Intelligent cybersecurity approach for data protection in cloud computing based internet of things A Mughaid, I Obeidat, L Abualigah, S Alzubi, MS Daoud, H Migdady International Journal of Information Security 23 (3), 2123-2137, 2024 | 2 | 2024 |
A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks A Mughaid, A Alnajjar, SM El-Salhi, K Almakadmeh, S AlZu’bi Cluster Computing, 1-17, 2024 | | 2024 |
A novel secure cryptography model for data transmission based on Rotor64 technique I Obeidat, A Mughaid, S AlZu’bi, A Al-Arjan, R Al-Amrat, R Al-Ajmi, ... Multimedia Tools and Applications 83 (13), 37295-37314, 2024 | | 2024 |
Big dermatological data service for precise and immediate diagnosis by utilizing pre-trained learning models M Elbes, S AlZu’bi, T Kanan, A Mughaid, S Abushanab Cluster Computing, 1-21, 2024 | 1 | 2024 |
An intelligent healthcare monitoring system-based novel deep learning approach for detecting covid-19 from x-rays images S AlZu’bi, A Zreiqat, W Radi, A Mughaid, L Abualigah Multimedia Tools and Applications, 1-18, 2024 | 2 | 2024 |
A review of Henry gas solubility optimization algorithm: a robust optimizer and applications L Abualigah, G Al-Hilo, A Raza, AE Ezugwu, MR Al Nasar, A Mughaid, ... Metaheuristic Optimization Algorithms, 177-192, 2024 | | 2024 |
Salp swarm algorithm: survey, analysis, and new applications L Abualigah, W Hawamdeh, RA Zitar, S AlZu’bi, A Mughaid, ... Metaheuristic Optimization Algorithms, 241-258, 2024 | | 2024 |
Crow search algorithm: a survey of novel optimizer and its recent applications L Abualigah, S Faweer, A Raza, F Gul, AE Ezugwu, M Alshinwan, ... Metaheuristic Optimization Algorithms, 167-176, 2024 | | 2024 |
Exploring the capabilities and limitations of chatgpt and alternative big language models S AlZu'bi, A Mughaid, F Quiam, S Hendawi Artificial Intelligence and Applications 2 (1), 28-37, 2024 | 26 | 2024 |
Elevating Employment Practices in Agricultural Corporations with Large Language Models and AI SA Abu-Shanab, A Mughaid, S AlZu'bi 2023 Tenth International Conference on Social Networks Analysis, Management …, 2023 | | 2023 |
Simulated Model for Preventing IoT Fake Clients over the Smart Cities Environment M Aljamal, A Mughaid, R Alquran, M Almiani, S AlZu'bi 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023 | | 2023 |
Investigating the cyberbullying risk in digital media: protecting victims in school teenagers I Obaidat, A Al-zou’bi, A Mughaid, L Abualigah Social Network Analysis and Mining 13 (1), 139, 2023 | 4 | 2023 |
Enhancing cybersecurity in scada iot systems: A novel machine learning-based approach for man-in-the-middle attack detection A Mughaid, M AlJamal, ALA Issa, M AlJamal, R Alquran, S AlZu'bi, ... 2023 3rd Intelligent Cybersecurity Conference (ICSC), 74-79, 2023 | 1 | 2023 |
Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks. AH Aljammal, A Qawasmeh, A Mughaid, S Taamneh, FI Wedyan, ... International Journal of Interactive Mobile Technologies 17 (19), 2023 | 1 | 2023 |
Securing the Digital Fortress: Unveiling the Modern Battleground for Sustainable OSs and the Digital Threatscape S AlZu'bi, S Hendawi, I Altalahin, M Almiani, A Mughaid 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC …, 2023 | | 2023 |
Botnet Detection Using Label Propagation and Batch K-means Clustering for Securing IoT Networks M Almiani, A AbuGhazleh, A Mughaid, Y Jararweh 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC …, 2023 | | 2023 |
Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning A Mughaid, I Obeidat, A Shdaifat, R Alhayjna, S AlZu'bi 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC …, 2023 | | 2023 |
Unleashing the full potential of artificial intelligence and machine learning in cybersecurity vulnerability management M Elbes, S Hendawi, S AlZu'bi, T Kanan, A Mughaid 2023 International Conference on Information Technology (ICIT), 276-283, 2023 | 3 | 2023 |
Unmasking the Truth: A Deep Learning Approach to Detecting Deepfake Audio Through MFCC Features I Altalahin, S AlZu'bi, A Alqudah, A Mughaid 2023 International Conference on Information Technology (ICIT), 511-518, 2023 | 3 | 2023 |
A novel machine learning cyber approach for detecting wannalocker ransomware attack on android devices M AlJamal, R Alquran, ALA Issa, A Mughaid, S AlZu'bi, AA Abutabanjeh 2023 International Conference on Information Technology (ICIT), 135-142, 2023 | 2 | 2023 |