Professor
PhD in Computer Engineering, North Carolina State University, Raleigh, NC, 2006
MS in Computer Engineering, North Carolina State University, Raleigh, NC, 2001
BS in Electrical Engineering, Jordan University of Science and Technology (JUST), Irbid, Jordan, 1998
Bio
Monther Aldwairi is a full professor at the College of Technological Innovation at Zayed University, Abu Dhabi. He joined Zayed University in 2014 where he served as the chair of Computing and Applied Technology department in 2020 and the as the Coordinator for Masters of IT in Cyber Security in 2023. Prior to joining ZU, he was an associate and assistant professor of computer engineering at Jordan University of Science and Technology since 2007. He served as the vice dean of the Faculty of Computer and Information Technology from 2010 to 2012 and was the assistant dean for student affairs in 2008. In addition, he was an adjunct professor at New York Institute of Technology (NYiT)-Amman campus from 2009 to 2012. Prof. Aldwairi worked at NCSU as post-doctoral research associate in 2007 and as a research assistant from 2001 to 2006. He also held several parttime research positions during his PhD and worked as a System Integration Engineer for ARAMEX from 1998 to 2000.
Dr. Aldwairi expertise spans multiple areas from digital circuit design, computer architecture, information and network security, to software development. Prof. Aldwairi’s research interests are in information, network, IoT and web security, intrusion detection, digital forensics, reconfigurable architectures, artificial intelligence and pattern matching.
Office
Abu Dhabi Campus, MF2-0-012
Phone:
+971 2 599 3238
Email:
monther.aldwairi@zu.ac.aeTeaching Areas
Information Security Technologies
Ethical Hacking and Countermeasures
Digital Forensics
Computer Architecture and Programming
Research and Professional Activities
OPEN SOURCE SOFTWARE CONTRIBUTIONS
1. Plug and Play Signature-based Intrusion Detection Engine.
https://github.com/munzer2000/IDSEngine
2. MultiPLZW: A Novel Multiple Pattern Matching Search in LZW-Compressed Data. https://github.com/abdulmughniHamzah/MultiPLZW
3. FLUKES: Log Visualization and Forensics Tool.
https://github.com/5998/FLUKES
Recent refereed journal papers
- Q.Yaseen, M. Aldwairi, A. Manasrah, Enhancing Future A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance, Computers, Materials & Continua, 2024. https://doi.org/10.32604/cmc.2024.051179.
- W.Mater, M. Aldwairi, N. Matar, W. Mugahed Al-Rahmi, Developing a success model of a social student relationship management system, Heliyon,Vol 10, No 4, 2024, e25941, 2023, https://doi.org/10.1016/j.heliyon.2024.e25941.
- A. Khalil; M. Jarrah; M. Aldwairi, Hybrid Neural Network Models for Detecting Fake News Articles. Hum-Cent Intell Syst (2023). https://doi.org/10.1007/s44230-023-00055-x.
- H. H. Alsaadi, M. Aldwairi, F. Yasin, S. C. P. Cachinho, A. Hussein, Artificial intelligence tool for the study of COVID-19 microdroplet spread across the human diameter and airborne space. PLOS ONE 18(7): e0269905. https://doi.org/10.1371/journal.pone.0269905.
- B. Nagy, K. Abuhmaidan, M. Aldwairi, Generalized Logical Conditions in Programming, Annales Mathematicae et Informaticae, 57 pp. 65–77, 2023. https://doi.org/10.33039/ami.2023.04.002.
- M. Aldwairi, M. Jarrah, N. Mahasneh, B. Al-khateeb, Graph-Based Data Management System for Efficient Information Storage, Retrieval and Processing, Information Processing & Management, Vol 60, No 2, 103165, 2023, https://doi.org/10.1016/j.ipm.2022.103165.
- M. Aldwairi, D. Al-ansari, n-grams Exclusion and Inclusion Filter for Intrusion Detection in IoE Big Data Systems, Transactions on Emerging Telecommunications Technologies, 2022, 33(3), e3711. https://doi.org/10.1002/ett.3711.
