关注
Ala Mughaid
标题
引用次数
年份
Intelligent cybersecurity approach for data protection in cloud computing based internet of things
A Mughaid, I Obeidat, L Abualigah, S Alzubi, MS Daoud, H Migdady
International Journal of Information Security 23 (3), 2123-2137, 2024
22024
A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks
A Mughaid, A Alnajjar, SM El-Salhi, K Almakadmeh, S AlZu’bi
Cluster Computing, 1-17, 2024
2024
A novel secure cryptography model for data transmission based on Rotor64 technique
I Obeidat, A Mughaid, S AlZu’bi, A Al-Arjan, R Al-Amrat, R Al-Ajmi, ...
Multimedia Tools and Applications 83 (13), 37295-37314, 2024
2024
Big dermatological data service for precise and immediate diagnosis by utilizing pre-trained learning models
M Elbes, S AlZu’bi, T Kanan, A Mughaid, S Abushanab
Cluster Computing, 1-21, 2024
12024
An intelligent healthcare monitoring system-based novel deep learning approach for detecting covid-19 from x-rays images
S AlZu’bi, A Zreiqat, W Radi, A Mughaid, L Abualigah
Multimedia Tools and Applications, 1-18, 2024
22024
A review of Henry gas solubility optimization algorithm: a robust optimizer and applications
L Abualigah, G Al-Hilo, A Raza, AE Ezugwu, MR Al Nasar, A Mughaid, ...
Metaheuristic Optimization Algorithms, 177-192, 2024
2024
Salp swarm algorithm: survey, analysis, and new applications
L Abualigah, W Hawamdeh, RA Zitar, S AlZu’bi, A Mughaid, ...
Metaheuristic Optimization Algorithms, 241-258, 2024
2024
Crow search algorithm: a survey of novel optimizer and its recent applications
L Abualigah, S Faweer, A Raza, F Gul, AE Ezugwu, M Alshinwan, ...
Metaheuristic Optimization Algorithms, 167-176, 2024
2024
Exploring the capabilities and limitations of chatgpt and alternative big language models
S AlZu'bi, A Mughaid, F Quiam, S Hendawi
Artificial Intelligence and Applications 2 (1), 28-37, 2024
262024
Elevating Employment Practices in Agricultural Corporations with Large Language Models and AI
SA Abu-Shanab, A Mughaid, S AlZu'bi
2023 Tenth International Conference on Social Networks Analysis, Management …, 2023
2023
Simulated Model for Preventing IoT Fake Clients over the Smart Cities Environment
M Aljamal, A Mughaid, R Alquran, M Almiani, S AlZu'bi
2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023
2023
Investigating the cyberbullying risk in digital media: protecting victims in school teenagers
I Obaidat, A Al-zou’bi, A Mughaid, L Abualigah
Social Network Analysis and Mining 13 (1), 139, 2023
42023
Enhancing cybersecurity in scada iot systems: A novel machine learning-based approach for man-in-the-middle attack detection
A Mughaid, M AlJamal, ALA Issa, M AlJamal, R Alquran, S AlZu'bi, ...
2023 3rd Intelligent Cybersecurity Conference (ICSC), 74-79, 2023
12023
Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks.
AH Aljammal, A Qawasmeh, A Mughaid, S Taamneh, FI Wedyan, ...
International Journal of Interactive Mobile Technologies 17 (19), 2023
12023
Securing the Digital Fortress: Unveiling the Modern Battleground for Sustainable OSs and the Digital Threatscape
S AlZu'bi, S Hendawi, I Altalahin, M Almiani, A Mughaid
2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC …, 2023
2023
Botnet Detection Using Label Propagation and Batch K-means Clustering for Securing IoT Networks
M Almiani, A AbuGhazleh, A Mughaid, Y Jararweh
2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC …, 2023
2023
Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning
A Mughaid, I Obeidat, A Shdaifat, R Alhayjna, S AlZu'bi
2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC …, 2023
2023
Unleashing the full potential of artificial intelligence and machine learning in cybersecurity vulnerability management
M Elbes, S Hendawi, S AlZu'bi, T Kanan, A Mughaid
2023 International Conference on Information Technology (ICIT), 276-283, 2023
32023
Unmasking the Truth: A Deep Learning Approach to Detecting Deepfake Audio Through MFCC Features
I Altalahin, S AlZu'bi, A Alqudah, A Mughaid
2023 International Conference on Information Technology (ICIT), 511-518, 2023
32023
A novel machine learning cyber approach for detecting wannalocker ransomware attack on android devices
M AlJamal, R Alquran, ALA Issa, A Mughaid, S AlZu'bi, AA Abutabanjeh
2023 International Conference on Information Technology (ICIT), 135-142, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–20