![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://fanyv88.com/img/search.dark.16x16.png)
default search action
Mohammad Alauthman
Refine list
![note](https://dblp.dagstuhl.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on 50 of 50 records
view refined list in
export refined list as
refine by search term
![clear](https://fanyv88.com/img/clear-mark.medium.16x16.png)
![filter active filter active](https://fanyv88.com/img/filter-mark.12x12.png)
refine by type
- |
- no options
- temporarily not available
refine by coauthor
- no options
- temporarily not available
refine by orcid
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
2020 – today
- 2025
- [j28]Mohammad Arafah, Iain Phillips, Asma Adnane, Wael Hadi, Mohammad Alauthman, Abedal-Kareem Al-Banna:
Anomaly-based network intrusion detection using denoising autoencoder and Wasserstein GAN synthetic attacks. Appl. Soft Comput. 168: 112455 (2025) - 2024
- [j27]Rizwan Hamid Randhawa
, Nauman Aslam, Mohammad Alauthman
, Muhammad Khalid
, Husnain Rafiq
:
Deep reinforcement learning based Evasion Generative Adversarial Network for botnet detection. Future Gener. Comput. Syst. 150: 294-302 (2024) - [j26]Abdelraouf Ishtaiwi, Ali Mohd Ali
, Ahmad Al-Qerem, Yazan Alsmadi, Amjad Aldweesh, Mohammad Alauthman, Omar Alzubi, Shadi Nashwan, Awad Ramadan, Musab Al-Zghoul, Someah Alangari:
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models. Int. Arab J. Inf. Technol. 21(3): 466-482 (2024) - [j25]Iman Akour, Mohammad Alauthman, Khalid M. O. Nahar, Ammar Almomani, Brij B. Gupta:
Analyzing Darknet Traffic Through Machine Learning and Neucube Spiking Neural Networks. Intell. Converged Networks 5(4): 265-283 (2024) - [j24]Amjad Aldweesh, Sarangam Kodati
, Mohammad Alauthman
, Ibrahim Aqeel
, Ibrahim Mohsen Khormi, M. Dhasaratham, R. Lakshmana Kumar:
Mlora-CBF: efficient cluster-based routing protocol against resource allocation using modified location routing algorithm with cluster-based flooding. Wirel. Networks 30(2): 671-693 (2024) - [j23]Liyakathunisa Syed, P. Sathyaprakash, A. Shobanadevi, Ha Huy Cuong Nguyen, Mohammad Alauthman
, M. Vedaraj
, R. Premalatha:
Deep learning-based route reconfigurability for intelligent vehicle networks to improve power-constrained using energy-efficient geographic routing protocol. Wirel. Networks 30(2): 939-960 (2024) - [c16]Eman Kamal Al-Bwana, Ikbel Sayahi, Mohammad Alauthman, Mohamed Ali Mahjoub:
Adverserial network augmentation and tabular data for a new covid-19 diagnostics approach. CoDIT 2024: 2000-2005 - [c15]Mouhammd Alkasassbeh, Ammar Almomani, Amjad Aldweesh, Ahmad Al-Qerem, Mohammad Alauthman, Khalid M. O. Nahar, Beenu Mago:
Cyberbullying Detection Using Deep Learning: A Comparative Study. ICCR 2024: 1-6 - [c14]Qais Al-Na'amneh
, Ammar Almomani, Ahmad Nasayreh, Khalid M. O. Nahar, Hasan Gharaibeh, Rabia Emhamed Al Mamlook, Mohammad Alauthman:
Next Generation Image Watermarking via Combined DWT-SVD Technique. ICCR 2024: 1-10 - [c13]May Y. Al-Nashashibi, Mohammad Alauthman, Wael Hadi:
Machine Learning for Enhanced Autism Screening: A Comparative Evaluation of Classification Algorithms. ICCR 2024: 1-7 - [c12]Mohammad Alauthman, Ahmad Al-Qerem, Mouhammd Alkasassbeh, Nauman Aslam, Amjad Aldweesh:
Malware Threats Targeting Cryptocurrency: A Comparative Study. ICCR 2024: 1-8 - [c11]Mohammad Alauthman, Amjad Aldweesh, Ahmad Al-Qerem:
IoT Security Challenges in Modern Smart Cities. ICCR 2024: 1-6 - [c10]Mohammad Alauthman, Abdelraouf Ishtaiwi, Ali Al Maqousi, Wael Hadi:
A Framework for Cybersecurity in the Metaverse. ICCR 2024: 1-8 - [c9]Ali Mohd Ali
, Shadi Nashwan, Ahmad Al-Qerem, Amjad Aldweesh, Mohammad Alauthman, Zenab Elgamal, Ammar Almomani:
CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models. ICCR 2024: 1-5 - 2023
- [j22]Ahmad S. Tarawneh, Eman S. Alamri, Najah Noori Al-Saedi, Mohammad Alauthman
, Ahmad Basheer Hassanat
:
CTELC: A Constant-Time Ensemble Learning Classifier Based on KNN for Big Data. IEEE Access 11: 89791-89802 (2023) - [j21]Bilal Sowan
, Tzung-Pei Hong, Ahmad Al-Qerem, Mohammad Alauthman
, Nasim Matar
:
Ensembling validation indices to estimate the optimal number of clusters. Appl. Intell. 53(9): 9933-9957 (2023) - [j20]Ali Al Maqousi, Mohammad Alauthman
:
RoboGuard: enhancing robotic system security with ensemble learning. Int. Arab J. Inf. Technol. 20(6): 965-976 (2023) - [j19]Amjad Aldweesh
, Mohammad Alauthman
, Mohammad Al Khaldy
, Abdelraouf Ishtaiwi, Ahmad Al-Qerem, Ammar Almomani, Brij B. Gupta:
The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds. Int. J. Cloud Appl. Comput. 13(1): 1-24 (2023) - [j18]Ala Hamarsheh
, Ahmad Alqerem, Iman Akour
, Mohammad Alauthman
, Amjad Aldweesh
, Ali Mohd Ali
, Ammar Almomani, Someah Alangari
:
Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols. Int. J. Cloud Appl. Comput. 13(1): 1-26 (2023) - [j17]Mohammad Alauthman
, Ahmad Al-Qerem, Someah Alangari
, Ali Mohd Ali, Ahmad Nabot, Amjad Aldweesh, Issam Jebreen, Ammar Almomani, Brij B. Gupta:
Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments. Int. J. Softw. Sci. Comput. Intell. 15(1): 1-24 (2023) - [j16]Mohammad Al Khaldy
, Abdelraouf Ishtaiwi, Ahmad Al-Qerem, Amjad Aldweesh
, Mohammad Alauthman
, Ammar Almomani, Varsha Arya:
Redefining E-Commerce Experience: An Exploration of Augmented and Virtual Reality Technologies. Int. J. Semantic Web Inf. Syst. 19(1): 1-24 (2023) - [j15]Mohammad Alauthman
, Ahmad Al-Qerem
, Bilal Sowan
, Ayoub Alsarhan
, Mohammed Eshtay
, Amjad Aldweesh
, Nauman Aslam
:
Enhancing Small Medical Dataset Classification Performance Using GAN. Informatics 10(1): 28 (2023) - [j14]Ayoub Alsarhan
, Mohammad Alauthman
, Esra'a Alshdaifat, Abdel-Rahman Al-Ghuwairi, Ahmed Al-Dubai:
Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks. J. Ambient Intell. Humaniz. Comput. 14(5): 6113-6122 (2023) - [j13]Ahmad Al-Qerem, Ali Mohd Ali
, Shadi Nashwan
, Mohammad Alauthman
, Ala Hamarsheh
, Ahmad Nabot
, Issam Jebreen
:
Transactional Services for Concurrent Mobile Agents over Edge/Cloud Computing-Assisted Social Internet of Things. ACM J. Data Inf. Qual. 15(3): 36:1-36:20 (2023) - [j12]Rizwan Hamid Randhawa
, Nauman Aslam
, Mohammad Alauthman
, Husnain Rafiq
:
Evasion Generative Adversarial Network for Low Data Regimes. IEEE Trans. Artif. Intell. 4(5): 1076-1088 (2023) - [c8]Ahmad Al-Qerem
, Ali Mohd Ali
, Mohammad Alauthman
, Mohammad Al Khaldy
, Amjad Aldweesh
:
The effect of Data Augmentation Using SMOTE: Diabetes Prediction by Machine Learning Techniques. AICCC 2023: 13-20 - [c7]Bashar Igried
, Mohammad Alauthman
, Mohammad Al Khaldy
, Ayoub Alsarhan
:
Efficient Scanning Activity Detection in IoT Networks Using Ensemble Learning. AIMLR 2023: 3:1-3:8 - [c6]Ayoub Alsarhan
, Bashar Igried
, Raad Mohammad Bani Saleem
, Mohammad Alauthman
, Mohammad Aljaidi
:
Enhancing Phishing URL Detection: A Comparative Study of Machine Learning Algorithms. AIMLR 2023: 5:1-5:7 - 2022
- [j11]Ammar Almomani
, Mohammad Alauthman
, Mohd Taib Shatnawi, Mohammed Alweshah, Ayat Alrosan
, Waleed Alomoush, Brij B. Gupta
:
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study. Int. J. Semantic Web Inf. Syst. 18(1): 1-24 (2022) - [c5]Bashar Igried, Ayoub Alsarhan, Mohammad Alauthman, Ammar Almomani:
Machine learning Scheme for Managing Virtual Computing Resources in Cloud Market. ACIT 2022: 1-5 - [c4]Ashraf S. Mashaleh, Noor Farizah Binti Ibrahim, Mohammad Alauthman, Ammar Almomani:
A Proposed Framework for Early Detection IoT Botnet. ACIT 2022: 1-7 - [i4]Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Muhammad Khalid
, Husnain Rafiq:
Deep Reinforcement Learning based Evasion Generative Adversarial Network for Botnet Detection. CoRR abs/2210.02840 (2022) - 2021
- [j10]Rizwan Hamid Randhawa
, Nauman Aslam
, Mohammad Alauthman
, Husnain Rafiq
, Frank Comeau:
Security Hardening of Botnet Detectors Using Generative Adversarial Networks. IEEE Access 9: 78276-78292 (2021) - [j9]Kamal Alieyan, Ammar Almomani
, Mohammed Anbar
, Mohammad Alauthman
, Rosni Abdullah, Brij B. Gupta
:
DNS rule-based schema to botnet detection. Enterp. Inf. Syst. 15(4): 545-564 (2021) - [j8]Ammar Almomani
, Ahmad Al Nawasrah, Mohammad Alauthman
, Mohammed Azmi Al-Betar
, Farid Meziane:
Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm. Int. J. Ad Hoc Ubiquitous Comput. 36(1): 50-65 (2021) - [j7]Ayoub Alsarhan
, Abdel-Rahman Al-Ghuwairi, Islam T. Almalkawi, Mohammad Alauthman
, Ahmed Al-Dubai:
Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks. Wirel. Pers. Commun. 117(4): 3129-3152 (2021) - [c3]Israa Odeh, Mouhammd Alkasassbeh, Mohammad Alauthman
:
Diabetic Retinopathy Detection using Ensemble Machine Learning. ICIT 2021: 173-178 - [i3]Israa Odeh, Mouhammd Alkasassbeh, Mohammad Alauthman:
Diabetic Retinopathy Detection using Ensemble Machine Learning. CoRR abs/2106.12545 (2021) - [i2]Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Husnain Rafiq, Muhammad Khalid:
EVAGAN: Evasion Generative Adversarial Network for Low Data Regimes. CoRR abs/2109.08026 (2021) - 2020
- [j6]Ahmad Al Nawasrah, Ammar Ali Almomani
, Samer Atawneh
, Mohammad Alauthman
:
A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing. Int. J. Cloud Appl. Comput. 10(3): 17-53 (2020) - [j5]Mohammad Alauthman
, Nauman Aslam, Mouhammd Al-Kasassbeh
, Suleman Khan
, Ahmad Al-Qerem
, Kim-Kwang Raymond Choo
:
An efficient reinforcement learning-based Botnet detection approach. J. Netw. Comput. Appl. 150 (2020) - [j4]Ahmad Al-Qerem
, Mohammad Alauthman
, Ammar Almomani
, Brij B. Gupta
:
IoT transaction processing through cooperative concurrency control on fog-cloud computing environment. Soft Comput. 24(8): 5695-5711 (2020) - [c2]Bilal Sowan, Nasim Matar
, Firas Omar, Mohammad Alauthman
, Mohammed Eshtay
:
Evaluation of Class Decomposition based on Clustering Validity and K-means Algorithm. ACIT 2020: 1-6 - [p1]Mouhammd Al-Kasassbeh, Safaa Mohammed, Mohammad Alauthman
, Ammar Almomani
:
Feature Selection Using a Machine Learning to Classify a Malware. Handbook of Computer Networks and Cyber Security 2020: 889-904 - [i1]Ghassan Samara
, Ghadeer Al Besani, Mohammad Alauthman, Mohammad Al Khaldy:
Energy-Efficiency Routing algorithms in Wireless Sensor Networks: a Survey. CoRR abs/2002.07178 (2020) - no results
2010 – 2019
- 2019
- [j3]Ammar Almomani
, Mohammad Alauthman
, Mohammed Alweshah
, Osama M. Dorgham
, Firas AlBalas
:
A comparative study on spiking neural network encoding schema: implemented with cloud computing. Clust. Comput. 22(2): 419-433 (2019) - 2018
- [j2]Ammar Almomani
, Mohammad Alauthman
, Firas AlBalas, Osama M. Dorgham, Atef A. Obeidat:
An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms. Int. J. Cloud Appl. Comput. 8(2): 96-112 (2018) - [j1]Mohammad Alauthman
, Nauman Aslam, Li Zhang, Rafe Alasem, M. Alamgir Hossain:
A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks. Neural Comput. Appl. 29(11): 991-1004 (2018) - [c1]Kamal Alieyan
, Mohammed Anbar
, Ammar Almomani
, Rosni Abdullah, Mohammad Alauthman
:
Botnets Detecting Attack Based on DNS Features. ACIT 2018: 1-4 - 2016
- [b1]Mohammad Alauthman:
An efficient approach to online bot detection based on a reinforcement learning technique. Northumbria University, Newcastle upon Tyne, UK, 2016 - no results
Coauthor Index
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
![](https://fanyv88.com/img/new-feature-top-right.156x64.png)