- A. Khalil, M. Jarrah, M. Aldwairi, M. Jaradat, AFND: Arabic Fake News Dataset for the Detection and Classification of Articles Credibility, Data in Brief, article no. 108141, 2022. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9048144/
- M. Aldwairi, Evaluating Virtual Laboratory Platforms for Supporting Online Information Security Courses. Global Journal of Engineering Education, Vol. 24, No.2, pp. 143—148, 2022. http://www.wiete.com.au/journals/GJEE/Publish/vol24no2/07-Aldwairi-M.pdf.
- A. Shuhaiber and M. Aldwairi, The impact of CDIO's dimensions and values on IT Learner's attitude and behavior: A regression model using Partial Least Squares, Heliyon, Vol 8, No 11, e11433e11433, 2022. https://doi.org/10.1016/j.heliyon.2022.e11433.
- R. Alqudah, Y. Khamayseh, M. Aldwairi, S.Fayaz Khan, The Smart in Smart Cities: A Framework for Image Classification using Deep Learning, Sensors, Sensors. Vol. 22, No. (12), 4390, 2022. https://doi.org/10.3390/s22124390.
- K. Abuhmaidan, M. Aldwairi and B. Nagy, Vector Arithmetic in the Triangular Grid, Entropy 2021, 23, 373. https://doi.org/10.3390/e23030373.
- M. Aldwairi, S. Mohammed, M. L. Padmanabhan, Efficient and Secure Flash-based Gaming CAPTCHA, Journal of Parallel and Distributed Computing, Vol. 142, Aug 2020, pp. 27-35 https://doi.org/10.1016/j.jpdc.2020.03.020.
- Y. Khamayseh, W. Mardini, M. Aldwairi, H. Mouftah, On the Optimality of Route Selection in Grid Wireless Sensor Networks: Theory and Applications, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(2):87-105, June 2020. https://10.22667/JOWUA.2020.06.30.087, http://isyou.info/jowua/papers/jowua-v11n2-7.pdf.
- L. Tawalbeh, M. Tawalbeh, M. Aldwairi, Improving the impact of Power Efficiency in Mobile Cloud Applications Using Cloudlet Model, Concurrency and Computation: Practice and Experience, 2020. https://doi.org/10.1002/cpe.5709.
- N. Zemmal, N. Azizi, M. Sellami, S. Cheriguene, A. Ziani, M. Aldwairi, N. Denadani, AL-PSO: An Active Learning Particle Swarm Optimizer for Medical Data Classification, Cognitive Computation, Springer, 2020. https://doi.org/10.1007/s12559-020-09739-z.
- M. Aldwairi and L. Tawalbeh, Security Techniques for Intelligent Spam Sensing and Anomaly Detection in Online Social Platforms. International Journal of Electrical and Computer Engineering, Vol.10, No.1, Article No: 16195, Feb 2020. http://ijece.iaescore.com/index.php/IJECE/article/view/16195/13441
- M. Aldwairi, A. Y. Hamzah, M. Jarrah, KPN-based Parallelization of Wu-Manber Algorithm on Multi-Core Machines, Cluster Computing, pp.1 – 10, 2019. https://doi.org/10.1007/s10586-019-02955-9.
- M. Aldwairi, A. Shuhaiber, Predicting Students’ Acceptance of CDIO as a Crowdsourcing and Gamification methodology in IT classrooms: A multiple regression model using PLS-SEM, Global Journal of Engineering Education, Vol. 21, No.3, 2019.
http://www.wiete.com.au/journals/GJEE/Publish/vol21no3/06-Aldwairi-M.pdf - M. Aldwairi, A. Shuhaiber, Exploring the Integration of CDIO, Crowdsourcing and Gamification into Information Security Courses, World Transactions on Engineering and Technology Education, Vol.17, No.3, 2019, pp. 237-243. http://www.wiete.com.au/journals/WTE&TE/Pages/Vol.17,%20No.3%20(2019)/04-Aldwairi-M.pdf
- M. Aldwairi, A. Y. Hamzah, M. Jarrah, A Novel Multiple Patterns Matching Algorithm in LZW-compressed Data for Cloud Environment, Computer Communications, Computer Communications Vol. 145, Sept 2019, pp.126-136. https://doi.org/10.1016/j.comcom.2019.06.011
- M. Aldwairi, D. Al-ansari, n-grams Exclusion and Inclusion Filter for Intrusion Detection in IoE Big Data Systems, Transactions on Emerging Telecommunications Technologies, June 2019. Article No: ETT371. https://doi.org/10.1002/ett.3711
- R. Basir, S. Qaisar, M. Ali, M. Aldwairi, I. Ashraf, A. Mahmood, M. Gidlund, A Survey on Fog Computing Enabling Industrial Internet of Things: State-of-Art and Research Challenges. Sensors 2019, Vol. 19, No 21, 4807. https://www.mdpi.com/1424-8220/19/21/4807
- B.S. Kim, M. Aldwairi, K. I. Kim, An Efficient Real-time Data Dissemination Multicast Protocol for Big Data in Wireless Sensor Networks. Journal of Grid Computing, Vol. 17, No. 2, pp. 341–355, June 2019. https://doi.org/10.1007/s10723-018-9447-1
- Y. Khamayseh, W. Mardini, W. Atwood, M. Aldwairi, Dynamic Framework to Mining IoT for Multimedia Services, Expert Systems. 2019; e12404. https://doi.org/10.1111/exsy.12404
- M. Aldwairi, A. Alhowaide, W. Mardini, Anomaly Payload Signature Generation System Based on Efficient Tokenization Methodology, International Journal on Communications Antenna and Propagation (IRECAP), Vol 8, No 5 (2018). https://doi.org/10.15866/irecap.v8i5.12794
- S. Aljawarneh, M. Aldwairi, M. B. Yassein, Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model, Journal of Computational Science, Vol. 25, 2018, pp. 152-160. http://doi.org/10.1016/j.jocs.2017.03.006
- Q. Yaseen, M. Aldwairi, Y. Jararweh, M. Al-Ayyoub. Collusion Attacks Mitigation in Internet of Things: A Fog Based Model, Multimedia Tools and Applications, Vol. 77, No. 14, pp 18249–18268, July 2018. https://doi.org/10.1007/s11042-017-5288-3
- W. Mater, M. Aldwairi, R. Ibrahim, Enhanced Teamwork Communication Model for Electronic Clinical Pathways in Healthcare. The Open Bioinformatics Journal. Vol 11, pp. 140-163, Article TOBIOIJ-11-140, Jul 31, 2018. http://dx.doi.org/10.2174/1875036201811010140
- Y. Yim, K. H. Kim, M. Aldwairi, K.l. Kim, Energy-Efficient Region Shift Scheme to Support Mobile Sink Group in Wireless Sensor Networks, Sensors, Vol 18. No. 14, Article 90, 2018. https://doi.org/10.3390/s18010090
- M. Aldwairi, A. Abu-Dalo, M. Jarrah, “Pattern Matching for Signature-Based IDS Using MapReduce Framework and Myers Algorithm”, EURASIP Journal on Information Security. Vol 2017, No. 1, pp. 9, Jun 2, 2017. https://doi.org/10.1186/s13635-017-0062-7
- M. Aldwairi, M. Hasan, Z. Balbahaith, “Detection of Drive-By Download Attacks Using Machine Learning Approach”. International Journal of Information Security and Privacy (IJISP), Vol 11. No. 4, Article 2. Sept 2017. https://doi.org/10.4018/IJISP.2017100102
- M. Al-Ayyoub, Y. Jararweh, A. Rabab'ah, M. Aldwairi, Feature extraction and selection for Arabic tweets authorship authentication, Journal of Ambient Intelligence and Humanized Computing, Vol. 8, No. 3, pp. 383–393, June 2017. https://doi.org/10.1007/s12652-017-0452-1
- M. Aldwairi, K. Al-Khamaiseh, F. Alharbi, B. Shah. Bloom Filters Optimized Wu-Manber for Intrusion Detection, Journal of Digital Forensics, Security and Law, Vol. 11: No. 4, Article 5, Dec 2016. http://commons.erau.edu/jdfsl/vol11/iss4/5/
- S.Y. Kang, M. Aldwairi, and K.I. Kim, “A Survey on Network Simulators in Three Dimensional Wireless Ad Hoc and Sensor Networks”, International Journal of Distributed Sensor Networks, Vol 12. No. 9, pp. 1-10, Oct 2016. https://doi.org/10.1177/1550147716664740
- G. Ali, K.H. Kim, K.l. Kim, M. Aldwairi, “Interference Aware Real-Time Flows Scheduling in Cluster Based Wireless Sensor Networks”, International Journal of Engineering and Technology Innovation, vol. 6, no. 2, 2016, pp. 93 – 102. http://ojs.imeti.org/index.php/IJETI/article/view/119
- M. Aldwairi, Y. Khamayseh, M. Al-Masri, “Application of artificial bee colony for intrusion detection systems”, Security and Communication Networks, John Wiley & Sons, Ltd., Vol. 8, No. 16, pp. 2730-2740, 2015/11. http://dx.doi.org/10.1002/sec.588.
Papers in refereed conference proceedings
- F. Muheidat, L. Tawalbeh, M. Al-Kfairy and M. Aldwairi, Securing IoT wearable health devices against cyberthreats through Securing XML Data in electronic Patient Care Reports (ePCR), The 14th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2024), October 28-30, 2024, Leuven, Belgium.
- B. Mardassa, A. Beza, A. Al Madhan and M. Aldwairi, Sentiment Analysis of Hacker Forums with Deep Learning to Predict Potential Cyberattacks, 15th Undergraduate Research Conference on Applied Computing (URC24), Zayed University, Dubai, UAE, April 17-18, 2024
- M. Aldwairi, M. Badra, R. Borghol. DocCert: Nostrification, Document Verification and Authenticity Blockchain Solution, The Fifth International Conference on Blockchain Computing and Applications (BCCA 2023), held in Conjunction with Kuwait Fintech and Blockchain Summit 2023, 24–26 Oct 2023 – Kuwait City, Kuwait.
- A. Shuhaiber, M.Aldwairi, A Best Practice Model of CDIO Implementation in IT Classrooms Gamification Crowdsourcing Approach, The 27th International Computer Science and Engineering Conference 2023 (ICSEC), Surat Thani, Thailand, 13-15 Sep 2023.
- S. Rashed, T. Said, A. Abdulrahman, A. Yohannes, M.Aldwairi, Evaluating Web Search Engines Results for Personalization and User Tracking, 14th Annual Conference on Undergraduate Research on Applied Computing (ZURC2022), Dubai, UAE, Nov 23-34, 2022.
- A. Almarzooqi, J. Mahmoud, B. Alzaabi, A. Ghebremichael, M. Aldwairi, Detecting Malicious Domains Using Statistical Internationalized Domain Name Features in Top Level Domains, 14th Annual Conference on Undergraduate Research on Applied Computing (ZURC2022), Dubai, UAE, Nov 23-34, 2022.
- F. Al Mukhaini, M. Aldwairi, FALSE: Fake News Automatic and Lightweight Solution. 2022 International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), Hybrid Conference (Bali and Virtual), Bali-Indonesia, July 28-30, 2022.
- A. Khalil, M. Jarrah, M. Aldwairi, Y. Jararweh, Detecting Arabic Fake News Using Machine Learning, 2021 Second International Conference on Intelligent Data Science Technologies and Applications (IDSTA), pp. 171-177, Tartu, Estonia, 15-17 Nov. 2021. https://doi.org/10.1109/IDSTA53674.2021.9660811.
- A. Ziani, N. Azizi, D. Schwab, D. Zenakhra, M. Aldwairi, N. Chekkai and Z. Nawel, Deceptive Opinions Detection Using New Proposed Arabic Semantic Features. 5th International Conference on AI in Computational Linguistics (ACLing 2021), June 4th-5th, 2021.
- W.Mater, M. Aldwairi, Teamwork Communication in Healthcare: An Instrument (Questionnaire) Validation Process. The 5th International Conference of Reliable Information and Communication Technology 2020 (IRICT 2020)., 21- 22 Dec 2020, Malaysia.72, pp. 217-229; In: Saeed F., Mohammed F., Al-Nahari A. (eds) Innovative Systems for Intelligent Health Informatics. IRICT 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 72. Springer, Cham. https://doi.org/10.1007/978-3-030-70713-2_22.
- S. Paliath, M. Abu Qbeitah, M., “Phishing detection using classification algorithm”, 2020 27th International Conference on Telecommunications (ICT), Bali, Indonesia, 2020, pp. 1-5. https://doi.org/10.1109/ICT49546.2020.9239589.
- S. Ibrahim, N. Al Herami, E. Al Naqbi, M. Aldwairi, Detection and Analysis of Drive-by-Downloads and Malicious Websites. In: Thampi S., Martinez Perez G., Ko R., Rawat D. (eds) 7th International Symposium on Security in Computing and Communications. SSCC 2019. December 18-21, 2019, Trivandrum, Kerala, India. Communications in Computer and Information Science, vol 1208 CCIS, 2020, pp. 72-86; Code 239439 Springer, Singapore. https://doi.org/10.1007/978-981-15-4825-3_6.
- H. Alsaadi, M. Aldwairi and E.M. Muller-Stuler, Analyzing D-Wave Quantum Macro Assembler Security. In: Latifi S. (eds) 16th International Conference on Information Technology-New Generations (ITNG 2019). Advances in Intelligent Systems and Computing, vol 800. Springer, Cham, April 1-3, 2019, Las Vegas, Nevada, USA. https://doi.org/10.1007/978-3-030-14070-0_19.
- M. Aldwairi, A. Seyam, M. Alshboul, Characterizing Realistic Signature-based Intrusion Detection Benchmarks, International Conference Proceedings Series by ACM. The 6th International Conference on Information Technology: IoT and Smart City, Hong Kong, Dec 29-31, 2018. https://dl.acm.org/citation.cfm?id=3301591.
- M. Aldwairi and A. Alwahedi, Detecting fake news in social media networks, Procedia Computer Science, Vol 141, pp. 215-222, The 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN), November 5-8, 2018, Leuven, Belgium. https://doi.org/10.1016/j.procs.2018.10.171
- H. Al-Theiabat, M. Al-Ayyoub, M. Alsmirat and M. Aldwairi, A Deep Learning Approach for Amazon EC2 Spot Price Prediction, The 2nd International Workshop on Automation of Cloud Configuration and Operations (ACCO 2018), 15th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA’18), Oct 28 – Nov 01, 2018, Aqaba, Jordan, pp. 1-5. https://doi.org/10.1109/AICCSA.2018.8612783.
- Q. M. Yaseen, M. Aldwairi, An Enhanced AODV Protocol for Avoiding Black Holes in MANET, the 13th International Conference on Future Networks and Communications (FNC 2018), Procedia Computer Science, Vol. 134, pp 371-376, August 13-15, 2018, Gran Canaria, Spain. https://doi.org/10.1016/j.procs.2018.07.196.
- K. Al Messabi, M. Aldwairi, A. Al Yousif, A. Thoban and F. Belqasmi, Malware Detection using DNS Records and Domain Name Features, International Conference on Future Networks and Distributed Systems (ICFNDS), June 26-27, 2018, Amman, Jordan. Article 29, pp.1-7. https://doi.org/10.1145/3231053.3231082
- N. E. Benzebouchi, N. Azizi, M. Aldwairi, Multi-Classifier System for Authorship Verification task using Word Embeddings, 2nd International Conference on Natural Language and Speech Processing (ICNLSP’18) Algiers, Algeria, April 25- 26th, 2018, 991-6. https://doi.org/10.1109/ICNLSP.2018.8374391.
- S. Souaidi, T. Kenaza, B. Djamaa and M. Aldwairi, Dynamic Clustering for IoT Key Management in Hostile Application Area. Springer, Cham: Lecture Notes in Networks and Systems Advances in Computing Systems and Applications. CSA 2018, April 24-25, 2018, Algiers, Algeria. https://doi.org/10.1007/978-3319-98352-3_6
- M. Abu Qbeitah and M. Aldwairi, Dynamic Malware Analysis of Phishing Emails, the 9th International Conference on Information and Communication Systems (ICICS 2018), Irbid, Jordan, 3-5, April 2018. Pp.18-24. https://doi.org/10.1109/IACS.2018.8355435.
- H. Alsaadi, M. Aldwairi, M. Al Taei, M. AlBuainain, M. AlKubaisi, The Penetration of Remote Secure Shell Service (OpenSSH) On Raspberry Pi 2, 9th IFIP International Conference on New Technologies, Mobility & Security (NTMS’18), 26- 28 February 2018. Paris, France. pp. 1-5. https://doi.org/10.1109/NTMS.2018.8328710.
- M. Aldwairi, K. Mhaidat, Y. Flaifel, “Efficient Pattern Matching Hardware for Network Intrusion Detection Systems”, International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC). 28th & 29th January 2018. Tamil Nadu, India.
- M. Aldwairi and S. Aldhanhani. Multi-Factor Authentication System. The 2017 International Conference on Research and Innovation in Computer Engineering and Computer Sciences (RICCES'2017), 15-17 August 2017 Langkawi Island, Kedah, Malaysia.
- M. Aldwairi, H. H. Shayef, “FLUKES: Autonomous Log Forensics, Intelligence and Visualization Tool”, International Conference on Future Networks and Distributed Systems (ICFNDS’17), July 19 - 20, 2017, Cambridge, UK. Article 33, pp. 1-6. https://doi.org/10.1145/3102304.3102337.
- R Masri, M Aldwairi. Automated Malicious Advertisement Detection using VirusTotal, URLVoid, and TrendMicro. The International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 4-6, April 2017, pp. 336-341. https://doi.org/10.1109/IACS.2017.7921994.
- K. AlRoum, A. Alolama, R. Kamel, M. El Barachi, M. Aldwairi. Detecting Malware Domains: A Cyber-Threat Alarm System, Emerging Technologies for Developing Countries. AFRICATEK 2017, March 27–28, 2017, Marrakech, Morocco. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 206, pp. 181-191. Springer, Cham. https://doi.org/10.1007/978-3-319-67837-5_17.
- Q. Yaseen, Y. Jararweh, M. Al-Ayyoub and M. Aldwairi, Collusion Attacks in Internet of Things: Detection and Mitigation using a Fog Based Model. 2017 IEEE Sensors Applications Symposium (SAS), Glassboro, NJ, Mar 13-15, 2017. pp. 1-5. https://doi.org/10.1109/SAS.2017.7894031.
- A. Rabab’ah, M. Al-Ayyoub, Y.Jararweh, and M. Aldwairi, Authorship Attribution of Arabic Tweets, In the Proc. of the13th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2016), Agadir, Morocco, Nov 29 – Dec 02, 2016. pp1-6. https://doi.org/10.1109/AICCSA.2016.7945818.
- B. Al-Duwairi, A. Al-Hammouri, M. Aldwairi, V. Paxson, “GFlux: A Google-Based System for Fast Flux Detection”, IEEE Conference on Communications and Network Security (IEEE-CNS 2015), Florence, Italy, 27-29 Sept 2015. pp. 755-756. https://doi.org/10.1109/CNS.2015.7346920.
- M. Aldwairi, K. Al-Khamaiseh, “Exhaust: Optimizing Wu-Manber Pattern Matching for Intrusion Detection using Bloom Filters”, The 2nd World Symposium on Web Applications and Networking (WSWAN’2015), Sousse, Tunisia, 21-23 March 2015. pp. 1-6. https://doi.org/10.1109/WSWAN.2015.7209081.