الجمعة 21-11-2025 الموافق 1 جمادي الآخرة 1447 منصة البلقاء الرقمية منصة البلقاء الرقمية | التوعية بالامن السيراني شهر التوعية بالامن السيبراني | خريجو البلقاء | English
عن الجامعةmenu arrow الكليات والعمادات menu arrow وحدة القبول والتسجيل المراكز العلمية menu arrow الوحدات الادارية menu arrow بوابة القبولات مكتب التعليم التقني المشاريع والمؤتمرات menu arrow البلقاء والعالم
عن الجامعة:
bullet عن الجامعة
bullet الرسالة الملكية
bullet كلمة الرئيس
bullet الرؤيا و الرسالة
bullet رئاسة الجامعة
bullet مجلس الامناء

bullet مجلس الجامعة
bullet مجلس العمداء
bullet الرؤساء السابقون
bullet قصص نجاح
bullet البلقاء في عيونهم
bullet السياسات العامة لجامعة البلقاء التطبيقية
bullet الخطة الاستراتيجية 2021 - 2025
bullet خطة إدارة المخاطر 2021-2025
العمادات:
bullet  شؤون الطلبة
bullet  البحث العلمي و الابتكار
كليات مركز الجامعة:
bullet  الدراسات العليا
bullet  الطب
bullet  العلوم الطبية المساندة
bullet  التمريض
bullet  العلوم
bullet  الامير عبدالله بن غازي للاتصالات وتكنولوجيا المعلومات
bullet  الذكاء الاصطناعي

bullet  الهندسة
bullet  الأعمال
bullet  السلط للعلوم الإنسانية
bullet  الزراعة التكنولوجية
bullet  السلط التقنية
bullet  الحقوق
الكليات الخارجية:
bullet  الحصن الجامعية
bullet  اربد الجامعية
bullet  عجلون الجامعية
bullet  الهندسة التكنولوجية
bullet  عمان الجامعية للعلوم المالية والادارية
bullet  الاميرة عاليه الجامعية
bullet  الزرقاء الجامعية

bullet  الاميرة رحمة الجامعية
bullet  الكرك الجامعية
bullet  الشوبك الجامعية
bullet  معان الجامعية
bullet  العقبة الجامعية

bullet  أكاديمية الأمير الحسين بن عبد الله الثاني للحماية المدنية
المراكز العلمية
bullet مركز الحاسوب
bullet مركز اللغات
bullet مركز الاستشارات والدراسات والتدريب
bullet المركز الوطني للتدريب وتأهيل المدربين
bullet مركز التطوير وضمان الجودة
bullet المركز الدولي لبحوث المياه والبيئة والطاقة
bullet المركز الاردني الكوري للمعلومات وتكنولوجيا الاتصالات
bullet مركز العقبة للتعليم والتدريب البحري
bullet مركز تكنولوجيا التعلم والتعليم
bullet مركز الابتكار والابداع وريادة الاعمال
bullet  مركز القياس والتشخيص الشامل للإعاقات
bullet مركز التطوير الوظيفي
bullet مركز التطوير الوظيفي لكليات إقليم الشمال
bullet مكتب التعليم التقني
bullet مركز الرصد البيئي
الوحدات:
bullet وحدة القبول والتسجيل
bullet وحدة التقييم والامتحانات العامة
bullet وحدة المكتبة المركزية
bullet وحدة الشؤون المالية
bullet وحدة التأمين الصحي
bullet وحدة الخدمات العامة

bullet  وحدة الرئاسة
bullet وحدة اللوازم والاشغال
bullet وحدة الرقابة والتدقيق الداخلي
bullet وحدة التعاون والعلاقات الدولية
bullet وحدة التنمية وخدمة المجتمع المحلي
الدوائر:
bullet دائرة شؤون العاملين
bullet منصة البلقاء الرقمية
bullet نادي العاملين
وحدة القبول والتسجيل:
bullet الصفحة الرئيسية
bullet التعليمات
bullet  نشرة تخصصات البكالوريوس
bullet نشرة تخصصات البكالوريوس التقني
bullet نشرة تخصصات الدبلوم
bullet التحقق من الشهادات
bullet بوابة القبولات

bullet طلب التحقق من صحة شهادة
bullet دليل الطالب
bullet التقويم الجامعي 2021 _ 2022
bullet التقويم الجامعي 2022 _ 2023
bullet نظام التسجيل الإلكتروني
bullet دراسة نسب التشغيل لخريجي جامعة البلقاء التطبيقية
bullet عرض تقديمي عن دراسة نسب التشغيل لخريجي جامعة البلقاء التطبيقية
المشاريع و المؤتمرات:
bullet المؤتمر الدولي الأول للذكاء الاصطناعي في العلوم الصحية
bullet مؤتمر كلية الأعمال الدولي الثاني - مستقبل الاستدامة لبيئة الاعمال: التنمية السياحية، الابتكار والمرونة
bullet المؤتمر الدولي الاول - مستقبل الاستدامة لبيئة الاعمال: تجارب عملية
bullet 3D GARMENT DESIGN TRAINING
bullet INTERNISA
bullet Med-Quad
bullet Erasmus+ Projects bullet WATER4MED
OverView
Research Intersets
Qualifications
Experiences
Publications
University Courses Taught
Master and Phd thesis contributions
Honors and Academics Awards
Projects
Conferences and Workshops
Patents
Books
Journals Editor/ Reviewer
Community Service
Refrences
Dr. Ammar Ali Deeb Almomani
Dr.Ammar Almomani , Associate professor at Al-Balqa Applied University (BAU), Currently, Academic member in HIGHER COLLEGE OF TECHNOLOGY-UAE
ASSOCIATE PROFESSOR
AL-HUSON UNIVERSITY COLLEGE
https://www.bau.edu.jo/@ammarnav6
 Major: Computer Science
 Minor: INTERNET INFRASTRUCTURES SECURITY
 ammarnav6@bau.edu.jo
 00971569432859
ORCID ID: https://orcid.org/my-orcid?orcid=0000-0002-8808-6114
WoS: https://www.webofscience.com/wos/author/record/F-2180-2017
Scopus Author ID: 51664568700
Scopus Link: https://www.scopus.com/authid/detail.uri?authorId=51664568700
Researcher ID: 7944
Google Scholar: https://scholar.google.com/citations?user=d_tRtPkAAAAJ&hl=en

OverView
I obtained my PhD from Universiti Sains Malaysia (USM) in 2013, where the university was ranked #142 in the QS World University Rankings for 2021. My specialization is in Computer Science, with a research focus on Internet infrastructure security. I also hold a Master's in Computer Information Systems (CIS). I have published over 150 research papers and conference articles, most of which are indexed in Scopus Q1, Q2, and WOS. I have filed ten patents, eight of which are in Germany and two in India, along with many international awards. I also serve as a co-supervisor for several PhD students from the UK and Malaysia.

Currently, I manage AI and cybersecurity projects with international teams at top universities and collaborate with leading researchers in the field of AI and cybersecurity. We have published over 130 articles on cybersecurity, AI, data science, and information systems, and I have extensive experience in linking research with industry and society.

With 20 years of academic experience, I have taught over 45 different subjects in Computer Science, Information Systems, AI, Data Science, Cybersecurity, Networking, Programming Languages, as well as many international certifications, and I have participated in several projects.

Currently, I am an Associate Professor, Head of the Research and Innovation Department, and a faculty member at the Higher College of Technology (HCT), Sharjah, UAE. I have 6 years of administrative experience and hold the UAE Golden Visa. My primary goal is to enhance educational institutions, and I am capable of integrating with diverse faculty members from different backgrounds.

I have contributed to the development of courses and programs (at the undergraduate level) offered by the College of Computer Science and Informatics, and I have experience in accreditation, particularly ABET Accreditation and CAA. I have also helped establish several specializations in Jordan and the UAE.

Research Intersets:
Cybersecurity, AI, Botnet, IOT, Cloud computing

Qualifications
# Degree University Specialization Graduation year
1PHDUniversiti Sains MalaysiaComputer Science2013
2MASTER DEGREEThe Arab Academy for Management, Banking and Financial SciencesComputer Information System2005
3BACHELOR'S DEGREEMutah universityComputer Science2003

Experiences
Academic Experience:
2024 -Current :Prpfessor-Computer Information Science (CIS) program, Bachelor of Cybersecurity,Higher Colleges of Technology (HCT)-UAE,United Arab Emirates.
2022 -2024 :Professor- An academic staff member at IT college,Skyline university college-Sharjah-UAE,United Arab Emirates.
2019 -2023 :Associate professor,Al-Balqa Applied University, Al-Huson University College, Dept. of Information Technology,Jordan.
2016 -2019 :Assistant professor,Al-Balqa Applied University, Al-Huson University College, Dept. of Information Technology,Jordan.
2015 -2016 :Assistant professor,College of Computer and Information Sciences- Al-Imam Muhammad Ibn Saud Islamic University -Kingdom of Saudi Arabia,Saudi Arabia.
2013 -2015 :Assistant professor,Al-Balqa Applied University, Al-Huson University College, Dept. of Information Technology,Jordan.
2006 -2010 :lecturer,Saudi Arabia - king Khalid university - department of computer science,Saudi Arabia.
2003 -2006 :trainer in the information technology,National Information technology Centre (NITC),Jordan.

Administrative Experience:
2022 -2024 :Professor- A head of the research and innovation department,Skyline university college-Sharjah-UAE,United Arab Emirates.
2018 -2022 :Head of IT department, at Al-Balqa Applied University (BAU), Al-Huson University College,,Al-Balqa Applied University, Al-Huson University College, Dept. of Information Technology,Jordan.

Publications
1- Cryptographic Protocols for Internet of Things (IoT) Security Lightweight Schemes and Practical Deployment ,Innovations in Modern Cryptography, 5,Vol. 1,no. 1.
2- Revolutionizing Cryptography Blockchain as a Catalyst for Advanced Security Systems , Innovations in Modern Cryptography, 5,Vol. 1,no. 1.
3- A Modified Bonobo Optimizer With Its Application in Solving Engineering Design Problems ,IEEE Access, 3,Vol. 12,no. 12.
4- Multiround transfer learning and modified generative adversarial network for lung cancer detect ,International Journal of Intelligent Systems , 3,Vol. 2023,no. 1.
5- CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models ,2024, 2nd INTERNATIONAL CONFERENCE ON CYBER RESILIENCE, Dubai, UAE, IEEE, 28,Vol. 1,no. 1.
6- Cyberbullying Detection Using Deep Learning: A Comparative Study , 2024 2nd International Conference on Cyber Resilience (ICCR), 28,Vol. 4,no. 1.
7- Machine Learning Models for Brain Signal Classification: A Focus on EEG Analysis in Epilepsy Cases ,2024 2nd International Conference on Cyber Resilience (ICCR), 28,Vol. 4,no. 1.
8- Next Generation Image Watermarking via Combined DWT-SVD Technique ,ICCR-2024, 2nd INTERNATIONAL CONFERENCE ON CYBER RESILIENCE, Dubai, UAE,IEEE, 28,Vol. 1,no. 1.
9- A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions ,information, 2023,Vol. 14,no. 7.
10- A Robust Model For Translating Arabic Sign Language Into Spoken Arabic Using Deep Learning ,Intelligent Automation & Soft Computing (IASC), 2023,Vol. 37,no. 2.
11- Adaptive and Convex Optimization Inspired Workflow Scheduling for Cloud Environment ,International Journal of Cloud Applications and Computing, 2023,Vol. 13,no. 1.
12- Digital Image Steganography and Watermarking using Discrete Cosine Transformation based Linear Modulation ,Journal of Cloud Computing:, 2023,Vol. 96,no. 12.
13- Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic ,Intelligent Automation & Soft Computing , 2023,Vol. 37,no. 2.
14- Machine Learning-Based Automatic Litter Detection and Classification Using Neural Networks in Smart Cities , International Journal on Semantic Web and Information Systems (IJSWIS, 2023,Vol. 19,no. 1.
15- A proposed Darknet Traffic Classification System Based on Max Voting algorithms ,CSPN 2021: International Conference on Cyber Security, Privacy and Networking (ICSPN 2022), 2023,Vol. 599,no. 1.
16- Darknet Traffic Analysis, and Classification System Based on Modified Stacking Ensemble Learning algorithms ,Information Systems and e-Business Management, 2023,Vol. -,no. -.
17- Email Spam Detection using Naive Bayes and Random Forest Classifiers , International Conference on Cyber Security, Privacy and Networking (ICSPN 2022), 2023,Vol. 599,no. 1.
18- Multiround Transfer Learning and Modified Generative Adversarial Network for Lung Cancer Detection ,International Journal of Intelligent Systems, 2023,Vol. ,no. 2023.
19- A Proposed Framework for Early Detection IoT Botnet ,2022 International Arab Conference on Information Technology (ACIT), 2023,Vol. -,no. -.
20- Energy efficiency wireless sensor network protocol: A survey ,nternational Arab Conference on Information Technology (ACIT2022)AL-AIN university. UAE PP(1-7)NOV 22-24, 2023,Vol. -,no. -.
21- Machine learning scheme for Managing Virtual Computing Resources in Cloud Market ,International Arab Conference on Information Technology (ACIT2022),AL-AIN university. UAE PP(1-7)NOV 22-24, 2023,Vol. -,no. -.
22- Energy efficiency Wireless Sensor Networks Protocols: a Survey ,2022 International Conference on Emerging Trends in Computing and Engineering Applications (ETCEA), 2022,Vol. -,no. -.
23- Age and Gender Classification Using Backpropagation and Bagging Algorithms ,CMC-Computers Materials & Continua, 2022,Vol. 74,no. 2.
24- A content and URL analysis based efficient approach to detect smishing SMS in intelligent systems ,International Journal of Intelligent Systems, 2022,Vol. 34,no. 5.
25- Fully automatic grayscale image segmentation based fuzzy C?means with firefly mate algorithm ,Journal of Ambient Intelligence and Humanized Computing, 2022,Vol. 13,no. 1.
26- African buffalo algorithm: Training the probabilistic neural network to solve classification problems ,Journal of King Saud University - Computer and Information Sciences, 2022,Vol. 34,no. 5.
27- Classification of Virtual Private Networks Encrypted Traffic using ensemble learning algorithms ,Egyptian Informatics Journal, 2022,Vol. 23,no. 4.
28- Analysis of Quantum Computing-Based security of Internet of Things(IoT) Environment , Cyber Security Insights Magazine, 2022,Vol. 4,no. 1.
29- Traffic Accidents Prevention in Low Visibility Conditions using VANETS Cloud Environment International ,International Journal of Cloud Applications and Computing (IJCAC), 2022,Vol. 12,no. 1.
30- evaluation and Comparative Analysis of Semantic Web-Based Strategies for enhancing educational System development ,International Journal on Semantic Web and Information Systems (IJSWIS), 2022,Vol. 18,no. 1.
31- Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm ,International Journal of Cloud Applications and Computing (IJCAC), 2022,Vol. 12,no. 1.
32- Performance Optimization of Multi-Hop Routing Protocols With Clustering- Based Hybrid Networking Architecture in Mobile Adhoc Cloud Networks ,International Journal of Cloud Applications and Computing, 2022,Vol. 12,no. 1.
33- Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers:A Comparative Study ,International Journal on Semantic Web and Information Systems, 2022,Vol. 18,no. 1.
34- Information Management and IoT Technology for Safety and Security of Smart Home and Farm Systems ,Journal of Global Information Management, 2021,Vol. 29,no. 6.
35- Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System ,Journal of Web Engineering, 2021,Vol. 21,no. 1.
36- Botnet Detection Used Fast-Flux Technique, Based on Adaptive Dynamic Evolving Spiking Neural Network Algorithm ,International Journal of Ad Hoc and Ubiquitous Computing, 2021,Vol. 36,no. 1.
37- Botnet and Internet of Things (IoTs): a definition, taxonomy, ?challenges, and future directions. In Research Anthology on Combating Denial-of-Service Attacks ,IGI-BOOK, 2021,Vol. -,no. -.
38- DNS rule-based schema to botnet detection ,Enterprise Information Systems, , 2021,Vol. 15,no. 4.
39- Detection mechanisms of DDoS attack in cloud computing environment: A survey ,International Conference on Advances in Cyber Security 2019, 2020,Vol. ,no. -.
40- The monarch butterfly optimization algorithm for solving feature The monarch butterfly optimization algorithm for solving feature selection problems ,Neural Computing and Applications, 2020,Vol. -,no. -.
41- A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing ,International Journal of Cloud Applications and Computing, 2020,Vol. 10,no. 3.
42- Firefly photinus search algorithm ,Journal of King Saud University-Computer and Information Sciences, 2020,Vol. 32,no. 5.
43- Network-Based Detection of Mirai Botnet Using Machine Learning and Feature Selection Methods ,In Multimedia Cyber Security , 2020,Vol. -,no. -.
44- Spatial information of fuzzy clustering based mean best artificial bee colony algorithm for phantom brain image segmentation ,International Journal of Electrical and Computer Engineering (IJECE), 2020,Vol. 11,no. 5.
45-  Improved water cycle algorithm with probabilistic neural network to solve classification problems ,Cluster Computing, 2020,Vol. 23,no. 1.
46- B-Hill climbing algorithm with probabilistic neural network for classification problems ,Journal of Ambient Intelligence and Humanized Computing, 2019,Vol. 11,no. 1.
47- Feature Selection using a Machine Learning to Classify a Malware ,In Computer Networks and Cyber Security: Principles and Paradigms, 2019,Vol. -,no. -.
48- User acceptance model of open source software: an integrated model of OSS characteristics and UTAUT ,Journal of Ambient Intelligence and Humanized Computing, 2019,Vol. 11,no. 1.
49- A Novel Leader Election Algorithm for Honeycomb Mesh Networks , Journal of Theoretical & Applied Information Technology, 2019,Vol. 97,no. 14.
50- A survey of botnet detection based on DNS ,Neural Computing and Applications, 2019,Vol. 28,no. 7.
51- A rule-based approach to detect botnets based on DNS ,2018 8th IEEE International Conference on Control System, Computing and Engineering (ICCSCE), 2019,Vol. -,no. -.
52- A comparative study on spiking neural network encoding schema: implemented with cloud computing ,Cluster Computing The Journal of Networks, Software Tools and Applications, 2019,Vol. 22,no. 2.
53- An Automated Approach to Generate Test Cases From Use Case Description Model ,CMES-Computer Modeling in Engineering & Sciences, 2019,Vol. 119,no. 3.
54- Botnets Detecting attack based on DNS features ,2018 International Arab Conference on Information Technology (ACIT), 2019,Vol. -,no. -.
55- IoT transaction processing through cooperative concurrency control on fog?cloud computing environment ,Multimedia Cyber Security , 2019,Vol. -,no. -.
56- Machine learning for phishing detection and mitigation ,Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices , 2019,Vol. 1,no. -.
57- Metaheuristic Algorithms Based Feature Selection Approach for Intrusion Detection ,Machine Learning for Computer and Cyber Security: Principles, Algorithms, and Practices, 2019,Vol. -,no. -.
58- Proposed Method for an Automatic Segmentation of Medical Images ,2018 International Arab Conference on Information Technology (ACIT), 2019,Vol. -,no. -.
59- Botnet Behavior and Detection Techniques: A Review ,Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives, 2018,Vol. -,no. -.
60- Economic load dispatch problems with valve-point loading using natural updated harmony search ,Neural Computing and Applications, 2018,Vol. 92,no. 10.
61- A Survey: Challenges Of Image Segmentation Based Fuzzy C-Means Clustering Algorithm ,journal of theoretical and applied information technology, 2018,Vol. 96,no. 16.
62- An online intrusion detection system to cloud computing based on NeuCube algorithms ,International Journal of Cloud Applications and Computing (IJCAC), 2018,Vol. 8,no. 2.
63- Fast-flux hunter: a system for filtering online fast-flux botnet ,Neural Computing and Applications, 2018,Vol. 29,no. 7.
64- Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-curve cryptography ,The International Arab Journal of Information Technology (IAJIT), 2018,Vol. 15,no. 3A.
65- Enhancing the security of exchanging and storing DICOM medical images on the cloud ,International Journal of Cloud Applications and Computing (IJCAC), 2018,Vol. 8,no. 1.
66- A proposed framework for Botnet Spam-email Filtering using Neucube. ,The International Arab Conference on Information Technology (ACIT) 2017, 2017,Vol. -,no. -.
67- Secure and Energy-effictive CoAP Application Layer Protocol for the Internet of Things ,ACIT?2017 The International Arab Conference on Information Technology Yassmine Hammamet, Tunisia December 22-24, 2017, 2017,Vol. -,no. -.
68- A variable service broker routing policy for data center selection in cloud analyst ,Journal of King Saud University - Computer and Information Sciences, 2017,Vol. 29,no. 3.
69- A Framework of Childhood Obesity Intervention Using Persuasive Mobile Game Technology ,Australian Journal of Basic and Applied Sciences, 2017,Vol. 8,no. 6.
70- Spam E-mail Filtering using ECOS Algorithms ,Indian Journal of Science and Technology, 2017,Vol. 8,no. S9.
71- Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. ,Multimedia Tools and Applications, 2017,Vol. 76,no. 18.
72- Hadoop based Defence Solution to Handle Distributed Denial of Service (DDoS) Attacks ,journal of Information Security (JIS), 2016,Vol. 4,no. 2.
73- HANON Chaotic Map -Based New Digital Image Encryption Algorithm ,MAGNT Research Report, 2014,Vol. 2,no. 4.
74- Mobile game approach to prevent childhood obesity using persuasive technology , 2014 International Conference on Computer and Information Sciences (ICCOINS), 2014,Vol. -,no. -.
75- A Novel Model for Global Schema Integration and Optimization ,MAGNT Research Report, 2014,Vol. 2,no. 4.
76- ICMPv6 Flood Attack Detection using DENFIS algorithms ,Indian Journal of Science and Technology (INDJST), 2014,Vol. 7,no. 2.
77- A Novel Solution to Handle DDOS Attack in MANET ,Journal of Information Security, 2013,Vol. 4,no. 2.
78- Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection ?Zero-day? Phishing Email ,Indian Journal of Science and Technology, 2013,Vol. 6,no. 1.
79- An enhanced online phishing e-mail detection framework based on ?Evolving connectionist system. ,International Journal of Innovative Computing, Information, and Control (IJICIC) , 2013,Vol. 9,no. 3.
80- Dynamic Stochastic Early Discovery: A New Congestion Control Technique to Improve Networks Performance ,International Journal of Innovative Computing, Information, and Control (IJICIC), 2013,Vol. 9,no. 3.
81- Steganography in Digital Images: Common Approaches and Tools ,IETE Technical Review, 2013,Vol. 30,no. 4.
82- A survey of phishing email filtering techniques ,IEEE Communications Surveys & Tutorials, 2013,Vol. 15,no. 4.
83- Investigating Study on Network Scanning Techniques ,JDCTA International journal of digital content technology and its application, 2013,Vol. 7,no. 9.
84- research proposal: an intrusion detection system alert reduction and assessment framework based on data mining ,Journal of computer science, 2013,Vol. 9,no. 4.
85- Collection Mechanism and Reduction of IDS Alert ,International Journal of Computer Applications, 2012,Vol. 58,no. 4.
86- A Survey of learning based Techniques of phishing email filtering ,JDCTA International journal of digital content technology and its application, 2012,Vol. 6,no. 18.
87- Application of Adaptive Neuro-Fuzzy Inference System for Information Security ,Journal of computer science, 2012,Vol. 8,no. 6.
88- Malware Detection Based on Evolving Clustering Method for Classification ,Scientific Research and Essays, 2012,Vol. 7,no. 22.
89- An Approach to Assessment of Network Worm Detection Using Threatening-Database Mining ,Australian Journal of Basic and Applied Sciences, 2012,Vol. 5,no. 12.
90- Combined Behavior- and Signature-Based Internet worm detection system ,International Information Institute, 2012,Vol. 15,no. 10.
91- An intelligent soft approach for malware detection in dual stack IPV4/IPv6 networks ,International Journal of Physical Sciences, 2012,Vol. 7,no. 10.
92- Evolving Fuzzy Neural Network for Phishing Emails Detection ,Journal of computer science, 2012,Vol. 8,no. 7.
93- Real time network anomaly detection using relative entropy , 8th International Conference on High-capacity Optical Networks and Emerging Technologies, 2012,Vol. -,no. -.
94- A dual stack IPv4/IPv6 testbed for malware detection in IPv6 networks ,2011 IEEE International Conference on Control System, Computing and Engineering, 2011,Vol. -,no. -.
95- An Online Model on Evolving Phishing E-mail Detection and Classification Method ,journal of applied science, 2011,Vol. 11,no. 18.
96- Computer Virus Detection Using Features ranking and Machine learning ,Australian Journal of Basic and Applied Sciences, 2011,Vol. 5,no. 9.
97- Behaviour based worm detection and signature automation ,Journal of Computer Science, 2011,Vol. 5,no. 12.
98- Cryptographic Techniques for Securing Blockchain-Based Cryptocurrency Transactions Against Botnet Attacks ,Innovations in Modern Cryptography, 2,Vol. 1,no. 1.
99- Artificial Intelligence in Cryptographic Evolution: Bridging the Future of Security ,Innovations in Modern Cryptography, 2,Vol. 1,no. 1.
100- Cryptography in Business Intelligence and Data Analytics ,Innovations in Modern Cryptography, 2,Vol. 1,no. 1.
101- Evaluation of machine learning and deep learning methods for early detection of internet of things botnets ,International Journal of Electrical and Computer Engineering (IJECE), 2,Vol. 14,no. 4.
102- Homomorphic Encryption Enabling Computation on Encrypted Data for Secure Cloud Computing ,Innovations in Modern Cryptography, 2,Vol. 1,no. 1.
103- Navigating the Landscape: Safeguarding Privacy and Security in the Era of Ambient Intelligence within Healthcare Settings ,Cyber Security and Applications , 2,Vol. 2,no. 2.
104- Quantum Computing for Cybersecurity: A Comparative Study of Classical and Quantum Techniques ,Innovations in Modern Cryptography, 2,Vol. 1,no. 1.
105- Secure Key Generation and Management Using Generative Adversarial Networks , Innovations in Modern Cryptography, 2,Vol. 1,no. 1.
106- RPL based attack detection approaches in IoT networks review and taxonomy ,Artificial Intelligence Review , 12,Vol. 57,no. 8.
107- Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting ,International Journal of Cloud Applications and Computing, 12,Vol. 14,no. 1.
108- A classification model for predicting course outcomes using ensemble methods ,International Journal of Electrical and Computer Engineering (IJECE) , 12,Vol. 14,no. 6.
109- Redefining E-commerce Experience An Exploration of Augmented and Virtual Reality Technologies ,International Journal on Semantic Web and Information Systems, 11,Vol. 19,no. 1.
110- DFScan: Security Scanner of the Dockerfile Based on Instruction Coverage and Attack Perspective ,Human-centric Computing and Information Sciences , 10,Vol. 14,no. 10.
111- A Rule-Based Expert Advisory System for Restaurants Using Machine Learning and Knowledge-Based Systems Techniques ,International Journal on Semantic Web and Information Systems, 10,Vol. 19,no. 1.
112- Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments ,International Journal of Software Science and Computational Intelligence (IJSSCI), 1,Vol. 15,no. 1.
113- Machine Learning-Based Automatic Litter Detection and Classification Using Neural Networks in Smart Cities ,International Journal on Semantic Web and Information Systems, 1,Vol. 19,no. 1.
114- Adaptive and Convex Optimization Inspired Workflow Scheduling for Cloud Environment ,International Journal of Cloud Applications and Computing, 1,Vol. 13,no. 2.
115- Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset ,International Journal of Intelligent Networks , 1,Vol. 4,no. 1.
116- Image cyberbullying detection and recognition using transfer deep machine learning ,International Journal of Cognitive Computing in Engineering , 1,Vol. 5,no. 1.
117- Towards Intelligent Data Processing: A Verifiable and Lightweight Searchable Encryption Scheme with Constant Client-Side Storage Cost ,Human-centric Computing and Information Sciences, 1,Vol. 13,no. 53.
118- Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis with Different Routing Protocols ,International Journal of Cloud Applications and Computing, 1,Vol. 13,no. 1.
119- The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds ,International Journal of Cloud Applications and Computing, 1,Vol. 13,no. 1.
120- A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks ,Journal of King Saud University - Computer and Information Sciences , 1,Vol. 36,no. 1.
121- Privacy-Preserving Machine Learning Cryptographic Techniques for Secure Data Analysis ,Innovations in Modern Cryptography, 1,Vol. 1,no. 1.

University Courses Taught
1- Data Communication & Networking.
2- C++ programming language.
3- Java programming language with Object-Oriented using java.
4- Web application programming.
5- Operating system.
6- special topics (research methodology).
7- Cryptography.
8- cloud computing and security.
9- Wireless Computer Networks.
10- Information System Security.

Master and Phd thesis contributions
Thesis Supervision
Fast Flux Botnet Detection Based On Adaptive Dynamic Evolving Spiking Neural Network ,University of Salford,Phd Thesis,2018.
Rule-Based Approach For Detecting Botnet Based On Domain Name System ,Universiti Sains Malaysia,Phd Thesis,2018.
Distributed Denial of Service (DDoS) Attack Detection in Cloud Computing Environment ,Universiti Sains Malaysia,Phd Thesis,2017.

Honors and Academics Awards
# Award Name Donor Name Award Year Award Country
1Book of Thanks: Contribute successfully the electoral process of Al-Balqa Applied UniversityAl-Balqa Applied University2019Jordan
2Best paper from the IEEE publisher8th IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2018), Penang, Malaysia, 23 - 25 November 20182018Malaysia
3certificate from al-Balqa Applied University as one of the best researchers.al-Balqa Applied University2017Jordan
4Book of Thanks: technology-Enhanced Ph.D. program in Psychosocial Counseling- A refugee Oriented Approach (TEPPC)Yarmouk university2017Jordan
5Book of Thanks: For Support Committee student activities - and the organization of the closing ceremonyAl-Imam Muhammad Ibn Saud Islamic University2016Saudi Arabia
6won IETE-GOWRI MEMORIAL AWARD with Golden Medallion -2014The Institution of Electronics and telecommunication engineering2014India
7Book of Thanks: For the establishment of specialty engineering diploma smart devices in Husson CollegeAl-Balqa Applied University2014Jordan
8Book of Thanks: Creating and Designing a Magazine (sound of the student)King Khalid University2009Saudi Arabia
9Book of Thanks: Excellent achievementsking Khalid university- department of Computer Science2009Saudi Arabia
10Book of Thanks: Excellent work in teaching electronic commerceNational Information technology Centre (NITC)- Jordan2006Jordan

Projects
Virtual Private Networks Traffic analysis and Classification system based on stacking ensemble learning ,Al-Balqa Applied University,2022/01-2022/11.
AI-based fraud detection system for Metaverse transactions ,Skyline University College-Sharjah-UAE,2023/04-2024/04.
AI-based Cyber Security Framework for Advance Cyber-attack Detection in the Internet Age ,Skyline University College-Sharjah-UAE,2022/04-2023/04.
Fast flux botnet catcher approach (FFBCA) ,Al-Balqa Applied University,2019/04-2020/04.

Conferences and Workshops
# Conference/Workshop Name Conference/Workshop Place Conference/Workshop Date
12024 2nd International Conference on Cyber Resilience (ICCR)United Arab Emirates2024/08
23rd International Conference on Cyber Security, Privacy and Networking(ICSPN-2023)United Arab Emirates2023/09
3The 3rd International Conference on Computing and Information Technology (ICCIT)Saudi Arabia2023/02
4International Conference on Cyber Security, Privacy and Networking (ICSPN 2022)Thailand2023/01
5International Conference on Smart Systems and Advanced Computing (SysCom 2022), December 30-31, 2022, Macau, China (Virtual Mode)China2022/12
6EUMMAS A2S Conference on Global Social and Technological Development and Sustainability, Dubai 2023, United Arab EmiratesUnited Arab Emirates2022/12
72022 International Conference on Emerging Trends in Computing and Engineering Applications (ETCEA)Jordan2022/11
8International Arab Conference on Information Technology ACIT2022 Al Ain University UAEUnited Arab Emirates2022/11
9ICSPN-2022: International Conference on Cyber Security, Privacy and Networking, Four Seasons Hotel Bangkok at Chao Phraya River,Bangkok, Thailand, September 9-11, 2022,SpringerThailand2022/02
10International Conference on Advances in Cyber Security ACeS 2019 : Advances in Cyber SecurityMalaysia2020/11
11The 19th International Arab Conference on Information Technology (ACIT2018)Lebanon2018/11
12IEEE International Conference on Control System, Computing and Engineering (ICCSCE) 2018Malaysia2018/11
13The International Arab Conference on Information Technology (ACIT) 2017Tunisia2017/06
142014 International Conference on Computer and Information Sciences (ICCOINS)Malaysia2014/06
15the 8th International Conference on High-capacity Optical Networks and Emerging Technologies 2011Malaysia2011/12
162011 IEEE International Conference on Control System, Computing and EngineeringMalaysia2011/11

Patents
Intelligentes Verteidigungssystem gegen verteilte Denial of Service (DDoS) Angriffe in Internet of Things (IoT) Netzen ,German Patent and Trade Office.
Ein System zur Identifizierung verdachtiger Uberreste von Objekten auf der Grundlage von Mask- RCNN / A system for identifying suspicious remains of objects based on Mask-RCNN  ,German Patent and Trade Office.
Ein System zum Finden und Optimieren eines Zeitplans fur die Betriebszeiten von intelligenten Geraten / A system for finding and optimizing a schedule for the operating hours of smart devices  ,German Patent and Trade Office.
System zur Optimierung der Bew?sserung auf landwirtschaftlichen Feldern mithilfe von Big-Data-Analysen ,German Patent and Trade Office.
Method And System For Secure Communication In IOT Networks ,Intellectual Property India.
Ein intelligentes System zur Entwicklung eines sicheren und effizienten elektronischen Ticketings mithilfe intelligenter Vertr?ge ,German Patent and Trade Office.
Auf einem chaotischen Zufallszahlengenerator basierendes kryptografisches System ,German Patent and Trade Office.
Ein system zur erkennung von verteilten denial of service angriffen im pandemie -szenario COVID 19 fur kleinunternehmer ,German Patent and Trade Office.
Cognitive Method And System To Shield Smart Devices ,Intellectual Property India.
Ein adaptives Gleichzeitigkeitskontrollsystem f?r das Transaktionsmanagement in einer Cloud-Edge-Computerumgebung ,German Patent and Trade Office.

Books
# Book Name Publisher Name Year
1Dynamic Evolving Neural Fuzzy Framework for phishing E-mail detectionVerlag publisher Scholars Press2014
2Innovations in Modern Cryptography?, IGI Global, Editorial Book 2024IGI2024

Journals Editor/ Reviewer
Editors
3rd International Conference on Cyber Security, Privacy and Networking (ICSPN-2023), September 28-30, 2023, Dubai, UAE.
Insights: An International Interdisciplinary Journal.
https://conference.eummas.net/dubai2023/ EUMMAS A2S Conference on Global Social and Technological Development and Sustainability, Dubai 2023, United Arab Emirates.
http://www.ieee-gcce.org/2014/special.html#. IEEE 3rd Global Conference on Consumer Electronics (GCCE) DOI: 10.1109/GCCE33711.2014 7-10 Oct. 2014.
Review:
https://easychair.org/cfp/ISCSA2017 : ISCSA2017: International Symposium on Computer Sciences and Applications FST Errachidia Errachidia, Morocco, October 26-28, 2017.
More than 76 articles were reviewed by different publishers. AS Academic Activities: https://www.webofscience.com/wos/author/record/F-2180-2017.
: https://www.aconf.org/conf_112810.html International Workshop on Big Data and Networks Technologies (BDNT2017) Jul. 24 - 26, 2017 Leuven ? Belgium.
https://www.juit.ac.in/pdgc-2018/tpc.php2018 Fifth International Conference : on Parallel, Distributed and Grid Computing(PDGC) 20-22 December, 2018 Dept. of CSE & IT, Jaypee University of Information Technology.
2022 International Conference on Information Technology, Communication Ecosystem and Management (ITCEM).
2022 International Conference on Computing, Robotics and System Sciences (ICRSS).

Community Service :
* Keynote speaker.
* Keynote speaker.
* Volunteering in the Skills Program with Google.
* Discussion of a masters thesis for the student Eman AlBawana.
* Volunteering for the success of the electoral process for students at Al-Hosun College.
* Arbitration research for the Deanship of Scientific Research at Al-Balqa Applied University.
* Member of the Social Committee.
* A Visit: Old Peoples Home.

Refrences
Prof. Dr. Dr.Mohammed Azmi Al-Betar-Ajman University (AU), U.A.E. ,m.albetar@ajman.ac.ae.
Dr. Dr.Mohammad Alauthman-University of Petra ,mohammad.alauthman@uop.edu.jo.
Prof. Dr. Kamel Al-Zboon-Al-Balqa Applied University(BAU) ,alzboon@bau.edu.jo.


Print CV
Print CV



اتصل بنا
جامعة البلقاء التطبيقية
 962 5 3491111+
 962 5 3532312+
  السلط 19117 . الاردن, ص. ب. 206
شبكات التواصل الإجتماعي
Facebook Twitter Youtube Instgram Linked In
Google Play App Store
سياسة حماية البيانات و الخصوصية
©2022 جميع الحقوق محفوظة جامعة البلقاء التطبيقية تصميم وبرمجة مركز الحاسوب
إضغط هنا لمشاهدة أفضل إعدادات التصفح