


default search action
Yaser Jararweh
- > Home > Persons > Yaser Jararweh
Publications
- 2020
- [j109]Qutaibah Althebyan
, Yaser Jararweh, Qussai Yaseen
, Rami Mohawesh
:
A knowledgebase insider threat mitigation model in the cloud: a proactive approach. Int. J. Adv. Intell. Paradigms 15(4): 417-436 (2020) - 2019
- [j75]Mohammad Al-Zinati
, Qutaibah Althebyan
, Yaser Jararweh:
An agent-Based self-organizing model for large-scale biosurveillance systems using mobile edge computing. Simul. Model. Pract. Theory 93: 65-86 (2019) - 2018
- [c70]Mohammad Al-Zinati
, Qutaibah Althebyan
, Yaser Jararweh:
An Agent Based Model for Health Surveillance Systems and Early Biological Threat Detection. FiCloud 2018: 55-62 - 2017
- [j49]Qussai Yaseen
, Yaser Jararweh
, Brajendra Panda, Qutaibah Althebyan
:
An insider threat aware access control for cloud relational databases. Clust. Comput. 20(3): 2669-2685 (2017) - [j47]Qutaibah Althebyan, Omar AlQudah, Yaser Jararweh, Qussai Yaseen:
A scalable Map Reduce tasks scheduling: a threading-based approach. Int. J. Comput. Sci. Eng. 14(1): 44-54 (2017) - 2016
- [j32]Qutaibah Althebyan
, Qussai Yaseen
, Yaser Jararweh
, Mahmoud Al-Ayyoub:
Cloud support for large scale e-healthcare systems. Ann. des Télécommunications 71(9-10): 503-515 (2016) - [j29]Mahmoud Al-Ayyoub, Mustafa Daraghmeh
, Yaser Jararweh, Qutaibah Althebyan:
Towards improving resource management in cloud systems using a multi-agent framework. Int. J. Cloud Comput. 5(1/2): 112-133 (2016) - [j22]Qussai Yaseen
, Qutaibah Althebyan
, Brajendra Panda, Yaser Jararweh
:
Mitigating insider threat in cloud relational databases. Secur. Commun. Networks 9(10): 1132-1145 (2016) - 2015
- [j19]Mahmoud Al-Ayyoub, Yaser Jararweh
, Mustafa Daraghmeh
, Qutaibah Althebyan
:
Multi-agent based dynamic resource provisioning and monitoring for cloud computing systems infrastructure. Clust. Comput. 18(2): 919-932 (2015) - [j18]Qutaibah Althebyan
, Yaser Jararweh
, Qussai Yaseen
, Omar AlQudah, Mahmoud Al-Ayyoub:
Evaluating map reduce tasks scheduling algorithms over cloud computing infrastructure. Concurr. Comput. Pract. Exp. 27(18): 5686-5699 (2015) - [c21]Qutaibah Althebyan
, Rami Mohawesh
, Qussai Yaseen
, Yaser Jararweh
:
Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability. ICITST 2015: 226-231 - 2013
- [c6]Qussai Yaseen
, Qutaibah Althebyan
, Yaser Jararweh
:
PEP-side caching: An insider threat port. IRI 2013: 137-144

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-07 23:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint