Tarawneh, Monther
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

A comparative study of machine learning tools for detecting Trojan horse infections in cloud computing environments Kanaker, Hasan; Tarawneh, Monther; Karim, Nader Abdel; Alsaaidah, Adeeb; Abuhamdeh, Maher; Qtaish, Osama; Alhroob, Essam; Alhalhouli, Zaid
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 6: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i6.pp6642-6655

Abstract

Cloud computing offers several advantages, including cost savings and easy access to resources, it is also could be vulnerable to serious security attacks such as cloud Trojan horse infection attacks. To address this issue, machine learning is a promising approach for detecting these threats. Thus, different machine learning tools and models have been employed to detect Trojan horse infection such as Weka and Python Colab. This study aims to compare the performance of Weka and Python Colab, as popular tools for building machine learning models. This study evaluates the recall, accuracy, and F1-score of machine learning models built with Weka and Python Colab and compares their computational resources required employing several machine learning algorithms. The dataset collected and analyzed using dynamic analysis of Trojan horse infection in control lab environment. The findings of this study can help determine the decision about which tool to use to detect Trojan horse infections and provide insights into the strengths and limitations of Weka and Python Colab for building machine-learning models in general.
Hybrid artificial intelligence approach to counterfeit currency detection Tarawneh, Monther
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 6: December 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i6.pp5804-5814

Abstract

The use of physical money continues, posing ongoing challenges in the form of counterfeit money. This problem not only poses a threat to economic stability but also undermines confidence in the financial systems in use. Traditional methods such as manual inspections and testing of security features have become ineffective in detecting advanced counterfeiting techniques on an ongoing basis. This study proposes a hybrid model that harnesses the power of artificial intelligence, combining convolutional neural networks (CNNs), long short-term memory networks (LSTMs), and support vector machines (SVMs) for counterfeit detection. The proposed model leverages the diverse strengths of a number of artificial intelligence techniques, combining the ability to detect counterfeiting, analyse visual aspects, and sequences of banknotes. The proposed model was tested using real Jordanian currency sets of different denominations and datasets generated using generative adversarial networks (GANs). The results showed that the model was able to detect counterfeiting with high accuracy of 98.6%. and minimal errors compared to other methods. This outstanding performance demonstrates the benefits of integrating artificial intelligence (AI) technologies and that there is room for development and solutions that can keep up with advanced counterfeiting strategies. The study demonstrates the importance of integrating AI in maintaining the integrity of physical currency transactions.