​
Login / Signup
Shadi Nashwan
ORCID
Publication Activity (10 Years)
Years Active: 2007-2024
Publications (10 Years): 12
Top Topics
Authentication And Key Agreement
Wireless Networks
Multidimensional Data
Authentication Scheme
Top Venues
Int. J. Commun. Networks Inf. Secur.
ICCR
ACM J. Data Inf. Qual.
Comput. Syst. Sci. Eng.
</>
Publications
</>
Ali Mohd Ali
,
Shadi Nashwan
,
Ahmad Al-Qerem
,
Amjad Aldweesh
,
Mohammad Alauthman
,
Zenab Elgamal
,
Ammar Almomani
CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models.
ICCR
(2024)
Ali Mohd Ali
,
Shadi Nashwan
,
Ahmad Al-Qerem
,
Ammar Almomani
,
Mahmoud Al Sakhnini
,
Amjad Aldweesh
Machine Learning Models for Brain Signal Classification: A Focus on EEG Analysis in Epilepsy Cases.
ICCR
(2024)
Ahmad Al-Qerem
,
Ali Mohd Ali
,
Shadi Nashwan
,
Mohammad Alauthman
,
Ala Hamarsheh
,
Ahmad Nabot
,
Issam Jibreen
Transactional Services for Concurrent Mobile Agents over Edge/Cloud Computing-Assisted Social Internet of Things.
ACM J. Data Inf. Qual.
15 (3) (2023)
Ahmad Al-Qerem
,
Ali Mohd Ali
,
Hani Attar
,
Shadi Nashwan
,
Lianyong Qi
,
Mohammad Kazem Moghimi
,
Ahmed A. A. Solyman
Synthetic Generation of Multidimensional Data to Improve Classification Model Validity.
ACM J. Data Inf. Qual.
15 (3) (2023)
Munayfah Alanazi
,
Shadi Nashwan
Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems.
Comput. Syst. Sci. Eng.
42 (2) (2022)
Shadi Nashwan
Analysis of the Desynchronization Attack Impact on the E2EA Scheme.
Comput. Syst. Sci. Eng.
41 (2) (2022)
Shadi Nashwan
,
Imad I. H. Nashwan
Reducing the Overhead Messages Cost of the SAK-AKA Authentication Scheme for 4G/5G Mobile Networks.
IEEE Access
9 (2021)
Shadi Nashwan
,
Imad I. H. Nashwan
An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme.
Sensors
21 (15) (2021)
Ahmad Al-Qerem
,
Faten F. Kharbat
,
Shadi Nashwan
,
Staish Ashraf
,
khairi blaou
General model for best feature extraction of EEG using discrete wavelet transform wavelet family and differential evolution.
Int. J. Distributed Sens. Networks
16 (3) (2020)
Nourah Almrezeq
,
Lama Almadhoor
,
Thowg Alrasheed
,
A. A. Abd El-Aziz
,
Shadi Nashwan
Design a secure IoT Architecture using Smart Wireless Networks.
Int. J. Commun. Networks Inf. Secur.
12 (3) (2020)
Mustafa Al-Fayoumi
,
Shadi Nashwan
Performance Analysis of SAP-NFC Protocol.
Int. J. Commun. Networks Inf. Secur.
10 (1) (2018)
Shadi Nashwan
SAK-AKA: a secure anonymity key of authentication and key agreement protocol for LTE network.
Int. Arab J. Inf. Technol.
14 (5) (2017)
Mustafa Al-Fayoumi
,
Shadi Nashwan
,
Sufian Yousef
,
Abdel-Rahman Alzoubaidi
A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks.
WiMob
(2007)