Work place: King Abdullah II School for Information Technology the University of Jordan, Amman, Jordan
E-mail: sherinhijazi@yahoo.com
Website: https://orcid.org/0000-0003-2411-5681
Research Interests: Artificial Intelligence, Information Security, Network Security, Parallel Computing, Algorithm Design, Analysis of Algorithms
Biography
Sherin Hijazi Sherin Hijazi earned her bachelor’s degree in management information systems from An-Najah National University in Nablus, Palestine, in 2005. She then pursued a master’s degree in computer information systems at Al-Yarmouk University in Irbid, Jordan, completing it in 2012. In 2015, she received a scholarship from Palestine Technical University-Kadoorie (PTUK) to pursue her Ph.D. in Computer Science at the University of Jordan in Amman, Jordan, which she successfully obtained in 2020.
From 2005 to 2007, Sherin served as an Administrative Assistant in the IT Department at Palestine Securities Exchange (PSE). From 2007 to 2011, she worked as a Programmer at PTUK in Tulkarm, Palestine. She then progressed to leadership roles, serving as Head of Programming at the Computer Center at PTUK from 2011 to 2013. Following this, she contributed to academia as a Lecturer in the Department of Applied Computing at PTUK from 2013 to 2020. Continuing her academic career, she became an Assistant Professor in the Department of Applied Computing from 2020 to 2022. In 2022, she transitioned to the role of Assistant Professor in the Department of Computer Science and simultaneously served as the Head of the Computer Science Department and the Head of the Information System Department within the Information Technology Faculty at PTUK from 2022 to 2023. Since 2022 and until now, she has been leading the Computer Science Department within the Information Technology Faculty at PTUK.
Dr. Hijazi has made significant contributions to the field with nine publications covering various areas of computer science. Her research interests include artificial intelligence, data science, data analysis, algorithms, network security, software engineering, and database systems. In recognition of her outstanding contributions, Dr. Hijazi received the IEEE Systems Journal Best Paper Award in 2020. Additionally, she was honored with the Reviewer Certificate from the Security and Privacy Journal for the period 2020-2024 and the Reviewer Certificate from IEEE Access Journal for the period 2020-2022.
By Mahmoud Moshref Sherin Hijazi Azzam Sleit Ahmad Sharieh
DOI: https://doi.org/10.5815/ijem.2024.03.01, Pub. Date: 8 Jun. 2024
Cloud-fog computing has emerged as the contemporary approach for processing and analyzing Internet of Things applications due to its ability to offer remote resources. Cloud fog computing technology provides shared resources, information, and software packages, supporting distributed parallel systems in an open environment. It constructs and manages virtual machines to enhance efficiency and attractiveness. We have consistently strived to tackle challenges affecting the efficiency of cloud fog computing, including ineffective resource utilization and response times. The improvement of these challenges can be achieved through effective task scheduling and load balancing between Virtual Machines, this problem considered as NP-hard problem. This paper proposes a Hybrid K-means Clustering Honey Bee algorithm (HKCHB) to cluster Virtual Machines into two or more clusters. Subsequently, the hybrid Honey Bee algorithm is employed for task scheduling, enhancing load balance performance. The proposed algorithm is compared with other task scheduling and load balancing algorithms, including Round Robin, Ant Colony, Honey Bee, and Particle Swarm Optimization Algorithm, utilizing the CloudSim Simulator. The results demonstrate the superiority of the proposed algorithm, yielding the lowest response time. Specifically, the response time is reduced by 22.1%, and processing time is reduced by 47.9%, while throughput is increased by 95.4%. These improvements are observed under the assumption of multiple tasks in a heterogeneous environment, utilizing one or two Data Centers with Virtual Machines. This contribution gives the impression that network systems based on the Internet of Things and cloud fog computing will be improved in the future to operate within the framework of real-time systems with high efficiency.
[...] Read more.DOI: https://doi.org/10.5815/ijitcs.2023.03.03, Pub. Date: 8 Jun. 2023
Web applications are becoming very important in our lives as many sensitive processes depend on them. Therefore, it is critical for safety and invulnerability against malicious attacks. Most studies focus on ways to detect these attacks individually. In this study, we develop a new vulnerability system to detect and prevent vulnerabilities in web applications. It has multiple functions to deal with some recurring vulnerabilities. The proposed system provided the detection and prevention of four types of vulnerabilities, including SQL injection, cross-site scripting attacks, remote code execution, and fingerprinting of backend technologies. We investigated the way worked for every type of vulnerability; then the process of detecting each type of vulnerability; finally, we provided prevention for each type of vulnerability. Which achieved three goals: reduce testing costs, increase efficiency, and safety. The proposed system has been validated through a practical application on a website, and experimental results demonstrate its effectiveness in detecting and preventing security threats. Our study contributes to the field of security by presenting an innovative approach to addressing security concerns, and our results highlight the importance of implementing advanced detection and prevention methods to protect against potential cyberattacks. The significance and research value of this survey lies in its potential to enhance the security of online systems and reduce the risk of data breaches.
[...] Read more.DOI: https://doi.org/10.5815/ijcnis.2018.10.01, Pub. Date: 8 Oct. 2018
This paper focuses on the design model verification processes to reduce modification cost after the software is delivered. We proposed a new design flow of web content integrity to protect web security by using colored petri nets simulation. The method covers the design process from the firewall stage to the recovery stage. In the proposed solution, the model verified the integrity of web content through detection tampering and recovery web content processes. Furthermore, the specification formally verifies the model checking technique by colored Petri nets formalism. Finally, the model is simulated by colored petri nets to insure the correct behavior of the designed web content integrity model.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals