Browsing by Author "Amro, Belal"

Sort by: Order: Results:

  • Amro, Belal; Najjar, Arwa; Macido, Mario (Elsevier, 2021-12-01)
    Background Electronic Medical Records (EMRs) have become a priority for hospitals, and assessing the level of deployment of EMRs nationwide is essential to better utilization. The Electronic Medical Record Adoption Model ...
  • Salah, Saeed; Amro, Belal (Inderscience, 2023)
    Distributed denial-of-service (DDoS) attacks are among the toughest security issues nowadays. These attacks are launched at any time and can impact any part of a network’s operations or IT resources. Because of the seriousness ...
  • Amro, Belal; Levi, Albert; Saygin, Yucel (2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, 2011-10)
    In general service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc. A good solution is to use pseudonyms as temporary identities. On the other ...
  • Amro, Belal (MECS Press - I.J. Wireless and Microwave Technologies, 2018-09)
    According to Palestinian police records, cybercrimes have become common last few years in Palestine. The most commonly reported cybercrimes are mainly based on social networks to hack victims asking for some service. Many ...
  • Amro, Belal; Al-Jabari, Mohanad; Jabareen, Hussein; Khader, Yousef; Taweel, Adel (15th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2018, 2018-10)
    Health informatics has been reported to be a vital sector for the last decade. Many efforts have been implemented to better utilize advancements in health informatics in real life. Educational institutions have worked hard ...
  • Al-Jabari, Mohanad; Amro, Belal; Jabareen, Hussein; Khadir, Yousef; Taweel, Adel (15th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2018, 2018-10)
    The notion of Electronic Health Record (EHR) and healthcare Information Technologies (HITs) related to the EHR have recently adopted by many countries. EHR facilitates sharing of patients’ data among healthcare providers, ...
  • Amro, Belal; Levi, Albert; Saygin, Yucel (IAJIT -The International Arab Journal of Information Technology, 2016-10)
    In service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc., To protect the privacy of users, their real identities should not be linked to ...
  • Amro, Belal; Najjar, Arwa; Macido, Mario (Slovensko društvo INFORMATIKA, 2022-01-01)
    The task of finding the best job candidates among a set of applicants is both time and resource consuming, especially when there are lots of applications. In this concern, the development of a decision support system ...
  • Amro, Belal; Najjar, Arwa; Macido, Mario (De Gruyter, 2022-03-17)
    Objectives Due to the diversity, volume, and distribution of ingested data, the majority of current healthcare entities operate independently, increasing the problem of data processing and interchange. The goal of this ...
  • Amro, Belal (International Journal of Mobile Network Communications & Telematics, 2017-12)
    Mobile devices have become very popular nowadays, due to is portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware ...
  • Amro, Belal (IJCSI International Journal of Computer Science Issues, 2014-03)
    Mobile agent technology offers a dramatically evolving computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfers itself to another agent-enabled host ...
  • Amro, Belal; Saygin, Yucel; Levi, Albert (SPRINGL '10 Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS Pages 55-59, 2010-11)
    Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from cars. Users collaborate by providing their location information to have a global picture of the current traffic ...
  • Amro, Belal; Saygin, Yucel; Levi, Albert (SPRINGL '11 Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS Pages 1-8, 2011-11)
    Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from vehicles. Users collaborate by providing their location information to have a global picture of the current traffic ...
  • Amro, Belal; Abu sabha, Ahmed; Qunaibi, Ammar; Najjar, Inrahim (IJCNT- University of Bahrain, 2019-01-01)
    Security and privacy have been considered a corner stone in all electronic transactions nowadays. People are becoming very cautious when conducting electronic transactions over internet. One of the major issues that frightens ...
  • Amro, Belal (IJCSNS International Journal of Computer Science and Network Security,, 2018-01)
    Mobile malware has increased rapidly last 10 years. This rapid increase is due to the rapid enhancement of mobile technology and their power to do most work for their users. Since mobile devices are personal devices, then ...
  • Amro, Belal (Scientific Research Publishing, 2018-02)
    The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ...
  • Amro, Belal (AIRCC Publishing Corporation, 2018-01)
    Vehicular ad hoc networks VANETs use pseudonyms to communicate among them and with roadside units, these pseudonyms are used to authenticate these vehicles and to hide real identities behind these pseudonyms, to better ...
  • Amro, Belal (DIRASAT: EDUCATIONAL SCIENCES, 2021-09-02)
    Information systems security is a core factor in the development and using of computer information systems which provides security for the data and privacy for users; and humans are one of the major key players in this ...
  • Asafrah, mohammad; Amro, Belal (Hebron University, 2022-12-01)
    Technological development in the e-health field helps to facilitate and enhance healthcare, and improve treatment quality. Different public and private healthcare facilities in Palestine employ different health information ...
  • Amro, Belal; zaid, abu znaid (AL-Rafidain Journal of Computer Sciences and Mathematics, 2021-12-16)
    Mobile malware has become a very hot research topic in the last few years, and this was due to the widespread usage of mobile devices all over the world. Like other systems, mobile devices are prune to different attacks ...