default search action
Mustafa Al-Fayoumi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Mustafa Al-Fayoumi, Qasem Abu Al-Haija, Rakan Armoush, Christine Amareen:
XAI-PDF: a robust framework for malicious PDF detection leveraging SHAP-based feature engineering. Int. Arab J. Inf. Technol. 21(1): 128-146 (2024) - 2023
- [j10]Mustafa Al-Fayoumi, Qasem Abu Al-Haija:
Capturing low-rate DDoS attack based on MQTT protocol in software Defined-IoT environment. Array 19: 100316 (2023) - [j9]Bushra Alhijawi, Mutaz Abo Alrub, Mustafa Al-Fayoumi:
Generalized Ethereum Blockchain-based recommender system framework. Inf. Syst. 111: 102113 (2023) - [j8]Qasem Abu Al-Haija, Mustafa Al-Fayoumi:
An intelligent identification and classification system for malicious uniform resource locators (URLs). Neural Comput. Appl. 35(23): 16995-17011 (2023) - [c11]Abdelnoor Dabit, Qasem Abu Al-Haija, Mustafa Al-Fayoumi:
Identifying Weaknesses: A Guide to Conducting an Effective Network Vulnerability Assessment. ACIT 2023: 1-6 - [c10]Yaser Alkurdi, Mustafa Al-Fayoumi, Amer Al-badarneh, Qasem Abu Al-Haija:
Enhancing Password Security via Supervised Learning. ICIT 2023: 256-259 - [c9]Khawla Shalabi, Mustafa Al-Fayoumi, Qasem Abu Al-Haija:
Enhancing Financial System Resilience Against Cyber Threats via SWIFT Customer Security Framework. ICIT 2023: 260-265 - 2022
- [c8]Mustafa Al-Fayoumi, Ammar Jamil Odeh, Ismail Mohamed Keshta, Abobakr Aboshgifa, Tareq AlHajahjeh, Rana Abdulraheem:
Email phishing detection based on naïve Bayes, Random Forests, and SVM classifications: A comparative study. CCWC 2022: 7-11 - [c7]Rana Abdulraheem, Ammar Jamil Odeh, Mustafa Al-Fayoumi, Ismail Keshta:
Efficient Email phishing detection using Machine learning. CCWC 2022: 354-358 - 2021
- [j7]Thaeer Kobbaey, Raouf Hamzaoui, Shakeel Ahmad, Mustafa Al-Fayoumi, Nikolaos Thomos:
Enhanced collision resolution and throughput analysis for the 802.11 distributed coordination function. Int. J. Commun. Syst. 34(16) (2021) - [c6]Ahmad Homsi, Joyce Al Nemri, Nisma Naimat, Hamzeh Abdul Kareem, Mustafa Al-Fayoumi, Mohammad Abu Snober:
Detecting Twitter Fake Accounts using Machine Learning and Data Reduction Techniques. DATA 2021: 88-95 - [c5]Rana Faek, Mohammad Al-Fawa'reh, Mustafa Al-Fayoumi:
Exposing Bot Attacks Using Machine Learning and Flow Level Analysis. DATA 2021: 99-106 - 2020
- [j6]Mustafa Al-Fayoumi, Jaber Alwidian, Mohammad Abusaif:
Intelligent Association Classification Technique for Phishing Website Detection. Int. Arab J. Inf. Technol. 17(4): 488-496 (2020) - [i1]Abdalrahman Hwoij, Mouhammd Al-Kasassbeh, Mustafa Al-Fayoumi:
Detecting Network Anomalies using Rule-based machine learning within SNMP-MIB dataset. CoRR abs/2002.02368 (2020)
2010 – 2019
- 2018
- [j5]Mustafa Al-Fayoumi, Salam Hamdan, Malek Al-Zewairi:
A new model of multi-key generation for RFID access control system. Int. Arab J. Inf. Technol. 15(3A): 585-591 (2018) - [j4]Mustafa Al-Fayoumi, Shadi Nashwan:
Performance Analysis of SAP-NFC Protocol. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - [j3]Mustafa Al-Fayoumi, Ruba Haj Hamad, Ja'afer Al-Saraireh:
SSOAM: Automated Security Testing Framework for SOA Middleware in Banking Domain. J. Comput. Sci. 14(7): 957-968 (2018) - [c4]Ruba Mohammad Haj Hamad, Mustafa Al-Fayoumi:
Modernization of a Classical Data Center (CDC) vs. Adoption in Cloud Computing Calculate Total Cost of Ownership for Both Cloud and CDC - Jordanian Case Study. ACIT 2018: 1-8 - [c3]Ruba Mohammad Haj Hamad, Mustafa Al-Fayoumi:
Scalable Agile Transformation Process (SATP) to Convert Waterfall Project Management Office into Agile Project Management Office. ACIT 2018: 1-8 - 2017
- [j2]Mustafa Al-Fayoumi, Sattar J. Aboud:
An Efficient E-Exam Scheme. Int. J. Emerg. Technol. Learn. 12(4): 153-162 (2017) - 2010
- [j1]Mustafa Al-Fayoumi, Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi:
A New Digital Signature Scheme Based on Integer Factoring and Discrete Logarithm Problem. Int. J. Comput. Their Appl. 17(2): 108-115 (2010)
2000 – 2009
- 2008
- [c2]Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi, Mustafa Al-Fayoumi, Haidar S. Jabbar:
An Efficient RSA Public Key Encryption Scheme. ITNG 2008: 127-130 - 2007
- [c1]Mustafa Al-Fayoumi, Shadi Nashwan, Sufian Yousef, Abdel-Rahman Alzoubaidi:
A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks. WiMob 2007: 29
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint