Emerging Topics in Software Engineering
Fundamentals of Cybersecurity
Senior Project
Cybersecurity Forensics
Software Development processes
Penetration Testing and Ethical Hacking
Thesis
Cooperative Training
Advanced Algorithms and Complexity
Computer & Network Security
Emerging Topics in CyberSecurity
Emerging Topics in Computer Science
Advanced Cryptography
Ethical and Social Aspects of Computing
UAE university
Al-Ain , United Arab Emirates
The University of Jordan
Amman , Jordan
De Montfort Univesity
Leicester , Britain
12/1/2012 - 5/3/2020
Amman,Jordan
8/24/2014 - 3/5/2020
PRINCE SULTAN UNIVERSITY
Riyadh,Saudi Arabia
9/1/2015 - 9/1/2019
9/3/2017 - 9/1/2020
4/1/2019 - 9/1/2021
4/1/2022 - 8/31/2022
Prince Sultan University
4/7/2022 - 8/31/2022
1/31/2024 - 8/31/2026
8/24/2025 - 8/22/2026
IEEE Senior Member
Frontiers in Dental Medicine 2026-01-01
Developing an AI-powered tool for radiographic feedback on working length determination in pre-clinical endodontic training
Multimedia Tools and Applications 2025-11-01
A novel chaotic logistic-sine map-based quantum cryptosystem for secure video communication
Applied Sciences (Switzerland) 2025-09-01
DCmal-2025: A Novel Routing-Based DisConnectivity Malware—Development, Impact, and Countermeasures
PLoS ONE 2024-12-01
B-UMCS: Blockchain-enabled Unified Medical Consultancy Service
2024 21st International Multi-Conference on Systems, Signals and Devices, SSD 2024 2024-01-01
Employing Invisible Unicode Characters for Preserving Privacy and Enhancing Communication Security
2024 IEEE 30th International Conference on Telecommunications, ICT 2024 2024-01-01
SAMA: A Comprehensive Smart Automated Malware Analyzer Empowered by ChatGPT Integration
IEEE Access 2024-01-01
Maloid-DS: Labeled Dataset for Android Malware Forensics
A Holistic Intelligent Cryptojacking Malware Detection System
2024 International Jordanian Cybersecurity Conference, IJCC 2024 2024-01-01
S2VC: Secure Smart Vehicular Communications
ICT Express 2023-08-01
Digitization of healthcare sector: A study on privacy and security concerns
Multimedia Tools and Applications 2023-06-01
An optical-based encryption and authentication algorithm for color and grayscale medical images
Applied Sciences (Switzerland) 2023-05-01
Risk-Based Cybersecurity Compliance Assessment System (RC2AS)
Sensors 2023-05-01
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches
Computers, Materials and Continua 2023-01-01
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
Complex and Intelligent Systems 2022-10-01
A federated learning framework for cyberattack detection in vehicular sensor networks
PLoS ONE 2022-07-01
Android malware analysis in a nutshell
Sensors 2022-06-01
A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks
Sensors 2022-03-01
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices
IEEE Access 2022-01-01
CBiLSTM: A Hybrid Deep Learning Model for Efficient Reputation Assessment of Cloud Services
An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks
Proceedings - 2022 2nd International Conference of Smart Systems and Emerging Technologies, SMARTTECH 2022 2022-01-01
DefOff: Defensive/Offensive System based on Hiding Technologies
Communications in Computer and Information Science 2022-01-01
An Effective Detection and Classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting
Lecture Notes on Data Engineering and Communications Technologies 2022-01-01
Automatic Saudi Arabian License Plate Detection and Recognition Using Deep Convolutional Neural Networks
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2022-01-01
Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks
COVIBOT: A Smart Chatbot for Assistance and E-Awareness during COVID-19 Pandemic
Applied Sciences (Switzerland) 2021-11-01
Hybrid-based analysis impact on ransomware detection for android systems
Symmetry 2021-08-01
Iot botnet detection using salp swarm and ant lion hybrid optimization model
2021 International Conference on Information Technology, ICIT 2021 - Proceedings 2021-07-14
Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach
Applied Sciences (Switzerland) 2021-07-02
Visualized malware multi-classification framework using fine-tuned cnn-based transfer learning models
Sensors 2021-05-01
A multi-layer classification approach for intrusion detection in iot networks based on deep learning
2021 1st International Conference on Artificial Intelligence and Data Analytics, CAIDA 2021 2021-04-06
An Efficient Machine Learning-based Approach for Android v.11 Ransomware Detection
Applied Sciences (Switzerland) 2021-04-01
A multi-stage classification approach for iot intrusion detection based on clustering with oversampling
Computers, Materials and Continua 2021-01-01
Novel ransomware hiding model using HEVC steganography approach
PeerJ Computer Science 2021-01-01
Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia
IEEE Access 2021-01-01
Optical Bit-Plane-Based 3D-JST Cryptography Algorithm with Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication
Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data
Proceedings - 2020 1st International Conference of Smart Systems and Emerging Technologies, SMART-TECH 2020 2020-11-01
ASAF: Android Static Analysis Framework
Applied Sciences (Switzerland) 2020-06-01
Optimizing extreme learning machines using chains of salps for efficient android ransomware detection
Sensors (Switzerland) 2020-03-01
Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks
Jordanian Journal of Computers and Information Technology 2020-03-01
The impact of mobility models on the performance of authentication services in wireless sensor networks
Proceedings - 2020 6th Conference on Data Science and Machine Learning Applications, CDMA 2020 2020-03-01
On the Effectiveness of Application Permissions for Android Ransomware Detection
IEEE Access 2020-01-01
A Comprehensive Analysis of the Android Permissions System
Electronics (Switzerland) 2020-01-01
Collaborative mobile-learning architecture based on mobile agents
Electronics (Switzerland) 2019-08-01
Ransomware detection system for android applications
2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, JEEIT 2019 - Proceedings 2019-05-16
Mobility Effect on the Authenticity of Wireless Sensor Networks
2019 International Conference on Computer and Information Sciences, ICCIS 2019 2019-05-15
Android applications scanning: The guide
Journal of Information Science and Engineering 2018-07-01
Efficient Denial of Service Attacks Detection in Wireless Sensor Networks
KSII Transactions on Internet and Information Systems 2018-04-30
S-FEAR: Secure-fuzzy energy aware routing protocol for wireless sensor networks
Advances in Intelligent Systems and Computing 2018-01-01
Empirical analysis of static code metrics for predicting risk scores in android applications
2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2017 2017-07-01
Abusing Android permissions: A security perspective
Journal of Infection and Public Health 2016-11-01
Enhancing outpatient clinics management software by reducing patients’ waiting time
Journal of Sensors 2016-01-01
WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
2015 6th International Conference on Information and Communication Systems, ICICS 2015 2015-05-06
Performance analysis of LEACH protocol under Denial of Service attacks
International Journal of Distributed Sensor Networks 2013-03-11
Logic-based security architecture for systems providing multihop communication
2013 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2013 2013-01-01
Dynamic Load Balancing Protocol (DLBP) for Wireless Sensor Networks
Secure cluster-based SIP service over Ad hoc networks
KSII Transactions on Internet and Information Systems 2012-04-25
Security model for Tree-based routing in Wireless Sensor Networks: Structure and evaluation
2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2011 2011-12-01
Ubiquitous GPS vehicle tracking and management system
10th WSEAS International Conference on Applied Computer and Applied Computational Science, ACACOS'11 2011-05-23
Energy awareness tree-based routing protocol for wireless sensor networks
WSEAS Transactions on Computers 2010-09-01
A power-efficient secure routing protocol for Wireless Sensor Networks
Neurocomputing 2009-06-01
Non-intrusive speech quality prediction in VoIP networks using a neural network approach
Computer Communications 2006-12-15
Architectural framework for wireless mobile ad hoc networks (AF WMANETs)
IEE Conference Publication 2005-12-01
Architectural framework for Wireless Mobile Ad hoc Networks (WMANETs)
Android Security
Cybersecurity
Cybersecurity Maturity Models
Mobile Ad hoc Networks
Network Security
Wireless Sensor Netowrks