Recent Courses

CYS501

Fundamentals of Cybersecurity

CYS517

Cybersecurity Forensics

SE501

Software Development processes

CS495

Emerging Topics In Computer Science

CYS405

Penetration Testing & ETHICAL HACKING

CYS600

Thesis

SE600

Thesis

CS391

Computer & Network Security

SE495

Emerging Topics In Software Engineering

CYS595

Emerging Topics in CyberSecurity

Semester Courses

No Data Exists.

Education

  • B

    BACHELOR / 2000

    UAE university

    Al-Ain , United Arab Emirates

  • M

    MASTER / 2002

    The University of Jordan

    Amman , Jordan

  • D

    DOCTORATE / 2007

    De Montfort Univesity

    Leicester , Britain

Experience

  • 2012 - 2020

    AMMAN

    Associate professor

    12/1/2012 - 5/3/2020

    The University of Jordan

    Amman,Jordan

  • 2014 - 2020

    RIYADH

    Associate Professor

    8/24/2014 - 3/5/2020

    PRINCE SULTAN UNIVERSITY

    Riyadh,Saudi Arabia

  • 2015 - 2019

    RIYADH

    Associate Chair of Computer Science Department

    9/1/2015 - 9/1/2019

    PRINCE SULTAN UNIVERSITY

    Riyadh,Saudi Arabia

  • 2017 - 2020

    RIYADH

    Associate Director of Reserach and Initiative Center (RIC)

    9/3/2017 - 9/1/2020

    PRINCE SULTAN UNIVERSITY

    Riyadh,Saudi Arabia

  • 2019 - 2021

    RIYADH

    Security Engineering Lab (SEL) Leader

    4/1/2019 - 9/1/2021

    PRINCE SULTAN UNIVERSITY

    Riyadh,Saudi Arabia

  • 2022 - 2022

    RIYADH

    Intellectual Property (IP) Manager

    4/1/2022 - 8/31/2022

    Prince Sultan University

    Riyadh,Saudi Arabia

  • 2022 - 2022

    RIYADH

    Associate Director of the Innovation Center

    4/7/2022 - 8/31/2022

    Prince Sultan University

    Riyadh,Saudi Arabia

Professional Society

  • IEEE

    IEEE Senior Member

Publications

  • 2024-01-01

    journal

    Iman Almomani Almomani I. ,Tala Almashat Almashat T. ,Walid El-Shafai El-Shafai W.

    IEEE Access 2024-01-01

    Maloid-DS: Labeled Dataset for Android Malware Forensics

  • 2023-08-01

    other

    Metty Paul Paul M. ,Leandros Maglaras Maglaras L. ,Mohamed Amine Ferrag Ferrag M.A. ,Iman Almomani Almomani I.

    ICT Express 2023-08-01

    Digitization of healthcare sector: A study on privacy and security concerns

  • 2023-06-01

    journal

    Walid El-Shafai El-Shafai W. ,Iman Almomani Almomani I. ,Anees Ara Ara A. ,Aala Alkhayer Alkhayer A.

    Multimedia Tools and Applications 2023-06-01

    An optical-based encryption and authentication algorithm for color and grayscale medical images

  • 2023-05-01

    journal

    Afnan Alfaadhel Alfaadhel A. ,Iman Almomani Almomani I. ,Mohanned Ahmed Ahmed M.

    Applied Sciences (Switzerland) 2023-05-01

    Risk-Based Cybersecurity Compliance Assessment System (RC2AS)

  • 2023-05-01

    journal

    Iman Almomani Almomani I. ,Aala Alkhayer Alkhayer A. ,Walid El-Shafai El-Shafai W.

    Sensors 2023-05-01

    E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches

  • 2023-01-01

    journal

    Iman Almomani Almomani I. ,Walid El-Shafai El-Shafai W. ,Aala AlKhayer AlKhayer A. ,Albandari Alsumayt Alsumayt A. ,Sumayh S. Aljameel Aljameel S.S. ,Khalid Alissa Alissa K.

    Computers, Materials and Continua 2023-01-01

    Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms

  • 2022-10-01

    journal

    Maha Driss Driss M. ,Iman Almomani Almomani I. ,Zil e Huma e Huma Z. ,Jawad Ahmad Ahmad J.

    Complex and Intelligent Systems 2022-10-01

    A federated learning framework for cyberattack detection in vehicular sensor networks

  • 2022-07-01

    journal

    Iman Almomani Almomani I. ,Mohanned Ahmed Ahmed M. ,Walid El-Shafai El-Shafai W.

    PLoS ONE 2022-07-01

    Android malware analysis in a nutshell

  • 2022-06-01

    journal

    Safa Ben Atitallah Atitallah S.B. ,Maha Driss Driss M. ,Iman Almomani Almomani I.

    Sensors 2022-06-01

    A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks

  • 2022-03-01

    journal

    Iman Almomani Almomani I. ,Aala Alkhayer Alkhayer A. ,Walid El-Shafai El-Shafai W.

    Sensors 2022-03-01

    A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices

  • 2022-01-01

    journal

    Iman Almomani Almomani I. ,Mohanned Ahmed Ahmed M. ,Dimitrios Kosmanos Kosmanos D. ,Aala Alkhayer Alkhayer A. ,Leandros Maglaras Maglaras L.

    IEEE Access 2022-01-01

    An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks

  • 2022-01-01

    conference

    Ayyub Alzahem Alzahem A. ,Wadii Boulila Boulila W. ,Maha Driss Driss M. ,Anis Koubaa Koubaa A. ,Iman Almomani Almomani I.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2022-01-01

    Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers

  • 2022-01-01

    conference

    Safa Ben Atitallah Ben Atitallah S. ,Maha Driss Driss M. ,Wadii Boulila Boulila W. ,Iman Almomani Almomani I.

    Communications in Computer and Information Science 2022-01-01

    An Effective Detection and Classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting

  • 2022-01-01

    conference

    Maha Driss Driss M. ,Iman Almomani Almomani I. ,Leen Alahmadi Alahmadi L. ,Linah Alhajjam Alhajjam L. ,Raghad Alharbi Alharbi R. ,Shahad Alanazi Alanazi S.

    Proceedings - 2022 2nd International Conference of Smart Systems and Emerging Technologies, SMARTTECH 2022 2022-01-01

    COVIBOT: A Smart Chatbot for Assistance and E-Awareness during COVID-19 Pandemic

  • 2022-01-01

    conference

    Iman Almomani Almomani I. ,Mohanned Ahmed Ahmed M. ,Walid El-Shafai El-Shafai W.

    Proceedings - 2022 2nd International Conference of Smart Systems and Emerging Technologies, SMARTTECH 2022 2022-01-01

    DefOff: Defensive/Offensive System based on Hiding Technologies

  • 2022-01-01

    other

    Maha Driss Driss M. ,Iman Almomani Almomani I. ,Rahaf Al-Suhaimi Al-Suhaimi R. ,Hanan Al-Harbi Al-Harbi H.

    Lecture Notes on Data Engineering and Communications Technologies 2022-01-01

    Automatic Saudi Arabian License Plate Detection and Recognition Using Deep Convolutional Neural Networks

  • 2022-01-01

    journal

    Reem Al Saleh Saleh R.A. ,Maha Driss Driss M. ,Iman Almomani Almomani I.

    IEEE Access 2022-01-01

    CBiLSTM: A Hybrid Deep Learning Model for Efficient Reputation Assessment of Cloud Services

  • 2022-01-01

    journal

    Iman Almomani Almomani I. ,Aala Alkhayer Alkhayer A. ,Walid El-Shafai El-Shafai W.

    IEEE Access 2022-01-01

    An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks

  • 2021-11-01

    journal

    Rana Almohaini Almohaini R. ,Iman Almomani Almomani I. ,Aala Alkhayer Alkhayer A.

    Applied Sciences (Switzerland) 2021-11-01

    Hybrid-based analysis impact on ransomware detection for android systems

  • 2021-08-01

    journal

    Ruba Abu Khurma Khurma R.A. ,Iman Almomani Almomani I. ,Ibrahim Aljarah Aljarah I.

    Symmetry 2021-08-01

    Iot botnet detection using salp swarm and ant lion hybrid optimization model

  • 2021-07-14

    conference

    Raneem Qaddoura Qaddoura R. ,Ala'M. Al-Zoubi Al-Zoubi A.M. ,Iman Almomani Almomani I. ,Hossam Faris Faris H.

    2021 International Conference on Information Technology, ICIT 2021 - Proceedings 2021-07-14

    Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach

  • 2021-07-02

    journal

    Walid El-Shafai El-Shafai W. ,Iman Almomani Almomani I. ,Aala Alkhayer Alkhayer A.

    Applied Sciences (Switzerland) 2021-07-02

    Visualized malware multi-classification framework using fine-tuned cnn-based transfer learning models

  • 2021-05-01

    journal

    Raneem Qaddoura Qaddoura R. ,Ala’ M. Al-Zoubi Al-Zoubi A.M. ,Hossam Faris Faris H. ,Iman Almomani Almomani I.

    Sensors 2021-05-01

    A multi-layer classification approach for intrusion detection in iot networks based on deep learning

  • 2021-04-06

    conference

    Iman Almomani Almomani I. ,Aala Alkhayer Alkhayer A. ,Mohanned Ahmed Ahmed M.

    2021 1st International Conference on Artificial Intelligence and Data Analytics, CAIDA 2021 2021-04-06

    An Efficient Machine Learning-based Approach for Android v.11 Ransomware Detection

  • 2021-04-01

    journal

    Raneem Qaddoura Qaddoura R. ,Ala’ M. Al-Zoubi Al-Zoubi A.M. ,Iman Almomani Almomani I. ,Hossam Faris Faris H.

    Applied Sciences (Switzerland) 2021-04-01

    A multi-stage classification approach for iot intrusion detection based on clustering with oversampling

  • 2021-01-01

    journal

    Iman Almomani Almomani I. ,Mohanned Ahmed Ahmed M. ,Leandros Maglaras Maglaras L.

    PeerJ Computer Science 2021-01-01

    Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia

  • 2021-01-01

    journal

    Iman Almomani Almomani I. ,Aala AlKhayer AlKhayer A. ,Walid El-Shafai El-Shafai W.

    Computers, Materials and Continua 2021-01-01

    Novel ransomware hiding model using HEVC steganography approach

  • 2021-01-01

    journal

    Iman Almomani Almomani I. ,Raneem Qaddoura Qaddoura R. ,Maria Habib Habib M. ,Samah Alsoghyer Alsoghyer S. ,Alaa Al Khayer Khayer A.A. ,Ibrahim Aljarah Aljarah I. ,Hossam Faris Faris H.

    IEEE Access 2021-01-01

    Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data

  • 2021-01-01

    journal

    Walid El-Shafai El-Shafai W. ,Iman M. Almomani Almomani I.M. ,Aala Alkhayer Alkhayer A.

    IEEE Access 2021-01-01

    Optical Bit-Plane-Based 3D-JST Cryptography Algorithm with Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication

  • 2020-11-01

    conference

    Aala Al Khayer Al Khayer A. ,Iman Almomani Almomani I. ,Khaled Elkawlak Elkawlak K.

    Proceedings - 2020 1st International Conference of Smart Systems and Emerging Technologies, SMART-TECH 2020 2020-11-01

    ASAF: Android Static Analysis Framework

  • 2020-06-01

    journal

    Hossam Faris Faris H. ,Maria Habib Habib M. ,Iman Almomani Almomani I. ,Mohammed Eshtay Eshtay M. ,Ibrahim Aljarah Aljarah I.

    Applied Sciences (Switzerland) 2020-06-01

    Optimizing extreme learning machines using chains of salps for efficient android ransomware detection

  • 2020-03-01

    conference

    Samah Alsoghyer Alsoghyer S. ,Iman Almomani Almomani I.

    Proceedings - 2020 6th Conference on Data Science and Machine Learning Applications, CDMA 2020 2020-03-01

    On the Effectiveness of Application Permissions for Android Ransomware Detection

  • 2020-03-01

    journal

    Iman Almomani Almomani I. ,Katrina Sundus Sundus K.

    Jordanian Journal of Computers and Information Technology 2020-03-01

    The impact of mobility models on the performance of authentication services in wireless sensor networks

  • 2020-03-01

    journal

    Iman Almomani Almomani I. ,Afnan Alromi Alromi A.

    Sensors (Switzerland) 2020-03-01

    Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks

  • 2020-01-01

    journal

    Iman M. Almomani Almomani I.M. ,Aala Al Khayer Khayer A.A.

    IEEE Access 2020-01-01

    A Comprehensive Analysis of the Android Permissions System

  • 2020-01-01

    journal

    Samer Atawneh Atawneh S. ,Mousa Al-Akhras Al-Akhras M. ,Iman Almomani Almomani I. ,Anas Liswi Liswi A. ,Mohammed Alawairdhi Alawairdhi M.

    Electronics (Switzerland) 2020-01-01

    Collaborative mobile-learning architecture based on mobile agents

  • 2019-08-01

    journal

    Samah Alsoghyer Alsoghyer S. ,Iman Almomani Almomani I.

    Electronics (Switzerland) 2019-08-01

    Ransomware detection system for android applications

  • 2019-05-16

    conference

    Katrina Sundus Sundus K. ,Iman Almomani Almomani I.

    2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, JEEIT 2019 - Proceedings 2019-05-16

    Mobility Effect on the Authenticity of Wireless Sensor Networks

  • 2019-05-15

    conference

    Iman Almomani Almomani I. ,Aala Khayer Khayer A.

    2019 International Conference on Computer and Information Sciences, ICCIS 2019 2019-05-15

    Android applications scanning: The guide

  • 2018-07-01

    journal

    Iman Almomani Almomani I. ,Mamdouh Alenezi Alenezi M.

    Journal of Information Science and Engineering 2018-07-01

    Efficient Denial of Service Attacks Detection in Wireless Sensor Networks

  • 2018-04-30

    journal

    Iman Musa Almomani Almomani I.M. ,Maha Saadeh Saadeh M.

    KSII Transactions on Internet and Information Systems 2018-04-30

    S-FEAR: Secure-fuzzy energy aware routing protocol for wireless sensor networks

  • 2018-01-01

    conference

    Mamdouh Alenezi Alenezi M. ,Iman Almomani Almomani I.

    Advances in Intelligent Systems and Computing 2018-01-01

    Empirical analysis of static code metrics for predicting risk scores in android applications

  • 2017-07-01

    conference

    Mamdouh Alenezi Alenezi M. ,Iman Almomani Almomani I.

    2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2017 2017-07-01

    Abusing Android permissions: A security perspective

  • 2016-11-01

    journal

    Iman Almomani Almomani I. ,Ahlam AlSarheed AlSarheed A.

    Journal of Infection and Public Health 2016-11-01

    Enhancing outpatient clinics management software by reducing patients’ waiting time

  • 2016-01-01

    journal

    Iman Almomani Almomani I. ,Bassam Al-Kasasbeh Al-Kasasbeh B. ,Mousa Al-Akhras Al-Akhras M.

    Journal of Sensors 2016-01-01

    WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

  • 2016-01-01

    journal

    Almomani, Iman

    2016-01-01

    Investigating the Use of Encryption Techniques and Different Speech Coders with Multimedia Streaming

  • 2015-05-06

    conference

    Iman Almomani Almomani I. ,Bassam Al-Kasasbeh Al-Kasasbeh B.

    2015 6th International Conference on Information and Communication Systems, ICICS 2015 2015-05-06

    Performance analysis of LEACH protocol under Denial of Service attacks

  • 2013-03-11

    journal

    Iman Almomani Almomani I. ,Eman Al-Banna Al-Banna E. ,Mousa Al-Akhras Al-Akhras M.

    International Journal of Distributed Sensor Networks 2013-03-11

    Logic-based security architecture for systems providing multihop communication

  • 2013-01-01

    conference

    Hamzeh Aljawawdeh Aljawawdeh H. ,Iman Almomani Almomani I.

    2013 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2013 2013-01-01

    Dynamic Load Balancing Protocol (DLBP) for Wireless Sensor Networks

  • 2013-01-01

    conference

    Lamya Abdullah Abdullah L. ,Iman Almomani Almomani I. ,Ala Aburumman Aburumman A.

    2013 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2013 2013-01-01

    Secure cluster-based SIP service over Ad hoc networks

  • 2012-04-25

    journal

    Iman Almomani Almomani I. ,Maha Saadeh Saadeh M.

    KSII Transactions on Internet and Information Systems 2012-04-25

    Security model for Tree-based routing in Wireless Sensor Networks: Structure and evaluation

  • 2011-12-01

    conference

    Iman M. Almomani Almomani I.M. ,Nour Y. Alkhalil Alkhalil N.Y. ,Enas M. Ahmad Ahmad E.M. ,Rania M. Jodeh Jodeh R.M.

    2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2011 2011-12-01

    Ubiquitous GPS vehicle tracking and management system

  • 2011-05-23

    conference

    Iman Almomani Almomani I. ,Maha Saadeh Saadeh M. ,Hamzeh Al Jawawdeh Al Jawawdeh H. ,Mousa Al-Akhras Al-Akhras M.

    10th WSEAS International Conference on Applied Computer and Applied Computational Science, ACACOS'11 2011-05-23

    Energy awareness tree-based routing protocol for wireless sensor networks

  • 2011-01-01

    other

    ALMomani, I and Karajeh, O and Abdullah, L

    2011-01-01

    Reducing the Vulnerability of Broadcast Authentication against Denial of Service Attacks in Wireless Sensor Networks

  • 2011-01-01

    book

    Almomani, Iman

    2011-01-01

    Security Solutions for Wireless Mobile Ad Hoc Networks: (WMANETs)

  • 2011-01-01

    journal

    AL-Momani, Iman and Saadeh, Maha and AL-Akhras, M and Jawawdeh, HA

    2011-01-01

    A tree-based power saving routing protocol for wireless sensor networks

  • 2011-01-01

    bookchapter

    Al-Akhras, Mousa and Al Momani, Iman

    2011-01-01

    VoIP Quality Assessment Technologies

  • 2010-09-01

    journal

    Iman Almomani Almomani I. ,Emad Almashakbeh Almashakbeh E.

    WSEAS Transactions on Computers 2010-09-01

    A power-efficient secure routing protocol for Wireless Sensor Networks

  • 2010-01-01

    journal

    ALMomani, Iman

    2010-01-01

    Copyrights Protection Schema: A Secure PDF Reader

  • 2010-01-01

    conference

    Al-Momani, Iman and Aziz, Asma'Abdel and AL-Akhras, Mousa

    2010-01-01

    Secure and power saving routing protocol for wireless sensor networks

  • 2009-06-01

    journal

    AL-Akhras AL-Akhras M. , Zedan Zedan H. , John John R. , ALMomani ALMomani I.

    Neurocomputing 2009-06-01

    Non-intrusive speech quality prediction in VoIP networks using a neural network approach

  • 2008-01-01

    conference

    Almomani, Iman

    2008-01-01

    Secure Wireless Communication for Mobile Surgical Army Hospitals.

  • 2008-01-01

    conference

    Almomani, Iman and Al-Akhras, Mousa

    2008-01-01

    Statistical Speech Quality Prediction in VoIP Networks.

  • 2007-01-01

    conference

    Almomani, Iman and Zedan, Hussein

    2007-01-01

    End-to-end security solution for wireless mobile ad hoc network (WMANET)

  • 2006-12-15

    journal

    Almomani Almomani I. , Al-Akaidi Al-Akaidi M. , Reynolds Reynolds P. , Ivins Ivins J.

    Computer Communications 2006-12-15

    Architectural framework for wireless mobile ad hoc networks (AF WMANETs)

  • 2006-01-01

    conference

    Almomani, Iman and Zedan, Hussein

    2006-01-01

    Secure Distributed Key Management for Wireless Mobile Ad hoc Networks (WMANETs)

  • 2005-12-01

    conference

    Almomani Almomani I. , Al-Akaidi Al-Akaidi M. , Ivins Ivins J. , Reynolds Reynolds P.

    IEE Conference Publication 2005-12-01

    Architectural framework for Wireless Mobile Ad hoc Networks (WMANETs)

INTERESTS

  • Android Security

  • Cybersecurity

  • Cybersecurity Maturity Models

  • Mobile Ad hoc Networks

  • Network Security

  • Wireless Sensor Netowrks