top of page

Published Books

WhatsApp Image 2025-10-09 at 10.01.07 AM.jpeg

Intelligent and Secure Solutions for Digital Transformation

Qasem Abu Al-Haija, Yassine Maleh, Ammar Odeh

Description

This book offers a comprehensive exploration of cutting-edge technologies and methodologies at the intersection of cybersecurity and digital innovation. In an era where rapid digital transformation is reshaping industries, this book delivers timely insights into how organizations can secure their infrastructures while embracing intelligent, data-driven change.

9798369398517.png

Modern Insights on Smart and Secure Software Development

Qasem Abu Al-Haija and Mahmoud Hammad 

Description
 
The integration of emerging technologies, such as artificial intelligence (AI), machine learning (ML), and blockchain, in software development enhance the potential of software systems. For organizations, this can impact the efficiency of processes, automating their systems and increasing their cyber resilience. As a result, they have the ability to revolutionize healthcare systems, security systems, communication systems, and more. 
11111.jpg

Advances in AI for Simulation and Optimization of Energy Systems

Qasem Abu Al-Haija, Omar Mohamed, Wejdan Abu Elhaija

Description

This explores AI’s groundbreaking role in the future of energy. As the demand for cleaner, more efficient energy systems grows, AI‑driven methodologies are leading the way in simulating and optimizing critical processes across the power generation, transmission, and storage sectors. Whether applied to traditional power grids, renewable energy systems, or energy markets, AI techniques such as neural networks, reinforcement learning, fuzzy logic, and metaheuristic optimization are revolutionizing how energy systems are modeled and managed.
9798369334515.jpg

Smart and Agile Cybersecurity for IoT and IIoT Environments

Qasem Abu Al-Haija (Jordan University of Science and Technology, Jordan)

Description

Smart and Agile Cybersecurity for IoT and IIoT Environments addresses this pressing challenge by providing a comprehensive guide to securing IoT and IIoT environments. The book offers insights into the latest cybersecurity strategies and technologies, from intelligent threat detection to agile security approaches. By delving into data privacy, network security, and incident response, readers can gain the knowledge and skills to fortify their cybersecurity posture and mitigate risks effectively.
20251008_0010_image.png

Efficient Algorithms for ECC Using New Coordinates Systems Over GF(P)

 Qasem Abu Al-Haija (Author)

Description

The use of projective coordinates to define the Elliptic Curves (EC) instead of affine coordinates replaced the inversion operations by several multiplication operations. Many types of projective coordinates have been proposed for the elliptic curve E: y2= x3+ ax+ b which is defined over a field GF(p) to do EC arithmetic operations such as: Standard projective coordinates, Jacobean projective coordinates, Chudnovsky coordinates. 
Professor   |   Engineer  |  Educator  |   Researcher  |   Consultant  |   Reviewer  |   Trainer   |   Editor  |   Supervisor
just.jpg
google-scholar.jpg
ResearchGate.png
scopus3.png
WoS.png
768px-ORCID_iD.svg.png
IEEE.jpg
Springer.png
else.png
MDPI.jpg
Inder.jpg
IET.png
cropped_circle_image.png
cropped_circle_image (1).png
cropped_circle_image (2).png
linkedin-icon-2048x2048-ya5g47j2.png
bottom of page