systematic review of detection and prevention techniques of SQL injection attacks
M Nasereddin, A ALKhamaiseh, M Qasaimeh, R Al-Qassas
Information Security Journal: A Global Perspective 32 (4), 252-265, 2023
332023
Comparing agile software processes based on the software development project requirements
M Qasaimeh, H Mehrfard, A Hamou-Lhadj
2008 International Conference on Computational Intelligence for Modelling …, 2008
332008
Black box evaluation of web application scanners: Standards mapping approach
M Qasaimeh, A Shamlawi, T Khairallah
Journal of Theoretical and Applied Information Technology 96 (14), 4584-4596, 2018
262018
Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security
M Qasaimeh, RS Al-Qassas, S Tedmori
Multimedia Tools and Applications 77, 18415-18449, 2018
252018
A novel simplified aes algorithm for lightweight real-time applications: Testing and discussion
M Qasaimeh, RS Al-Qassas, F Mohammad, S Aljawarneh
Recent Advances in Computer Science and Communications (Formerly: Recent …, 2020
232020
An audit model for ISO 9001 traceability requirements in agile-xp environments.
M Qasaimeh, A Abran
J. Softw. 8 (7), 1556-1567, 2013
222013
Recent development in smart grid authentication approaches: A systematic literature review
M Qasaimeh, RS Al-Qassas, S Aljawarneh
Cybernetics and Information Technologies 19 (1), 27-52, 2019
182019
Extending extreme programming user stories to meet ISO 9001 formality requirements
M Qasaimeh, A Abran
Journal of Software Engineering and Applications 4 (11), 626, 2011
172011
Investigating the capability of agile processes to support medical devices regulations: The case of xp, scrum, and FDD with EU MDR regulations
M Alsaadi, A Lisitsa, M Khalaf, M Qasaimeh
Intelligent Computing Methodologies: 15th International Conference, ICIC …, 2019
142019
Authentication techniques in smart grid: a systematic review.
M Qasaimeh, R Turab, RS Al-Qassas
Telkomnika 17 (3), 2019
142019
Enhancing data protection provided by VPN connections over open WiFi networks
A Karaymeh, M Ababneh, M Qasaimeh, M Al-Fayoumi
2019 2nd International Conference on new Trends in Computing Sciences (ICTCS …, 2019
132019
Minimizing the ambiguities in medical devices regulations based on software requirement engineering techniques
M Alsaadi, A Lisitsa, M Qasaimeh
Proceedings of the second international conference on data science, e …, 2019
122019
Investigation of the capability of XP to support the requirements of ISO 9001 software process certification
M Qasaimeh, A Abran
2010 Eighth ACIS International Conference on Software Engineering Research …, 2010
122010
Software design and experimental evaluation of a reduced aes for iot applications
M Qasaimeh, RS Al-Qassas, M Ababneh
Future Internet 13 (11), 273, 2021
102021
Email fraud attack detection using hybrid machine learning approach
YA Yaseen, M Qasaimeh, RS Al-Qassas, M Al-Fayoumi
Recent Advances in Computer Science and Communications (Formerly: Recent …, 2021
102021
Intrusion detection system for malicious traffic using evolutionary search algorithm
S Al-Saqqa, M Al-Fayoumi, M Qasaimeh
Recent Advances in Computer Science and Communications (Formerly: Recent …, 2021
102021
Attack based DoS attack detection using multiple classifier
M Abushwereb, M Mustafa, M Al-Kasassbeh, M Qasaimeh
arXiv preprint arXiv:2001.05707, 2020
92020
HIPAA security and privacy rules auditing in extreme programming environments
M Alsaadi, M Qasaimeh, S Tedmori, K Almakadmeh
Data Analytics in Medicine: Concepts, Methodologies, Tools, and Applications …, 2020
92020
Framework for blockchain deployment: the case of educational systems
S Kazakzeh, E Ayoubi, BK Muslmani, M Qasaimeh, M Al-Fayoumi
2019 2nd International Conference on new Trends in Computing Sciences (ICTCS …, 2019
72019
Systematic review of e-commerce security issues and customer satisfaction impact
M Qasaimeh, NA Halemah, R Rawashdeh, RS Al-Qassas, A Qusef
2022 International Conference on Engineering & MIS (ICEMIS), 1-8, 2022
62022
The system can't perform the operation now. Try again later.
Articles 1–20