×
ahmed saleh shatnawi
• Department of Network Engineering and Security - Faculty Member
• Department of Software Engineering - Faculty Member
• Information Technology and Communication Center - Head of the Center

  • Ph.D. of Engineering from University of Wisconsin Milwaukee, 2017
  • Msc. of Software Engineering from George Mason University, 2012
  • Bsc. of Computer Engineering from Jordan University of Science and Technology, 2007

    Publications
  • Shatnawi, Ahmed  S. and Coley, Nicholas and Titi, Hani  H., "Interactive Data Framework and User Interface for Wisconsin?s Oversize-Overweight Vehicle Permits," Data, vol. 3, no. 2, pp. 0-0, 2018
  • Abdel-Hafeez, Saleh; Albosul, Asem; Shatnawi, Ahmad; Gordon-Ross, Ann; Harb, Shadi, "A Shadow Dynamic Finite State Machine for Branch Prediction: An Alternative for the 2-bit Saturating Counter.," Informatica, vol. 25, no. 2, pp. 0-0, 2011
  • Al-Duwairi, Basheer and Jarrah, Moath and Shatnawi, Ahmed, "PASSVM: A Highly Accurate Online Fast Flux Detection System," arXiv preprint arXiv:2006.03566, vol. , no. , pp. 0-0, 2020
  • Al-Sharif, Ziad A and Al-Saleh, Mohammed I and Jararweh, Yaser and Alawneh, Luay and Shatnawi, Ahmed S, "The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach.," J. UCS, vol. 25, no. , pp. 1174-1198, 2019
  • Shatnawi, Ahmed S. and Coley, Nicholas and Titi, Hani H., "Interactive Data Framework and User Interface for Wisconsin?s Oversize-Overweight Vehicle Permits," Data, vol. 3, no. , pp. 0-0, 2018, MDPI
  • Al-Sharif, Ziad A and Al-Saleh, Mohammed I and Jararweh, Yaser and Alawneh, Luay and Shatnawi, Ahmed S, "The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach.," J. Univers. Comput. Sci., vol. 25, no. , pp. 1174-1198, 2019
  • Al-Duwairi, Basheer and Jarrah, Moath and Shatnawi, Ahmed S, "PASSVM: A highly accurate fast flux detection system," Computers \& Security, vol. 110, no. , pp. 0-0, 2021, Elsevier Advanced Technology
  • Malkawi, Mohammad and Al-Zoubi, Khaldoon and Shatnawi, Ahmed S, "Quasi Real-Time Intermodulation Interference Method: Analysis and Performance," International Journal of Communication Networks and Information Security, vol. 13, no. , pp. 125-135, 2021, Kohat University of Science and Technology (KUST)
  • Mohammad Malkawi,Ahmed Shatnawi, Khaldoon Al-Zoubi, Luay Alawneh, "Improving Network Entry Procedure in Broadband Wi-Fi Networks," International Journal on Communications Antenna and Propagation (IRECAP), vol. 11, no. , pp. 0-0, 2021
  • Alawneh, Luay and Al-Ayyoub, Mahmoud and Al-Sharif, Ziad A and Shatnawi, Ahmed, "Personalized human activity recognition using deep learning and edge-cloud architecture," Journal of Ambient Intelligence and Humanized Computing, vol. , no. , pp. 1-13, 2022, Springer Berlin Heidelberg
  • Malkawi, Mohammad Issam and Abidah, Ehab Mohammad and Shatnawi, Ahmed S, "A Software Evolution Process Model: Analysis of Software Failure Causes," , vol. , no. , pp. 0-0, 2022
  • Abdel-Hafeez, Saleh and Gordon-Ross, Ann and Albosul, Asem and Shatnawi, Ahmad and Harb, Shadi, "A shadow dynamic finite state machine for branch prediction: an alternative for the 2-bit saturating counter," Informatica, vol. 35, no. , pp. 0-0, 2011
  • Mahmoud Al-Dwairi, Ahmed S. Shatnawi, Osama Al-Khaleel, and Basheer Al-Duwairi, "Ransomware-Resilient Self-Healing XML Documents," Future Internet, vol. 14, no. , pp. 0-0, 2022, MDPI
  • Shatnawi, Ahmed S and Al-Duwairi, Basheer and Almazari, Mahmoud M and Alshakhatreh, Mohammad S and Khader, Ahmad N and Abdullah, Abdullah A, "Adaptable Plug and Play Security Operations Center Leveraging a Novel Programmable Plugin-based Intrusion Detection and Prevention System," arXiv preprint arXiv:2204.04576, vol. , no. , pp. 0-0, 2022
  • Ahmed S. Shatnawi , Aya Jaradat , Tuqa Bani Yaseen, Eyad Taqieddin , Mahmoud Al-Ayyoub, Dheya Mustafa, "An Android Malware Detection Leveraging Machine Learning," Wireless Communications and Mobile Computing, vol. 2022, no. , pp. 0-0, 2022, Hindawi
  • Al-Share, Rama A and Shatnawi, Ahmed S and Al-Duwairi, Basheer, "Detecting and Mitigating Collusive Interest Flooding Attacks in Named Data Networking," IEEE Access, vol. , no. , pp. 0-0, 2022, IEEE
  • Almazari, Mahmoud M. and Taqieddin, Eyad S. and Shatnawi, Ahmed S. and AlShara, Zakarea, "RSA Private Keys and the Presence of Weak Keys: An Evaluation," , vol. , no. , pp. 0-0, 2022
  • A Shatnawi, EV Munson, C Thao, "Maintaining Integrity and Non-Repudiation in Secure Offline Documents," ACM Symposium on Document Engineering, Sep 2017, pp. 0-0
  • A Shatnawi, EV Munson, "Enhanced Automated Policy Enforcement eXchange framework (eAPEX)," roceedings of the ACM Symposium on Document Engineering 2019, , pp. 0-0
  • A. M. Al-Rawashdeh, Z. A. Al-Sharif, M. I. Al-Saleh and A. S. Shatnawi, "A Post-Mortem Forensic Approach for the Kik Messenger on Android," , 2020, pp. 79-84, IEEE
  • Shatnawi, Ahmed and Munson, Ethan V and Thao, Cheng, "Maintaining integrity and non-repudiation in secure offline documents," , 2017, pp. 59-62
  • Shatnawi, Ahmed S and Munson, Ethan V, "Enhanced Automated Policy Enforcement eXchange framework (eAPEX)," , 2019, pp. 1-4
  • A. M. Al-Rawashdeh, Z. A. Al-Sharif, M. I. Al-Saleh and A. S. Shatnawi, "A Post-Mortem Forensic Approach for the Kik Messenger on Android," , 2020, pp. 79-84, IEEE
  • Shatnawi, Ahmed S and Munson, Ethan V, "Interactive and Scalable visualization framework for Version-aware XML documents," , 2020, pp. 1-4
  • Al-Kahla, Wafaa and Shatnawi, Ahmed S and Taqieddin, Eyad, "A Taxonomy of Web Security Vulnerabilities," , 2021, pp. 424-429, IEEE
  • Al-Syouf, Raghad and Al-Duwairi, Basheer and Shatnawi, Ahmad S, "Towards a Secure Web-Based Smart Homes," , 2021, pp. 195-200, IEEE
  • Shatnawi, Ahmad and Drine, Abderraouf and Al-Zinati, Mohammad and Althebyan, Qutaibah, "Simulation study of speed control at congested arms of roundabouts," , 2021, pp. 1-5, IEEE
  • Al-Share, Rama and Abu-Akleek, Fatima and Shatnawi, Ahmed S and Taqieddin, Eyad, "Performance Evaluation of Online Website Safeguarding Tools Against Phishing Attacks; a Comparative Assessment," , 2022, pp. 161-168, Springer, Cham
  • Al-Duwairi, Basheer and Shatnawi, Ahmed S and Jaradat, Hala and Al-Musa, Afnan and Al-Awadat, Hamzah, "On the Digital Forensics of Social Networking Web-based Applications," , 2022, pp. 1-6, IEEE
  • "An Android Malware Detection Leveraging Machine Learning", Wireless Communications and Mobile Computing
  • "An evaluation of the RSA private keys and the presence of weak keys", Journal of Discrete Mathematical Sciences and Cryptography
  • "Analyzing the Effect of Driving Speed on the Performance of Roundabouts", International Arab Journal of Information Technology
  • "Detecting and Mitigating Collusive Interest Flooding Attacks in Named Data Networking", IEEE Access
  • "PASSVM: A Highly Accurate Fast Flux Detection System", Computers & Security
  • "Personalized human activity recognition using deep learning and edge-cloud architecture", Journal of Ambient Intelligence and Humanized Computing
  • "RSA cryptanalysis ? Fermat factorization exact bound and the role of integer sequences in factorization problem", Journal of Information Security and Applications
  • "Ransomware-Resilient Self-Healing XML Documents", Future Internet
  • "The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach", Journal of Universal Computer Science
  • Head of the Center, Information Technology and Communication Center, Sep 2023 - Present
  • Head of the Center, Information Technology and Communication Center, Sep 2022 - Sep 2023
  • Head of the Center, Information Technology and Communication Center, Jan 2022 - Sep 2022
  • Deputy Head of the Center, Vice director, Sep 2018 - Sep 2019
  • Faculty Member, Department of Software Engineering, Mar 2018 - Present
  • Full-time Lecturer, Department of Software Engineering, Mar 2018 - Mar 2018
  • Instructor and Graduate Teaching Assistant, University of Wisconsin Milwaukee, U.S.A, Aug 2014- Dec 2017
  • Security Coordinator-Risk Assessment Support, University of Wisconsin Milwaukee, U.S.A, Jan 2014- Aug 2014
  • Senior Engineer, Blue Sky Broadband, U.S.A, Aug 2012- Feb 2013
  • Web application programmer, George Mason University, U.S.A, Jun 2011- Aug 2011
  • Teaching Assistant, JORDAN UNIVERSITY OF SCIENCE AND TECHNOLOGY, Jordan, Jan 2007- Aug 2010
  • Software Engineer, HORIZONS MEDIA AND INFORMATION SERVICES, Jordan, Sep 2006- Jan 2007
  • ADVANCED NETWORK SECURITY
  • CRYPTOGRAPHY AND NETWORK SECURITY
  • PRACTICAL TRAINING
  • SOFTWARE ENGINEERING FOR WEB APPLICATIONS
  • SOFTWARE SECURITY
  • SPECIAL TOPICS IN COMPUTER ENGINEERING (3)
  • WEB APPLICATIONS SECURITY
  • Intermediate Computer Programming(CS 251)
  • ASP.NET and C#