Mouhammd Alkasassbeh
Princess Sumaya University for Technology
H-index: 27
Asia-Jordan
Top articles of Mouhammd Alkasassbeh
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Spark-based Multi-Verse Optimizer as Wrapper Features Selection Algorithm for Phishing Attack Challenge | Cluster Computing | Mohammad Almseidin Jamil Al-Sawwa Mouhammd Alkasassbeh Khalid Alemerien Remah Younisse | 2024/12/2 |
Comparative Analysis of Fuzzy Rule Interpolation Techniques Across Various Scenarios Using a set of Benchmarks | IEEE Access | Maen Alzubi Mohammad Almseidin Mouhammd Alkasassbeh Jamil Al-Sawwa Amjad Aldweesh | 2024/2/29 |
EI-FRI: Extended Incircle Fuzzy Rule Interpolation for Multidimensional Rule Antecedents, Multiple Fuzzy Rules, and Extrapolation | Journal of Robotics and Control (JRC) | Maen Alzubi Mohammad Almseidin Szilveszter Kovacs Jamil Al-Sawwa Mouhammd Alkasassbeh | 2024/1/25 |
DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation | Journal of Network and Systems Management | Mohammad Almseidin Jamil Al-Sawwa Mouhammd Alkasassbeh Maen Alzubi Khaled Alrfou | 2024/1 |
Machine Learning Techniques for Accurately Detecting the DNS Tunneling | Mouhammd Alkasassbeh Mohammad Almseidin | 2023/6/23 | |
An Early Detection Model for Kerberoasting Attacks and Dataset Labeling | Jordanian Journal of Computers and Information Technology | Remah Younisse Mouhammd Alkasassbeh Mohammad Almseidin Hamza Abdi | 2023/3 |
Towards Generating a Practical SUNBURST Attack Dataset for Network Attack Detection | Computer Systems Science & Engineering | Ehab AlMasri Mouhammd Alkasassbeh Amjad Aldweesh | 2023/11/1 |
On Detecting Distributed Denial of Service Attacks Using Fuzzy Inference System | Cluster Computing | Mohammad Almseidin Jamil Al-Sawwa Mouhammd Alkasassbeh Mohammed Alweshah | 2023 |
A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks | Arabian Journal for Science and Engineering | Yasmeen Alslman Mouhammd Alkasassbeh Mohammad Almseidin | 2024/3 |
SRP-Blockchain: A Framework for Scientific Research Profile on the Blockchain | Amjad Aldweesh Huda Alatwi Mohammad Alauthman Mouhammd Alkasassbeh | 2022/11/23 | |
An Accurate Detection Approach for IoT Botnet Attacks Using Interpolation Reasoning Method | Information | Mohammad Almseidin Mouhammd Alkasassbeh | 2022/6 |
Unknown Attack Detection Based on Multistage One-Class SVM | Ashaar Alkhamaiseh Mouhammd Alkasassbeh Jaafer Al-Saraireh | 2022/11 | |
An efficient enhanced k-means clustering algorithm for best offer prediction in telecom | International Journal of Electrical and Computer Engineering | Malak Fraihat Salam Fraihat Mohammed Awad Mouhammd AlKasassbeh | 2022/6/1 |
Intrusion Detection Systems: A State-of-the-Art Taxonomy and Survey | Mouhammd Alkasassbeh Sherenaz Al-Haj Baddar | 2023/8 | |
Generating a benchmark cyber multi-step attacks dataset for intrusion detection | Journal of Intelligent & Fuzzy Systems | Mohammad Almseidin Jamil Al-Sawwa Mouhammd Alkasassbeh | 2022/4/22 |
Android Spyware Detection Using Machine Learning: A Novel Dataset | Sensors | Majdi K. Qabalin Muawya Naser Mouhammd Alkasassbeh | 2022/8/2 |
Diabetic Retinopathy Detection Method Using Artificial Neural Network | Int. J. of Bioinformatics Research and Applications | Israa Odeh Mouhammd Alkasassbeh Mohammad Almseidin | 2022/4 |
Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation | Cryptography | Mohammad Almseidin Mouhammad Alkasassbeh Maen Alzubi Jamil Al-Sawwa | 2022/5/7 |
A proposed Darknet Traffic Classification System Based on Max Voting algorithms | Ammar Almomani Mohammad Alauthman Mouhammad Alkasassbeh Ghassan Samara Ryan Wen Liu | 2021/9/9 | |
A Survey: Soft Computing for Anomaly Detection to Mitigate IoT Abuse | Rama Al Attar Mouhammd Alkasassbeh Mu'Awya Al-Dala'Ien | 2022/6 |