default search action
Rami Mustafa A. Mohammad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Mutasem K. Alsmadi, Rami Mustafa A. Mohammad, Malek Alzaqebah, Sana Jawarneh, Muath AlShaikh, Ahmad Al Smadi, Fahad A. Alghamdi, Jehad Saad Alqurni, Hayat Alfagham:
Intrusion Detection Using an Improved Cuckoo Search Optimization Algorithm. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 15(2): 73-93 (2024) - [j17]Muath AlShaikh, Malek Alzaqebah, Nabil Gmati, Nashat Alrefai, Mutasem K. Alsmadi, Ibrahim Almarashdeh, Rami Mustafa A. Mohammad, Sultan Alamri, Mostefa Kara:
Image encryption algorithm based on factorial decomposition. Multim. Tools Appl. 83(40): 88447-88467 (2024) - [c7]Norah Ahmed Almubairik, Fakhri Alam Khan, Rami Mustafa A. Mohammad:
WristSense: A Wrist-Wear Dataset for Identifying Aggressive Tendencies. AIAI (1) 2024: 268-284 - 2023
- [j16]Esra'a Alshabeeb, Malak Aljabri, Rami Mustafa A. Mohammad, Fatemah S. Alqarqoosh, Aseel A. Alqahtani, Zainab T. Alibrahim, Najd Y. Alawad, Mashael A. Alzeer:
Intelligent Techniques for Predicting Stock Market Prices: A Critical Survey. J. Inf. Knowl. Manag. 22(3): 2250099:1-2250099:41 (2023) - [j15]Malak Saleh Aljabri, Amal A. Alahmadi, Rami Mustafa A. Mohammad, Fahd A. Alhaidari, Menna Aboulnour, Dorieh M. Alomari, Samiha Mirza:
Machine Learning-Based Detection for Unauthorized Access to IoT Devices. J. Sens. Actuator Networks 12(2): 27 (2023) - [j14]Dhiaa Musleh, Meera Alotaibi, Fahd A. Alhaidari, Atta-ur-Rahman, Rami Mustafa A. Mohammad:
Intrusion Detection System Using Feature Extraction with Machine Learning Algorithms in IoT. J. Sens. Actuator Networks 12(2): 29 (2023) - 2022
- [j13]Malak Saleh Aljabri, Hanan S. Altamimi, Shahd A. Albelali, Maimunah Al-Harbi, Haya T. Alhuraib, Najd K. Alotaibi, Amal A. Alahmadi, Fahd A. Alhaidari, Rami Mustafa A. Mohammad, Khaled Salah:
Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions. IEEE Access 10: 121395-121417 (2022) - [j12]Rami Mustafa A. Mohammad, Malak Saleh Aljabri, Menna Aboulnour, Samiha Mirza, Ahmad Alshobaiki:
Classifying the Mortality of People with Underlying Health Conditions Affected by COVID-19 Using Machine Learning Techniques. Appl. Comput. Intell. Soft Comput. 2022: 3783058:1-3783058:12 (2022) - [j11]Manal Mohamed Alhejazi, Rami Mustafa A. Mohammad:
Enhancing the blockchain voting process in IoT using a novel blockchain Weighted Majority Consensus Algorithm (WMCA). Inf. Secur. J. A Glob. Perspect. 31(2): 125-143 (2022) - [j10]Rami Mustafa A. Mohammad:
An Enhanced Multiclass Support Vector Machine Model and its Application to Classifying File Systems Affected by a Digital Crime. J. King Saud Univ. Comput. Inf. Sci. 34(2): 179-190 (2022) - [j9]Malek Alzaqebah, Sana Jawarneh, Maram Al-Wohaibi, Mutasem K. Alsmadi, Ibrahim Almarashdeh, Rami Mustafa A. Mohammad:
Hybrid Brain Storm Optimization algorithm and Late Acceptance Hill Climbing to solve the Flexible Job-Shop Scheduling Problem. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part A): 2926-2937 (2022) - 2021
- [j8]Malek Alzaqebah, Sana Jawarneh, Rami Mustafa A. Mohammad, Mutasem K. Alsmadi, Ibrahim Almarashdeh:
Improved Multi-Verse Optimizer Feature Selection Technique With Application To Phishing, Spam, and Denial Of Service Attacks. Int. J. Commun. Networks Inf. Secur. 13(1) (2021) - [j7]Rami Mustafa A. Mohammad, Mutasem K. Alsmadi:
Intrusion detection using Highest Wins feature selection algorithm. Neural Comput. Appl. 33(16): 9805-9816 (2021) - [j6]Malak Saleh Aljabri, Sumayh S. Aljameel, Rami Mustafa A. Mohammad, Sultan H. Almotiri, Samiha Mirza, Fatima M. Anis, Menna Aboulnour, Dorieh M. Alomari, Dina H. Alhamed, Hanan S. Altamimi:
Intelligent Techniques for Detecting Network Attacks: Review and Research Directions. Sensors 21(21): 7070 (2021) - 2020
- [j5]Rami Mustafa A. Mohammad, Mutasem K. Alsmadi, Ibrahim Almarashdeh, Malek Alzaqebah:
An improved rule induction based denial of service attacks classification model. Comput. Secur. 99: 102008 (2020) - [c6]Rami Mustafa A. Mohammad, Mamoun Masoud Abdulqader:
Exploring Cyber Security Measures in Smart Cities. ACIT 2020: 1-7
2010 – 2019
- 2019
- [j4]Rami Mustafa A. Mohammad, Mohammed Abdulrahman Alqahtani:
A comparison of machine learning techniques for file system forensics analysis. J. Inf. Secur. Appl. 46: 53-61 (2019) - [c5]Amanda H. Gonsalves, Fadi A. Thabtah, Rami Mustafa A. Mohammad, Gurpreet Singh:
Prediction of Coronary Heart Disease using Machine Learning: An Experimental Analysis. ICDLT 2019: 51-56 - 2018
- [c4]Rami Mustafa A. Mohammad:
A Neural Network based Digital Forensics Classification. AICCSA 2018: 1-7 - 2016
- [b1]Rami Mustafa A. Mohammad:
An ensemble self-structuring neural network approach to solving classification problems with virtual concept drift and its application to phishing websites. University of Huddersfield, UK, 2016 - [c3]Fadi A. Thabtah, Rami Mustafa A. Mohammad, Lee McCluskey:
A dynamic self-structuring neural network model to combat phishing. IJCNN 2016: 4221-4226 - [c2]Rami Mustafa A. Mohammad, Fadi A. Thabtah, Lee McCluskey:
An Improved Self-Structuring Neural Network. PAKDD Workshops 2016: 35-47 - 2015
- [j3]Rami Mustafa A. Mohammad, Fadi A. Thabtah, Lee McCluskey:
Tutorial and critical analysis of phishing websites methods. Comput. Sci. Rev. 17: 1-24 (2015) - [d1]Rami Mustafa A. Mohammad, Lee McCluskey:
Phishing Websites. UCI Machine Learning Repository, 2015 - 2014
- [j2]Rami Mustafa A. Mohammad, Fadi A. Thabtah, Lee McCluskey:
Intelligent rule-based phishing websites classification. IET Inf. Secur. 8(3): 153-160 (2014) - [j1]Rami Mustafa A. Mohammad, Fadi A. Thabtah, Lee McCluskey:
Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25(2): 443-458 (2014) - 2012
- [c1]Rami Mustafa A. Mohammad, Fadi A. Thabtah, Lee McCluskey:
An assessment of features related to phishing websites using an automated technique. ICITST 2012: 492-497
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-07 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint