Dr. Monther Aldwairi

Professor, Chair Computing and Applied Technology Department (AUH)

PhD in Computer Engineering, North Carolina State University, Raleigh, NC 2006

MS in Computer Engineering, North Carolina State University, Raleigh, NC 2006

BS in Electrical Engineering, Jordan University of Science and Technology (JUST), Irbid, Jordan. 1998


Dr. Monther Aldwairi is a full professor at the College of Technological Innovation at Zayed University since fall of 2020. Prior to joining ZU in 2014, he was an associate and assistant professor of computer engineering at JUST since 2007. He served as the vice dean of the Faculty of Computer and Information Technology from 2010 to 2012 and was the assistant dean for student affairs in 2008. In addition, he was an adjunct professor at New York Institute of Technology (NYiT) from 2009 to 2012. Dr. Aldwairi worked at NCSU as post-doctoral research associate in 2007 and as a research assistant from 2001 to 2006. He worked as a system integration engineer for ARAMEX from 1998 to 2000.

Dr. Aldwairi expertise span multiple areas from digital circuit design, computer architecture, information and network security, to software development. Dr. Aldwairi’s research interests are in information, network, IoT and web security, intrusion detection, digital forensics, reconfigurable architectures, artificial intelligence and pattern matching.


Abu Dhabi Campus, M F2 -0- 012


+971 2 599 3238

Teaching Areas

Information Security Technologies

Ethical Hacking and Countermeasures

Digital Forensics

Research and Professional Activities

  • Research Area

Information, network and web security, intrusion detection, digital forensics, artificial intelligence and pattern matching.


1. Plug and Play Signature-based Intrusion Detection Engine.

2.  MultiPLZW: A Novel Multiple Pattern Matching Search in LZW-Compressed Data. https://github.com/abdulmughniHamzah/MultiPLZW

