Submissions from 2023
Comparative analysis study for air quality prediction in smart cities using regression techniques, Shorouq Al-Eidi, Fathi Amsaad, Omar Darwish, Yahya Tashtoush, Ali Alqahtani, and Niveshitha Niveshitha
A survey of uncover misleading and cyberbullying on social media for public health, Omar Darwish, Yahya Tashtoush, Amjad Bashayreh, Alaa Alomar, Shahed Alkhaza’leh, and Dirar Darweesh
BioChainReward: A secure and incentivised blockchain framework for biomedical data sharing, Mahmoud Elkhodr, Ergun Gide, Omar Darwish, and Shorouq Al-Eidi
Information-centric IoT-based smart farming with dynamic data optimization, Souvik Pal, Hannah VijayKumar, D. Akila, N. Z. Jhanjhi, Omar A. Darwish, and Fathi Amsaad
A notional understanding of the relationship between code readability and software complexity, Yahya Tashtoush, Noor Abu-El-Rup, Omar Darwish, Shorouq Al-Eidi, Dirar Darweesh, and Ola Karajeh
Efficient privacy-preserving task allocation with secret sharing for vehicular crowdsensing, Yantao Yu, Xiaoping Xue, Jingxiao Ma, Ellen Z. Zhang, Yunguo Guan, and Rongxing Lu
Faculty Scholarship from 2022
A classifier to detect best mode for Solar Chimney Power Plant system, Emad Abdelsalam, Omar Darwish, Ola Karajeh, Fares Almomani, Dirar Darweesh, Sanad Kiswani, Abdullah Omar, and Malek Alkisrawi
Covert timing channels detection based on image processing using deep learning, Shorouq Al-Eidi, Omar Darwish, Yuanzhu Chen, and Mahmoud Elkhodr
An explainable machine learning framework for lung cancer hospital length of stay prediction, Belal Alsinglawi, Osama Alshari, Mohammed Alorjani, Omar Mubin, Fady Alnajjar, Mauricio Novoa, and Omar Darwish
Survey on authentication and security protocols and schemes over 5G networks, Omar Darwish
Blockchain-enabled deep recurrent neural network model for clickbait detection, Abdul Razaque, Bandar Alotaibi, Munif Alotaibi, Fathi Amsaad, Ansagan Manasov, Salim Hariri, Banu B. Yergaliyeva, and Aziz Alotaibi
A blockchain-enabled framework for securing connected consumer electronics against wireless attacks, Adbul Razaque, Yaser Jararweh, Aziz Alotaibi, Fathi Amsaad, Bandar Altaibi, and Munif Alotaibi
Agile approaches for cybersecurity systems, IoT and intelligent transportation, Yahya M. Tashtoush, Dirar A. Darweesh, Ghaith Husari, Omar A. Darwish, Yousef Darwish, Luai Bani Issa, and Huthaifa I. Ashqar
Faculty Scholarship from 2021
A lightweight hardware-based authentication for secure smart grid energy storage units, Fathi Amsaad and Selcuk Kose
A secure hardware-assisted AMI authentication scheme for smart cities, Fathi Amsaad and Selcuk Kose
A secure lightweight hardware-assisted charging coordination authentication framework for trusted smart grid energy storage units, Fathi Amsaad and Selçuk Köse
Enhancing the performance of lightweight configurable PUF for robust IoT hardware-assisted security, Fathi Amsaad, Ahmed Oun, Mohammed Y. Niamat, Abdul Razaque, Seluck Kose, Mohamed Mahmoud, Waleed Alasmary, and Fawaz Alsolami
An efficient and reliable lightweight PUF for IoT-based applications, Fathi Amsaad, Abdul Razaque, Mohamed Baza, Seluck Kose, Sajal Bhatia, and Gautam Srivastava
Exploring the impact of using Code Genie to enhance the programming knowledge of students and across genders: Experimental study, Hadeel Mohammed Jawad and Samir Tout
Gamifying computer science education for Z generation, Hadeel Mohammed Jawad and Samir Tout
Analysis of sentimental behaviour over social data using machine learning algorithms, Abdul Razaque, Fathi Amsaad, Dipal Halder, Mohamed Baza, Abobakr Aboshgifa, and Sajal Bhatia
Enhancing robots navigation in Internet of Things indoor systems, Yahya Tashtoush, Israa Haj-Mahmoud, Omar Darwish, Majdi Maabreh, Belal Alsinglawi, Mahmoud Elkhodr, and Nasser Alsaedi
On the assessment of robustness of telemedicine applications against adversarial machine learning attacks, Ibrahim Yilmaz, Mohamed Baza, Ramy Amer, Amar Rasheed, Fathi Amsaad, and Rasha Morsi
Faculty Scholarship from 2020
Automated cyber risk mitigation: Making informed cost-effective decisions, Mohammed Noraden Alsaleh and Ehab Al-Shaer
A trusted authentication scheme for IoT-based smart grid applications, Fathi Amsaad and Selcuk Kose
Successes and failures in exploring biometric algorithms in NIST open source software and data, Abdul Razaque, Fathi Amsaad, Muder Almiani, Duisen Gulsezim, Mohammad Adnan Almahameed, Ayman Al-Dmour, Meer Jaro Khan, and Raouf Ganda
Efficient context-aware file system approach, Abdul Razaque, Fathi Amsaad, Muder Almiani, Wan Xiaoya, Li Shiyu, Raouf Ganda, Majdi Rawashdeh, and Amer AlRahayfeh
Enhanced grey risk assessment model for support of cloud service provider, Abdul Razaque, Fathi Amsaad, Salim Hariri, Marwah Almasri, Syed S. Rizvi, and Mohamed Ben Haj Frej
Detection of phishing websites using machine learning, Abdul Razaque, Mohamed Ben Haj Frej, Dauren Sabyrox, Aidana Shaikhyn, Fathi Amsaad, and Ahmed Oun
Detection of lying electrical vehicles in charging coordination using deep learning, Ahmed A. Shafee, Mostafa M. Fouda, Mohamed M.E.A. Mahmoud, Abdulah Jeza Aljohani, Waleed Alasmary, and Fathi Amsaad
Hydraview: A synchronized 360◦-view of multiple sensors for autonomous vehicles, Luodai Yang*, Qian Jia*, Ruijun Wang, Jie Cao, and Weisong Shi
Faculty Scholarship from 2019
gExtractor: Automated extraction of malware deception parameters for autonomous cyber deception, Mohammed Noraden Alsaleh, Jinpeng Wei, Ehab Al-Shaer, and Mohiuddin Ahmed
Two factor authentication using Twofish Encryption and Visual Cryptography algorithms for secure data communication, Duisen Gulsezim, Seiitkaliyeva Zhansaya, Abdul Razaque, Yestayeva Ramina, Fathi Amsaad, Muder Almiani, Raouf Ganda, and Ahmed Oun
Smart phone as toolbox for height measurement, Abdul Razaque, Fathi Amsaad, Cai Mengjie Cherry, Lin Jiahui Linda, and Ahmed Oun
Privacy preserving medium access control protocol for wireless body area sensor networks, Abdul Razaque, Fathi Amsaad, Meer Jaro Khan, Saule Toksanovna Amanzholova, Ahmed Oun, and Muder Almiani
Pair data division algorithm for handling data classification, Abdul Razaque, A. Kanapina, M. Sailaubek, D. Tsoy, Z. Turganov, Muder Almiani, Fathi Amsaad, and Mohammad Adnan Almahamed
Faculty Scholarship from 2018
gExtractor: Towards automated extraction of malware deception parameters, Mohammed Noraden Alsaleh, Jinpeng Wei, Ehab Al-Shaer, and Mohiuddin Ahmed
QoS dependency modeling for composite systems, Khayyam Hashmi, Zaki Malik, Abdelkarim Erradi, and Abdelmounaam Rezgui
A survey of traffic sign recognition systems based on convolutional neural networks, Syed Hussain*, Munther Abualkibash, and Samit Tout
"Think before you click. Post. Type." Lessons learned from our university cyber security awareness campaign, Rachel Innocenzi*, Kaylee Brown*, Peggy Liggit, Samir Tout, Andrea Tanner^, Theodore Coutilish^, and Rocky Jenkins^
The theory of planned behavior and high school students’ interest in computer science, Hadeel Mohammed Jawad*, Munther Abualkibash, Samir Tout, and Yichun Xie
The Code Genie programming environment, Hadeel Mohammed Jawad*, Deb de Laski-Smith, and Samir Tout
Integrating art and animation in teaching computer programming for high school students experimental study, Hadeel Mohammed Jawad*, Samir Tout, Munther Abualkibash, and Yichun Xie
Earthquake damage detection using before and after earthquake satellite images, Kasim A. Korkmaz and Munther Abualkibash
Provably secure APK redevelopment authorization scheme in the standard model, Daofeng Li, Mingxing Luo, Bowen Zhao, and Xiangdong Che
Emerging research in the security of modern and autonomous vehicles, Samir Tout, Munther Abualkibash, and Pooja Patil*
Infrastructure challenges in an information assurance education: An implementation case, Liu Hua Yeo*, Munther Abulkibash, James Banfield, and Suleiman Ashur
Faculty Scholarship from 2017
Effective integration of advanced mobile technology for course delivery in information technology programs, Bilquis Ferdousi
Gender gaps in undergraduate computer technology programs: Develop a theoretical research framework, Bilquis Ferdousi