Header image  
God is an imaginary friend of adults
  HOME :Publications:

Refereed Journal Articles

  1. Monther Aldwairi , Yaser Khamayseh, Mohamed Al-Masri, (2012), “Application of artificial bee colony for intrusion detection systems”. Security Comm. Networks. http://dx.doi.org/10.1002/sec.588 [PDF]
  2. Monther Aldwairi , Rami Alsalman, “MALURLS: A lightweight Malicious Website Classification Based on URL Features”, Journal of Emerging Technologies in Web Intelligence (JETWI), Vol. 4, No. 2, pp.128-133, 2012. [PDF]
  3. Mazen Kharbutli, Abdullah Mughrabi, Monther Aldwairi, “Function and Data Parallelization of Wu-Manber Pattern Matching for Intrusion Detection Systems”, Network Protocols and Algorithms, Vol. 4, No. 3, pp. 46–61, 2012. [PDF]
  4. Monther Aldwairi , Bashar Al-Hajasad, Yaser Khamayseh, “A Classifier System for Predicting RNA Secondary Structure”, Accepted for publication in the International Journal of Bioinformatics Research and Applications, 2012. [PDF]
  5. Monther Aldwairi , Haitham Noman, “A Zero-day Attach Exploiting a Yahoo Messenger Vulnerability”. International Journal of Scientific & Engineering Research, Vol. 3, No. 8, 2012. [PDF]
  6. Monther Aldwairi, , Niveen Yaser, “Hybrid Pattern Matching Algorithm for Intrusion Detection Systems”, Journal of Information Assurance and Security, Vol. 6, No. 6, pp.512–521, 2011. [PDF]
  7. Monther Aldwairi , Thomas Conte, Paul Franzon, “Configurable String Matching Hardware for Speeding up Intrusion Detection”. In ACM SIGARCH Computer Architecture News, 33(1):99–107, 2005. Cited by 101. [PDF]

Articles in Refereed Symposia, Conferences and Workshops

  1. Monther Aldwairi, Yahya Flaifel, “Baeza-Yates and Navarro Approximate String Matching for Spam Filtering”, In Proc. of the Second International Conference on Innovative Computing Technology (INTECH 2012), Rabat, Morocco, September 18-20, 2012. [PDF]
  2. Monther Aldwairi , Haitham Noman, A Zero-day Attach Exploiting a Yahoo Messenger Vulnerability”, In Proc. of the 2012 Global Conference for Academic Research (GCAR), Kuala Lumpur, Malaysia, Jun 8-11, 2012. [PDF]
  3. Monther Aldwairi, Duaa AL-ansari, "Exscind: Fast pattern matching for intrusion detection using exclusion and inclusion filters", 7th International Conference on Next Generation Web Services Practices (NWeSP), pp.24-30, 19-21 Oct. 2011. doi: 10.1109/NWeSP.2011.6088148 [PDF]
  4. Monther Aldwairi, Rami Alsalman. MALURLs: Malicious URLs Classification System”. In Proc. of the Annual International Conference on Information Theory and Applications, Singapore, Feb 28, 2011. Best Research Paper Award. [PDF]
  5. Monther Aldwairi , Noor Al-Tarazi. “IP Lookup Using Two-level Indexing and B-Trees”. In the proceedings of the 2010 International Conference on Internet Computing (ICOMP'10), held in conjunction with the 2010 World Congress in Computer Science, Computer Engineering and Applied Computing. Las Vegas, July 12-15, 2010. [PDF]
  6. Monther Aldwairi , Rehab Duwairi, Wafa'a Alqarqaz. A Classification System for Predicting RNA Hairpin Loops. In Proc. of the 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing (IJCBS '09). IEEE Computer Society, Washington, DC, USA, 109-115. [PDF]
  7. Fatima Alharbi, Monther Aldwairi . “Optimizing Antenna Topology in 802.16j Networks Using Genetic Programming”. In Proceedings of Mosharaka International Conference on Communications, Propagation and Electronics (MIC-CPE) Amman, Jordan, 2009. [PDF]
  8. Monther Aldwairi, Thomas Conte, and Paul Franzon. Configurable String Matching Hardware for Speeding up Intrusion Detection. In Proc. of Workshop on architectural support for security and anti-virus (WASSA), held in conjunction with ASPLOS XI. Boston, MA, Oct 04. [PDF]
  9. Monther Aldwairi , M. Guled, M. Cassada, M. Pratt, D. Stevenson, P. Franzon. Switch Architecture for Optical Burst Switching Networks. In proceedings of the first workshop on Optical Burst Switching, OPTICOMM. Dallas, Oct 03. [PDF]

Non-Refereed Research Publications

  1. John Edwards, Paul Franzon, Tome Conte, Shobhit Kanaujia, Monther Aldwairi , Meeta Yadav, Balaji V. Iyer. Data Compression and Network Processing for Polymorphous Computing Architecture (PCA). Technical Report. Storming Media, Pentagon Reports 2005. [PDF]