Fundamentals of Cybersecurity
Cybersecurity Forensics
Software Development processes
Emerging Topics In Computer Science
Penetration Testing & ETHICAL HACKING
Thesis
Computer & Network Security
Emerging Topics In Software Engineering
Emerging Topics in CyberSecurity
UAE university
Al-Ain , United Arab Emirates
The University of Jordan
Amman , Jordan
De Montfort Univesity
Leicester , Britain
12/1/2012 - 5/3/2020
Amman,Jordan
8/24/2014 - 3/5/2020
PRINCE SULTAN UNIVERSITY
Riyadh,Saudi Arabia
9/1/2015 - 9/1/2019
9/3/2017 - 9/1/2020
4/1/2019 - 9/1/2021
4/1/2022 - 8/31/2022
Prince Sultan University
4/7/2022 - 8/31/2022
IEEE Senior Member
IEEE Access 2024-01-01
Maloid-DS: Labeled Dataset for Android Malware Forensics
ICT Express 2023-08-01
Digitization of healthcare sector: A study on privacy and security concerns
Multimedia Tools and Applications 2023-06-01
An optical-based encryption and authentication algorithm for color and grayscale medical images
Applied Sciences (Switzerland) 2023-05-01
Risk-Based Cybersecurity Compliance Assessment System (RC2AS)
Sensors 2023-05-01
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches
Computers, Materials and Continua 2023-01-01
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
Complex and Intelligent Systems 2022-10-01
A federated learning framework for cyberattack detection in vehicular sensor networks
PLoS ONE 2022-07-01
Android malware analysis in a nutshell
Sensors 2022-06-01
A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks
Sensors 2022-03-01
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices
IEEE Access 2022-01-01
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2022-01-01
Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers
Communications in Computer and Information Science 2022-01-01
An Effective Detection and Classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting
Proceedings - 2022 2nd International Conference of Smart Systems and Emerging Technologies, SMARTTECH 2022 2022-01-01
COVIBOT: A Smart Chatbot for Assistance and E-Awareness during COVID-19 Pandemic
DefOff: Defensive/Offensive System based on Hiding Technologies
Lecture Notes on Data Engineering and Communications Technologies 2022-01-01
Automatic Saudi Arabian License Plate Detection and Recognition Using Deep Convolutional Neural Networks
CBiLSTM: A Hybrid Deep Learning Model for Efficient Reputation Assessment of Cloud Services
An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks
Applied Sciences (Switzerland) 2021-11-01
Hybrid-based analysis impact on ransomware detection for android systems
Symmetry 2021-08-01
Iot botnet detection using salp swarm and ant lion hybrid optimization model
2021 International Conference on Information Technology, ICIT 2021 - Proceedings 2021-07-14
Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach
Applied Sciences (Switzerland) 2021-07-02
Visualized malware multi-classification framework using fine-tuned cnn-based transfer learning models
Sensors 2021-05-01
A multi-layer classification approach for intrusion detection in iot networks based on deep learning
2021 1st International Conference on Artificial Intelligence and Data Analytics, CAIDA 2021 2021-04-06
An Efficient Machine Learning-based Approach for Android v.11 Ransomware Detection
Applied Sciences (Switzerland) 2021-04-01
A multi-stage classification approach for iot intrusion detection based on clustering with oversampling
PeerJ Computer Science 2021-01-01
Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
Computers, Materials and Continua 2021-01-01
Novel ransomware hiding model using HEVC steganography approach
IEEE Access 2021-01-01
Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data
Optical Bit-Plane-Based 3D-JST Cryptography Algorithm with Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication
Proceedings - 2020 1st International Conference of Smart Systems and Emerging Technologies, SMART-TECH 2020 2020-11-01
ASAF: Android Static Analysis Framework
Applied Sciences (Switzerland) 2020-06-01
Optimizing extreme learning machines using chains of salps for efficient android ransomware detection
Proceedings - 2020 6th Conference on Data Science and Machine Learning Applications, CDMA 2020 2020-03-01
On the Effectiveness of Application Permissions for Android Ransomware Detection
Jordanian Journal of Computers and Information Technology 2020-03-01
The impact of mobility models on the performance of authentication services in wireless sensor networks
Sensors (Switzerland) 2020-03-01
Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks
IEEE Access 2020-01-01
A Comprehensive Analysis of the Android Permissions System
Electronics (Switzerland) 2020-01-01
Collaborative mobile-learning architecture based on mobile agents
Electronics (Switzerland) 2019-08-01
Ransomware detection system for android applications
2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, JEEIT 2019 - Proceedings 2019-05-16
Mobility Effect on the Authenticity of Wireless Sensor Networks
2019 International Conference on Computer and Information Sciences, ICCIS 2019 2019-05-15
Android applications scanning: The guide
Journal of Information Science and Engineering 2018-07-01
Efficient Denial of Service Attacks Detection in Wireless Sensor Networks
KSII Transactions on Internet and Information Systems 2018-04-30
S-FEAR: Secure-fuzzy energy aware routing protocol for wireless sensor networks
Advances in Intelligent Systems and Computing 2018-01-01
Empirical analysis of static code metrics for predicting risk scores in android applications
2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2017 2017-07-01
Abusing Android permissions: A security perspective
Journal of Infection and Public Health 2016-11-01
Enhancing outpatient clinics management software by reducing patients’ waiting time
Journal of Sensors 2016-01-01
WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
2016-01-01
Investigating the Use of Encryption Techniques and Different Speech Coders with Multimedia Streaming
2015 6th International Conference on Information and Communication Systems, ICICS 2015 2015-05-06
Performance analysis of LEACH protocol under Denial of Service attacks
International Journal of Distributed Sensor Networks 2013-03-11
Logic-based security architecture for systems providing multihop communication
2013 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2013 2013-01-01
Dynamic Load Balancing Protocol (DLBP) for Wireless Sensor Networks
Secure cluster-based SIP service over Ad hoc networks
KSII Transactions on Internet and Information Systems 2012-04-25
Security model for Tree-based routing in Wireless Sensor Networks: Structure and evaluation
2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2011 2011-12-01
Ubiquitous GPS vehicle tracking and management system
10th WSEAS International Conference on Applied Computer and Applied Computational Science, ACACOS'11 2011-05-23
Energy awareness tree-based routing protocol for wireless sensor networks
2011-01-01
Reducing the Vulnerability of Broadcast Authentication against Denial of Service Attacks in Wireless Sensor Networks
Security Solutions for Wireless Mobile Ad Hoc Networks: (WMANETs)
A tree-based power saving routing protocol for wireless sensor networks
VoIP Quality Assessment Technologies
WSEAS Transactions on Computers 2010-09-01
A power-efficient secure routing protocol for Wireless Sensor Networks
2010-01-01
Copyrights Protection Schema: A Secure PDF Reader
Secure and power saving routing protocol for wireless sensor networks
Neurocomputing 2009-06-01
Non-intrusive speech quality prediction in VoIP networks using a neural network approach
2008-01-01
Secure Wireless Communication for Mobile Surgical Army Hospitals.
Statistical Speech Quality Prediction in VoIP Networks.
2007-01-01
End-to-end security solution for wireless mobile ad hoc network (WMANET)
Computer Communications 2006-12-15
Architectural framework for wireless mobile ad hoc networks (AF WMANETs)
2006-01-01
Secure Distributed Key Management for Wireless Mobile Ad hoc Networks (WMANETs)
IEE Conference Publication 2005-12-01
Architectural framework for Wireless Mobile Ad hoc Networks (WMANETs)
Android Security
Cybersecurity
Cybersecurity Maturity Models
Mobile Ad hoc Networks
Network Security
Wireless Sensor Netowrks