MK Qabalin, M Naser, Mouhammd Alkasassbeh.
Android Spyware Detection Using Machine Learning: A Novel Dataset. Sensors 22 (15)
M Almseidin, J Al-Sawwa, Mouhammd Alkasassbeh, M Alweshah.
On Detecting Distributed Denial of Service Attacks Using Fuzzy Inference System. Cluster Computing
RA Attar Mouhammd Alkasassbeh, MA Al-Dala'Ien.
A Survey: Soft Computing for Anomaly Detection to Mitigate IoT Abuse. The 8th International Conference on Engineering & MIS 2022
M Almseidin, Mouhammd Alkasassbeh, M Alzubi, J Al-Sawwa.
Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation.cryptography 6 (2), 24
M Almseidin, Mouhammd Alkasassbeh.
An Accurate Detection Approach for IoT Botnet Attacks Using Interpolation Reasoning Method. Information 13 (6), 300
M Fraihat, S Fraihat, M Awad, Mouhammd Alkasassbeh.
An efficient enhanced k-means clustering algorithm for best offer prediction in telecom.International Journal of Electrical and Computer Engineering 12 (3), 2931
M Almseidin, J Al-Sawwa, Mouhammd Alkasassbeh.
Generating a benchmark cyber multi-step attacks dataset for intrusion detection. Journal of Intelligent & Fuzzy Systems, 1-15, 2022
I Odeh, Mouhammd Alkasassbeh, M Almseidin.
Diabetic Retinopathy Detection Method Using Artificial Neural Network. Int. J. of Bioinformatics Research and Applications
M Almseidin, J Al-Sawwa, Mouhammd Alkasassbeh, M Alweshah.
On Detecting Distributed Denial of Service Attacks Using Fuzzy Inference System. Cluster Computing
M Almseidin, J Al-Sawwa, Mouhammd Alkasassbeh.
Anomaly-based Intrusion Detection System Using Fuzzy Logic. 2021 International Conference on Information Technology (ICIT) .6/2021.
I Odeh, Mouhammd Alkasassbeh, M Alauthman,
Diabetic Retinopathy Detection using Ensemble Machine Learning. 2021 International Conference on Information Technology (ICIT) .6/2021.
G Al-Naymat, H Hussain, Mouhammd Alkasassbeh, N Al-Dmour,
Accurate detection of network anomalies within SNMP-MIB data set using deep learning.Int. J. Computer Applications in Technology 66 (1), 74-85..2021.
Z Alothman, Mouhammd Alkasassbeh, SAH Baddar.
An Efficient Approach to Detect IoT Botnet Attacks Using Machine Learning. Journal of High Speed Networks 26 (3), 241–254.12/2020.
M Alkasassbeh, MA Abbadi, AM Al-Bustanji. LightGBM Algorithm for Malware Detection.
Advances in Intelligent Systems and Computing 1230, 391-403.6/2020.
Almaha Abuzuraiq, Mouhammd Alkasassbeh, Mohammad Almseidin.
Intelligent Methods for Accurately Detecting Phishing Websites
The 11th International Conference on Information & Communication Systems.4/2020.
Mohammad A. Abbadi, Ahmed M. Al-Bustanji, Mouhammd Alkasassbeh
Robust Intelligent Malware Detection using LightGBM Algorithm
International Journal of Innovative Technology and Exploring Engineering (IJITEE).4/2020.
Mouhammd Alkasassbeh, Mohammad Almseidin, Khaled Alrfou, Szilveszter Kovacs
Detection of IoT-Botnet Attacks Using Fuzzy Rule Interpolation
Journal of Intelligent & Fuzzy Systems.3/2020.
Mouhammd Alkasassbeh, Mohannad Zead Khairallah
Network Attack Detection With SNMP-MIB Using Deep Neural Network
Handbook of Research on Intrusion Detection Systems, 66-76,2020.
Mouhammd Alkasassbeh, Safaa Mohammed, Mohammad Alauthman, Ammar Almomani
“Feature Selection Using a Machine Learning to Classify a Malware”.
Handbook of Computer Networks and Cyber Security, 889-904, 2020.
Alauthman, Mohammad, Nauman Aslam, Mouhammd Alkasassbeh, Suleman Khan, and Kim-Kwang Raymond Choo. "An efficient reinforcement learning-based Botnet detection approach." Journal of Network and Computer Applications 150(15), January 2020.
Mouhammd Alkasassbeh, Tariq Khairallah. “Winning tactics with DNS tunnelling”, Network security (12), 12-19, December 2019.
Mohammed Almseidin, AlMaha Abu Zuraiq, Mouhammd Alkasassbeh, Nidal Alnidami,” Phishing Detection Based on Machine Learning and Feature Selection Method “, International Journal of Interactive Mobile Technologies (iJIM) 13 (12), December 2019.
Mouhammd Alkasassbeh, Safaa mohammed, Mohammad Alauthman, Ammar Almomani," Feature Selection using a Machine Learning to Classify a Malware", Computer Networks and Cyber Security: Principles and Paradigms, Springer Nature, November, 2019.
Yousef Khaled Shaheen, Mouhammd Alkasassbeh,” A Proactive Design to Detect Denial of Service Attacks Using SNMP-MIB ICMP Variable”, The 2nd International Conference on New Trends in Computing Sciences, 62-67, November, 2019.
Abdelrahman Manna, Mouhammd Alkasassbeh,” Detecting network anomalies using machine learning and SNMP-MIB dataset with IP group” , The 2nd International Conference on New Trends in Computing Sciences, 51-55, November, 2019.
Mohammad Almseidin, Mouhammd Alkasassbeh, Szilveszter Kovacs,” Detecting Slow Port Scan Using Fuzzy Rule Interpolation”, The 2nd International Conference on New Trends in Computing Sciences, 33-38, November, 2019.
AlMaha Abu Zuraiq, Mouhammd Alkasassbeh,” Review: Phishing Detection Approaches”, The 2nd International Conference on New Trends in Computing Sciences, 27-32, November, 2019.
Mohammed Al-Refai, Yousef Alrabanah, Mohammed Alauthman, Ammar Almomani, Mouhammd Alkasassbeh, mohammed Alweshah, "A Novel Leader Election Algorithm For Honeycomb Mesh Networks".Journal of Theoretical and Applied Information Technology 97 (14), July 2019.
Mohammad A. Abbadi, Mouhammd Alkasassbeh, Ameen Al Saudi, "A General Structure for Improving the Lifetime and Stability Period of Wireless Sensor Networks". IJCSNS International Journal of Computer Science and Network Security. 19 (5), May 2019.
Mohammad Almseidin, Imre Piller, Mouhammd Alkasassbeh, Szilveszter Kovacs. "Fuzzy Automaton as a Detection Mechanism for the Multi-Step Attack". International Journal on Advanced Science, Engineering and Information Technology. 9(2), March 2019.
Nabhan Hamadneh, Mouhammd Alkasassbeh, Ibrahim Obiedat, Mustafa BaniKhalaf, " Revisiting the Gentle Parameter of the Random Early Detection (RED) for TCP Congestion Control". Journal of Communications. 14 (3), 2019.
Mohammad Almseidin, Mouhammd Alkasassbeh, Szilveszter Kovacs. "Fuzzy Rule Interpolation and SNMP-MIB for Emerging Network Abnormality". International Journal on Advanced Science, Engineering and Information Technology.9(3), 2019
I Obeidat, N Hamadneh, M Alkasassbeh, M Almseidin, MI AlZubi. "Intensive Pre-Processing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques".International Journal of Interactive Mobile Technologies (iJIM) 13 (1), 2019.
G Al-Naymat, M Alkasassbeh, E Al-Hawari. "Using machine learning methods for detecting network anomalies within SNMP-MIB dataset". Int. J. Wireless and Mobile Computing 15 (1), 67-76. 2018.
G Al-Naymat, M Alkasassbeh, Z Sober. "Pairs Trading Strategy: A Recommendation System".International Journal of Computers and Applic ations. pages={1--11}, Taylor \& Francis. 2018
Ahmad BA Hassanat, VB Surya Prasath, Mouhammd Alkasassbeh, Ahmad S Tarawneh, Ahmad J Al-shamailh .. "Magnetic energy-based feature extraction for low-quality fingerprint images". Signal, Image and Video Processing, 1-8. 2018
Mouhammd Alkasassbeh, mohammad Almseidi. "Machine Learning Methods for Network Intrusion Detection". ICCCNT 2018 - THE 20th INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES.12(8).2018.
G Al-Naymat, M Alkasassbeh, E Al-Hawari. "Exploiting SNMP-MIB Data to Detect Network Anomalies using Machine Learning Techniques". Intelligent Systems Conference.1204-1209. 2018.
Mouhammd Alkasassbeh. "A Novel Hybrid Method for Network Anomaly Detection Based on Traffic Prediction and Change Point Detection", Journal of Computer Sciences. Volume 14, Issue 2, Pages 153-162. 2018.
Adnan Rawashdeh, Mouhammd Alkasassbeh, Muna Hawari. "An Anomaly Based Approach for DDoS Attacks Detection in Cloud Environment", International Journal of Computer Applications in Technology. 57(4), 2018.
Mouhammd Alkasassbeh. "AN EMPIRICAL EVALUATION FOR THE INTRUSION DETECTION FEATURES BASED ON MACHINE LEARNING AND FEATURE SELECTION METHODS”, Journal of Theoretical and Applied Information Technology. 95(22), 2017.
M Almseidin, M Alzubi, S Kovacs, Mouhammd Alkasassbeh."Evaluation of machine learning algorithms for intrusion detection system". Intelligent Systems and Informatics (SISY), 2017 IEEE 15th International, 2017.
K Qader, M Adda, Mouhammd Alkasassbeh. "Comparative Analysis of Clustering Techniques in Network Traffic Faults Classification". International Journal of Innovative Research in Computer and Communication Engineering. 5(4), 2017.
Ghazi Al-Naymat, Mouhammd Alkasassbeh, N Abu-Samhadanh, S Sakr. "CLASSIFICATION OF VOIP AND NON-VOIP TRAFFIC USING MACHINE LEARNING APPROACHES". Journal of Theoretical and Applied Information Technology 92 (2), 403-414, 2016.
Mouhammd Alkasassbeh ,Ghazi Al-Naymat, Eshraq Al-Hawari. "Towards Generating Realistic SNMP-MIB Dataset for Network Anomaly Detection ", International Journal of Computer Science and Information Security Volume 14, Issue No. 9, Pages (pp. 1162-1185). 2016.
Ghazi Al-Naymat, Mouhammd Alkasassbeh, Ahmad Hassanat · Ahmad Al-Tarawneh, “ Dynamics-Based Approach for Accurate User Identification and Authentication using Machine Learning Techniques”, Conference: International Conference on Information Technology and Applications, At Sydney, Australia, July 2016
Ahmad BA Hassanat, Mouhammd Alkasassbeh, Mouhammd Al-awadi, AA Esra'a, “Color-based object segmentation method using artificial neural network”. Simulation Modelling Practice and Theory, March 2016
Ahmad Hassanat, Esra' Alkafaween, Nedal A Al-Nawaiseh, Mohammad A Abbadi, Mouhammd Alkasassbeh, Mahmoud B AlhasanatEnhancing Genetic Algorithms using Multi Mutations”, Enhancing Genetic Algorithms using Multi Mutations”, arXiv preprint arXiv:1602.08313.2016
Mouhammd Alkasassbeh, Ghazi Al-Naymat, Ahmad Hassanat, Mohammad Almseidin (2016)," Detecting Distributed Denial of Service Attacks Using Data Mining Techniques", (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 1, 2016.
Ahmad Hassanat, Mouhammd Alkasassbeh, Mouhammd Al-awadi, Esra'a A.A Alhasanat (2015)," Colour-based lips segmentation method using artificial neural networks", IEEE Information and Communication Systems (ICICS), 2015, 6th International Conference on, Amman, Jordan.
Mouhammd Alkasassbeh, Ghada A. Altarawneh, Ahmad B. A. Hassanat (2015), "On Enhancing The Performance Of Nearest Neighbour Classifiers Using Hassanat Distance Metric", Canadian Journal of Pure and Applied Sciences, (Vol.9, No.1). 2015.
H Faris, M Alkasassbeh, A Rodan (2014), "Artificial Neural Networks for Surface Ozone Prediction: Models and Analysis", Polish Journal of Environmental Studies 23 (2).
H Faris, M Alkasassbeh, N Ghatasheh, O Harfoushi (2014), "PM10 prediction using Genetic Programming: A Case Study in Salt, Jordan", Life Science Journal 11 (2).
R Obiedat, M Alkasassbeh, H Faris, O Harfoushi (2013), "Customer churn prediction using a hybrid genetic programming approach", Scientific Research and Essays 8 (27), 1289-1295.
A Sheta, H Faris, M Alkasassbeh (2013), "A Genetic Programming Model for S&P 500 Stock Market Prediction", International Journal of Control and Automation 6 (Vol.6, No.5), pp.303-314.
M Alkasassbeh, AF Sheta, H Faris, H Turabieh (2013), "Prediction of PM10 and TSP Air Pollution Parameters Using Artificial Neural Network Autoregressive, External Input Models: A Case Study in Salt, Jordan" ,Middle-East Journal of Scientific Research 14 (7), 999-1009.
M Alkasassbeh (2013), "Predicting of Surface Ozone Using Artificial Neural Networks and Support Vector Machines" International Journal of Advanced Science and Technology. 55
A Sheta, M Alkasassbeh, M Braik, H Abu Ayyash (2012), "Detection of Oil Spills in SAR Images using Threshold Segmentation Algorithms", International Journal of Computer Applications 57
H Faris, M Alkasassbeh, A Sheta (2012), "Predicting Stock Abundance of the Barents Sea Capelin Using Genetic Programming" , International Review on Computers and Software (IRECOS) 7 (4)
Alkasassbeh, M. (2011), "Network Intrusion Detection with Wiener Filter-based Agent" World Applied Sciences Journal 13 (11): 2372-2384, 2011 - ISSN 1818-4952 - idosi.org
Alkasassbeh, M. (2011), "Change Detection Methods for Computer Network Problems", World Applied Sciences Journal 13 (11): 2364-2371, 2011 - ISSN 1818-4952- idosi.org
Alkasassbeh, M., Adda, M. (2009), " 'Network Fault Detection based on Wiener Filter' " presented at Third International Conference on Internet Technologies and Applications (ITA 09), September 2009, Wrexham, North Wales, UK.
Alkasassbeh, M., Adda, M. (2009), “Network Fault Detection with Wiener Filter-Based Agent", Journal of Network and Computer Applications-Elsevier, doi:10.1016/j.jnca.2009.02.001.
Alkasassbeh, M., Adda, M. (2007), "Analysis of Mobile Agents in Network Fault Management", Journal of Network and Computer Applications-Elsevier, Journal of Network and Computer Applications, Volume 31, Issue 4 (November 2008) table of contents, Pages 699-711, ISSN:1084-8045
Alkasassbeh, M., Adda, M. (2006), "The Architecture of the Intelligent Mobile Agent in Network Fault Management", presented at International Conference on Computer Science and Information Systems, Athens.
Alkasassbeh, M., Adda, M., Peart, A. (2005), "A survey of Network Fault Management ". In: IADAT ed. 2nd International Conference on Telecommunications and Computer Networks. 7-9 September 2005, Portsmouth UK.
Adda, M., Owen, G. Kasassbeh, M., Paraskelidis, A., Peart, A. (2005), "Communication issues in Large Scale Wireless Ad hoc Networks", presented at International Conference on Computer Science and Information Systems, Athens.