Follow
Mohammad Alauthman
Mohammad Alauthman
University of Petra, Faculty of Information Technology
Verified email at uop.edu.jo - Homepage
Title
Cited by
Cited by
Year
IoT transaction processing through cooperative concurrency control on fog–cloud computing environment
A Al-Qerem, M Alauthman, A Almomani, BB Gupta
Soft Computing, 1-17, 2019
2432019
An efficient reinforcement learning-based Botnet detection approach
M Alauthman, N Aslam, M Al-Kasassbeh, S Khan, A Al-Qerem, KKR Choo
Journal of Network and Computer Applications 150, 102479, 2020
1282020
A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks
M Alauthaman, N Aslam, L Zhang, R Alasem, MA Hossain
Neural Computing and Applications 29 (11), 991-1004, 2018
1262018
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study
A Almomani, M Alauthman, MT Shatnawi, M Alweshah, A Alrosan, ...
International Journal on Semantic Web and Information Systems (IJSWIS) 18 (1 …, 2022
1172022
DNS rule-based schema to botnet detection
K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta
Enterprise Information Systems 15 (4), 545-564, 2021
1132021
Feature selection using a machine learning to classify a malware
M Al-Kasassbeh, S Mohammed, M Alauthman, A Almomani
Handbook of Computer Networks and Cyber Security: Principles and Paradigms …, 2020
492020
Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks
A Alsarhan, M Alauthman, E Alshdaifat, AR Al-Ghuwairi, A Al-Dubai
Journal of Ambient Intelligence and Humanized Computing 14 (5), 6113-6122, 2023
472023
An online intrusion detection system to cloud computing based on NeuCube algorithms
A Almomani, M Alauthman, F Albalas, O Dorgham, A Obeidat
International Journal of Cloud Applications and Computing (IJCAC) 8 (2), 2018
422018
Machine learning for phishing detection and mitigation
M Alauthman, A Almomani, M Alweshah, W Alomoush, K Alieyan
Machine Learning for Computer and Cyber Security: Principle, Algorithms, and …, 2019
27*2019
Botnet Spam E-Mail Detection Using Deep Recurrent Neural Network
M ALAUTHMAN
International Journal of Emerging Trends in Engineering Research 8 (5), 2020
262020
Machine learning-driven optimization for intrusion detection in smart vehicular networks
A Alsarhan, AR Al-Ghuwairi, IT Almalkawi, M Alauthman, A Al-Dubai
Wireless Personal Communications 117, 3129-3152, 2021
252021
A survey of fast flux botnet detection with fast flux cloud computing
A Al-Nawasrah, AA Almomani, S Atawneh, M Alauthman
International Journal of Cloud Applications and Computing (IJCAC) 10 (3), 17-53, 2020
252020
Diabetic retinopathy detection using ensemble machine learning
I Odeh, M Alkasassbeh, M Alauthman
2021 International conference on information technology (ICIT), 173-178, 2021
242021
Botnet and Internet of Things (IoTs): A definition, taxonomy, challenges, and future directions
K Alieyan, A Almomani, R Abdullah, B Almutairi, M Alauthman
Research Anthology on Combating Denial-of-Service Attacks, 138-150, 2021
242021
Energy-efficiency routing algorithms in wireless sensor networks: A survey
G Samara, GA Besani, M Alauthman, MA Khaldy
arXiv preprint arXiv:2002.07178, 2020
212020
A comparative study on spiking neural network encoding schema: implemented with cloud computing
A Almomani, M Alauthman, M Alweshah, O Dorgham, F Albalas
Cluster Computing, 1-15, 2019
212019
Fast flux botnet detection framework using adaptive dynamic evolving
A AlNawasrah, A AlMomani, F Meziane, M Alauthman
Computer Networks 57 (2), 501-513, 2018
21*2018
Early Wildfire Smoke Detection Using Different YOLO Models
Y Al-Smadi, M Alauthman, A Al-Qerem, A Aldweesh, R Quaddoura, ...
Machines 11 (2), 246, 2023
202023
Security hardening of botnet detectors using generative adversarial networks
RH Randhawa, N Aslam, M Alauthman, H Rafiq, F Comeau
IEEE Access 9, 78276-78292, 2021
202021
Botnets detecting attack based on DNS features
K Alieyan, M Anbar, A Almomani, R Abdullah, M Alauthman
2018 International Arab conference on information technology (ACIT), 1-4, 2018
192018
The system can't perform the operation now. Try again later.
Articles 1–20