|
|
|
|
|
|
|
OverView
|
|
Obaida M. Al-Hazaimeh's current research focus is on Cyber-Security (Cryptography), which is mainly focusing on creating an electronic equivalent of security primitives such as confidentiality, integrity, identification, and authentication. To achieve this goal, the research concentrates on the design of cryptographic protocols and the development of security architectures for computer systems. The theoretical work on cryptographic algorithms and protocols is mainly based on number theory; other fields of mathematics relevant to cryptography such as elliptic curve, braid theory and chaos theory are also being investigated. The goal is to achieve efficient and secure solutions.
|
|
|
|
|
|
Research Intersets:
|
|
Developing new algorithms for detecting cybersecurity attacks and enhancing encryption techniques using artificial intelligence, IOT
|
|
|
|
|
Qualifications
|
| #
|
Degree
|
University
|
Specialization
|
Graduation year
|
| 1 | PHD | Universiti Utara Malaysia | Computer Science | 2010 | | 2 | MASTER DEGREE | Universiti Sains Malaysia | Computer Science | 2006 | | 3 | BACHELOR'S DEGREE | Applied Science Private University | Computer Science | 2004 |
|
|
|
|
|
|
|
|
|
|
|
Publications
|
1- Enhanced IoT cybersecurity through Machine Learning - based penetration testing ,Applied Computer Science, 2025,Vol. 21,no. 2. 2- Intelligent dynamic bandwidth allocation for real-time IoT in fog-based optical networks ,Simulation Modelling Practice and Theory, 2025,Vol. ,no. . 3- Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity ,International Journal of Interactive Mobile Technologies, 2025,Vol. 19,no. 3. 4- Security Enhanced Dynamic Bandwidth Allocation-Based
Reinforcement Learning ,WSEAS Transactions on Information Science and Applications, 2025,Vol. 1,no. 22. 5- End-To-End Cybersecurity Encryption- Video Algorithm ,WSEAS Transactions on Computer Research, 2025,Vol. 13,no. 1. 6- ANALYSIS AND EVOLUTION OF SHA-1 ALGORITHM - ANALYTICAL TECHNIQUE
,International Journal of Computer Networks and Communications, 2024,Vol. 16,no. 3. 7- A NEW APPROACH FOR BREAST CANCER DETECTION- BASED MACHINE LEARNING TECHNIQUE ,Applied Computer Science, 2024,Vol. 20,no. 1. 8- A Novel Chaotic Map Partially Blind Signature Scheme Based on Quadratic Residue Problems ,Journal of Discrete Mathematical Sciences & Cryptography, 2024,Vol. 24,no. 3. 9- Vehicle To Vehicle and Vehicle To Ground Communication - Speech Encryption Algorithm
,2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 2023,Vol. ,no. . 10- A New Authentication Scheme Based on Chaotic Maps and Factoring Problems ,International Conference on Mathematics and Computations, 2023,Vol. 17,no. 8. 11- Enhance Linux Security Server Misconfigurations and hardening Methods
,Information Sciences Letters, 2023,Vol. 12,no. 3. 12- Swin Transformer-Based Segmentation and Multi-Scale Feature Pyramid Fusion Module for Alzheimer Disease with Machine Learning ,International Journal of Online and Biomedical Engineering (iJOE), 2023,Vol. 09,no. 04. 13- Analytical Approach for Data Encryption Standard Algorithm ,International Journal of Interactive Mobile Technologies, 2023,Vol. 17,no. 14. 14- Analysis of the current state of deepfake techniques-creation and detection methods ,Indonesian Journal of Electrical Engineering and Computer Science, 2022,Vol. 28,no. 03. 15- Chaotic Map and Quadratic Residue Problems-Based Hybrid Signature Scheme ,International Journal for Computers & Their Applications, 2022,Vol. 29,no. 04. 16- A signature algorithm based on chaotic maps and factoring problems ,Journal of Discrete Mathematical Sciences and Cryptography, 2022,Vol. 25,no. 08. 17- Chaotic based multimedia encryption: a survey for network and internet security ,Bulletin of Electrical Engineering and Informatics, 2022,Vol. 11,no. 4. 18- Image encryption using anti-synchronisation and Bogdanov transformation map ,International Journal of Computing Science and Mathematics, 2022,Vol. 15,no. 01. 19- Chaotic elliptic map for speech encryption ,Indonesian Journal of Electrical Engineering and Computer Science, 2022,Vol. 25,no. 02. 20- Combining Artificial Intelligence and Image Processing for Diagnosing Diabetic Retinopathy in Retinal Fundus Images ,International Journal of Online and Biomedical Engineering, 2022,Vol. 18,no. 03. 21- A novel RGB image steganography using simulated annealing and LCG via LSB ,International Journal of Computer Network and Information Security, 2021,Vol. 21,no. 1. 22- A Hybrid SVM NAIVE-BAYES Classifier for Bright Lesions Recognition in Eye Fundus Images ,International Journal on Electrical Engineering and Informatics, 2021,Vol. 13,no. 03. 23- A new speech encryption algorithm based on dual shuffling H?non chaotic map ,International Journal of Electrical and Computer Engineering, 2021,Vol. 11,no. 3. 24- A split and merge video cryptosystem technique based on dual hash functions and Lorenz system ,International Journal of High Performance Computing and Networking, 2021,Vol. 17,no. 1. 25- A new image encryption scheme using dual chaotic map synchronization ,International Arab Journal of Information Technology, 2021,Vol. 18,no. 01. 26- Phonocardiogram Classification Based on Machine Learning with Multiple Sound Features ,Journal of Computer Science, 2020,Vol. 16,no. 11. 27- A new dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol ,International Journal of Electrical and Computer Engineering (IJECE) , 2020,Vol. 10,no. 5. 28- An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem ,Journal of Discrete Mathematical Sciences and Cryptography, 2020,Vol. 23,no. 04. 29- A new RSA public key encryption scheme with chaotic maps ,International Journal of Electrical and Computer Engineering (IJECE), 2020,Vol. 10,no. 02. 30- Source Code Explorer System to Enhance the
Software Maintainability and Scalability ,International Journal of Education and Information Technologies, 2019,Vol. 13,no. . 31- Automated Pedestrian Recognition Based on Deep Convolutional Neural Networks ,International Journal of Machine Learning and Computing, 2019,Vol. 09,no. 05. 32- Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys ,Neural Computing and Applications, 2019,Vol. 31,no. . 33- An efficient identity-based cryptographic model for Chebyhev chaotic map and integer factoring based cryptosystem ,Journal of Applied Security Research, 2019,Vol. 14,no. 03. 34- Geometrical-based approach for robust human image detection ,Multimedia Tools and Applications, 2019,Vol. 78,no. 06. 35- NLP and IR Based Solution for Confirming Classification of Research Papers ,Journal of Theoretical and Applied Information Technology, 2018,Vol. 96,no. 16. 36- An effective image processing method for detection of diabetic retinopathy diseases from retinal fundus images ,Int. J. of Signal and Imaging Systems Engineering, 2018,Vol. 11,no. 04. 37- Revising Programs Internal Documentation for Developers Sustaining ,Journal of Theoretical & Applied Information Technology, 2017,Vol. 95,no. 18. 38- A novel framework for intelligent surveillance system based on abnormal human activity detection in academic environments ,Neural Computing and Applications, 2017,Vol. 28,no. 1. 39- A Topic Modeling Based Solution for Confirming Software Documentation Quality
,International Journal of Advanced Computer Science and Applications, 2016,Vol. 7,no. 2. 40- High Quality-Low Computational Cost Technique for Automated Principal Object Segmentation Applied in Solar and Medical Imaging ,Computer and Information Science, 2016,Vol. 9,no. 2. 41- Combining Audio Samples and Image Frames for Enhancing Video Security ,Indian Journal of Science and Technology, 2015,Vol. 08,no. 10. 42- Spam E-mail Filtering Using ECOS Algorithms ,Indian Journal of Science and Technology, 2015,Vol. 8,no. S9. 43- A Novel Encryption Scheme for Digital Image - Based on One Dimensional Logistic Map ,Computer and Information Science, 2014,Vol. 7,no. 4. 44- A dual curvature shell phased array simulation for delivery of high intensity focused ultrasound ,Computer and Information Science, 2014,Vol. 07,no. 03. 45- HANON Chaotic Map - Based New Digital Image Encryption Algorithm ,MAGNT Research Report, 2014,Vol. 02,no. 04. 46- Cross correlation-new based technique for speaker recognition ,International Journal of Academic Research, 2014,Vol. 06,no. . 47- A PAIR-WISE KEY ESTABLISHMENT SCHEME FOR AD HOC NETWORKS ,International Journal of Computer Networks and Communications, 2013,Vol. 05,no. 02. 48- A New Approach for Complex Encrypting and Decrypting Data ,International Journal of Computer Networks & Communications, 2013,Vol. 5,no. 2. 49- Increase the Security Level for Real-Time Application Using New Key Management Solution ,International Journal of Computer Science Issues, 2012,Vol. 09,no. 03.
|
|
|
|
|
|
|
University Courses Taught
|
1- Theory of Computation and Automata. 2- Compiler design and automation. 3- Computer and Network Forensiec-1. 4- Computer and Network Forensiec-2. 5- Modern Encryption. 6- Artificial Intelligent. 7- Networks Security. 8- Wireless Computer Network. 9- Cryptography.
|
|
|
|
|
Master and Phd thesis contributions
|
|
Thesis Supervision
|
A New Classification Approach Based on Geometrical Model for Human Detection in Images ,University of Salford,Phd Thesis,2019.
|
|
Thesis Defense Committee Membership
|
Voiced Cyber bullying Detection Using Machine Learning ,Yarmouk University,Master Thesis,2023.
A Concurrent Face Recognition for E-Learning Identification and Authentication ,University of Jordan,Master Thesis,2023.
Identifying the Best Base Classifier and the Significance of Capturing the Correlations among Labels in Multi-label Classification ,Al al-Bayt University,Master Thesis,2022.
Synchronization of Chaotic Systems with Application to Cryptography ,Yarmouk University,Master Thesis,2018.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Conferences and Workshops
|
| #
|
Conference/Workshop Name
|
Conference/Workshop Place
|
Conference/Workshop Date
|
| 1 | 2024 International Conference on Applied Mathematics & Computer Science (ICAMCS) | Spain | 2024/09 | | 2 | 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) | Spain | 2023/07 | | 3 | International Conference on Mathematics and Computations | Jordan | 2022/05 | | 4 | 2019 the 4th International Conference on Multimedia and Image Processing (ICMIP) | Malaysia | 2019/01 | | 5 | 2014 IEEE International Conference on Control Science and Systems Engineering | China | 2014/12 |
|
|
|
|
|
|
|
|
|
Books
|
| #
|
Book Name
|
Publisher Name
|
Year
|
| 1 | A New Authentication Scheme Based on Chaotic Maps and Factoring Problems | Springer Nature Singapore | 2023 |
|
|
|
|
Journals Editor/ Reviewer
|
|
|
|
|
|
Review:
|
IET Image Processing.
Microscopy Research and Technique.
Network: Computation in Neural Systems.
Biomedical Engineering - Applications, Basis and Communications.
International Journal of Artificial Intelligence.
World Journal of Traditional Chinese Medicine.
IEEE Multimedia.
Journal of Intelligent and Fuzzy Systems.
Advances in Mathematical Physics.
Journal of Applied Security Research.
SIAM Journal on Imaging Sciences.
Concurrency Computation Practice and Experience.
Cogent Engineering.
Computer Methods in Biomechanics and Biomedical Engineering: Imaging and Visualization.
Applied Soft Computing Journal.
IEEE Access.
Neural Computing and Applications.
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS.
DIABETES OBESITY & METABOLISM.
Journal of Imaging Science and Technology.
CLINICAL MEDICINE INSIGHTS-CASE REPORTS.
Electromagnetic Biology and Medicine.
Journal of Pharmacology and Experimental Therapeutics.
Malaysian Journal of Medicine and Health Sciences.
PeerJ Computer Science.
Journal of Computational Design and Engineering.
Optical and Quantum Electronics.
Digital Health.
IEEE Transactions on Industrial Informatics.
Biotechnic and Histochemistry.
BMJ Open Ophthalmology.
Journal of Medical Imaging and Health Informatics.
Institution of Electronics and Telecommunication Engineers (IETE).
Connection Science.
|
|
|
|
|
Other Contributions:
|
*Erasmus+ Program of the European Union - Staff and students training workshops - Development of Remote and Virtual Laboratories Co-funded by the Erasmus+ Program of the European Union for Teaching and Training Engineering Students in the South Mediterranean and Sub-Saharan Higher Education Institutions (RL4Eng) ? Spain - University of Castilla-La Mancha (UCLM) from 10 - 17 February 2024..
|
|
|
|
|
|
|
|
|
Refrences
|
Prof. Dr. Saeid M. Abu-Romman-Al-Balqa Applied University ,saeid.aburomman@bau.edu.jo.
Prof. Dr. Samer Samarah-YARMOUK University ,samers@yu.edu.jo.
Prof. Dr. Ammar Ali Deeb Almomani-Al-Balqa Applied University ,ammarnav6@bau.edu.jo.
Prof. Dr. Ashraf Abu-Ein-Al-Balqa Applied University ,ashraf.abuain@bau.edu.jo.
Prof. Dr. Zaid Ahmed Salem Al-Anber-Al-Balqa Applied University ,z_alanber@bau.edu.jo.
|
|
|

|
|
|
|
|
|
|