Emerging Topics in Software Engineering
Fundamentals of Cybersecurity
Advanced Cryptography
Cybersecurity Forensics
Software Development processes
Penetration Testing and Ethical Hacking
Advanced Data Communication and Networks
Thesis
Ethical and Social Aspects of Computing
Computer & Network Security
Emerging Topics in CyberSecurity
Emerging Topics in Computer Science
Senior Project
Cooperative Training
Advanced Algorithms and Complexity
UAE university
Al-Ain , United Arab Emirates
The University of Jordan
Amman , Jordan
De Montfort Univesity
Leicester , Britain
12/1/2012 - 5/3/2020
Amman,Jordan
8/24/2014 - 3/5/2020
PRINCE SULTAN UNIVERSITY
Riyadh,Saudi Arabia
9/1/2015 - 9/1/2019
9/3/2017 - 9/1/2020
4/1/2019 - 9/1/2021
4/1/2022 - 8/31/2022
Prince Sultan University
4/7/2022 - 8/31/2022
IEEE Senior Member
PLoS ONE 2024-12-01
B-UMCS: Blockchain-enabled Unified Medical Consultancy Service
2024 International Jordanian Cybersecurity Conference, IJCC 2024 2024-01-01
S2VC: Secure Smart Vehicular Communications
IEEE Access 2024-01-01
A Holistic Intelligent Cryptojacking Malware Detection System
2024 IEEE 30th International Conference on Telecommunications, ICT 2024 2024-01-01
SAMA: A Comprehensive Smart Automated Malware Analyzer Empowered by ChatGPT Integration
2024 21st International Multi-Conference on Systems, Signals and Devices, SSD 2024 2024-01-01
Employing Invisible Unicode Characters for Preserving Privacy and Enhancing Communication Security
Maloid-DS: Labeled Dataset for Android Malware Forensics
ICT Express 2023-08-01
Digitization of healthcare sector: A study on privacy and security concerns
Multimedia Tools and Applications 2023-06-01
An optical-based encryption and authentication algorithm for color and grayscale medical images
Applied Sciences (Switzerland) 2023-05-01
Risk-Based Cybersecurity Compliance Assessment System (RC2AS)
Sensors 2023-05-01
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches
Computers, Materials and Continua 2023-01-01
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
Complex and Intelligent Systems 2022-10-01
A federated learning framework for cyberattack detection in vehicular sensor networks
PLoS ONE 2022-07-01
Android malware analysis in a nutshell
Sensors 2022-06-01
A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks
Sensors 2022-03-01
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices
IEEE Access 2022-01-01
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2022-01-01
Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers
Communications in Computer and Information Science 2022-01-01
An Effective Detection and Classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting
Proceedings - 2022 2nd International Conference of Smart Systems and Emerging Technologies, SMARTTECH 2022 2022-01-01
COVIBOT: A Smart Chatbot for Assistance and E-Awareness during COVID-19 Pandemic
DefOff: Defensive/Offensive System based on Hiding Technologies
Lecture Notes on Data Engineering and Communications Technologies 2022-01-01
Automatic Saudi Arabian License Plate Detection and Recognition Using Deep Convolutional Neural Networks
CBiLSTM: A Hybrid Deep Learning Model for Efficient Reputation Assessment of Cloud Services
An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks
Applied Sciences (Switzerland) 2021-11-01
Hybrid-based analysis impact on ransomware detection for android systems
Symmetry 2021-08-01
Iot botnet detection using salp swarm and ant lion hybrid optimization model
2021 International Conference on Information Technology, ICIT 2021 - Proceedings 2021-07-14
Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach
Applied Sciences (Switzerland) 2021-07-02
Visualized malware multi-classification framework using fine-tuned cnn-based transfer learning models
Sensors 2021-05-01
A multi-layer classification approach for intrusion detection in iot networks based on deep learning
2021 1st International Conference on Artificial Intelligence and Data Analytics, CAIDA 2021 2021-04-06
An Efficient Machine Learning-based Approach for Android v.11 Ransomware Detection
Applied Sciences (Switzerland) 2021-04-01
A multi-stage classification approach for iot intrusion detection based on clustering with oversampling
PeerJ Computer Science 2021-01-01
Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
Computers, Materials and Continua 2021-01-01
Novel ransomware hiding model using HEVC steganography approach
IEEE Access 2021-01-01
Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data
