Mohammad Alauthman
YOU?
Author Swipe
View article: Enhancing Privacy and Usability in Blockchain Traceability Systems
Enhancing Privacy and Usability in Blockchain Traceability Systems Open
View article: Unified Transformer Framework for Automated Cyberbullying Detection
Unified Transformer Framework for Automated Cyberbullying Detection Open
Cyberbullying is a fast-growing public-health hazard, demanding reliable, real-time detection of abusive language online. This study presents a unified transformer framework that compares bidirectional encoder representations from transfor…
View article: Comprehensive Evaluation of XBNet for Multi-Class IoT Attack Detection
Comprehensive Evaluation of XBNet for Multi-Class IoT Attack Detection Open
IoT environments face growing security threats due to their heterogeneity, resource limits, and scale. This paper evaluates an IoT-optimized Xtremely Boosted Network (XBNet) for multi-class attack detection, incorporating protocol-aware no…
View article: Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol
Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol Open
View article: Remote Labs in Cybersecurity Education
Remote Labs in Cybersecurity Education Open
Remote cybersecurity laboratories (remote labs) have become increasingly central to academic and professional training in cybersecurity, offering hands-on experiences and reducing the infrastructure requirements for institutions. This pape…
View article: Federated Learning in Distributed Cyber Defense
Federated Learning in Distributed Cyber Defense Open
This chapter investigates how Federated Learning (FL) can reshape cyber defense by enabling collaborative model training without consolidating sensitive data, thus safeguarding privacy while enhancing detection and mitigation capabilities.…
View article: Information Theory-Based DDoS Attack Detection in Cloud Computing
Information Theory-Based DDoS Attack Detection in Cloud Computing Open
Distributed denial of service (DDoS) attacks have emerged as a critical challenge for cloud computing, impacting service availability and raising concerns among providers. Despite cloud computing's scalable and flexible architecture, its v…
View article: HECOCP: Hybrid Edge-Cloud Optimistic Concurrency Protocol for Sensor Data Transactional Services
HECOCP: Hybrid Edge-Cloud Optimistic Concurrency Protocol for Sensor Data Transactional Services Open
This paper proposes the Hybrid Edge-Cloud Optimistic Concurrency Protocol (HECOCP), a novel approach for efficiently managing distributed transactions on sensor data across both edge and cloud environments. By maintaining ACID properties a…
View article: Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes
Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes Open
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection methods, utilizing a heart …
View article: Priority-Based Scheduling and Orchestration in Edge-Cloud Computing: A Deep Reinforcement Learning-Enhanced Concurrency Control Approach
Priority-Based Scheduling and Orchestration in Edge-Cloud Computing: A Deep Reinforcement Learning-Enhanced Concurrency Control Approach Open
View article: Enhancing Organizational Performance: Synergy of Cyber-Physical Systems, Cloud Services, and Crowdsensing
Enhancing Organizational Performance: Synergy of Cyber-Physical Systems, Cloud Services, and Crowdsensing Open
In the contemporary business landscape, software has evolved into a strategic asset crucial for organizations seeking sustainable competitive advantage. The imperative of ensuring software quality becomes evident as low-quality software sy…
View article: TGAN and CTGAN: A Comparative Analysis for Augmenting COVID 19 Tabular Data
TGAN and CTGAN: A Comparative Analysis for Augmenting COVID 19 Tabular Data Open
View article: Analyzing Darknet Traffic Through Machine Learning and Neucube Spiking Neural Networks
Analyzing Darknet Traffic Through Machine Learning and Neucube Spiking Neural Networks Open
The rapidly evolving darknet enables a wide range of cybercrimes through anonymous and untraceable communication channels. Effective detection of clandestine darknet traffic is therefore critical yet immensely challenging. This research de…
View article: A classification model for predicting course outcomes using ensemble methods
A classification model for predicting course outcomes using ensemble methods Open
Educational data mining has sparked a lot of attention in latest years. Many machine learning methods have been suggested to discover hidden information from educational data. The extracted knowledge assists institutions in enhancing the e…
View article: A stacked ensemble approach to identify internet of things network attacks through traffic analysis
A stacked ensemble approach to identify internet of things network attacks through traffic analysis Open
The internet of things (IoT) has increased exponentially in connected devices worldwide in recent years. However, this rapid growth also introduces significant security challenges since many IoT devices have vulnerabilities that can be exp…
View article: Forecasting research influence: a recurrent neural network approach to citation prediction
Forecasting research influence: a recurrent neural network approach to citation prediction Open
As the volume of scientific publications continues to proliferate, effective evaluation tools to determine the impact and quality of research articles are increasingly necessary. Citations serve as a widely utilized metric for gauging scie…
View article: Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting
Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting Open
Machine learning has become ubiquitous across industries for its ability to uncover in- sights from data. This research explores the application of machine learning for identifying phishing websites. The efficiency of different algorithms …
View article: A general framework for metaverse based on parallel computing and HPC
A general framework for metaverse based on parallel computing and HPC Open
As virtual and actual universes merge inside the creating metaverse, requests have pointedly ascended for continuous, intuitive, and intense encounters. The ability of the metaverse to effectively analyze and render complicated links and i…
View article: Evaluation of machine learning and deep learning methods for early detection of internet of things botnets
Evaluation of machine learning and deep learning methods for early detection of internet of things botnets Open
The internet of things (IoT) represents a rapidly expanding sector within computing, facilitating the interconnection of myriad smart devices autonomously. However, the complex interplay of IoT systems and their interdisciplinary nature ha…
View article: Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models Open
Brain tumors are widely recognized as one of the world's worst and most disabling diseases. Every year, thousands of people die as a result of brain tumors caused by the rapid growth of tumor cells. As a result, saving the lives of tens of…
View article: IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO
IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO Open
Increasing Internet of Things (IoT) device connectivity makes botnet attacks more dangerous, carrying catastrophic hazards.As IoT botnets evolve, their dynamic and multifaceted nature hampers conventional detection methods.This paper propo…
View article: Image cyberbullying detection and recognition using transfer deep machine learning
Image cyberbullying detection and recognition using transfer deep machine learning Open
Cyberbullying detection on social media platforms is increasingly important, necessitating robust computational methods. Current approaches, while promising, have not fully leveraged the combined strengths of deep learning and traditional …
View article: Redefining E-Commerce Experience
Redefining E-Commerce Experience Open
Integrating virtual reality (VR) and augmented reality (AR) technology into online stores enables more immersive and engaging shopping experiences, which is crucial for businesses to succeed in today's competitive e-commerce market. These …
View article: Botnet Detection Techniques: A Comparative Study
Botnet Detection Techniques: A Comparative Study Open
Botnets pose a grave cybersecurity threat, enabling widescale malicious activities through networks of compromised devices. Detecting botnets is challenging given their frequent use of evasion techniques like encryption. Traditional signat…
View article: Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols
Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols Open
The impending exhaustion of internet protocol (IP) version four (IPv4) addresses necessitates a transition to the more expansive IP version six (IPv6) protocol. However, this shift faces challenges due to the widespread legacy of IPv4 infr…
View article: Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments
Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments Open
Cost estimation for software development is crucial for project planning and management. Several regression models have been developed to predict software development costs, using historical datasets of previous projects. Accurate cost est…
View article: The Meta-Fusion
The Meta-Fusion Open
Blockchain technology and the metaverse are revolutionizing digital experiences by merging secure, cryptographic systems with shared virtual spaces. These advancements have immense potential across various sectors, including social interac…
View article: Deep reinforcement learning based Evasion Generative Adversarial Network for botnet detection
Deep reinforcement learning based Evasion Generative Adversarial Network for botnet detection Open
View article: Development of a Secure Model for Mobile Government Applications in Jordan
Development of a Secure Model for Mobile Government Applications in Jordan Open
This paper develops a secure model for mobile government (M-G) applications using effective privacy methods and validates the model through semi-structured interviews with eight Jordanian e-government experts. The experts emphasized the im…
View article: Explainable Machine Learning Approach for Hepatitis C Diagnosis Using SFS Feature Selection
Explainable Machine Learning Approach for Hepatitis C Diagnosis Using SFS Feature Selection Open
Hepatitis C is a significant public health concern, resulting in substantial morbidity and mortality worldwide. Early diagnosis and effective treatment are essential to prevent the disease’s progression to chronic liver disease. Machine le…