Personal information

Activities

Works (3)

Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption

EURASIP Journal on Wireless Communications and Networking
2024-08-13 | Journal article
Contributors: Mustafa Ibrahim Alnajjar; Mehmet Sabir Kiraz; Ali Al-Bayatti; Suleyman Kardas
Source: check_circle
Crossref

Mitigating MEV Attacks with a Two-Tiered Architecture Utilizing Verifiable Decryption

2023-09-22 | Preprint
Contributors: Mustafa Ibrahim Alnajjar; Mehmet Sabir Kiraz; Ali Al-Bayatti; Suleyman Kardas
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Mining Student Data Using Decision Trees

The 2006 International Arab Conference on Information Technology (ACIT'2006)At: Jordan
2006-08-01 | Conference paper
Contributors: Mustafa Alnajjar; Qasem A. Al-Radaideh; Mohammed N. Al-Kabi
Source: Self-asserted source
Mustafa Alnajjar