3. FLUKES: Log Visualization and Forensics Tool.

  • Refereed journal papers
  1. L. Tawalbeh,  M. Tawalbeh, M. Aldwairi, Improving the impact of Power Efficiency in Mobile Cloud Applications Using Cloudlet Model, Concurrency and Computation: Practice and Experience, 2020.
  2. N. Zemmal, N. Azizi, M. Sellami, S. Cheriguene, A. Ziani, M. Aldwairi, N. Denadani, AL-PSO: An Active Learning Particle Swarm Optimizer for Medical Data Classification, Cognitive Computation, Springer, 2020.
  3. M. Aldwairi and L. Tawalbeh, Security Techniques for Intelligent Spam Sensing and Anomaly Detection in Online Social Platforms. International Journal of Electrical and Computer Engineering, Vol.10, No.1,  Article No: 16195, Feb 2020. http://ijece.iaescore.com/index.php/IJECE/article/view/16195/13441
  4. M. Aldwairi, A. Y. Hamzah, M. Jarrah, KPN-based Parallelization of Wu-Manber Algorithm on Multi-Core Machines, Cluster Computing,  pp.1 – 10, 2019. https://doi.org/10.1007/s10586-019-02955-9.
  5. M. Aldwairi, A. Shuhaiber, Predicting Students’ Acceptance of CDIO as a Crowdsourcing and Gamification methodology in IT classrooms: A multiple regression model using PLS-SEM, Global Journal of Engineering Education, Vol. 21, No.3, 2019.
  6. M. Aldwairi, A. Shuhaiber, Exploring the Integration of CDIO, Crowdsourcing and Gamification into Information Security Courses, World Transactions on Engineering and Technology Education, Vol.17, No.3, 2019, pp. 237-243. http://www.wiete.com.au/journals/WTE&TE/Pages/Vol.17,%20No.3%20(2019)/04-Aldwairi-M.pdf
  7. M. Aldwairi, A. Y. Hamzah, M. Jarrah, A Novel Multiple Patterns Matching Algorithm in LZW-compressed Data for Cloud Environment, Computer Communications, Computer Communications Vol. 145, Sept 2019, pp.126-136. https://doi.org/10.1016/j.comcom.2019.06.011
  8. M. Aldwairi, D. Al-ansari, n-grams Exclusion and Inclusion Filter for Intrusion Detection in IoE Big Data Systems, Transactions on Emerging Telecommunications Technologies, June 2019.  Article No: ETT371. https://doi.org/10.1002/ett.3711
  9. R. Basir, S. Qaisar, M. Ali, M. Aldwairi, I. Ashraf, A. Mahmood, M. Gidlund, A Survey on Fog Computing Enabling Industrial Internet of Things: State-of-Art and Research Challenges. Sensors 2019, Vol. 19, No 21, 4807. https://www.mdpi.com/1424-8220/19/21/4807
  10. B.S. Kim, M. Aldwairi, K. I. Kim, An Efficient Real-time Data Dissemination Multicast Protocol for Big Data in Wireless Sensor Networks. Journal of Grid Computing, Vol. 17, No. 2, pp. 341–355,  June 2019. https://doi.org/10.1007/s10723-018-9447-1
  11. Y. Khamayseh, W. Mardini, W. Atwood, M. Aldwairi, Dynamic Framework to Mining IoT for Multimedia Services, Expert Systems. 2019; e12404. https://doi.org/10.1111/exsy.12404
  12. M. Aldwairi, A. Alhowaide, W. Mardini, Anomaly Payload Signature Generation System Based on Efficient Tokenization Methodology, International Journal on Communications Antenna and Propagation (IRECAP), Vol 8, No 5 (2018).  https://doi.org/10.15866/irecap.v8i5.12794
  13. S. Aljawarneh, M. Aldwairi, M. B. Yassein, Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model,  Journal of Computational Science, Vol. 25, 2018, pp. 152-160. http://doi.org/10.1016/j.jocs.2017.03.006
  14. Q. Yaseen, M. Aldwairi, Y. Jararweh, M. Al-Ayyoub. Collusion Attacks Mitigation in Internet of Things: A Fog Based Model, Multimedia Tools and Applications, Vol. 77, No. 14, pp 18249–18268, July 2018. https://doi.org/10.1007/s11042-017-5288-3
  15. W. Mater, M. Aldwairi, R. Ibrahim, Enhanced Teamwork Communication Model for Electronic Clinical Pathways in Healthcare. The Open Bioinformatics Journal. Vol 11, pp. 140-163, Article TOBIOIJ-11-140, Jul 31, 2018. http://dx.doi.org/10.2174/1875036201811010140
  16. Y. Yim, K. H. Kim, M. Aldwairi, K.l. Kim, Energy-Efficient Region Shift Scheme to Support Mobile Sink Group in Wireless Sensor Networks, Sensors, Vol 18. No. 14, Article 90, 2018. https://doi.org/10.3390/s18010090
  17. M. Aldwairi, A. Abu-Dalo, M. Jarrah, “Pattern Matching for Signature-Based IDS Using MapReduce Framework and Myers Algorithm”, EURASIP Journal on Information Security. Vol 2017, No. 1, pp. 9, Jun 2, 2017. https://doi.org/10.1186/s13635-017-0062-7
  18. M. Aldwairi, M. Hasan, Z. Balbahaith, “Detection of Drive-By Download Attacks Using Machine Learning Approach”. International Journal of Information Security and Privacy (IJISP), Vol 11. No. 4, Article 2. Sept 2017. https://doi.org/10.4018/IJISP.2017100102
  19. M. Al-Ayyoub, Y. Jararweh, A. Rabab'ah, M. Aldwairi, Feature extraction and selection for Arabic tweets authorship authentication, Journal of Ambient Intelligence and Humanized Computing, Vol. 8, No. 3, pp. 383–393, June 2017. https://doi.org/10.1007/s12652-017-0452-1
  20. M. Aldwairi, K. Al-Khamaiseh, F. Alharbi, B. Shah. Bloom Filters Optimized Wu-Manber for Intrusion Detection, Journal of Digital Forensics, Security and Law, Vol. 11: No. 4, Article 5, Dec 2016. http://commons.erau.edu/jdfsl/vol11/iss4/5/
  21. S.Y. Kang, M. Aldwairi, and K.I. Kim, “A Survey on Network Simulators in Three Dimensional Wireless Ad Hoc and Sensor Networks”, International Journal of Distributed Sensor Networks, Vol 12. No. 9, pp. 1-10, Oct 2016. https://doi.org/10.1177/1550147716664740
  22. G. Ali, K.H. Kim, K.l. Kim, M. Aldwairi, “Interference Aware Real-Time Flows Scheduling in Cluster Based Wireless Sensor Networks”, International Journal of Engineering and Technology Innovation, vol. 6, no. 2, 2016, pp. 93 – 102. http://ojs.imeti.org/index.php/IJETI/article/view/119
  23. M. Aldwairi, Y. Khamayseh, M. Al-Masri, “Application of artificial bee colony for intrusion detection systems”, Security and Communication Networks, John Wiley & Sons, Ltd., Vol. 8, No. 16, pp. 2730-2740, 2015/11. http://dx.doi.org/10.1002/sec.588.
  • Papers in refereed conference proceedings

