Follow

Submissions from 2023

Link

A survey of uncover misleading and cyberbullying on social media for public health, Omar Darwish, Yahya Tashtoush, Amjad Bashayreh, Alaa Alomar, Shahed Alkhaza’leh, and Dirar Darweesh

Faculty Scholarship from 2022

Link

A classifier to detect best mode for Solar Chimney Power Plant system, Emad Abdelsalam, Omar Darwish, Ola Karajeh, Fares Almomani, Dirar Darweesh, Sanad Kiswani, Abdullah Omar, and Malek Alkisrawi

Link

Covert timing channels detection based on image processing using deep learning, Shorouq Al-Eidi, Omar Darwish, Yuanzhu Chen, and Mahmoud Elkhodr

Link

An explainable machine learning framework for lung cancer hospital length of stay prediction, Belal Alsinglawi, Osama Alshari, Mohammed Alorjani, Omar Mubin, Fady Alnajjar, Mauricio Novoa, and Omar Darwish

Link

Survey on authentication and security protocols and schemes over 5G networks, Omar Darwish

Link

Blockchain-enabled deep recurrent neural network model for clickbait detection, Abdul Razaque, Bandar Alotaibi, Munif Alotaibi, Fathi Amsaad, Ansagan Manasov, Salim Hariri, Banu B. Yergaliyeva, and Aziz Alotaibi

Link

A blockchain-enabled framework for securing connected consumer electronics against wireless attacks, Adbul Razaque, Yaser Jararweh, Aziz Alotaibi, Fathi Amsaad, Bandar Altaibi, and Munif Alotaibi

Link

Agile approaches for cybersecurity systems, IoT and intelligent transportation, Yahya M. Tashtoush, Dirar A. Darweesh, Ghaith Husari, Omar A. Darwish, Yousef Darwish, Luai Bani Issa, and Huthaifa I. Ashqar

Faculty Scholarship from 2021

Link

A lightweight hardware-based authentication for secure smart grid energy storage units, Fathi Amsaad and Selcuk Kose

Link

A secure hardware-assisted AMI authentication scheme for smart cities, Fathi Amsaad and Selcuk Kose

Link

A secure lightweight hardware-assisted charging coordination authentication framework for trusted smart grid energy storage units, Fathi Amsaad and Selçuk Köse

Link

Enhancing the performance of lightweight configurable PUF for robust IoT hardware-assisted security, Fathi Amsaad, Ahmed Oun, Mohammed Y. Niamat, Abdul Razaque, Seluck Kose, Mohamed Mahmoud, Waleed Alasmary, and Fawaz Alsolami

Link

An efficient and reliable lightweight PUF for IoT-based applications, Fathi Amsaad, Abdul Razaque, Mohamed Baza, Seluck Kose, Sajal Bhatia, and Gautam Srivastava

Link

Exploring the impact of using Code Genie to enhance the programming knowledge of students and across genders: Experimental study, Hadeel Mohammed Jawad and Samir Tout

Link

Gamifying computer science education for Z generation, Hadeel Mohammed Jawad and Samir Tout

Link

Analysis of sentimental behaviour over social data using machine learning algorithms, Abdul Razaque, Fathi Amsaad, Dipal Halder, Mohamed Baza, Abobakr Aboshgifa, and Sajal Bhatia

Link

Enhancing robots navigation in Internet of Things indoor systems, Yahya Tashtoush, Israa Haj-Mahmoud, Omar Darwish, Majdi Maabreh, Belal Alsinglawi, Mahmoud Elkhodr, and Nasser Alsaedi

Link

On the assessment of robustness of telemedicine applications against adversarial machine learning attacks, Ibrahim Yilmaz, Mohamed Baza, Ramy Amer, Amar Rasheed, Fathi Amsaad, and Rasha Morsi

Faculty Scholarship from 2020

Link

Automated cyber risk mitigation: Making informed cost-effective decisions, Mohammed Noraden Alsaleh and Ehab Al-Shaer

Link

A trusted authentication scheme for IoT-based smart grid applications, Fathi Amsaad and Selcuk Kose

Link

Successes and failures in exploring biometric algorithms in NIST open source software and data, Abdul Razaque, Fathi Amsaad, Muder Almiani, Duisen Gulsezim, Mohammad Adnan Almahameed, Ayman Al-Dmour, Meer Jaro Khan, and Raouf Ganda

Link

Efficient context-aware file system approach, Abdul Razaque, Fathi Amsaad, Muder Almiani, Wan Xiaoya, Li Shiyu, Raouf Ganda, Majdi Rawashdeh, and Amer AlRahayfeh

Link

Enhanced grey risk assessment model for support of cloud service provider, Abdul Razaque, Fathi Amsaad, Salim Hariri, Marwah Almasri, Syed S. Rizvi, and Mohamed Ben Haj Frej

Link

Detection of phishing websites using machine learning, Abdul Razaque, Mohamed Ben Haj Frej, Dauren Sabyrox, Aidana Shaikhyn, Fathi Amsaad, and Ahmed Oun

Link

Detection of lying electrical vehicles in charging coordination using deep learning, Ahmed A. Shafee, Mostafa M. Fouda, Mohamed M.E.A. Mahmoud, Abdulah Jeza Aljohani, Waleed Alasmary, and Fathi Amsaad

Link

Hydraview: A synchronized 360◦-view of multiple sensors for autonomous vehicles, Luodai Yang, Qian Jia*, Ruijun Wang, Jie Cao, and Weisong Shi

Faculty Scholarship from 2019

Link

gExtractor: Automated extraction of malware deception parameters for autonomous cyber deception, Mohammed Noraden Alsaleh, Jinpeng Wei, Ehab Al-Shaer, and Mohiuddin Ahmed

Link

Two factor authentication using Twofish Encryption and Visual Cryptography algorithms for secure data communication, Duisen Gulsezim, Seiitkaliyeva Zhansaya, Abdul Razaque, Yestayeva Ramina, Fathi Amsaad, Muder Almiani, Raouf Ganda, and Ahmed Oun

Link

Smart phone as toolbox for height measurement, Abdul Razaque, Fathi Amsaad, Cai Mengjie Cherry, Lin Jiahui Linda, and Ahmed Oun

Link

Privacy preserving medium access control protocol for wireless body area sensor networks, Abdul Razaque, Fathi Amsaad, Meer Jaro Khan, Saule Toksanovna Amanzholova, Ahmed Oun, and Muder Almiani

Link

Pair data division algorithm for handling data classification, Abdul Razaque, A. Kanapina, M. Sailaubek, D. Tsoy, Z. Turganov, Muder Almiani, Fathi Amsaad, and Mohammad Adnan Almahamed

Faculty Scholarship from 2018

Link

gExtractor: Towards automated extraction of malware deception parameters, Mohammed Noraden Alsaleh, Jinpeng Wei, Ehab Al-Shaer, and Mohiuddin Ahmed

Link

QoS dependency modeling for composite systems, Khayyam Hashmi, Zaki Malik, Abdelkarim Erradi, and Abdelmounaam Rezgui

Link

A survey of traffic sign recognition systems based on convolutional neural networks, Syed Hussain*, Munther Abualkibash, and Samit Tout

Link

"Think before you click. Post. Type." Lessons learned from our university cyber security awareness campaign, Rachel Innocenzi*, Kaylee Brown*, Peggy Liggit, Samir Tout, Andrea Tanner^, Theodore Coutilish^, and Rocky Jenkins^

Link

The theory of planned behavior and high school students’ interest in computer science, Hadeel Mohammed Jawad*, Munther Abualkibash, Samir Tout, and Yichun Xie

Link

The Code Genie programming environment, Hadeel Mohammed Jawad*, Deb de Laski-Smith, and Samir Tout

Link

Integrating art and animation in teaching computer programming for high school students experimental study, Hadeel Mohammed Jawad*, Samir Tout, Munther Abualkibash, and Yichun Xie

Link

Earthquake damage detection using before and after earthquake satellite images, Kasim A. Korkmaz and Munther Abualkibash

Link

Provably secure APK redevelopment authorization scheme in the standard model, Daofeng Li, Mingxing Luo, Bowen Zhao, and Xiangdong Che

Link

Emerging research in the security of modern and autonomous vehicles, Samir Tout, Munther Abualkibash, and Pooja Patil*

Link

Infrastructure challenges in an information assurance education: An implementation case, Liu Hua Yeo*, Munther Abulkibash, James Banfield, and Suleiman Ashur

Faculty Scholarship from 2017

Link

Effective integration of advanced mobile technology for course delivery in information technology programs, Bilquis Ferdousi

Link

Gender gaps in undergraduate computer technology programs: Develop a theoretical research framework, Bilquis Ferdousi