| 1 | Paper ID | 87 | 
| Authors | Mohammad Shehab, Ghaith Jaradat, Bahaa Almasri, Sharaf Alzoubi, and Mariam Al Ghamri | |
| Paper Name | Enhancing Intrusion Detection in Wireless Sensor Networks with Sperm Swarm Optimization Algorithm | |
| 2 | Paper ID | 27 | 
| Authors | Bashar Al Shboul, Khaled Almakadmeh, Hani Bani-Salameh, and Malek Bishara | |
| Paper Name | Theoretical Framework for AI-Driven Code Generation and Summarization: Advancing Software Development through Conceptual Design Principles | |
| 3 | Paper ID | 20 | 
| Authors | Ahmed Awad | |
| Paper Name | Declarative Enactment of BPMN Processes - An Approach Based on Streams and Tables | |
| 4 | Paper ID | 19 | 
| Authors | Abdulrahman S Almuhaidib, Azlan Mohd Zain, Zalmiyah Zakaria, Izyan Izzati Kamsani, and Abdulaziz S Almuhaidib | |
| Paper Name | Weaponizing Language Models for Cybersecurity Offensive Operations: Automating Vulnerability Assessment Report Validation; A Review Paper | |
| 5 | Paper ID | 74 | 
| Authors | Saleh Salous | |
| Paper Name | Comparative Analysis of Sorting Algorithm Performance on Normally and Poisson Distributed Integer Arrays | 
 
       
			 
	
			 
			 
 
 