Optical Bit-Plane-Based 3D-JST Cryptography Algorithm with Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication
Proceedings - 2020 1st International Conference of Smart Systems and Emerging Technologies, SMART-TECH 2020 2020-11-01
ASAF: Android Static Analysis Framework
Applied Sciences (Switzerland) 2020-06-01
Optimizing extreme learning machines using chains of salps for efficient android ransomware detection
Proceedings - 2020 6th Conference on Data Science and Machine Learning Applications, CDMA 2020 2020-03-01
On the Effectiveness of Application Permissions for Android Ransomware Detection
Jordanian Journal of Computers and Information Technology 2020-03-01
The impact of mobility models on the performance of authentication services in wireless sensor networks
Sensors (Switzerland) 2020-03-01
Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks
IEEE Access 2020-01-01
A Comprehensive Analysis of the Android Permissions System
Electronics (Switzerland) 2020-01-01
Collaborative mobile-learning architecture based on mobile agents
Electronics (Switzerland) 2019-08-01
Ransomware detection system for android applications
2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, JEEIT 2019 - Proceedings 2019-05-16
Mobility Effect on the Authenticity of Wireless Sensor Networks
2019 International Conference on Computer and Information Sciences, ICCIS 2019 2019-05-15
Android applications scanning: The guide
Journal of Information Science and Engineering 2018-07-01
Efficient Denial of Service Attacks Detection in Wireless Sensor Networks
KSII Transactions on Internet and Information Systems 2018-04-30
S-FEAR: Secure-fuzzy energy aware routing protocol for wireless sensor networks
Advances in Intelligent Systems and Computing 2018-01-01
Empirical analysis of static code metrics for predicting risk scores in android applications
2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2017 2017-07-01
Abusing Android permissions: A security perspective
Journal of Infection and Public Health 2016-11-01
Enhancing outpatient clinics management software by reducing patients’ waiting time
Journal of Sensors 2016-01-01
WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
2016-01-01
Investigating the Use of Encryption Techniques and Different Speech Coders with Multimedia Streaming
2015 6th International Conference on Information and Communication Systems, ICICS 2015 2015-05-06
Performance analysis of LEACH protocol under Denial of Service attacks
International Journal of Distributed Sensor Networks 2013-03-11
Logic-based security architecture for systems providing multihop communication
2013 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2013 2013-01-01
Dynamic Load Balancing Protocol (DLBP) for Wireless Sensor Networks
Secure cluster-based SIP service over Ad hoc networks
KSII Transactions on Internet and Information Systems 2012-04-25
Security model for Tree-based routing in Wireless Sensor Networks: Structure and evaluation
2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2011 2011-12-01
Ubiquitous GPS vehicle tracking and management system
10th WSEAS International Conference on Applied Computer and Applied Computational Science, ACACOS'11 2011-05-23
Energy awareness tree-based routing protocol for wireless sensor networks
2011-01-01
Reducing the Vulnerability of Broadcast Authentication against Denial of Service Attacks in Wireless Sensor Networks
Security Solutions for Wireless Mobile Ad Hoc Networks: (WMANETs)
A tree-based power saving routing protocol for wireless sensor networks
VoIP Quality Assessment Technologies
WSEAS Transactions on Computers 2010-09-01
A power-efficient secure routing protocol for Wireless Sensor Networks
2010-01-01
Copyrights Protection Schema: A Secure PDF Reader
Secure and power saving routing protocol for wireless sensor networks
Neurocomputing 2009-06-01
Non-intrusive speech quality prediction in VoIP networks using a neural network approach
2008-01-01
Secure Wireless Communication for Mobile Surgical Army Hospitals.
Statistical Speech Quality Prediction in VoIP Networks.
2007-01-01
End-to-end security solution for wireless mobile ad hoc network (WMANET)
Computer Communications 2006-12-15
Architectural framework for wireless mobile ad hoc networks (AF WMANETs)
2006-01-01
Secure Distributed Key Management for Wireless Mobile Ad hoc Networks (WMANETs)
IEE Conference Publication 2005-12-01
Architectural framework for Wireless Mobile Ad hoc Networks (WMANETs)
Android Security
Cybersecurity
Cybersecurity Maturity Models
Mobile Ad hoc Networks
Network Security
Wireless Sensor Netowrks