default search action
Mahmoud AlJamal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j4]Mahmoud AlJamal, Rabee Alqura'n, Ayoub Alsarhan, Mohammad Aljaidi, Wafa' Q. Al-Jamal, Ali Fayez Alkoradees:
Optimized Novel Text Embedding Approach for Fake News Detection on Twitter X: Integrating Social Context, Temporal Dynamics, and Enhanced Interpretability. Int. J. Comput. Intell. Syst. 18(1): 22 (2025) - 2024
- [j3]Mahmoud AlJamal, Rabee Alqura'n, Ayoub Alsarhan, Mohammad Aljaidi, Mohammad Alhmmad, Wafa' Q. Al-Jamal, Nasser S. Albalawi:
A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks. Future Internet 16(12): 482 (2024) - [j2]Ayoub Alsarhan
, Athari Alnatsheh, Mohammad Aljaidi
, Tuqa Al Makkawi, Mahmoud AlJamal
, Tamam Alsarhan:
Optimizing Electric Vehicle Charging Infrastructure through Machine Learning: A Study of Charging Patterns and Energy Consumption. Int. J. Interact. Mob. Technol. 18(21): 149-170 (2024) - [j1]Mahmoud AlJamal, Ala Mughaid
, Bashar Al-Shboul, Hani Bani-Salameh, Shadi AlZu'bi, Laith Abualigah
:
Optimizing risk mitigation: A simulation-based model for detecting fake IoT clients in smart city environments. Sustain. Comput. Informatics Syst. 43: 101019 (2024) - [c9]Mahmoud AlJamal, Rabee Alqura'n, Mohammad Aljaidi, Osama S. AlJamal, Ayoub Alsarhan, Issa Al-Aiash, Ghassan Samara, Mohammad BaniSalman, Mohammad Khouj:
Harnessing ML and NLP for Enhanced Cybersecurity: A Comprehensive Approach for Phishing Email Detection. ACIT 2024: 1-9 - [c8]Osama S. AlJamal, Mahmoud AlJamal, Ayoub Alsarhan, Mohammad Aljaidi, Saif Okour, Issa Al-Aiash, Ahmad Al-Qerem, Essam Al Daoud, Ali Elrashidi:
Design and Simulation of a Network Infrastructure for a Multi-Branch Organization Using Cisco Packet Tracer. ACIT 2024: 1-10 - [c7]Hanay Almomani, Ayoub Alsarhan, Mahmoud AlJamal, Mohammad Aljaidi, Tamam Alsarhan, Bashar Khassawneh, Abdelrahman Alfaqih, Ghassan Samara, Manish Kumar Singla:
Securing Internet of Vehicles IoV Communications: A Biometric and Hash-Key Derivation Function HKDF-Based Approach. ACIT 2024: 1-7 - [c6]Hanay Almomani, Ayoub Alsarhan, Mahmoud AlJamal, Mohammad Aljaidi, Tamam Alsarhan, Bashar Khassawneh, Ghassan Samara, Manish Kumar Singla, Ahmed BaniMustafa:
Proactive Insider Threat Detection Using Facial and Behavioral Biometrics. ACIT 2024: 1-7 - [c5]Rabee Alqura'n, Mahmoud AlJamal, Mohammad Aljaidi, Mohammad AlJamal, Bashar Khassawneh, Ayoub Alsarhan, Omar Alidmat, Ghassan Samara, Sattam Almatarneh
:
Machine Learning as the Shield: Mitigating ARP Poisoning Attacks in Software Defined Networks. ACIT 2024: 1-8 - [c4]Ala Mughaid, Ruba Ibrahim, Mahmoud AlJamal, Issa Al-Aiash:
Detection of Trojan Horse in the Internet of Things: Comparative Evaluation of Machine Learning Approaches. MCNA 2024: 35-41 - 2023
- [c3]Ala Mughaid
, Ali Alqahtani, Shadi AlZu'bi, Ibrahim Obeidat, Rabee Alqura'n, Mahmoud AlJamal, Raid AL-Marayah:
Utilizing Machine Learning Algorithms for Effectively Detection IoT DDoS Attacks. ACR 2023: 617-629 - [c2]Mahmoud AlJamal, Ala Mughaid
, Rabee Alqura'n, Muder Almiani
, Shadi AlZu'bi:
Simulated Model for Preventing IoT Fake Clients over the Smart Cities Environment. DASC/PiCom/CBDCom/CyberSciTech 2023: 757-761 - [c1]Mahmoud AlJamal, Rabee Alqura'n, Issa Al-Aiash, Ala Mughaid
, Shadi AlZu'bi, Ala A. Abutabanjeh:
A Novel Machine Learning Cyber Approach for Detecting WannaLocker Ransomware Attack on Android Devices. ICIT 2023: 135-142
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-05 00:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint