|
|
|
|
|
|
|
OverView
|
I obtained my PhD from Universiti Sains Malaysia (USM) in 2013, where the university was ranked #142 in the QS World University Rankings for 2021. My specialization is in Computer Science, with a research focus on Internet infrastructure security. I also hold a Master's in Computer Information Systems (CIS). I have published over 150 research papers and conference articles, most of which are indexed in Scopus Q1, Q2, and WOS. I have filed ten patents, eight of which are in Germany and two in India, along with many international awards. I also serve as a co-supervisor for several PhD students from the UK and Malaysia.
Currently, I manage AI and cybersecurity projects with international teams at top universities and collaborate with leading researchers in the field of AI and cybersecurity. We have published over 130 articles on cybersecurity, AI, data science, and information systems, and I have extensive experience in linking research with industry and society.
With 20 years of academic experience, I have taught over 45 different subjects in Computer Science, Information Systems, AI, Data Science, Cybersecurity, Networking, Programming Languages, as well as many international certifications, and I have participated in several projects.
Currently, I am an Associate Professor, Head of the Research and Innovation Department, and a faculty member at the Higher College of Technology (HCT), Sharjah, UAE. I have 6 years of administrative experience and hold the UAE Golden Visa. My primary goal is to enhance educational institutions, and I am capable of integrating with diverse faculty members from different backgrounds.
I have contributed to the development of courses and programs (at the undergraduate level) offered by the College of Computer Science and Informatics, and I have experience in accreditation, particularly ABET Accreditation and CAA. I have also helped establish several specializations in Jordan and the UAE.
|
|
|
|
|
|
Research Intersets:
|
|
Cybersecurity, AI, Botnet, IOT, Cloud computing
|
|
|
|
|
Qualifications
|
| #
|
Degree
|
University
|
Specialization
|
Graduation year
|
| 1 | PHD | Universiti Sains Malaysia | Computer Science | 2013 | | 2 | MASTER DEGREE | The Arab Academy for Management, Banking and Financial Sciences | Computer Information System | 2005 | | 3 | BACHELOR'S DEGREE | Mutah university | Computer Science | 2003 |
|
|
|
|
|
Experiences
|
|
Academic Experience:
|
2024 -Current :Prpfessor-Computer Information Science (CIS) program, Bachelor of Cybersecurity,Higher Colleges of Technology (HCT)-UAE,United Arab Emirates.
2022 -2024 :Professor- An academic staff member at IT college,Skyline university college-Sharjah-UAE,United Arab Emirates.
2019 -2023 :Associate professor,Al-Balqa Applied University, Al-Huson University College, Dept. of Information Technology,Jordan.
2016 -2019 :Assistant professor,Al-Balqa Applied University, Al-Huson University College, Dept. of Information Technology,Jordan.
2015 -2016 :Assistant professor,College of Computer and Information Sciences- Al-Imam Muhammad Ibn Saud Islamic University -Kingdom of Saudi Arabia,Saudi Arabia.
2013 -2015 :Assistant professor,Al-Balqa Applied University, Al-Huson University College, Dept. of Information Technology,Jordan.
2006 -2010 :lecturer,Saudi Arabia - king Khalid university - department of computer science,Saudi Arabia.
2003 -2006 :trainer in the information technology,National Information technology Centre (NITC),Jordan.
|
Administrative Experience:
|
2022 -2024 :Professor- A head of the research and innovation department,Skyline university college-Sharjah-UAE,United Arab Emirates.
2018 -2022 :Head of IT department, at Al-Balqa Applied University (BAU), Al-Huson University College,,Al-Balqa Applied University, Al-Huson University College, Dept. of Information Technology,Jordan.
|
|
|
|
|
|
|
Publications
|
1- Cryptographic Protocols for Internet of Things (IoT) Security Lightweight Schemes and Practical Deployment ,Innovations in Modern Cryptography, 5,Vol. 1,no. 1. 2- Revolutionizing Cryptography Blockchain as a Catalyst for Advanced Security Systems , Innovations in Modern Cryptography, 5,Vol. 1,no. 1. 3- A Modified Bonobo Optimizer With Its Application in Solving Engineering Design Problems ,IEEE Access, 3,Vol. 12,no. 12. 4- Multiround transfer learning and modified generative adversarial network for lung cancer detect ,International Journal of Intelligent Systems , 3,Vol. 2023,no. 1. 5- CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models ,2024, 2nd INTERNATIONAL CONFERENCE ON CYBER RESILIENCE, Dubai, UAE, IEEE, 28,Vol. 1,no. 1. 6- Cyberbullying Detection Using Deep Learning: A Comparative Study , 2024 2nd International Conference on Cyber Resilience (ICCR), 28,Vol. 4,no. 1. 7- Machine Learning Models for Brain Signal Classification: A Focus on EEG Analysis in Epilepsy Cases ,2024 2nd International Conference on Cyber Resilience (ICCR), 28,Vol. 4,no. 1. 8- Next Generation Image Watermarking via Combined DWT-SVD Technique ,ICCR-2024, 2nd INTERNATIONAL CONFERENCE ON CYBER RESILIENCE, Dubai, UAE,IEEE, 28,Vol. 1,no. 1. 9- A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions ,information, 2023,Vol. 14,no. 7. 10- A Robust Model For Translating Arabic Sign Language Into Spoken Arabic Using Deep Learning ,Intelligent Automation & Soft Computing (IASC), 2023,Vol. 37,no. 2. 11- Adaptive and Convex Optimization Inspired Workflow Scheduling for Cloud Environment ,International Journal of Cloud Applications and Computing, 2023,Vol. 13,no. 1. 12- Digital Image Steganography and Watermarking using Discrete Cosine Transformation based Linear Modulation ,Journal of Cloud Computing:, 2023,Vol. 96,no. 12. 13- Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic ,Intelligent Automation & Soft Computing , 2023,Vol. 37,no. 2. 14- Machine Learning-Based Automatic Litter Detection and Classification Using Neural Networks in Smart Cities , International Journal on Semantic Web and Information Systems (IJSWIS, 2023,Vol. 19,no. 1. 15- A proposed Darknet Traffic Classification System Based on Max Voting algorithms ,CSPN 2021: International Conference on Cyber Security, Privacy and Networking (ICSPN 2022), 2023,Vol. 599,no. 1. 16- Darknet Traffic Analysis, and Classification System Based on Modified Stacking Ensemble Learning algorithms ,Information Systems and e-Business Management, 2023,Vol. -,no. -. 17- Email Spam Detection using Naive Bayes and Random Forest Classifiers , International Conference on Cyber Security, Privacy and Networking (ICSPN 2022), 2023,Vol. 599,no. 1. 18- Multiround Transfer Learning and Modified Generative
Adversarial Network for Lung Cancer Detection
,International Journal of Intelligent Systems, 2023,Vol. ,no. 2023. 19- A Proposed Framework for Early Detection IoT Botnet ,2022 International Arab Conference on Information Technology (ACIT), 2023,Vol. -,no. -. 20- Energy efficiency wireless sensor network protocol: A survey ,nternational Arab Conference on Information Technology (ACIT2022)AL-AIN university. UAE PP(1-7)NOV 22-24, 2023,Vol. -,no. -. 21- Machine learning scheme for Managing Virtual Computing Resources in Cloud Market ,International Arab Conference on Information Technology (ACIT2022),AL-AIN university. UAE PP(1-7)NOV 22-24, 2023,Vol. -,no. -. 22- Energy efficiency Wireless Sensor Networks Protocols: a Survey ,2022 International Conference on Emerging Trends in Computing and Engineering Applications (ETCEA), 2022,Vol. -,no. -. 23- Age and Gender Classification Using Backpropagation and Bagging Algorithms ,CMC-Computers Materials & Continua, 2022,Vol. 74,no. 2. 24- A content and URL analysis based efficient approach to detect smishing SMS in intelligent systems ,International Journal of Intelligent Systems, 2022,Vol. 34,no. 5. 25- Fully automatic grayscale image segmentation based fuzzy C?means with firefly mate algorithm ,Journal of Ambient Intelligence and Humanized Computing, 2022,Vol. 13,no. 1. 26- African buffalo algorithm: Training the probabilistic neural network to solve classification problems ,Journal of King Saud University - Computer and Information Sciences, 2022,Vol. 34,no. 5. 27- Classification of Virtual Private Networks Encrypted Traffic using ensemble learning algorithms ,Egyptian Informatics Journal, 2022,Vol. 23,no. 4. 28- Analysis of Quantum Computing-Based security of Internet of Things(IoT) Environment , Cyber Security Insights Magazine, 2022,Vol. 4,no. 1. 29- Traffic Accidents Prevention in Low Visibility Conditions using VANETS Cloud Environment International ,International Journal of Cloud Applications and Computing (IJCAC), 2022,Vol. 12,no. 1. 30- evaluation and Comparative Analysis of Semantic Web-Based Strategies for enhancing educational System development ,International Journal on Semantic Web and Information Systems (IJSWIS), 2022,Vol. 18,no. 1. 31- Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm ,International Journal of Cloud Applications and Computing (IJCAC), 2022,Vol. 12,no. 1. 32- Performance Optimization of Multi-Hop
Routing Protocols With Clustering-
Based Hybrid Networking Architecture
in Mobile Adhoc Cloud Networks ,International Journal of Cloud Applications and Computing, 2022,Vol. 12,no. 1. 33- Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers:A Comparative Study ,International Journal on Semantic Web and Information Systems, 2022,Vol. 18,no. 1. 34- Information Management and IoT Technology for Safety and Security of Smart Home and Farm Systems ,Journal of Global Information Management, 2021,Vol. 29,no. 6. 35- Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System ,Journal of Web Engineering, 2021,Vol. 21,no. 1. 36- Botnet Detection Used Fast-Flux Technique, Based on Adaptive Dynamic Evolving Spiking Neural Network Algorithm ,International Journal of Ad Hoc and Ubiquitous Computing, 2021,Vol. 36,no. 1. 37- Botnet and Internet of Things (IoTs): a definition, taxonomy, ?challenges, and future directions. In Research Anthology on Combating Denial-of-Service Attacks ,IGI-BOOK, 2021,Vol. -,no. -. 38- DNS rule-based schema to botnet detection ,Enterprise Information Systems, , 2021,Vol. 15,no. 4. 39- Detection mechanisms of DDoS attack in cloud computing environment: A survey ,International Conference on Advances in Cyber Security 2019, 2020,Vol. ,no. -. 40- The monarch butterfly optimization algorithm for solving feature
The monarch butterfly optimization algorithm for solving feature selection problems
,Neural Computing and Applications, 2020,Vol. -,no. -. 41- A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing ,International Journal of Cloud Applications and Computing, 2020,Vol. 10,no. 3. 42- Firefly photinus search algorithm ,Journal of King Saud University-Computer and Information Sciences, 2020,Vol. 32,no. 5. 43- Network-Based Detection of Mirai Botnet Using Machine Learning and Feature Selection Methods ,In Multimedia Cyber Security , 2020,Vol. -,no. -. 44- Spatial information of fuzzy clustering based mean best artificial bee colony algorithm for phantom brain image segmentation ,International Journal of Electrical and Computer Engineering (IJECE), 2020,Vol. 11,no. 5. 45- Improved water cycle algorithm with probabilistic neural network to solve classification problems ,Cluster Computing, 2020,Vol. 23,no. 1. 46- B-Hill climbing algorithm with probabilistic neural network for classification problems
,Journal of Ambient Intelligence and Humanized Computing, 2019,Vol. 11,no. 1. 47- Feature Selection using a Machine Learning to Classify a Malware ,In Computer Networks and Cyber Security: Principles and Paradigms, 2019,Vol. -,no. -. 48- User acceptance model of open source software: an integrated model of OSS characteristics and UTAUT ,Journal of Ambient Intelligence and Humanized Computing, 2019,Vol. 11,no. 1. 49- A Novel Leader Election Algorithm for Honeycomb Mesh Networks , Journal of Theoretical & Applied Information Technology, 2019,Vol. 97,no. 14. 50- A survey of botnet detection based on DNS ,Neural Computing and Applications, 2019,Vol. 28,no. 7. 51- A rule-based approach to detect botnets based on DNS ,2018 8th IEEE International Conference on Control System, Computing and Engineering (ICCSCE), 2019,Vol. -,no. -. 52- A comparative study on spiking neural network encoding schema: implemented with cloud computing ,Cluster Computing The Journal of Networks, Software Tools and Applications, 2019,Vol. 22,no. 2. 53- An Automated Approach to Generate Test Cases From Use Case
Description Model ,CMES-Computer Modeling in Engineering & Sciences, 2019,Vol. 119,no. 3. 54- Botnets Detecting attack based on DNS features ,2018 International Arab Conference on Information Technology (ACIT), 2019,Vol. -,no. -. 55- IoT transaction processing through cooperative concurrency control on fog?cloud computing environment ,Multimedia Cyber Security , 2019,Vol. -,no. -. 56- Machine learning for phishing detection and mitigation ,Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices , 2019,Vol. 1,no. -. 57- Metaheuristic Algorithms Based Feature Selection Approach for Intrusion Detection ,Machine Learning for Computer and Cyber Security: Principles, Algorithms, and Practices, 2019,Vol. -,no. -. 58- Proposed Method for an Automatic Segmentation of Medical Images ,2018 International Arab Conference on Information Technology (ACIT), 2019,Vol. -,no. -. 59- Botnet Behavior and Detection Techniques: A Review ,Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives, 2018,Vol. -,no. -. 60- Economic load dispatch problems with valve-point loading using natural updated harmony search ,Neural Computing and Applications, 2018,Vol. 92,no. 10. 61- A Survey: Challenges Of Image Segmentation Based Fuzzy C-Means Clustering Algorithm ,journal of theoretical and applied information technology, 2018,Vol. 96,no. 16. 62- An online intrusion detection system to cloud computing based on NeuCube algorithms ,International Journal of Cloud Applications and Computing (IJCAC), 2018,Vol. 8,no. 2. 63- Fast-flux hunter: a system for filtering online fast-flux botnet ,Neural Computing and Applications, 2018,Vol. 29,no. 7. 64- Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-curve cryptography ,The International Arab Journal of Information Technology (IAJIT), 2018,Vol. 15,no. 3A. 65- Enhancing the security of exchanging and storing DICOM medical images on the cloud ,International Journal of Cloud Applications and Computing (IJCAC), 2018,Vol. 8,no. 1. 66- A proposed framework for Botnet Spam-email Filtering using Neucube. ,The International Arab Conference on Information Technology (ACIT) 2017, 2017,Vol. -,no. -. 67- Secure and Energy-effictive CoAP Application Layer Protocol for the Internet of Things ,ACIT?2017 The International Arab Conference on Information Technology Yassmine Hammamet, Tunisia December 22-24, 2017, 2017,Vol. -,no. -. 68- A variable service broker routing policy for data center selection in cloud analyst ,Journal of King Saud University - Computer and Information Sciences, 2017,Vol. 29,no. 3. 69- A Framework of Childhood Obesity Intervention Using Persuasive Mobile Game Technology ,Australian Journal of Basic and Applied Sciences, 2017,Vol. 8,no. 6. 70- Spam E-mail Filtering using ECOS Algorithms ,Indian Journal of Science and Technology, 2017,Vol. 8,no. S9. 71- Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. ,Multimedia Tools and Applications, 2017,Vol. 76,no. 18. 72- Hadoop based Defence Solution to Handle Distributed Denial of Service (DDoS) Attacks ,journal of Information Security (JIS), 2016,Vol. 4,no. 2. 73- HANON Chaotic Map -Based New Digital Image Encryption Algorithm ,MAGNT Research Report, 2014,Vol. 2,no. 4. 74- Mobile game approach to prevent childhood obesity using persuasive technology , 2014 International Conference on Computer and Information Sciences (ICCOINS), 2014,Vol. -,no. -. 75- A Novel Model for Global Schema Integration and Optimization ,MAGNT Research Report, 2014,Vol. 2,no. 4. 76- ICMPv6 Flood Attack Detection using DENFIS algorithms ,Indian Journal of Science and Technology (INDJST), 2014,Vol. 7,no. 2. 77- A Novel Solution to Handle DDOS Attack in MANET ,Journal of Information Security, 2013,Vol. 4,no. 2. 78- Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection ?Zero-day? Phishing Email ,Indian Journal of Science and Technology, 2013,Vol. 6,no. 1. 79- An enhanced online phishing e-mail detection framework based on ?Evolving connectionist system. ,International Journal of Innovative Computing, Information, and Control (IJICIC) , 2013,Vol. 9,no. 3. 80- Dynamic Stochastic Early Discovery: A New Congestion Control Technique to Improve Networks Performance ,International Journal of Innovative Computing, Information, and Control (IJICIC), 2013,Vol. 9,no. 3. 81- Steganography in Digital Images: Common Approaches and Tools ,IETE Technical Review, 2013,Vol. 30,no. 4. 82- A survey of phishing email filtering techniques ,IEEE Communications Surveys & Tutorials, 2013,Vol. 15,no. 4. 83- Investigating Study on Network Scanning Techniques ,JDCTA International journal of digital content technology and its application, 2013,Vol. 7,no. 9. 84- research proposal: an intrusion detection system alert reduction and assessment framework based on data mining ,Journal of computer science, 2013,Vol. 9,no. 4. 85- Collection Mechanism and Reduction of IDS Alert ,International Journal of Computer Applications, 2012,Vol. 58,no. 4. 86- A Survey of learning based Techniques of phishing email filtering ,JDCTA International journal of digital content technology and its application, 2012,Vol. 6,no. 18. 87- Application of Adaptive Neuro-Fuzzy Inference System for Information Security ,Journal of computer science, 2012,Vol. 8,no. 6. 88- Malware Detection Based on Evolving Clustering Method for Classification ,Scientific Research and Essays, 2012,Vol. 7,no. 22. 89- An Approach to Assessment of Network Worm Detection Using Threatening-Database Mining ,Australian Journal of Basic and Applied Sciences, 2012,Vol. 5,no. 12. 90- Combined Behavior- and Signature-Based Internet worm detection system ,International Information Institute, 2012,Vol. 15,no. 10. 91- An intelligent soft approach for malware detection in dual stack IPV4/IPv6 networks
,International Journal of Physical Sciences, 2012,Vol. 7,no. 10. 92- Evolving Fuzzy Neural Network for Phishing Emails Detection ,Journal of computer science, 2012,Vol. 8,no. 7. 93- Real time network anomaly detection using relative entropy , 8th International Conference on High-capacity Optical Networks and Emerging Technologies, 2012,Vol. -,no. -. 94- A dual stack IPv4/IPv6 testbed for malware detection in IPv6 networks ,2011 IEEE International Conference on Control System, Computing and Engineering, 2011,Vol. -,no. -. 95- An Online Model on Evolving Phishing E-mail Detection and Classification Method ,journal of applied science, 2011,Vol. 11,no. 18. 96- Computer Virus Detection Using Features ranking and Machine learning ,Australian Journal of Basic and Applied Sciences, 2011,Vol. 5,no. 9. 97- Behaviour based worm detection and signature automation ,Journal of Computer Science, 2011,Vol. 5,no. 12. 98- Cryptographic Techniques for Securing Blockchain-Based Cryptocurrency Transactions Against Botnet Attacks ,Innovations in Modern Cryptography, 2,Vol. 1,no. 1. 99- Artificial Intelligence in Cryptographic Evolution: Bridging the Future of Security ,Innovations in Modern Cryptography, 2,Vol. 1,no. 1. 100- Cryptography in Business Intelligence and Data Analytics ,Innovations in Modern Cryptography, 2,Vol. 1,no. 1. 101- Evaluation of machine learning and deep learning methods for early detection of internet of things botnets ,International Journal of Electrical and Computer Engineering (IJECE), 2,Vol. 14,no. 4. 102- Homomorphic Encryption Enabling Computation on Encrypted Data for Secure Cloud Computing ,Innovations in Modern Cryptography, 2,Vol. 1,no. 1. 103- Navigating the Landscape: Safeguarding Privacy and Security in the Era of Ambient Intelligence within Healthcare Settings ,Cyber Security and Applications , 2,Vol. 2,no. 2. 104- Quantum Computing for Cybersecurity: A Comparative Study of Classical and Quantum Techniques ,Innovations in Modern Cryptography, 2,Vol. 1,no. 1. 105- Secure Key Generation and Management Using Generative Adversarial Networks , Innovations in Modern Cryptography, 2,Vol. 1,no. 1. 106- RPL based attack detection approaches in IoT networks
review and taxonomy ,Artificial Intelligence Review , 12,Vol. 57,no. 8. 107- Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting ,International Journal of Cloud Applications and Computing, 12,Vol. 14,no. 1. 108- A classification model for predicting course outcomes using ensemble methods ,International Journal of Electrical and Computer Engineering (IJECE) , 12,Vol. 14,no. 6. 109- Redefining E-commerce Experience An Exploration of Augmented and Virtual Reality Technologies ,International Journal on Semantic Web and Information Systems, 11,Vol. 19,no. 1. 110- DFScan: Security Scanner of the Dockerfile Based on Instruction Coverage and Attack Perspective ,Human-centric Computing and Information Sciences , 10,Vol. 14,no. 10. 111- A Rule-Based Expert Advisory System for Restaurants Using Machine Learning and Knowledge-Based Systems Techniques ,International Journal on Semantic Web and Information Systems, 10,Vol. 19,no. 1. 112- Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments ,International Journal of Software Science and Computational Intelligence (IJSSCI), 1,Vol. 15,no. 1. 113- Machine Learning-Based Automatic
Litter Detection and Classification Using
Neural Networks in Smart Cities ,International Journal on Semantic Web and Information Systems, 1,Vol. 19,no. 1. 114- Adaptive and Convex Optimization Inspired Workflow Scheduling for Cloud Environment ,International Journal of Cloud Applications and Computing, 1,Vol. 13,no. 2. 115- Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset ,International Journal of Intelligent Networks , 1,Vol. 4,no. 1. 116- Image cyberbullying detection and recognition using transfer deep machine learning ,International Journal of Cognitive Computing in Engineering , 1,Vol. 5,no. 1. 117- Towards Intelligent Data Processing: A Verifiable and Lightweight Searchable Encryption Scheme with Constant Client-Side Storage Cost ,Human-centric Computing and Information Sciences, 1,Vol. 13,no. 53. 118- Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis with Different Routing Protocols ,International Journal of Cloud Applications and Computing, 1,Vol. 13,no. 1. 119- The Meta-Fusion:
A Cloud-Integrated Study on Blockchain
Technology Enabling Secure and
Efficient Virtual Worlds ,International Journal of Cloud Applications and Computing, 1,Vol. 13,no. 1. 120- A systematic literature review of recent lightweight detection approaches
leveraging machine and deep learning mechanisms in Internet of
Things networks ,Journal of King Saud University - Computer and Information Sciences , 1,Vol. 36,no. 1. 121- Privacy-Preserving Machine Learning Cryptographic Techniques for Secure Data Analysis ,Innovations in Modern Cryptography, 1,Vol. 1,no. 1.
|
|
|
|
|
|
|
University Courses Taught
|
1- Data Communication & Networking. 2- C++ programming language. 3- Java programming language with Object-Oriented using java. 4- Web application programming. 5- Operating system. 6- special topics (research methodology). 7- Cryptography. 8- cloud computing and security. 9- Wireless Computer Networks. 10- Information System Security.
|
|
|
|
|
Master and Phd thesis contributions
|
|
Thesis Supervision
|
Fast Flux Botnet Detection Based On Adaptive Dynamic Evolving Spiking Neural Network ,University of Salford,Phd Thesis,2018.
Rule-Based Approach For Detecting Botnet Based On Domain Name System ,Universiti Sains Malaysia,Phd Thesis,2018.
Distributed Denial of Service (DDoS) Attack Detection in Cloud Computing Environment ,Universiti Sains Malaysia,Phd Thesis,2017.
|
|
|
|
|
|
|
|
|
Honors and Academics Awards
|
| #
|
Award Name
|
Donor Name
|
Award Year
|
Award Country
|
| 1 | Book of Thanks: Contribute successfully the electoral process of Al-Balqa Applied University | Al-Balqa Applied University | 2019 | Jordan | | 2 | Best paper from the IEEE publisher | 8th IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2018), Penang, Malaysia, 23 - 25 November 2018 | 2018 | Malaysia | | 3 | certificate from al-Balqa Applied University as one of the best researchers. | al-Balqa Applied University | 2017 | Jordan | | 4 | Book of Thanks: technology-Enhanced Ph.D. program in Psychosocial Counseling- A refugee Oriented Approach (TEPPC) | Yarmouk university | 2017 | Jordan | | 5 | Book of Thanks: For Support Committee student activities - and the organization of the closing ceremony | Al-Imam Muhammad Ibn Saud Islamic University | 2016 | Saudi Arabia | | 6 | won IETE-GOWRI MEMORIAL AWARD with Golden Medallion -2014 | The Institution of Electronics and telecommunication engineering | 2014 | India | | 7 | Book of Thanks: For the establishment of specialty engineering diploma smart devices in Husson College | Al-Balqa Applied University | 2014 | Jordan | | 8 | Book of Thanks: Creating and Designing a Magazine (sound of the student) | King Khalid University | 2009 | Saudi Arabia | | 9 | Book of Thanks: Excellent achievements | king Khalid university- department of Computer Science | 2009 | Saudi Arabia | | 10 | Book of Thanks: Excellent work in teaching electronic commerce | National Information technology Centre (NITC)- Jordan | 2006 | Jordan |
|
|
|
|
Projects
|
Virtual Private Networks Traffic analysis and Classification system based on stacking ensemble learning ,Al-Balqa Applied University,2022/01-2022/11.
AI-based fraud detection system for Metaverse transactions ,Skyline University College-Sharjah-UAE,2023/04-2024/04.
AI-based Cyber Security Framework for Advance Cyber-attack Detection in the Internet Age ,Skyline University College-Sharjah-UAE,2022/04-2023/04.
Fast flux botnet catcher approach (FFBCA) ,Al-Balqa Applied University,2019/04-2020/04.
|
|
|
|
|
Conferences and Workshops
|
| #
|
Conference/Workshop Name
|
Conference/Workshop Place
|
Conference/Workshop Date
|
| 1 | 2024 2nd International Conference on Cyber Resilience (ICCR) | United Arab Emirates | 2024/08 | | 2 | 3rd International Conference on Cyber Security, Privacy and Networking(ICSPN-2023) | United Arab Emirates | 2023/09 | | 3 | The 3rd International Conference on Computing and Information Technology (ICCIT) | Saudi Arabia | 2023/02 | | 4 | International Conference on Cyber Security, Privacy and Networking (ICSPN 2022) | Thailand | 2023/01 | | 5 | International Conference on Smart Systems and Advanced Computing (SysCom 2022), December 30-31, 2022, Macau, China (Virtual Mode) | China | 2022/12 | | 6 | EUMMAS A2S Conference on Global Social and Technological Development and Sustainability, Dubai 2023, United Arab Emirates | United Arab Emirates | 2022/12 | | 7 | 2022 International Conference on Emerging Trends in Computing and Engineering Applications (ETCEA) | Jordan | 2022/11 | | 8 | International Arab Conference on Information Technology ACIT2022 Al Ain University UAE | United Arab Emirates | 2022/11 | | 9 | ICSPN-2022: International Conference on Cyber Security, Privacy and Networking, Four Seasons Hotel Bangkok at Chao Phraya River,Bangkok, Thailand, September 9-11, 2022,Springer | Thailand | 2022/02 | | 10 | International Conference on Advances in Cyber Security ACeS 2019 : Advances in Cyber Security | Malaysia | 2020/11 | | 11 | The 19th International Arab Conference on Information Technology (ACIT2018) | Lebanon | 2018/11 | | 12 | IEEE International Conference on Control System, Computing and Engineering (ICCSCE) 2018 | Malaysia | 2018/11 | | 13 | The International Arab Conference on Information Technology (ACIT) 2017 | Tunisia | 2017/06 | | 14 | 2014 International Conference on Computer and Information Sciences (ICCOINS) | Malaysia | 2014/06 | | 15 | the 8th International Conference on High-capacity Optical Networks and Emerging Technologies 2011 | Malaysia | 2011/12 | | 16 | 2011 IEEE International Conference on Control System, Computing and Engineering | Malaysia | 2011/11 |
|
|
|
|
|
Patents
|
Intelligentes Verteidigungssystem gegen verteilte Denial of Service (DDoS) Angriffe in Internet of Things (IoT) Netzen ,German Patent and Trade Office.
Ein System zur Identifizierung verdachtiger Uberreste von Objekten auf der Grundlage von Mask- RCNN / A system for identifying suspicious remains of objects based on Mask-RCNN ,German Patent and Trade Office.
Ein System zum Finden und Optimieren eines Zeitplans fur die Betriebszeiten von intelligenten Geraten / A system for finding and optimizing a schedule for the operating hours of smart devices ,German Patent and Trade Office.
System zur Optimierung der Bew?sserung auf landwirtschaftlichen Feldern mithilfe von Big-Data-Analysen ,German Patent and Trade Office.
Method And System For Secure Communication In IOT Networks ,Intellectual Property India.
Ein intelligentes System zur Entwicklung eines sicheren und effizienten elektronischen Ticketings mithilfe intelligenter Vertr?ge ,German Patent and Trade Office.
Auf einem chaotischen Zufallszahlengenerator basierendes kryptografisches System ,German Patent and Trade Office.
Ein system zur erkennung von verteilten denial of service angriffen im pandemie -szenario COVID 19 fur kleinunternehmer ,German Patent and Trade Office.
Cognitive Method And System To Shield Smart Devices ,Intellectual Property India.
Ein adaptives Gleichzeitigkeitskontrollsystem f?r das Transaktionsmanagement in einer Cloud-Edge-Computerumgebung ,German Patent and Trade Office.
|
|
|
|
|
Books
|
| #
|
Book Name
|
Publisher Name
|
Year
|
| 1 | Dynamic Evolving Neural Fuzzy Framework for phishing E-mail detection | Verlag publisher Scholars Press | 2014 | | 2 | Innovations in Modern Cryptography?, IGI Global, Editorial Book 2024 | IGI | 2024 |
|
|
|
|
Journals Editor/ Reviewer
|
|
Editors
|
3rd International Conference on Cyber Security, Privacy and Networking (ICSPN-2023), September 28-30, 2023, Dubai, UAE.
Insights: An International Interdisciplinary Journal.
https://conference.eummas.net/dubai2023/ EUMMAS A2S Conference on Global Social and Technological Development and Sustainability, Dubai 2023, United Arab Emirates.
http://www.ieee-gcce.org/2014/special.html#. IEEE 3rd Global Conference on Consumer Electronics (GCCE) DOI: 10.1109/GCCE33711.2014 7-10 Oct. 2014.
|
|
Review:
|
https://easychair.org/cfp/ISCSA2017 : ISCSA2017: International Symposium on Computer Sciences and Applications FST Errachidia Errachidia, Morocco, October 26-28, 2017.
More than 76 articles were reviewed by different publishers. AS Academic Activities: https://www.webofscience.com/wos/author/record/F-2180-2017.
: https://www.aconf.org/conf_112810.html International Workshop on Big Data and Networks Technologies (BDNT2017) Jul. 24 - 26, 2017 Leuven ? Belgium.
https://www.juit.ac.in/pdgc-2018/tpc.php2018 Fifth International Conference : on Parallel, Distributed and Grid Computing(PDGC) 20-22 December, 2018 Dept. of CSE & IT, Jaypee University of Information Technology.
2022 International Conference on Information Technology, Communication Ecosystem and Management (ITCEM).
2022 International Conference on Computing, Robotics and System Sciences (ICRSS).
|
|
|
|
|
|
|
|
|
|
|
|
|
* Keynote speaker. * Keynote speaker. * Volunteering in the Skills Program with Google. * Discussion of a masters thesis for the student Eman AlBawana. * Volunteering for the success of the electoral process for students at Al-Hosun College. * Arbitration research for the Deanship of Scientific Research at Al-Balqa Applied University. * Member of the Social Committee. * A Visit: Old Peoples Home.
|
|
|
|
|
Refrences
|
Prof. Dr. Dr.Mohammed Azmi Al-Betar-Ajman University (AU), U.A.E. ,m.albetar@ajman.ac.ae.
Dr. Dr.Mohammad Alauthman-University of Petra ,mohammad.alauthman@uop.edu.jo.
Prof. Dr. Kamel Al-Zboon-Al-Balqa Applied University(BAU) ,alzboon@bau.edu.jo.
|
|
|

|
|
|
|
|
|
|