1 |
Paper ID |
87 |
Authors |
Mohammad Shehab, Ghaith Jaradat, Bahaa Almasri, Sharaf Alzoubi, and Mariam Al Ghamri |
Paper Name |
Enhancing Intrusion Detection in Wireless Sensor Networks with Sperm Swarm Optimization Algorithm |
2 |
Paper ID |
27 |
Authors |
Bashar Al Shboul, Khaled Almakadmeh, Hani Bani-Salameh, and Malek Bishara |
Paper Name |
Theoretical Framework for AI-Driven Code Generation and Summarization: Advancing Software Development through Conceptual Design Principles |
3 |
Paper ID |
20 |
Authors |
Ahmed Awad |
Paper Name |
Declarative Enactment of BPMN Processes - An Approach Based on Streams and Tables |
4 |
Paper ID |
19 |
Authors |
Abdulrahman S Almuhaidib, Azlan Mohd Zain, Zalmiyah Zakaria, Izyan Izzati Kamsani, and Abdulaziz S Almuhaidib |
Paper Name |
Weaponizing Language Models for Cybersecurity Offensive Operations: Automating Vulnerability Assessment Report Validation; A Review Paper |
5 |
Paper ID |
74 |
Authors |
Saleh Salous |
Paper Name |
Comparative Analysis of Sorting Algorithm Performance on Normally and Poisson Distributed Integer Arrays |