default search action
Ala Mughaid
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Mohammed W. Elbes, Shadi AlZu'bi, Tarek Kanan, Ala Mughaid, Samia A. Abu-Shanab:
Big dermatological data service for precise and immediate diagnosis by utilizing pre-trained learning models. Clust. Comput. 27(5): 6931-6951 (2024) - [j20]Ala Mughaid, Asma Alnajjar, Subhieh M. El-Salhi, Khaled Almakadmeh, Shadi AlZu'bi:
A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks. Clust. Comput. 27(8): 10359-10375 (2024) - [j19]Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, Shadi AlZu'bi, Mohammad Sh. Daoud, Hazem Migdady:
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things. Int. J. Inf. Sec. 23(3): 2123-2137 (2024) - [j18]Ibrahim Obeidat, Ala Mughaid, Shadi AlZu'bi, Ahmed Al-Arjan, Rula Al-Amrat, Rathaa Al-Ajmi, Razan Al-Hayajneh, Belal Abuhaija, Laith Abualigah:
A novel secure cryptography model for data transmission based on Rotor64 technique. Multim. Tools Appl. 83(13): 37295-37314 (2024) - [j17]Shadi AlZu'bi, Amjed Zreiqat, Worood Radi, Ala Mughaid, Laith Abualigah:
An intelligent healthcare monitoring system-based novel deep learning approach for detecting covid-19 from x-rays images. Multim. Tools Appl. 83(23): 63479-63496 (2024) - [j16]Mahmoud AlJamal, Ala Mughaid, Bashar Al-Shboul, Hani Bani-Salameh, Shadi AlZu'bi, Laith Abualigah:
Optimizing risk mitigation: A simulation-based model for detecting fake IoT clients in smart city environments. Sustain. Comput. Informatics Syst. 43: 101019 (2024) - [j15]Tarek Kanan, Amani AbedAlghafer, Shadi AlZu'bi, Bilal Hawashin, Ala Mughaid, Ghassan Kanaan, M. M. Kamruzzaman:
An Intelligent Health Care System for Detecting Drug Abuse in Social Media Platforms Based on Low Resource Language. IEEE ACM Trans. Audio Speech Lang. Process. 32: 691-703 (2024) - [c19]Ala Mughaid, Ruba Ibrahim, Mahmoud AlJamal, Issa AL-Aiash:
Detection of Trojan Horse in the Internet of Things: Comparative Evaluation of Machine Learning Approaches. MCNA 2024: 35-41 - 2023
- [j14]Tarek Kanan, Ala Mughaid, Riyad Al-Shalabi, Mahmoud Al-Ayyoub, Mohammad W. Elbes, Odai Sadaqa:
Business intelligence using deep learning techniques for social media contents. Clust. Comput. 26(2): 1285-1296 (2023) - [j13]Shadi AlZu'bi, Mohammad W. Elbes, Ala Mughaid, Noor Bdair, Laith Abualigah, Agostino Forestiero, Raed Abu Zitar:
Diabetes Monitoring System in Smart Health Cities Based on Big Data Intelligence. Future Internet 15(2): 85 (2023) - [j12]Ashraf Hamdan Aljammal, Ahmad Qawasmeh, Ala Mughaid, Salah Taamneh, Fadi Wedyan, Mamoon Obiedat:
Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks. Int. J. Interact. Mob. Technol. 17(19): 136-146 (2023) - [j11]Ala Mughaid, Shadi AlZu'bi, Asma Alnajjar, Esraa AbuElsoud, Subhieh El-Salhi, Bashar Igried, Laith Abualigah:
Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches. Multim. Tools Appl. 82(9): 13973-13995 (2023) - [j10]Ala Mughaid, Shadi AlZu'bi, Asma Alnajjar, Esraa AbuElsoud, Subhieh El-Salhi, Bashar Igried, Laith Abualigah:
Correction to: Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches. Multim. Tools Appl. 82(9): 13997-13998 (2023) - [j9]Ala Mughaid, Ibrahim Obeidat, Shadi AlZu'bi, Esraa Abu Elsoud, Asma Alnajjar, Anas Ratib Alsoud, Laith Abualigah:
A novel machine learning and face recognition technique for fake accounts detection system on cyber social networks. Multim. Tools Appl. 82(17): 26353-26378 (2023) - [j8]Ibrahim Obaidat, Aseel Al-zou'bi, Ala Mughaid, Laith Abualigah:
Investigating the cyberbullying risk in digital media: protecting victims in school teenagers. Soc. Netw. Anal. Min. 13(1): 139 (2023) - [c18]Samar Hendawi, Shadi AlZu'bi, Ala Mughaid, Nayef Alqahtani:
Ensuring Cybersecurity While Leveraging Social Media as a Data Source for Internet of Things Applications. ACR 2023: 587-604 - [c17]Ala Mughaid, Ali Alqahtani, Shadi AlZu'bi, Ibrahim Obeidat, Rabee Alqura'n, Mahmoud AlJamal, Raid AL-Marayah:
Utilizing Machine Learning Algorithms for Effectively Detection IoT DDoS Attacks. ACR 2023: 617-629 - [c16]Mahmoud AlJamal, Ala Mughaid, Rabee Alqura'n, Muder Almiani, Shadi AlZu'bi:
Simulated Model for Preventing IoT Fake Clients over the Smart Cities Environment. DASC/PiCom/CBDCom/CyberSciTech 2023: 757-761 - [c15]Ala Mughaid, Ibrahim Obeidat, Andaleeb Shdaifat, Razan Alhayjna, Shadi AlZu'bi:
Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning. FMEC 2023: 123-127 - [c14]Muder Almiani, Alia Abu Ghazleh, Ala Mughaid, Yaser Jararweh:
Botnet Detection Using Label Propagation and Batch K-means Clustering for Securing IoT Networks. FMEC 2023: 167-174 - [c13]Shadi AlZu'bi, Samar Hendawi, Islam AlTalahin, Muder Almiani, Ala Mughaid:
Securing the Digital Fortress: Unveiling the Modern Battleground for Sustainable OSs and the Digital Threatscape. FMEC 2023: 292-297 - [c12]Mahmoud AlJamal, Rabee Alqura'n, Issa AL-Aiash, Ala Mughaid, Shadi AlZu'bi, Ala A. Abutabanjeh:
A Novel Machine Learning Cyber Approach for Detecting WannaLocker Ransomware Attack on Android Devices. ICIT 2023: 135-142 - [c11]Tarek Kanan, Samar Hendawi, Shadi AlZu'bi, Mohammed W. Elbes, Ala Mughaid:
Revolutionizing Cyberbullying Prevention: A Cutting-Edge Natural Language Processing-Based Approach. ICIT 2023: 220-225 - [c10]Mohammed W. Elbes, Samar Hendawi, Shadi AlZu'bi, Tarek Kanan, Ala Mughaid:
Unleashing the Full Potential of Artificial Intelligence and Machine Learning in Cybersecurity Vulnerability Management. ICIT 2023: 276-283 - [c9]Shadi AlZu'bi, Samar Hendawi, Mohammed W. Elbes, Tarek Kanan, Ala Mughaid:
Towards a Sustainable Future: Exploring Key Features, Challenges, and Global Examples of Building Smart Cities. ICIT 2023: 284-291 - [c8]Islam AlTalahin, Shadi AlZu'bi, Assal A. M. Alqudah, Ala Mughaid:
Unmasking the Truth: A Deep Learning Approach to Detecting Deepfake Audio Through MFCC Features. ICIT 2023: 511-518 - [c7]Samia A. Abu-Shanab, Ala Mughaid, Shadi AlZu'bi:
Elevating Employment Practices in Agricultural Corporations with Large Language Models and AI. SNAMS 2023: 1-5 - 2022
- [j7]Darah Aqel, Shadi AlZu'bi, Ala Mughaid, Yaser Jararweh:
Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture. Clust. Comput. 25(3): 2007-2020 (2022) - [j6]Darah Aqel, Shadi AlZu'bi, Ala Mughaid, Yaser Jararweh:
Correction to: Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture. Clust. Comput. 25(3): 2303 (2022) - [j5]Ala Mughaid, Shadi AlZu'bi, Adnan Hnaif, Salah Taamneh, Asma Alnajjar, Esraa Abu Elsoud:
An intelligent cyber security phishing detection system using deep learning techniques. Clust. Comput. 25(6): 3819-3828 (2022) - [j4]Yang Wang, Ala Mughaid:
Design of a Virtual Reality-Based Learning System for Spoken English. Int. J. Emerg. Technol. Learn. 17(24): 25-41 (2022) - [j3]Ala Mughaid, Shadi AlZu'bi, Ahmed Al-Arjan, Rula Al-Amrat, Rathaa Al-Ajmi, Raed Abu Zitar, Laith Abualigah:
An intelligent cybersecurity system for detecting fake news in social media websites. Soft Comput. 26(12): 5577-5591 (2022) - [c6]Shadi AlZu'bi, Samia A. Abushanap, Muder Almiani, Ala Mughaid:
Transfer Learning Enabled CAD System for Monkey Pox Classification. IOTSMS 2022: 1-5 - 2021
- [j2]Shadi AlZu'bi, Bilal Hawashin, Ala Mughaid, Thar Baker:
Efficient 3D medical image segmentation algorithm over a secured multimedia network. Multim. Tools Appl. 80(11): 16887-16905 (2021) - [c5]Shadi AlZu'bi, Darah Aqel, Ala Mughaid:
Recent intelligent Approaches for Managing and Optimizing smart Blood Donation process. ICIT 2021: 679-684 - [c4]Ala Mughaid, Ahmed Al-Arjan, Mohammad Rasmi, Shadi AlZu'bi:
Intelligent security in the era of AI: The key vulnerability of RC4 algorithm. ICIT 2021: 691-694 - 2020
- [c3]Bilal Hawashin, Shadi AlZu'bi, Ala Mughaid, Farshad Fotouhi, Ahmad Abusukhon:
An Efficient Cold Start Solution for Recommender Systems Based on Machine Learning and User Interests. SDS 2020: 220-225
2010 – 2019
- 2019
- [j1]Ibrahim Obeidat, Ala Mughaid, Shadi AlZoubi:
A Secure Encrypted Protocol for Clients' Handshaking in the Same Network. Int. J. Interact. Mob. Technol. 13(5): 47-57 (2019) - [c2]Shadi AlZu'bi, Darah Aqel, Ala Mughaid, Yaser Jararweh:
A Multi-Levels Geo-Location based Crawling Method for Social Media Platforms. SNAMS 2019: 494-498 - [c1]Ala Mughaid, Ibrahim Obeidat, Bilal Hawashin, Shadi AlZu'bi, Darah Aqel:
A smart Geo-Location Job Recommender System Based on Social Media Posts. SNAMS 2019: 505-510
Coauthor Index
aka: Laith Abualigah
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint