Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Authors » Ayman Ghaben

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (96)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(111)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Trust(83)
TOPSIS(83)
Financial performance(83)
Sustainability(82)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Artificial intelligence(77)
Knowledge Management(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2184)
Indonesia(1290)
India(788)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Reynold number as a mathematical mechanism for detecting the distributed denial of service HTTP flooding attacks Pages 191-204 Right click to download the paper Download PDF

Authors: Kamal Alieyan, Mohammed Shehab, Ayman Ghaben, Rami Sihwail

DOI: 10.5267/j.ijdns.2025.10.003

Keywords: HTTP flooding, DDoS attacks, Quantitative metrics, Networking security

Abstract:
A distributed denial of service (DDoS) attack is a highly destructive form of organized cyber-attack that targets network computers or online services. Despite the availability of numerous systems for detecting DDoS attacks, the problem remains. This paper proposes the use of mathematical methods that can detect HTTP flooding DDoS attacks effectively. This paper developed an effective mathematical approach using a Reynold number approach for detecting harmful HTTP flooding DDoS packets in incoming traffic flows before they reach the web server. The traffic will be categorized into aggregated packets based on time, and each aggregated packet will be broken down into equally smaller periods known as events, which will then be divided into groups based on (equal packet size with the same inter-arrival time). Because the aggregated packets contain multiple events, this mechanism will determine the value of the Reynold number for each event. If the computed value shows a high Reynold number in the specified group under examination, it will be classified as an HTTP flooding DDoS attack; otherwise, it will be considered normal. In experiments using the ISCX dataset, the proposed mechanism achieves a high accuracy rate of 97.14%.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2026 | Volume: 10 | Issue: 1 | Views: 251 | Reviews: 0

 
2.

Integrating blockchain technology for secure access control in smart home environments: A comprehensive review Pages 373-384 Right click to download the paper Download PDF

Authors: Tariq Bishtawi, Mohammad Shehab, Reem Alzubi, Ayman Ghaben, Suaad M. Alenzi

DOI: 10.5267/j.ijdns.2025.4.003

Keywords: Blockchain, Access control, Smart home, IoT, Cryptographic techniques

Abstract:
Smart home technologies have revolutionized modern living by enhancing convenience, efficiency, and security. In contrast, many interconnected devices introduce significant security and privacy challenges. This comprehensive review investigates the integration of blockchain technology as a robust solution for secure access control in smart home environments. The decentralized and tamper-resistant nature of blockchain technology effectively solves important problems, including device authentication, data integrity, and access management, through the use of cryptography and distributed ledgers. The study synthesizes findings from 52 research papers, categorizing them into three thematic areas: blockchain in access control systems, its applications in IoT, and specific implementations for smart homes. It highlights the transformative potential of blockchain in mitigating vulnerabilities inherent in centralized systems, fostering trust, and enhancing security frameworks. Despite its promising applications, challenges such as scalability, interoperability, and energy consumption persist, warranting further research. This paper stresses the necessity of collaboration to tackle these limitations and enhance blockchain-based access control solutions for smart homes, setting the stage for more secure and user-focused smart environments.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 3 | Views: 1158 | Reviews: 0

 

® 2010-2026 GrowingScience.Com