top of page
Published Books
Intelligent and Secure Solutions for Digital Transformation
Qasem Abu Al-Haija, Yassine Maleh, Ammar Odeh
Description
This book offers a comprehensive exploration of cutting-edge technologies and methodologies at the intersection of cybersecurity and digital innovation. In an era where rapid digital transformation is reshaping industries, this book delivers timely insights into how organizations can secure their infrastructures while embracing intelligent, data-driven change.
Modern Insights on Smart and Secure Software Development
Qasem Abu Al-Haija and Mahmoud Hammad
Description
The integration of emerging technologies, such as artificial intelligence (AI), machine learning (ML), and blockchain, in software development enhance the potential of software systems. For organizations, this can impact the efficiency of processes, automating their systems and increasing their cyber resilience. As a result, they have the ability to revolutionize healthcare systems, security systems, communication systems, and more.
Advances in AI for Simulation and Optimization of Energy Systems
Qasem Abu Al-Haija, Omar Mohamed, Wejdan Abu Elhaija
Description
This explores AI’s groundbreaking role in the future of energy. As the demand for cleaner, more efficient energy systems grows, AI‑driven methodologies are leading the way in simulating and optimizing critical processes across the power generation, transmission, and storage sectors. Whether applied to traditional power grids, renewable energy systems, or energy markets, AI techniques such as neural networks, reinforcement learning, fuzzy logic, and metaheuristic optimization are revolutionizing how energy systems are modeled and managed.
Smart and Agile Cybersecurity for IoT and IIoT Environments
Qasem Abu Al-Haija (Jordan University of Science and Technology, Jordan)
Description
Smart and Agile Cybersecurity for IoT and IIoT Environments addresses this pressing challenge by providing a comprehensive guide to securing IoT and IIoT environments. The book offers insights into the latest cybersecurity strategies and technologies, from intelligent threat detection to agile security approaches. By delving into data privacy, network security, and incident response, readers can gain the knowledge and skills to fortify their cybersecurity posture and mitigate risks effectively.
Efficient Algorithms for ECC Using New Coordinates Systems Over GF(P)
Qasem Abu Al-Haija (Author)
Description
The use of projective coordinates to define the Elliptic Curves (EC) instead of affine coordinates replaced the inversion operations by several multiplication operations. Many types of projective coordinates have been proposed for the elliptic curve E: y2= x3+ ax+ b which is defined over a field GF(p) to do EC arithmetic operations such as: Standard projective coordinates, Jacobean projective coordinates, Chudnovsky coordinates.
bottom of page










