{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:32:24Z","timestamp":1740115944589,"version":"3.37.3"},"reference-count":79,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010272","name":"Zarqa University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010272","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,10]]},"DOI":"10.1109\/acit62805.2024.10876902","type":"proceedings-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:27:16Z","timestamp":1739816836000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Main Confidentiality Challenges in Network Security: A Literature Review"],"prefix":"10.1109","author":[{"given":"Mahmoud","family":"Asassfeh","sequence":"first","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Mohammad Rasmi","family":"Al-Mousa","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Waleed","family":"Amer","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Adai Mohammad","family":"Almomani","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Computer Science,Zarqa,Jordan"}]},{"given":"Ala\u2019a","family":"Al-Shaikh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Suha","family":"Afaneh","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cybersecurity,Zarqa,Jordan"}]},{"given":"Mohammed Nayef","family":"Alrefai","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Software Enginereeing,Zarqa,Jordan"}]},{"given":"Ali","family":"Elrashidi","sequence":"additional","affiliation":[{"name":"University of Business and Technology,Department of Electrical Engineering,Jeddah,Saudi Arabia,21432"}]},{"given":"Ghassan","family":"Samara","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Computer Science,Zarqa,Jordan"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"32","article-title":"Well-architected wireless network security","volume":"5","author":"Mughal","year":"2022","journal-title":"Journal of Humanities and Applied Science Research"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1002\/ett.4108"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.56726\/irjmets50637"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.14445\/22312803\/IJCTT-V71I6P101"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.compbiomed.2020.104130"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/s10796-020-10044-1"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/s40747-022-00667-z"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/c2013-0-06836-3"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s10207-023-00766-z"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.25271\/sjuoz.2022.10.1.865"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.3390\/electronics12061333"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.7176\/ceis\/14-2-03"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.3390\/s22103671"},{"year":"2023","author":"B\u00e4umer","article-title":"Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.compeleceng.2022.108467"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.3390\/drones6020041"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3614321.3614339"},{"issue":"2","key":"ref18","first-page":"351","article-title":"Biometric Authentication: Past, Present, and Future Perspectives","volume":"12","author":"Mubeen","year":"2024","journal-title":"International Journal of Innovative Research in Technology and Science"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1504\/IJWMC.2023.130403"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1002\/ett.4218"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TIFS.2024.3364092"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/j.eswa.2023.121096"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-981-16-4244-9_23"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1186\/s41512-022-00138-6"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.3390\/en16031044"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.jisa.2021.102788"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/ACCESS.2024.3393567"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1051\/e3sconf\/202340203028"},{"issue":"2","key":"ref29","first-page":"01","article-title":"Evaluating the Effectiveness and Resilience of SSL\/TLS, HTTPS, IPSec, SSH, and WPA\/WPA2 in Safeguarding Data Transmission","volume":"1","author":"Tariq","year":"2023","journal-title":"UCP Journal of Engineering & Information Technology"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.cose.2023.103383"},{"key":"ref31","article-title":"Active and passive security attacks in wireless networks and prevention techniques","author":"Ee","year":"2023","journal-title":"Authorea Preprints"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1051\/e3sconf\/202450903013"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1007\/s10207-024-00875-3"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.2147\/PGPM.S412430"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/j.clsr.2024.105957"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1177\/18479790221093992"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.4236\/jis.2024.152010"},{"year":"2023","author":"Gupta","journal-title":"Securing the cloud: an in-depth exploration of conceptual models, emerging trends, and forward-looking insights","key":"ref38"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1007\/s11227-022-04655-5"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/ACCESS.2024.3393548"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.3390\/a16080378"},{"author":"Hubert","article-title":"Autonomy and Informed Consent: Ensuring patients and their families are well-informed about AI-assisted decisions","key":"ref42"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.9734\/ajrcos\/2024\/v17i4427"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/JIOT.2023.3296368"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1145\/3580890"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/SP46215.2023.10179301"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1145\/3653297"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1080\/13563467.2020.1723514"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1080\/08874417.2020.1845583"},{"volume-title":"Revolutionizing Cybersecurity: Unleashing the Power of Artificial Intelligence and Machine Learning for Next-Generation Threat Detection","year":"2023","author":"Manoharan","key":"ref50"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.60087\/jaigs.v3i1.75"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1016\/j.ins.2022.11.100"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1109\/ICICACS60521.2024.10498662"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.20535\/tacs.2664-29132023.2.280377"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.30953\/bhty.v7.302"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.5771\/9783748913245-231"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.4337\/9781800371682.00010"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1038\/s41746-020-00362-8"},{"key":"ref59","first-page":"36","article-title":"Judging llm-as-a-judge with mt-bench and chatbot arena","author":"Zheng","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1080\/03075079.2020.1859689"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.4018\/IJISSS.2019010104"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.11591\/ijeecs.v33.i2.pp1186-1195"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.34028\/iajit\/19\/4\/8"},{"issue":"6","key":"ref64","first-page":"956","article-title":"Hybrid user acceptance test procedure to improve the software quality","volume":"19","author":"Pillai","year":"2022","journal-title":"Int. Arab J. Inf. Technol."},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.18576\/jsap\/130110"},{"issue":"12","key":"ref66","first-page":"5033","article-title":"Data Integrity Concerns, Requirements, and Proofing in Cloud Computing","volume":"102","author":"Al-Milli","year":"2024","journal-title":"Journal of Theoretical and Applied Information Technology"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.18576\/jsap\/130108"},{"key":"ref68","first-page":"95","article-title":"Improving Timetable Quality Through Multi-objective Optimization: A Case Study on Post-enrolment Course","volume-title":"Business Analytical Capabilities and Artificial Intelligence-enabled Analytics: Applications and Challenges in the Digital Era","volume":"2","author":"Al-Milli","year":"2024"},{"key":"ref68a","first-page":"87","article-title":"The Effects of Innovative Technology on Quality Assurance in Higher Education Institutions in Developing Countries: A Case Study of Jordan","volume-title":"Intelligent Systems, Business, and Innovation Research. Studies in Systems, Decision and Control","volume":"489","author":"Al-ramahi","year":"2024"},{"key":"ref69","first-page":"253","article-title":"The Influence that Covid-19 Has Had on the Electronic Payment System, Including Perspectives on Its Usage, Trust, and Competency","volume-title":"Intelligent Systems, Business, and Innovation Research. Studies in Systems, Decision and Control","volume":"489","author":"Alzeaideen","year":"2024"},{"doi-asserted-by":"publisher","key":"ref70","DOI":"10.3991\/ijim.v17i13.39395"},{"key":"ref71","first-page":"1","article-title":"Facebook Friendship Suggestion Model Based on Data Analysis and Visualization","volume-title":"2023 24th International Arab Conference on Information Technology (ACIT)","author":"Khattab"},{"issue":"4","key":"ref72","first-page":"1471","article-title":"Evaluating the influence of security considerations on information dissemination via social networks","volume-title":"International Journal of Data and Network Science","volume":"7","author":"AlHadid"},{"issue":"3","key":"ref73","first-page":"1381","article-title":"Depression and anxiety in social media: Jordan case study","volume-title":"International Journal of Data and Network Science","volume":"7","author":"AlHadid","year":"2023"},{"issue":"3","key":"ref74","first-page":"1241","article-title":"A new model for security analysis of network anomalies for IoT devices","volume-title":"International Journal of Data and Network Science","volume":"7","author":"Rawajbeh","year":"2023"},{"doi-asserted-by":"publisher","key":"ref75","DOI":"10.1109\/icit58056.2023.10226018"},{"doi-asserted-by":"publisher","key":"ref76","DOI":"10.1016\/j.eij.2020.12.005"},{"issue":"1","key":"ref77","article-title":"Energy-Efficiency Routing algorithms in Wireless Sensor Networks: a Survey","volume":"9","author":"Samara","year":"2020","journal-title":"International Journal of Scientific & Technology Research"},{"doi-asserted-by":"publisher","key":"ref78","DOI":"10.1109\/ACIT50332.2020.9300065"}],"event":{"name":"2024 25th International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2024,12,10]]},"location":"Zarqa, Jordan","end":{"date-parts":[[2024,12,12]]}},"container-title":["2024 25th International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10876862\/10876868\/10876902.pdf?arnumber=10876902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:58:16Z","timestamp":1740081496000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10876902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":79,"URL":"https:\/\/doi.org\/10.1109\/acit62805.2024.10876902","relation":{},"subject":[],"published":{"date-parts":[[2024,12,10]]}}}