Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Malek Al-Zewairi is active.

Publication


Featured researches published by Malek Al-Zewairi.


Security and Communication Networks | 2015

Risk adaptive hybrid RFID access control system

Malek Al-Zewairi; Ja'far Alqatawna; Jalal Atoum

Dynamic environments pose a challenge for traditional access control models where permissions are granted or revoked merely based on predefined and static access policies making them incapable of dynamically adapting to changing conditions. Risk adaptive access control models have been gaining more attention in the research community as an alternative approach to overcome the limitations of traditional access control models. Radio Frequency Identification RFID is an emerging technology widely utilized in both physical and logical access control systems because of its contactless nature, low cost, high read/write speed and long distance operation. Serverless RFID system architecture offers better availability assurance and lower implementation cost, while access rights management is easier in server-based architecture. In this study, we continue to build on our previous research on the privacy and security of RFID access control systems without a backend database in order to overcome its limitations. We propose a hybrid design for a risk adaptive RFID access control system; that is, dynamically alternating between two access control modes, online server-based and offline serverless, to adapt to the level of risk depending on rule-based risk scenarios and current risk value. The proposed design combines features of both serverless and risk adaptive access control systems. Copyright


ieee jordan conference on applied electrical engineering and computing technologies | 2011

Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database

Malek Al-Zewairi; Ja'far Alqatawna; Omar S. Al-Kadi

Radio Frequency Identification (RFID) is one of the most popular Automatic Identification and Data Capture (AIDC) technologies that facilitate objects identification and information exchange over relatively small and widely separated entities. In this paper, the main aim is to address the privacy and security challenges that RFID Access Control Systems face and solve these challenges without relying on back-end database but only the RF subsystem.


Procedia Computer Science | 2017

Spotting the Islamist Radical within: Religious Extremists Profiling in the United State

Malek Al-Zewairi; Ghazi Naymat

Abstract The war on terrorism, radicalism and violent extremism is no longer confined to the battlefield; it has become omnipresent in the recent years with militant, terrorists and insurgent groups actively recruiting new technologies as platform to impel their ideologies worldwide. Nonetheless, one thing remains constant in the fight against radicalism equation, that is, the information about radical individuals, whether personal, demographical, social or economic information. The ability to identify, classify and profile potential radicals based on such information has an appealing trait for security agencies around the world. The Intelligence and Security Informatics research field emphasizes the importance of engaging multidiscipline technologies to provide security-related applications that serve as aiding tools in combating terrorism and other forms of violent extremism. In this paper, the authors focus on radical Islamism and hypothesize that Islamist radicals have identifiable information and behavioral traits that could be utilized to identify their ideological motive uniquely amongst other radicals. Four different supervised machine learning algorithms are applied to validate this hypothesis using the “profiles of individual radicalization in the United States” dataset and their performance is compared and discussed. The evaluation results support the authors’ hypothesis and show that profiling religious extremists can be achieved with high recall and precision using machine learning models.


Procedia Computer Science | 2017

An Empirical Evaluation of Intelligent Machine Learning Algorithms under Big Data Processing Systems

Dima Suleiman; Malek Al-Zewairi; Ghazi Naymat

Abstract The rapid increase in the magnitude of data produced by industries that need to be processed using Machine Learning algorithms to generate business intelligence has created a dilemma for data scientists. This is due to the fact that traditional machine learning platforms such as Weka and R are not designed to handle data with such Volume, Velocity and Variety. Several machine learning algorithms and associated toolkits have been built specifically to work with big data; however, their performance is yet to be evaluated to allow researchers to get the most of these platforms. In this paper, the authors intend to provide an empirical evaluation of two emerging machine learning platforms under big data processing systems namely, H2O and Sparkling Water, by performing an experimental comparison between the two platforms in terms of performance over several generalization error metrics and model training time using the Santander Bank Dataset. Up to the authors’ knowledge, this is the first time such a study is conducted. The evaluation results showed that the H2O platform has significantly outperformed the Sparkling Water platform in terms of model training time almost by fifty percent, while achieving convergent results.


Archive | 2017

Using IPython for Teaching Web Scraping

Ali Hadi; Malek Al-Zewairi

Web scraping constitutes an indispensable part of information gathering and data intelligence. IPython has been the de facto project for data science since 2001. In this chapter, IPython is employed to support educators in teaching the fundamentals of web scraping. The authors identify providing detailed labs as free online resources together with model answers as the main contribution of this chapter.


2017 Fourth International Conference on Software Defined Systems (SDS) | 2017

An experimental Software Defined Security controller for Software Defined Network

Malek Al-Zewairi; Dima Suleiman; Sufyan Almajali

Software Defined Networking is an emerging technology that permits computer network infrastructure to be scaled dynamically as needed while enhancing the manageability of the various network devices in heterogeneous environment as opposed to classical networking. These capabilities emerge from the separation of the data plane from the control plane; thus, allowing the network devices to be programmatically managed and controlled. Similarly, the concept of Software Defined Security allows security solutions such as Firewalls and Intrusion Detection Systems to be dynamically implemented, controlled and managed using programmable interfaces. In this research, the authors propose an experimental software defined security controller based on the Open vSwitch Controller to detect and prevent IP and MAC spoofing attacks on the network. The proposed controller is simulated using Mininet. The simulation results confirm that the proposed controller is capable to detect and prevent the aforementioned attacks with high precision.


2016 Cybersecurity and Cyberforensics Conference (CCC) | 2016

Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System

Malek Al-Zewairi; Dima Suleiman; Adnan Shaout

Traditional access control systems lack the ability to cope with dynamic environments where several factors can affect the decision-making process. On the contrary, Risk-based access control systems offer a preeminent alternative where multiple risk factors sway the access control decision. Nonetheless, risk is often measured qualitatively, and is subject to uncertainty, thus, making it susceptible to underestimating or overestimating its value. Conversely, Fuzzy Inference System has been proven effective in solving problems where uncertainty has a dominant influence over the outcomes, making it an excellent candidate to solve the aforementioned issue. This study improves on the authors previous work in which risk adaptive hybrid RFID access control system is proposed. In this study, a multilevel fuzzy inference system is designed as a supplementary risk assessment model where risk is estimated using fuzzy logic controller. The results showed that the proposed design has significantly improved the overall risk calculation process.


Int'l J. of Communications, Network and System Sciences | 2015

Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution

Ja'far Alqatawna; Hossam Faris; Khalid Jaradat; Malek Al-Zewairi; Omar Adwan


Journal of Computational Chemistry | 2017

Agile Software Development Methodologies: Survey of Surveys

Malek Al-Zewairi; Mariam Biltawi; Wael Etaiwi; Adnan Shaout


Int'l J. of Communications, Network and System Sciences | 2015

Ultrasurf Traffic Classification: Detection and Prevention

Raed Al-Qura’n; Ali Hadi; Jalal Atoum; Malek Al-Zewairi

Collaboration


Dive into the Malek Al-Zewairi's collaboration.

Top Co-Authors

Avatar

Dima Suleiman

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ali Hadi

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar

Ghazi Naymat

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar

Jalal Atoum

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar

Sufyan Almajali

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mariam Biltawi

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge