ahmed saleh shatnawi
• Department of Network Engineering and Security - Faculty Member
• Department of Software Engineering - Faculty Member
-
-
-
-
-
- Ph.D. of Engineering from University of Wisconsin Milwaukee, 2017
- Msc. of Software Engineering from George Mason University, 2012
- Bsc. of Computer Engineering from Jordan University of Science and Technology, 2007
Publications
-
Shatnawi, Ahmed S. and Coley, Nicholas and Titi, Hani H., "Interactive Data Framework and User Interface for Wisconsin?s Oversize-Overweight Vehicle Permits," Data, vol. 3, no. 2, pp. 0-0, 2018
-
Abdel-Hafeez, Saleh; Albosul, Asem; Shatnawi, Ahmad; Gordon-Ross, Ann; Harb, Shadi, "A Shadow Dynamic Finite State Machine for Branch Prediction: An Alternative for the 2-bit Saturating Counter.," Informatica, vol. 25, no. 2, pp. 0-0, 2011
-
Al-Duwairi, Basheer and Jarrah, Moath and Shatnawi, Ahmed, "PASSVM: A Highly Accurate Online Fast Flux Detection System," arXiv preprint arXiv:2006.03566, vol. , no. , pp. 0-0, 2020
-
Al-Sharif, Ziad A and Al-Saleh, Mohammed I and Jararweh, Yaser and Alawneh, Luay and Shatnawi, Ahmed S, "The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach.," J. UCS, vol. 25, no. , pp. 1174-1198, 2019
-
Shatnawi, Ahmed S. and Coley, Nicholas and Titi, Hani H., "Interactive Data Framework and User Interface for Wisconsin?s Oversize-Overweight Vehicle Permits," Data, vol. 3, no. , pp. 0-0, 2018, MDPI
-
Al-Sharif, Ziad A and Al-Saleh, Mohammed I and Jararweh, Yaser and Alawneh, Luay and Shatnawi, Ahmed S, "The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach.," J. Univers. Comput. Sci., vol. 25, no. , pp. 1174-1198, 2019
-
Al-Duwairi, Basheer and Jarrah, Moath and Shatnawi, Ahmed S, "PASSVM: A highly accurate fast flux detection system," Computers \& Security, vol. 110, no. , pp. 0-0, 2021, Elsevier Advanced Technology
-
Malkawi, Mohammad and Al-Zoubi, Khaldoon and Shatnawi, Ahmed S, "Quasi Real-Time Intermodulation Interference Method: Analysis and Performance," International Journal of Communication Networks and Information Security, vol. 13, no. , pp. 125-135, 2021, Kohat University of Science and Technology (KUST)
-
Mohammad Malkawi,Ahmed Shatnawi, Khaldoon Al-Zoubi, Luay Alawneh, "Improving Network Entry Procedure in Broadband Wi-Fi Networks," International Journal on Communications Antenna and Propagation (IRECAP), vol. 11, no. , pp. 0-0, 2021
-
Alawneh, Luay and Al-Ayyoub, Mahmoud and Al-Sharif, Ziad A and Shatnawi, Ahmed, "Personalized human activity recognition using deep learning and edge-cloud architecture," Journal of Ambient Intelligence and Humanized Computing, vol. , no. , pp. 1-13, 2022, Springer Berlin Heidelberg
-
Malkawi, Mohammad Issam and Abidah, Ehab Mohammad and Shatnawi, Ahmed S, "A Software Evolution Process Model: Analysis of Software Failure Causes," , vol. , no. , pp. 0-0, 2022
-
Abdel-Hafeez, Saleh and Gordon-Ross, Ann and Albosul, Asem and Shatnawi, Ahmad and Harb, Shadi, "A shadow dynamic finite state machine for branch prediction: an alternative for the 2-bit saturating counter," Informatica, vol. 35, no. , pp. 0-0, 2011
-
Mahmoud Al-Dwairi, Ahmed S. Shatnawi, Osama Al-Khaleel, and Basheer Al-Duwairi, "Ransomware-Resilient Self-Healing XML Documents," Future Internet, vol. 14, no. , pp. 0-0, 2022, MDPI
-
Shatnawi, Ahmed S and Al-Duwairi, Basheer and Almazari, Mahmoud M and Alshakhatreh, Mohammad S and Khader, Ahmad N and Abdullah, Abdullah A, "Adaptable Plug and Play Security Operations Center Leveraging a Novel Programmable Plugin-based Intrusion Detection and Prevention System," arXiv preprint arXiv:2204.04576, vol. , no. , pp. 0-0, 2022
-
Ahmed S. Shatnawi , Aya Jaradat , Tuqa Bani Yaseen, Eyad Taqieddin , Mahmoud Al-Ayyoub, Dheya Mustafa, "An Android Malware Detection Leveraging Machine Learning," Wireless Communications and Mobile Computing, vol. 2022, no. , pp. 0-0, 2022, Hindawi
-
Al-Share, Rama A and Shatnawi, Ahmed S and Al-Duwairi, Basheer, "Detecting and Mitigating Collusive Interest Flooding Attacks in Named Data Networking," IEEE Access, vol. , no. , pp. 0-0, 2022, IEEE
-
Almazari, Mahmoud M. and Taqieddin, Eyad S. and Shatnawi, Ahmed S. and AlShara, Zakarea, "RSA Private Keys and the Presence of Weak Keys: An Evaluation," , vol. , no. , pp. 0-0, 2022
-
A Shatnawi, EV Munson, C Thao, "Maintaining Integrity and Non-Repudiation in Secure Offline Documents," ACM Symposium on Document Engineering, Sep 2017, pp. 0-0
-
A Shatnawi, EV Munson, "Enhanced Automated Policy Enforcement eXchange framework (eAPEX)," roceedings of the ACM Symposium on Document Engineering 2019, , pp. 0-0
-
A. M. Al-Rawashdeh, Z. A. Al-Sharif, M. I. Al-Saleh and A. S. Shatnawi, "A Post-Mortem Forensic Approach for the Kik Messenger on Android," , 2020, pp. 79-84, IEEE
-
Shatnawi, Ahmed and Munson, Ethan V and Thao, Cheng, "Maintaining integrity and non-repudiation in secure offline documents," , 2017, pp. 59-62
-
Shatnawi, Ahmed S and Munson, Ethan V, "Enhanced Automated Policy Enforcement eXchange framework (eAPEX)," , 2019, pp. 1-4
-
A. M. Al-Rawashdeh, Z. A. Al-Sharif, M. I. Al-Saleh and A. S. Shatnawi, "A Post-Mortem Forensic Approach for the Kik Messenger on Android," , 2020, pp. 79-84, IEEE
-
Shatnawi, Ahmed S and Munson, Ethan V, "Interactive and Scalable visualization framework for Version-aware XML documents," , 2020, pp. 1-4
-
Al-Kahla, Wafaa and Shatnawi, Ahmed S and Taqieddin, Eyad, "A Taxonomy of Web Security Vulnerabilities," , 2021, pp. 424-429, IEEE
-
Al-Syouf, Raghad and Al-Duwairi, Basheer and Shatnawi, Ahmad S, "Towards a Secure Web-Based Smart Homes," , 2021, pp. 195-200, IEEE
-
Shatnawi, Ahmad and Drine, Abderraouf and Al-Zinati, Mohammad and Althebyan, Qutaibah, "Simulation study of speed control at congested arms of roundabouts," , 2021, pp. 1-5, IEEE
-
Al-Share, Rama and Abu-Akleek, Fatima and Shatnawi, Ahmed S and Taqieddin, Eyad, "Performance Evaluation of Online Website Safeguarding Tools Against Phishing Attacks; a Comparative Assessment," , 2022, pp. 161-168, Springer, Cham
-
Al-Duwairi, Basheer and Shatnawi, Ahmed S and Jaradat, Hala and Al-Musa, Afnan and Al-Awadat, Hamzah, "On the Digital Forensics of Social Networking Web-based Applications," , 2022, pp. 1-6, IEEE
-
"An Android Malware Detection Leveraging Machine Learning", Wireless Communications and Mobile Computing
-
"An evaluation of the RSA private keys and the presence of weak keys", Journal of Discrete Mathematical Sciences and Cryptography
-
"Analyzing the Effect of Driving Speed on the Performance of Roundabouts", International Arab Journal of Information Technology
-
"Detecting and Mitigating Collusive Interest Flooding Attacks in Named Data Networking", IEEE Access
-
"Exploring Deep Learning-based Visual Localization Techniques for UAVs in GPS-Denied Environments", IEEE Access
-
"MIMD Programs Execution Support on SIMD Machines: A Holistic Survey", IEEE Access
-
"PASSVM: A Highly Accurate Fast Flux Detection System", Computers & Security
-
"Personalized human activity recognition using deep learning and edge-cloud architecture", Journal of Ambient Intelligence and Humanized Computing
-
"RSA cryptanalysis ? Fermat factorization exact bound and the role of integer sequences in factorization problem", Journal of Information Security and Applications
-
"Ransomware-Resilient Self-Healing XML Documents", Future Internet
-
"The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach", Journal of Universal Computer Science
-
"Vulnerability Detection and Classification of Ethereum Smart Contracts Using Deep Learning ", Future Internet
- Head of the Center, Information Technology and Communication Center, Sep 2023 - Sep 2024
- Head of the Center, Information Technology and Communication Center, Sep 2022 - Sep 2023
- Head of the Center, Information Technology and Communication Center, Jan 2022 - Sep 2022
- Deputy Head of the Center, Vice director, Sep 2018 - Sep 2019
- Faculty Member, Department of Software Engineering, Mar 2018 - Present
- Full-time Lecturer, Department of Software Engineering, Mar 2018 - Mar 2018
- Instructor and Graduate Teaching Assistant, University of Wisconsin Milwaukee, U.S.A, Aug 2014- Dec 2017
- Security Coordinator-Risk Assessment Support, University of Wisconsin Milwaukee, U.S.A, Jan 2014- Aug 2014
- Senior Engineer, Blue Sky Broadband, U.S.A, Aug 2012- Feb 2013
- Web application programmer, George Mason University, U.S.A, Jun 2011- Aug 2011
- Teaching Assistant, JORDAN UNIVERSITY OF SCIENCE AND TECHNOLOGY, Jordan, Jan 2007- Aug 2010
- Software Engineer, HORIZONS MEDIA AND INFORMATION SERVICES, Jordan, Sep 2006- Jan 2007
- ADVANCED NETWORK SECURITY
- CRYPTOGRAPHY AND NETWORK SECURITY
- PRACTICAL TRAINING
- SOFTWARE ENGINEERING FOR WEB APPLICATIONS
- SOFTWARE SECURITY
- SPECIAL TOPICS IN COMPUTER ENGINEERING (3)
- WEB APPLICATIONS SECURITY
- Intermediate Computer Programming(CS 251)
- ASP.NET and C#
|