  1. W. Mater, M. Aldwairi, Teamwork communication in healthcare: An Instrument Validation Process. First International Conference of Advanced Computing and Informatics (ICACIN 2020). Springer book series “Advances in Intelligent Systems and Computing”. Apr 12, 2020 - Apr 13, 2020, Morocco.
  2. S. Ibrahim, N. Al Herami, E. Al Naqbi, M. Aldwairi, Detection and Analysis of Drive-by-Downloads and Malicious Websites. Seventh International Symposium on Security in Computing and Communications (SSCC'19), December 18-21, 2019, Trivandrum, Kerala, India.
  3. H. Alsaadi, M. Aldwairi and E.M. Muller-Stuler, Analyzing D-Wave Quantum Macro Assembler Security. In: Latifi S. (eds) 16th International Conference on Information Technology-New Generations (ITNG 2019). Advances in Intelligent Systems and Computing, vol 800. Springer, Cham, April 1-3, 2019, Las Vegas, Nevada, USA. https://doi.org/10.1007/978-3-030-14070-0_19.
  4. M. Aldwairi, A. Seyam, M. Alshboul, Characterizing Realistic Signature-based Intrusion Detection Benchmarks, International Conference Proceedings Series by ACM. The 6th International Conference on Information Technology: IoT and Smart City, Hong Kong, Dec 29-31, 2018. https://dl.acm.org/citation.cfm?id=3301591.
  5. M. Aldwairi and A. Alwahedi, Detecting fake news in social media networks, Procedia Computer Science, Vol 141, pp. 215-222, The 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN), November 5-8, 2018, Leuven, Belgium. https://doi.org/10.1016/j.procs.2018.10.171
  6. H. Al-Theiabat, M. Al-Ayyoub, M. Alsmirat and M. Aldwairi, A Deep Learning Approach for Amazon EC2 Spot Price Prediction, The 2nd International Workshop on Automation of Cloud Configuration and Operations (ACCO 2018), 15th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA’18), Oct 28 – Nov 01, 2018, Aqaba, Jordan, pp. 1-5. https://doi.org/10.1109/AICCSA.2018.8612783.
  7. Q. M. Yaseen, M. Aldwairi, An Enhanced AODV Protocol for Avoiding Black Holes in MANET, the 13th International Conference on Future Networks and Communications (FNC 2018), Procedia Computer Science, Vol. 134, pp 371-376, August 13-15, 2018, Gran Canaria, Spain. https://doi.org/10.1016/j.procs.2018.07.196.
  8. K. Al Messabi, M. Aldwairi, A. Al Yousif, A. Thoban and F. Belqasmi, Malware Detection using DNS Records and Domain Name Features, International Conference on Future Networks and Distributed Systems (ICFNDS), June 26-27, 2018, Amman, Jordan. Article 29, pp.1-7. https://doi.org/10.1145/3231053.3231082
  9. N. E. Benzebouchi, N. Azizi, M. Aldwairi, Multi-Classifier System for Authorship Verification task using Word Embeddings, 2nd International Conference on Natural Language and Speech Processing (ICNLSP’18) Algiers, Algeria, April 25- 26th, 2018, 991-6. https://doi.org/10.1109/ICNLSP.2018.8374391.  
  10. S. Souaidi, T. Kenaza, B. Djamaa and M. Aldwairi, Dynamic Clustering for IoT Key Management in Hostile Application Area. Springer, Cham: Lecture Notes in Networks and Systems  Advances in Computing Systems and Applications. CSA 2018, April 24-25, 2018, Algiers, Algeria. https://doi.org/10.1007/978-3319-98352-3_6
  11. M. Abu Qbeitah and M. Aldwairi, Dynamic Malware Analysis of Phishing Emails, the 9th International Conference on Information and Communication Systems (ICICS 2018), Irbid, Jordan, 3-5, April 2018. Pp.18-24. https://doi.org/10.1109/IACS.2018.8355435.
  12. H. Alsaadi, M. Aldwairi, M. Al Taei, M. AlBuainain, M. AlKubaisi, The Penetration of Remote Secure Shell Service (OpenSSH) On Raspberry Pi 2, 9th IFIP International Conference on New Technologies, Mobility & Security (NTMS’18), 26- 28 February 2018. Paris, France. pp. 1-5. https://doi.org/10.1109/NTMS.2018.8328710.   
  13. M. Aldwairi, K. Mhaidat, Y. Flaifel, “Efficient Pattern Matching Hardware for Network Intrusion Detection Systems”, International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC). 28th & 29th January 2018. Tamil Nadu, India.
  14. M. Aldwairi and S. Aldhanhani. Multi-Factor Authentication System. The 2017 International Conference on Research and Innovation in Computer Engineering and Computer Sciences (RICCES'2017), 15-17 August 2017 Langkawi Island, Kedah, Malaysia.
  15. M. Aldwairi, H. H. Shayef, “FLUKES: Autonomous Log Forensics, Intelligence and Visualization Tool”, International Conference on Future Networks and Distributed Systems (ICFNDS’17), July 19 - 20, 2017, Cambridge, UK. Article 33, pp. 1-6. https://doi.org/10.1145/3102304.3102337.  
  16. R Masri, M Aldwairi. Automated Malicious Advertisement Detection using VirusTotal, URLVoid, and TrendMicro. The International Conference on Information and Communication Systems (ICICS), Irbid, Jordan, 4-6, April 2017, pp. 336-341. https://doi.org/10.1109/IACS.2017.7921994.   
  17. K. AlRoum, A. Alolama, R. Kamel, M. El Barachi, M. Aldwairi. Detecting Malware Domains: A Cyber-Threat Alarm System, Emerging Technologies for Developing Countries. AFRICATEK 2017, March 27–28, 2017, Marrakech, Morocco. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 206, pp. 181-191. Springer, Cham. https://doi.org/10.1007/978-3-319-67837-5_17.
  18. Q. Yaseen, Y. Jararweh, M. Al-Ayyoub and M. Aldwairi, Collusion Attacks in Internet of Things: Detection and Mitigation using a Fog Based Model. 2017 IEEE Sensors Applications Symposium (SAS), Glassboro, NJ, Mar 13-15, 2017. pp. 1-5. https://doi.org/10.1109/SAS.2017.7894031.  
  19. A. Rabab’ah, M. Al-Ayyoub, Y.Jararweh, and M. Aldwairi, Authorship Attribution of Arabic Tweets, In the Proc. of the13th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2016), Agadir, Morocco, Nov 29 – Dec 02, 2016. pp1-6. https://doi.org/10.1109/AICCSA.2016.7945818.
  20. B. Al-Duwairi, A. Al-Hammouri, M. Aldwairi, V. Paxson, “GFlux: A Google-Based System for Fast Flux Detection”, IEEE Conference on Communications and Network Security (IEEE-CNS 2015), Florence, Italy, 27-29 Sept 2015. pp. 755-756. https://doi.org/10.1109/CNS.2015.7346920.  
  21. M. Aldwairi, K. Al-Khamaiseh, “Exhaust: Optimizing Wu-Manber Pattern Matching for Intrusion Detection using Bloom Filters”, The 2nd World Symposium on Web Applications and Networking (WSWAN’2015), Sousse, Tunisia, 21-23 March 2015. pp. 1-6. https://doi.org/10.1109/WSWAN.2015.7209081.