Personal information

Activities

Works (5)

Anomaly intrusion detection using machine learning- IG-R based on NSL-KDD dataset

Bulletin of Electrical Engineering and Informatics
2024-12-01 | Journal article
Contributors: Ashraf H. Aljammal; Ibrahim Al-Oqily; Mamoon Obiedat; Ahmad Qawasmeh; Salah Taamneh; Fadi I. Wedyan
Source: check_circle
Crossref

Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks

International Journal of Interactive Mobile Technologies (iJIM)
2023-10-10 | Journal article
Contributors: Ashraf Hamdan Aljammal; Ahmad Qawasmeh; Ala Mughaid; Salah Taamneh; Fadi I. Wedyan; Mamoon Obiedat
Source: check_circle
Crossref

Visualization of aspect-oriented programs using city transportation metaphor

Cluster Computing
2022-12 | Journal article
Contributors: Fadi Wedyan; Reema Freihat; Maen Hammad
Source: check_circle
Crossref

GaSubtle: A New Genetic Algorithm for Generating Subtle Higher-Order Mutants

Information
2022-07-07 | Journal article
Contributors: Fadi Wedyan; Abdullah Al-Shishani; Yaser Jararweh
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Impact of design patterns on software quality: a systematic literature review

IET Software
2020-02 | Journal article
Contributors: Fadi Wedyan; Somia Abufakher
Source: check_circle
Crossref

Peer review (6 reviews for 5 publications/grants)

Review activity for Information technology and management. (1)
Review activity for International journal of machine learning and cybernetics. (1)
Review activity for Journal of network and systems management. (1)
Review activity for Neural computing & applications. (2)
Review activity for Peer-to-Peer Networking and Applications (1)