<?xml version="1.0"?>
<dblpperson name="Ja'far Alqatawna" pid="69/1058" n="21">
<person key="homepages/69/1058" mdate="2009-06-09">
<author pid="69/1058">Ja'far Alqatawna</author>
</person>
<r><article key="journals/ijdcf/KaradshehAAAA22" mdate="2023-08-28">
<author pid="73/9707">Louay Karadsheh</author>
<author pid="03/5026">Haroun Alryalat</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<author pid="328/5031">Samer Fawaz Alhawari</author>
<author orcid="0000-0002-3949-6475" pid="263/4483">Mufleh Amin Al-Jarrah</author>
<title>The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable.</title>
<pages>1-26</pages>
<year>2022</year>
<volume>14</volume>
<journal>Int. J. Digit. Crime Forensics</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.4018/ijdcf.286762</ee>
<ee>https://www.wikidata.org/entity/Q114928683</ee>
<url>db/journals/ijdcf/ijdcf14.html#KaradshehAAAA22</url>
</article>
</r>
<r><article key="journals/ijim/KhalafatAAEK21" mdate="2025-03-13">
<author pid="346/5714">Monther Khalafat</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<author orcid="0000-0001-7699-9074" pid="52/8946">Rizik M. H. Al-Sayyed</author>
<author orcid="0000-0001-5325-5304" pid="218/7176">Mohammed Eshtay</author>
<author pid="250/0261">Thaeer Kobbaey</author>
<title>Violence Detection over Online Social Networks: An Arabic Sentiment Analysis Approach.</title>
<pages>90</pages>
<year>2021</year>
<month>July</month>
<volume>15</volume>
<journal>Int. J. Interact. Mob. Technol.</journal>
<number>14</number>
<ee type="oa">https://doi.org/10.3991/ijim.v15i14.23029</ee>
<url>db/journals/ijim/ijim15.html#KhalafatAAEK21</url>
</article>
</r>
<r><article key="journals/istr/HijawiAAHF21" mdate="2021-05-06">
<author pid="210/1032">Wadi' Hijawi</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<author pid="210/0901">Ala' M. Al-Zoubi</author>
<author pid="220/0089">Mohammad A. Hassonah</author>
<author pid="58/10459">Hossam Faris</author>
<title>Android botnet detection using machine learning models based on a comprehensive static analysis approach.</title>
<pages>102735</pages>
<year>2021</year>
<volume>58</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2020.102735</ee>
<url>db/journals/istr/istr58.html#HijawiAAHF21</url>
</article>
</r>
<r><article key="journals/jis/Al-ZoubiAFH21" mdate="2025-01-19">
<author orcid="0000-0003-0414-3570" pid="210/0901">Ala' M. Al-Zoubi</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<author pid="58/10459">Hossam Faris</author>
<author pid="220/0089">Mohammad A. Hassonah</author>
<title>Spam profiles detection on social networks using computational intelligence methods: The effect of the lingual context.</title>
<year>2021</year>
<volume>47</volume>
<journal>J. Inf. Sci.</journal>
<number>1</number>
<ee>https://doi.org/10.1177/0165551519861599</ee>
<ee>https://www.wikidata.org/entity/Q127399191</ee>
<url>db/journals/jis/jis47.html#Al-ZoubiAFH21</url>
</article>
</r>
<r><inproceedings key="conf/kes/KiwanukaKAA21" mdate="2022-10-24">
<author pid="66/7266">Fred N. Kiwanuka</author>
<author pid="73/9707">Louay Karadsheh</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<author pid="95/6716">Anang Hudaya Muhamad Amin</author>
<title>Modeling Employee Flexible Work Scheduling As A Classification Problem.</title>
<pages>3281-3290</pages>
<year>2021</year>
<booktitle>KES</booktitle>
<ee type="oa">https://doi.org/10.1016/j.procs.2021.09.101</ee>
<crossref>conf/kes/2021</crossref>
<url>db/conf/kes/kes2021.html#KiwanukaKAA21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/blockchain/AminAPKA19" mdate="2025-10-14">
<author orcid="0000-0002-2010-9789" pid="95/6716">Anang Hudaya Muhamad Amin</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<author orcid="0000-0002-4863-1333" pid="233/9238">Sujni Paul</author>
<author pid="66/7266">Fred N. Kiwanuka</author>
<author pid="243/4447">Imtiaz Ahmad Akhtar</author>
<title>Improving Event Monitoring in IoT Network Using an Integrated Blockchain-Distributed Pattern Recognition Scheme.</title>
<pages>134-144</pages>
<year>2019</year>
<booktitle>BLOCKCHAIN</booktitle>
<ee>https://doi.org/10.1007/978-3-030-23813-1_17</ee>
<crossref>conf/blockchain/2019</crossref>
<url>db/conf/blockchain/blockchain2019.html#AminAPKA19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icissp/KiwanukaAAPF19" mdate="2025-10-14">
<author pid="66/7266">Fred N. Kiwanuka</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<author orcid="0000-0002-2010-9789" pid="95/6716">Anang Hudaya Muhamad Amin</author>
<author orcid="0000-0002-4863-1333" pid="233/9238">Sujni Paul</author>
<author pid="58/10459">Hossam Faris</author>
<title>Towards Automated Comprehensive Feature Engineering for Spam Detection.</title>
<pages>429-437</pages>
<year>2019</year>
<booktitle>ICISSP</booktitle>
<ee>https://doi.org/10.5220/0007393004290437</ee>
<crossref>conf/icissp/2019</crossref>
<url>db/conf/icissp/icissp2019.html#KiwanukaAAPF19</url>
</inproceedings>
</r>
<r><article key="journals/kbs/Al-ZoubiFAH18" mdate="2025-01-19">
<author orcid="0000-0003-0414-3570" pid="210/0901">Ala' M. Al-Zoubi</author>
<author orcid="0000-0003-4261-8127" pid="58/10459">Hossam Faris</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<author orcid="0000-0002-7173-8649" pid="220/0089">Mohammad A. Hassonah</author>
<title>Evolving Support Vector Machines using Whale Optimization Algorithm for spam profiles detection on online social networks in different lingual contexts.</title>
<pages>91-104</pages>
<year>2018</year>
<volume>153</volume>
<journal>Knowl. Based Syst.</journal>
<ee>https://doi.org/10.1016/j.knosys.2018.04.025</ee>
<ee>https://www.wikidata.org/entity/Q129941700</ee>
<url>db/journals/kbs/kbs153.html#Al-ZoubiFAH18</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1711-08521" mdate="2018-08-13">
<author pid="210/1032">Wadi' Hijawi</author>
<author pid="58/10459">Hossam Faris</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<author pid="61/10168">Ibrahim Aljarah</author>
<author pid="210/0901">Ala' M. Al-Zoubi</author>
<author pid="210/1006">Maria Habib</author>
<title>EMFET: E-mail Features Extraction Tool.</title>
<year>2017</year>
<volume>abs/1711.08521</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1711.08521</ee>
<url>db/journals/corr/corr1711.html#abs-1711-08521</url>
</article>
</r>
<r><inproceedings key="conf/ccc2/ZaidAH16" mdate="2023-03-23">
<author orcid="0000-0002-1716-9510" pid="250/3573">Aisha Zaid</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<author pid="05/3194">Ammar Huneiti</author>
<title>A Proposed Model for Malicious Spam Detection in Email Systems of Educational Institutes.</title>
<pages>60-64</pages>
<year>2016</year>
<booktitle>CCC</booktitle>
<ee>https://doi.ieeecomputersociety.org/10.1109/CCC.2016.24</ee>
<crossref>conf/ccc2/2016</crossref>
<url>db/conf/ccc2/ccc2016.html#ZaidAH16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccc2/AlqatawnaHAK16" mdate="2023-03-23">
<author pid="69/1058">Ja'far Alqatawna</author>
<author pid="181/6601">Ali Hadi</author>
<author orcid="0000-0002-6694-9193" pid="173/3614">Malek Al-Zewairi</author>
<author pid="231/5603">Mariam Khader</author>
<title>A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes.</title>
<pages>65-69</pages>
<year>2016</year>
<booktitle>CCC</booktitle>
<ee>https://doi.ieeecomputersociety.org/10.1109/CCC.2016.16</ee>
<crossref>conf/ccc2/2016</crossref>
<url>db/conf/ccc2/ccc2016.html#AlqatawnaHAK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccc2/HalasehA16" mdate="2023-03-23">
<author pid="250/3725">Rola Al Halaseh</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<title>Analyzing CyberCrimes Strategies: The Case of Phishing Attack.</title>
<pages>82-88</pages>
<year>2016</year>
<booktitle>CCC</booktitle>
<ee>https://doi.ieeecomputersociety.org/10.1109/CCC.2016.25</ee>
<crossref>conf/ccc2/2016</crossref>
<url>db/conf/ccc2/ccc2016.html#HalasehA16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccc2/AlswitiAAFH16" mdate="2023-03-23">
<author pid="250/3831">Wedyan Alswiti</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<author orcid="0000-0002-5214-6429" pid="38/10606">Bashar Al-Shboul</author>
<author pid="58/10459">Hossam Faris</author>
<author pid="250/3648">Heba Hakh</author>
<title>Users Profiling Using Clickstream Data Analysis and Classification.</title>
<pages>96-99</pages>
<year>2016</year>
<booktitle>CCC</booktitle>
<ee>https://doi.ieeecomputersociety.org/10.1109/CCC.2016.27</ee>
<crossref>conf/ccc2/2016</crossref>
<url>db/conf/ccc2/ccc2016.html#AlswitiAAFH16</url>
</inproceedings>
</r>
<r><article key="journals/scn/Al-ZewairiAA15" mdate="2021-10-14">
<author orcid="0000-0002-6694-9193" pid="173/3614">Malek Al-Zewairi</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<author pid="76/8325">Jalal Atoum</author>
<title>Risk adaptive hybrid RFID access control system.</title>
<pages>3826-3835</pages>
<year>2015</year>
<volume>8</volume>
<journal>Secur. Commun. Networks</journal>
<number>18</number>
<ee>https://doi.org/10.1002/sec.1303</ee>
<url>db/journals/scn/scn8.html#Al-ZewairiAA15</url>
</article>
</r>
<r><article key="journals/fcsc/Al-KadiAAA14" mdate="2025-02-03">
<author orcid="0000-0002-6346-0106" pid="70/2494">Omar S. Al-Kadi</author>
<author orcid="0000-0001-9079-6388" pid="148/8904">Osama Al-Kadi</author>
<author orcid="0000-0001-7699-9074" pid="52/8946">Rizik M. H. Al-Sayyed</author>
<author orcid="0000-0001-8744-4517" pid="69/1058">Ja'far Alqatawna</author>
<title>Road scene analysis for determination of road traffic density.</title>
<pages>619-628</pages>
<year>2014</year>
<volume>8</volume>
<journal>Frontiers Comput. Sci.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s11704-014-3156-0</ee>
<url>db/journals/fcsc/fcsc8.html#Al-KadiAAA14</url>
</article>
</r>
<r><inproceedings key="conf/webist/AlqatawnaSB10" mdate="2011-01-04">
<author pid="69/1058">Ja'far Alqatawna</author>
<author pid="20/1070">Jawed I. A. Siddiqi</author>
<author pid="14/1545">Mohammad Hjouj Btoush</author>
<title>Security in e-Business - Understanding Customers Perceptions and Concerns.</title>
<pages>319-324</pages>
<year>2010</year>
<booktitle>WEBIST (2)</booktitle>
<crossref>conf/webist/2010-2</crossref>
<url>db/conf/webist/webist2010-2.html#AlqatawnaSB10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itng/BtoushSAA09" mdate="2023-03-24">
<author orcid="0000-0002-1730-7135" pid="14/1545">Mohammad Hjouj Btoush</author>
<author pid="20/1070">Jawed I. A. Siddiqi</author>
<author orcid="0000-0001-8744-4517" pid="69/1058">Ja'far Alqatawna</author>
<author pid="06/4417">Babak Akhgar</author>
<title>The State of Play in Jordanian E-government Services.</title>
<pages>1474-1478</pages>
<year>2009</year>
<booktitle>ITNG</booktitle>
<ee>https://doi.org/10.1109/ITNG.2009.115</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ITNG.2009.115</ee>
<crossref>conf/itng/2009</crossref>
<url>db/conf/itng/itng2009.html#BtoushSAA09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csreaEEE/BtoushSGAA08" mdate="2009-02-10">
<author pid="14/1545">Mohammad Hjouj Btoush</author>
<author pid="20/1070">Jawed I. A. Siddiqi</author>
<author pid="70/2521">Michael Grimsley</author>
<author pid="06/4417">Babak Akhgar</author>
<author pid="69/1058">Ja'far Alqatawna</author>
<title>Comparative Review of e-service Maturity Models: 6I Model.</title>
<pages>3-9</pages>
<year>2008</year>
<booktitle>CSREA EEE</booktitle>
<crossref>conf/csreaEEE/2008</crossref>
<url>db/conf/csreaEEE/csreaEEE2008.html#BtoushSGAA08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csreaEEE/AlqatawnaSAB08" mdate="2009-02-10">
<author pid="69/1058">Ja'far Alqatawna</author>
<author pid="20/1070">Jawed I. A. Siddiqi</author>
<author pid="06/4417">Babak Akhgar</author>
<author pid="14/1545">Mohammad Hjouj Btoush</author>
<title>Towards Holistic Approaches to Secure e-Business: A Critical Review.</title>
<pages>245-251</pages>
<year>2008</year>
<booktitle>CSREA EEE</booktitle>
<crossref>conf/csreaEEE/2008</crossref>
<url>db/conf/csreaEEE/csreaEEE2008.html#AlqatawnaSAB08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csreaEEE/AlqatawnaSAB08a" mdate="2009-02-10">
<author pid="69/1058">Ja'far Alqatawna</author>
<author pid="20/1070">Jawed I. A. Siddiqi</author>
<author pid="06/4417">Babak Akhgar</author>
<author pid="14/1545">Mohammad Hjouj Btoush</author>
<title>A Holistic Framework for Secure e-Business.</title>
<pages>257-263</pages>
<year>2008</year>
<booktitle>CSREA EEE</booktitle>
<crossref>conf/csreaEEE/2008</crossref>
<url>db/conf/csreaEEE/csreaEEE2008.html#AlqatawnaSAB08a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/policy/AlqatawnaRF07" mdate="2023-03-23">
<author orcid="0000-0001-8744-4517" pid="69/1058">Ja'far Alqatawna</author>
<author pid="62/4443">Erik Rissanen</author>
<author pid="35/5550">Babak Sadighi Firozabadi</author>
<title>Overriding of Access Control in XACML.</title>
<pages>87-95</pages>
<year>2007</year>
<crossref>conf/policy/2007</crossref>
<booktitle>POLICY</booktitle>
<ee>https://doi.org/10.1109/POLICY.2007.31</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/POLICY.2007.31</ee>
<url>db/conf/policy/policy2007.html#AlqatawnaRF07</url>
</inproceedings>
</r>
<coauthors n="36" nc="5">
<co c="2"><na f="a/Akhgar:Babak" pid="06/4417">Babak Akhgar</na></co>
<co c="0"><na f="a/Akhtar:Imtiaz_Ahmad" pid="243/4447">Imtiaz Ahmad Akhtar</na></co>
<co c="0"><na f="a/Al=Jarrah:Mufleh_Amin" pid="263/4483">Mufleh Amin Al-Jarrah</na></co>
<co c="0"><na f="a/Al=Kadi:Omar_S=" pid="70/2494">Omar S. Al-Kadi</na></co>
<co c="0"><na f="a/Al=Kadi:Osama" pid="148/8904">Osama Al-Kadi</na></co>
<co c="0"><na f="a/Al=Sayyed:Rizik_M=_H=" pid="52/8946">Rizik M. H. Al-Sayyed</na></co>
<co c="0"><na f="a/Al=Shboul:Bashar" pid="38/10606">Bashar Al-Shboul</na></co>
<co c="1"><na f="a/Al=Zewairi:Malek" pid="173/3614">Malek Al-Zewairi</na></co>
<co c="0"><na f="a/Al=Zoubi:Ala=_M=" pid="210/0901">Ala' M. Al-Zoubi</na></co>
<co c="0"><na f="a/Alhawari:Samer_Fawaz" pid="328/5031">Samer Fawaz Alhawari</na></co>
<co c="0"><na f="a/Aljarah:Ibrahim" pid="61/10168">Ibrahim Aljarah</na></co>
<co c="0"><na f="a/Alryalat:Haroun" pid="03/5026">Haroun Alryalat</na></co>
<co c="0"><na f="a/Alswiti:Wedyan" pid="250/3831">Wedyan Alswiti</na></co>
<co c="0"><na f="a/Amin:Anang_Hudaya_Muhamad" pid="95/6716">Anang Hudaya Muhamad Amin</na></co>
<co c="1"><na f="a/Atoum:Jalal" pid="76/8325">Jalal Atoum</na></co>
<co c="2"><na f="b/Btoush:Mohammad_Hjouj" pid="14/1545">Mohammad Hjouj Btoush</na></co>
<co c="0"><na f="e/Eshtay:Mohammed" pid="218/7176">Mohammed Eshtay</na></co>
<co c="0"><na f="f/Faris:Hossam" pid="58/10459">Hossam Faris</na></co>
<co c="4"><na f="f/Firozabadi:Babak_Sadighi" pid="35/5550">Babak Sadighi Firozabadi</na></co>
<co c="2"><na f="g/Grimsley:Michael" pid="70/2521">Michael Grimsley</na></co>
<co c="0"><na f="h/Habib:Maria" pid="210/1006">Maria Habib</na></co>
<co c="1"><na f="h/Hadi:Ali" pid="181/6601">Ali Hadi</na></co>
<co c="0"><na f="h/Hakh:Heba" pid="250/3648">Heba Hakh</na></co>
<co c="-1"><na f="h/Halaseh:Rola_Al" pid="250/3725">Rola Al Halaseh</na></co>
<co c="0"><na f="h/Hassonah:Mohammad_A=" pid="220/0089">Mohammad A. Hassonah</na></co>
<co c="0"><na f="h/Hijawi:Wadi=" pid="210/1032">Wadi' Hijawi</na></co>
<co c="3"><na f="h/Huneiti:Ammar" pid="05/3194">Ammar Huneiti</na></co>
<co c="0"><na f="k/Karadsheh:Louay" pid="73/9707">Louay Karadsheh</na></co>
<co c="1"><na f="k/Khader:Mariam" pid="231/5603">Mariam Khader</na></co>
<co c="0"><na f="k/Khalafat:Monther" pid="346/5714">Monther Khalafat</na></co>
<co c="0"><na f="k/Kiwanuka:Fred_N=" pid="66/7266">Fred N. Kiwanuka</na></co>
<co c="0"><na f="k/Kobbaey:Thaeer" pid="250/0261">Thaeer Kobbaey</na></co>
<co c="0"><na f="p/Paul:Sujni" pid="233/9238">Sujni Paul</na></co>
<co c="4"><na f="r/Rissanen:Erik" pid="62/4443">Erik Rissanen</na></co>
<co c="2"><na f="s/Siddiqi:Jawed_I=_A=" pid="20/1070">Jawed I. A. Siddiqi</na></co>
<co c="3"><na f="z/Zaid:Aisha" pid="250/3573">Aisha Zaid</na></co>
</coauthors>
</dblpperson>

