Shadi Aljawarneh

Learn More
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failures in the software, and can also break the security upon web applications such as an unauthorized access to data. Now, it is estimated the web application vulnerabilities (such as(More)
Encryption algorithms play a main role in wireless network security systems. However, those algorithms consume a significant amount of computing resources such as CPU time, and packet size. In an attempt to remedy the wireless network security issue, a novel work has been deployed to secure the transmitted data over wireless network, called a secure WiFi(More)
Many e-learning tools are currently available for using in education. E-learning tools can provide training and education to large number of students with diverse cultural backgrounds and educational levels. However, e-learning could be failed in education when overestimating what e-learning can accomplish. Some people normally do not understand the(More)
In this paper we propose a novel routing algorithm called Bees Ants algorithm. This algorithm is a combination of Ant colony based Routing Algorithm (ARA) and BeeHive based Routing Algorithm. The proposed routing algorithm depends on splitting the network into two parts; one is a fixed network and the other is a mobile ad hoc network (MANET), then applying(More)
A multi-agent system (MAS) is a system composed of multiple interacting intelligent agents. Multi-agent systems can be used to solve problems which are difficult or impossible for an individual agent or monolithic system to solve. In this paper, we propose a security system based on multi agents and wireless sensors to secure the buildings and faculties of(More)
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication, it becomes increasingly important to secure the data flow path. The(More)
The provision of web services is a real-time process, conducted in ad-hoc, ‘off the cuff’ manner. Consequently the verification of the data content and the identification of any authorized data interference or manipulation are not without problems. Some progress has been made in addressing the verification of server content integrity, but current solutions(More)