Yousef Jaradat

Learn More
BACKGROUND High levels of perceived stressful working conditions have been found to have an adverse effect on physical and mental health. OBJECTIVES To examine the associations between self-reported stressful working conditions and Psychosomatic Symptoms (PSS), and to investigate possible gender differences. METHODS The present cross-sectional study(More)
Web phishing attacks are one of the challenging security threats. Phishing depends on humans’ behavior but not protocols and devices vulnerabilities. In this work, software defined networking (SDN) will be tailored to tackle phishing attacks. In SDN, network devices forward received packets to a central point ‘controller’ that makes decision on behalf of(More)
—Distributed network protocols operate similar to periodic state machines, utilizing internal states and timers for network coordination, which creates opportunities for carefully engineered radio jamming to target the protocol operating periods and disrupt network communications. Such periodic attacks targeting specific protocol period/frequency of(More)
Modeling Internet structure as an autonomous system (AS) graph has attracted researchers over years. AS graph model demonstrates the power-law distribution of the Internet. It also demonstrates the relationship between the cluster coefficient and the small-world structure of the Internet. To obtain an accurate AS graph model, the data used to generate the(More)
  • 1