Dr.
Mustafa
Al-Fayoumi
academic
Biography:
Mustafa A. Al-Fayoumi received a B.Sc. degree in Computer Science from Yarmouk University, Irbid, Jordan, in 1988. He earned a M.Sc. degree in Computer Science from the University of Jordan, Amman, Jordan, in 2003, and his Ph.D. in Computer Science from the Faculty of Science and Technology at Anglia University, UK in 2009. His research interests include areas like computer security, cryptography, identification and authentication, wireless and mobile networks security, e-application security, simulation and modeling, algorithm analyzes and design, information retrieval, data mining and other related topics.
Academic Rank:
Associate professor
Position:
Vice Dean for King Hussein School of Computing Sciences
Faculty:
King Hussein School of Computing Sciences
KHCS Departments:
Computer Science
Useful Link:
Phone:
+96265359949
Extension:
5302
Fax:
+96267295534
Email:
Publications:
Journal Papers
- Yousef A. Yaseen, Malik Qasaimeh, Raad S. Al-Qassas and Mustafa Al-Fayoumi, “Email Fraud Attack Detection Using Hybrid Machine Learning Approach”, Recent Patents on Computer Science, Vol. 12, No. 1, 2019. https://doi.org/10.2174/2213275912666190617162707.
- Mustafa Al-Fayoumi, Jaber Alwidian, Mohammad Abusaif, Murhaf Khaled, “Intelligent Association Classification Technique for Phishing Website Detection”, Accepted at International Arab Journal of Information Technology (IAJIT), Vol. 17, No. 4, 2020.
- Mustafa Al-Fayoumi, Ruba haj Hamad and Ja’afer Al Saraireh, “SSOAM: Automated Security Testing Framework for SOA Middleware in Banking Domain”, Journal of Computer Science, Vol. 14, No. 7, Page(s): 957-968, 2018.
- Mustafa Al-Fayoumi, Shadi Nashwan, “Performance Analysis of SAP-NFC Protocol”, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 10, No. 1, Page(s): 125-130, April 2018.
- Mustafa Al-Fayoumi, Malek Al-Zewairia, and Salam Hamdan, “A New Model of Multi-Key Generation for RFID Access Control System”, International Arab Journal of Information Technology (IAJIT), Vol. 15, No. 3A, Page(s): 585-591, June, 2018.
- Sattar Aboud, Mustafa Al-Fayoumi and Mohammad Al-Fayoumi, “Efficient E-Tickets Fare Scheme for Time-Typed Services”, Accepted in Journal Internet Banking & Commerce, Vol. 22, No. 1, April, 2017.
- Mustafa Al-Fayoumi, Yasir Ahmad, Usman Tariq, "A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks", International Journal of Advanced Computer Science and Applications Vol. 7, No. 12,· January 2016. doi: 10.14569/IJACSA.2016.071207.
- Mustafa Al-Fayoumi, “DS-AKA: Dynamic and Secure Authentication and Key Agreement Protocol for UMTS Networks”, International Journal of Scientific and Engineering Research (IJSER), Vol. 6, No. 2, Page(s): 1248-1257, February 2015.
- Usman Tariq, Abdullah Al Jumah, Mustafa Al-Fayoumi, “End-to-End Route Reliability in Pervasive Multi-Channel Multi-Radio (PMCMR) Scheme for MANETS”, Journal of Applied Sciences, Vol. 15, No. 4, Page(s): 703-708, 2015. doi: 10.3923/jas.2015.703.708.
- Mustafa Al-Fayoumi, Mohammed Alnababteh, Mohammad Daoud, Mohammad Alhawarat, “Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography”, International Journal of Science and Research (IJSR), Vol. 4, Issues 1, January 2015.
- Mustafa Al-Fayoumi, “Enhanced Associative classification based on incremental mining Algorithm (E-ACIM)”, International Journal of Computer Science Issues (IJCSI), Vol. 12, Issues 1, Page(s): 124-130, January 2015.
- Mustafa Al-Fayoumi, Sattar Aboud and Mohammad Al-Fayoumi, "Comments on the Secure Identity-Typed Bilinear Pairing Scheme", published in Jökull Journal, Vol. 64, No. 9, Page(s): 57- 61, Sept. 2014.
- M. Alnababteh, M. Al-Fayoumi, A. Aljumah and J. Ababneh, “Associative Classification Based On Incremental Mining (ACIM)”, International Journal of Computer Theory and Engineering (IJCTE), Vol. 6, No. 2, Page(s): 135-140, April 2014. doi: 10.7763/IJCTE. 2014.V6.851.
- Mustafa Al-Fayoumi, Nidal Shilbayeh, Clooning SIM Cards Usability Reduction in Mobile Networks”, Springer’s Journal of Network and Systems Management, Vol. 22, No.2: Page(s) 259-279, April 2014. doi: 10.1007/s10922-013-9299-8.
- Mohammad Daoud, Aladdin Ayesh, Mustafa Al-Fayoumi, Adrian Hopgood, “Location Prediction based on a Sector Snapshot for Location-Based Services”, Springer’s Journal of Network and Systems Management, Vol. 22, No.1, Page(s):23-49, January 2014. doi:10.1007/s10922-012-9258-9.
- Mustafa Al-Fayoumi, Ja’afer Al-Saraireh, “An Enhancement of Authentication Protocol and Key Agreement (AKA) for 3G Mobile Networks”, International Journal of Security (IJS), Vol. 5, Issue 1, 2011.
- Mustafa Al-Fayoumi, Sattar Aboud and Mohammad Al-Fayoumi, "A New Digital Signature Scheme Based on Integer Factoring and Discrete Logarithm Problem", International Journal of Computer and Their Application (IJCA), Vol. 17, No. 2: Page(s) 1-8, June 2010.
- Mohammad Al-Fayoumi, Sattar Aboud and Mustafa Al-Fayoumi, “Practical E-Payment Scheme”, International Journal of Computer Science Issues (IJCSI), Vol. 7, Issues 3, Pages: 18- 23, May 2010.
Conferences Papers
- Ruba haj Hamad and Mustafa Al-Fayoumi, “Scalable Quality and Testing Lab (SQTL): Mission-Critical Applications Testing", 2019 International Conference on Computer and Information Sciences (ICCIS), Saudi Arabia, 3-4 April 2019.
- Ruba haj Hamad and Mustafa Al-Fayoumi, “Modernisation of a Classical Data Centre (CDC) vs Adoption in Cloud Computing: Total Cost of Ownership Case Study”, accepted in the International Arab Conference on Information Technology (ACIT'2018), Lebanon, November 28-30, 2018.
- Ruba haj Hamad and Mustafa Al-Fayoumi,” SATP: Scalable Agile Transforming Process to transform Waterfall PMO into Agile PMO: Jordanian Case Study and Best Practices”, accepted in International Arab Conference on Information Technology (ACIT'2018), Lebanon, November 28-30, 2018.
- Sattar Aboud, Mustafa Al-Fayoumi, Mohammad Al-Fayoumi and Ja’afer Al Saraireh, “An Efficient E-Coin Scheme Under Elliptic Curve Cryptography”, Accepted in International Conference on New Trends in Computing Sciences (ICTCS 2017), 11-13 October, 2017, Amman Jordan.
- Mohammad Daoud, Adrian Hopgood, Mustafa Al-Fayoumi, Hani Mimi, “A New Routing Area Displacement Prediction for Location-Based Services based on an Enhanced Ant Colony, 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC2014), 5-8 October, 2014, San Diego, CA, USA, 2014.
- Mohammad Daoud, Aladddin Ayesh, Mustafa Al-Fayoumi, Adrian Hopgood, “An Enhancement Ant Colony Optimization for Routing Area Mobility Prediction over Cellular Communication Network”, 5th International Conference on Agent and Artificial Intelligence (ICAART 2013), Page(s) 392-397, 15-18 February, 2013, Barcelona, Spain, 2013.
- Mohammad Daoud, Aladddin Ayesh, Mustafa Al-Fayoumi, Adrian Hopgood, “A New Splitting-based Displacement Prediction Approach for Location-Based Services”, 2011 IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2011), Page(s) 392-397, October 9-12, 2011, Anchorage, AK, USA, 2011.
- Mustafa Al-Fayoumi, Shadi Nashwan and Sufian Yousef, “Transfer Hidden Secure Data through Insecure Link”, the Student University Conference, Chelmsford, Anglia Ruskin University, 18 April, 2007.
- Mohammad Al-Fayoumi, Sattar Aboud, Mustafa Al-Fayoumi and Daniyal Alghazzawi, "Efficient E-Payment Protocol Using Hash Chain", European, Mediterranean & Middle Eastern Conference on Information Systems 2010 (EMICIS2010) April 12-13, 2010, Abu Dhabi, UAE.
- Sattar Aboud, Al-Mohammad Fayoumi, Mustafa Al-Fayoumi and Haidar Jabbar, "An Efficient RSA Public Key Encryption Scheme", Fifth IEEE International Conference on Information Technology: New Generations (ITNG 2008), 7-9 April 2008, Las Vegas, Nevada, USA. , Pages: 127 – 130.
- Shadi Nashwan, Mustafa Al-Fayoumi and Sufian Yousef, “An Efficient Authentication Protocol for UMTS Mobile Network”, the Student University Conference, Chelmsford, Anglia Ruskin University, 18 April, 2007.
- Mustafa Al-Fayoumi, Shadi Nashwan and Sufian Yousef and Abdel-Rahman Alzoubaidi, “A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks”, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), pp.29, New York, USA, 2007.
- Mustafa Al-Fayoumi, Shadi Nashwan and Sufian Yousef, “Exploiting Public Key Cryptography against Third-Party Attacks in GSM, GPRS, UMTS and 4G Wireless”, 2005 Fourth Generation Mobile Forum Conference (4GMF’2005) in San Diego, California, July 7-8, 2005.