Derar Eleyan
YOU?
Author Swipe
Enhancing Web Security through Machine Learning-based Detection of Phishing Websites Open
The rise of cyberattacks has led to an increase in the creation of fake websites by attackers, who use these sites for advertising products, transmit malware, or steal valuable login credentials. Phishing, the act of soliciting sensitive i…
A Survey: Systems and Applications Based on Cloud Computing Open
mobile cloud computing is an emerging technology that combines the power of cloud computing with the ubiquity of smartphones. This technology enables smart devices to access cloud computing resources. It offers various advantages, such as …
Extraversion type of personality and Facebook: A literature review Open
This study aims to understand the relationship between Facebook users’ personalities and their usage pat-terns, with a focus on extraversion traits. Despite the growing body of research on this topic, there remains a scarcity of comprehens…
Social Engineering Attack concepts, frameworks, and Awareness: A Systematic Literature Review Open
The growth of data exchange and the dependency on the digital world through cyberspace raise security risks.Social engineering attacks occupy high percentage of total cybercrimes.It is also classified as the major cause of financial losses…
Responsive Web Design Trend in Official Ministries and Government Institutions Websites in Palestine Open
Websites compatibility with different browsers is quite necessary as modern technology evolves and more new devices are being invented. This paper aims at determining the application of the Responsive Web Design approach in the Palestinian…
Effect of Principal’s Technology Leadership on Teacher’s Technology Integration Open
Technology has changed the way people live .The role of school leadership, teaching approaches, and school innovation have also changed in the industrial era 4.0 due to advanced technology such as Artificial Intelligence and the internet.M…
Evaluation of Machine Learning Techniques for Email Spam Classification Open
Electronic mail (Email) is one of the official and very common way of exchanging data and information over digital and electronic devices.Millions of users worldwide use email to exchange data and information between email servers.On the o…
SQL Injection Detection Tools Advantages and Drawbacks Open
SQL injection attack is a major threat to web application security.It has been rated as one of the most dangerous vulnerabilities for a web-based application.Based on the Open Web Application Security Project (OWASP), it is measured as one…
Adoption Model of Social Customer Relationship Management in the Palestinian Banking Sector Open
Social CRM is a new technology that integrates social networking activities within traditional CRM itself. Social media might be the most effective strategy in the context of CRM technology concerning the availability of efforts and time b…
Cybercrimes during COVID -19 Pandemic Open
COVID-19 pandemic has changed the lifestyle of all aspects of life.These circumstances have created new patterns in lifestyle that people had to deal with.As such, full and direct dependence on the use of the unsafe Internet network in run…
Digital Forensic Tools Used in Analyzing Cybercrime Open
With the development of technology, crime has become not limited to traditional crimes, but has evolved in its modern sense into electronic crimes that have their own tools for penetration, extortion, theft, money laundering and electronic…
School University Consortium to Enhance General Certificate Student’s Prospective and Academic Performance in Palestine Open
This paper introduces a conceptual platform for bringing students and teachers together in a social media consortium. The results extracted from the questionnaire used in this paper exhibits that the majority of the students support and ar…
External Auditors and Earnings Management: Palestinian Evidence Open
Managers in large companies may manipulate earnings reports to suit their desire at the detriment of shareholders and other stakeholders. This may obstruct the companies and their sustainability. The objective of this study is to examine a…
Survey of DoS/DDoS attacks in IoT Open
The term internet of things (IoT) has gained much popularity in the last decade, which can be defined as various connected devices over the internet. IoT has rapidly spread to include all aspects of our lives. For instance, smart houses, s…
Enhancing Software Comments Readability Using Flesch Reading Ease Score Open
Comments are used to explain the meaning of code and ease communications between programmers themselves, quality assurance auditors, and code reviewers. A tool has been developed to help programmers write readable comments and measure thei…
A Proposed Web Application for Quality Improvement of Academic Programs in Higher Education Institutions (HEIs) Open
In this research, we have proposed and developed a web application as an evaluation tool for academic programs in Higher Education Institutions (HEIs). The purpose of this tool is to explore and report strengths and weaknesses in different…
View article: Binary Dragonfly Algorithm for Feature Selection
Binary Dragonfly Algorithm for Feature Selection Open
Wrapper feature selection methods aim to reduce the number of features from the original feature set to and improve the classification accuracy simultaneously. In this paper, a wrapper-feature selection algorithm based on the binary dragon…
S-Shaped vs. V-Shaped Transfer Functions for Ant Lion Optimization Algorithm in Feature Selection Problem Open
Feature selection is an important preprocessing step for classification problems. It deals with selecting near optimal features in the original dataset. Feature selection is an NP-hard problem, so meta-heuristics can be more efficient than…