Izzat Alsmadi

According to our database1, Izzat Alsmadi authored at least 103 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Deep reinforcement and transfer learning for abstractive text summarization: A review.
Comput. Speech Lang., 2022

Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective function.
Clust. Comput., 2022

2021
Ensemble Detection Model for IoT IDS.
Internet Things, 2021

Machine learning approaches to IoT security: A systematic literature review.
Internet Things, 2021

Fault-based testing for discovering SQL injection vulnerabilities in web applications.
Int. J. Inf. Comput. Secur., 2021

Misconfiguration in Firewalls and Network Access Controls: Literature Review.
Future Internet, 2021

Event Detection in Twitter: A Content and Time-Based Analysis.
CoRR, 2021

Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions.
CoRR, 2021

An ontological analysis of misinformation in online social networks.
CoRR, 2021

Adversarial Machine Learning in Text Analysis and Generation.
CoRR, 2021

Challenges of Software Requirements Quality Assurance and Validation: A Systematic Literature Review.
IEEE Access, 2021

Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Generating Optimal Attack Paths in Generative Adversarial Phishing.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Performance Comparison of Several Deep Learning-Based Object Detection Algorithms Utilizing Thermal Images.
Proceedings of the Second International Conference on Intelligent Data Science Technologies and Applications, 2021

2020
U.S. News & World Report Best Colleges rankings: Which institutional metrics contribute to sustained stratification?
Scientometrics, 2020

Integration of Data Envelopment Analysis and Clustering Methods.
J. Inf. Knowl. Manag., 2020

How Many Bots in Russian Troll Tweets?
Inf. Process. Manag., 2020

A model for reputation rank in online social networks and its applications.
Int. J. Soc. Netw. Min., 2020

RBAC for Healthcare-Infrastructure and data storage.
CoRR, 2020

Mutation Testing Framework for Ad-hoc Networks Protocols.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Mutation Testing to Validate Networks Protocols.
Proceedings of the IEEE International Systems Conference, 2020

Deceiving Machine Learning-Based Saturation Attack Detection Systems in SDN.
Proceedings of the 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2020

Exploring hackers assets: topics of interest as indicators of compromise.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

Using Data Analytics to Filter Insincere Posts from Online Social Networks A Case Study: Quora Insincere Questions.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

An Ensemble Feature Selection Method for IoT IDS.
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020

Disease Outbreak Detection Using Search Keywords Patterns.
Proceedings of 35th International Conference on Computers and Their Applications, 2020

Pro-ISIS Tweets Analysis Using Machine Learning Techniques.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Machine Learning Methods for Anomaly Detection in Industrial Control Systems.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Combining Blockchain and Machine Learning to Forecast Cryptocurrency Prices.
Proceedings of the 2020 Second International Conference on Blockchain Computing and Applications, 2020

Analysis and Prediction of COVID-19 Timeline and Infection Rates.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2019
A Near Real-Time Approach for Sentiment Analysis Approach Using Arabic Tweets.
J. Comput., 2019

IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries.
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019

Using Popular Search Terms in Stock Price Prediction.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

Users' Internet Searches as Proxies for Disease Escalation Trends.
Proceedings of the 4th IEEE/ACM International Conference on Connected Health: Applications, 2019

Popular Search Terms and Stock Price Prediction.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Regions-of-interest discovering and predicting in smartphone environments.
Pervasive Mob. Comput., 2018

Google n-gram viewer does not include arabic corpus! towards n-gram viewer for arabic corpus.
Int. Arab J. Inf. Technol., 2018

Evaluating social context in arabic opinion mining.
Int. Arab J. Inf. Technol., 2018

A multithreading and hashing technique for indexing Target-Decoy peptides databases.
Concurr. Comput. Pract. Exp., 2018

Network slicing to improve multicasting in HPC clusters.
Clust. Comput., 2018

Interactive based Access Control Framework for Connected Vehicle Communication.
Proceedings of the 14th IEEE International Conference on Control and Automation, 2018

2017
Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach.
J. Netw. Comput. Appl., 2017

Evaluating network test scenarios for network simulators systems.
Int. J. Distributed Sens. Networks, 2017

Software fault proneness prediction: a comparative study between bagging, boosting, and stacking ensemble and base learner methods.
Int. J. Data Anal. Tech. Strateg., 2017

Protein interaction based features' extraction.
Int. J. Bioinform. Res. Appl., 2017

Deep vs. shallow learning-based filters of MS/MS spectra in support of protein search engines.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Deep learning-based MSMS spectra reduction in support of running multiple protein search engines on cloud.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Towards Centralized MS/MS Spectra Preprocessing: An Empirical Evaluation of Peptides Search Engines using Ground Truth Datasets.
Proceedings of the 17th IEEE International Conference on Bioinformatics and Bioengineering, 2017

2016
Polarity Classification of Arabic Sentiments.
Int. J. Inf. Technol. Web Eng., 2016

The integration of access control levels based on SDN.
Int. J. High Perform. Comput. Netw., 2016

KP-Trie algorithm for update and search operations.
Int. Arab J. Inf. Technol., 2016

A prototype for a standard arabic sentiment analysis corpus.
Int. Arab J. Inf. Technol., 2016

E-government website security concerns and citizens' adoption.
Electron. Gov. an Int. J., 2016

Identifying DoS attacks on software defined networks: A relation context approach.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Interaction-based Reputation Model in Online Social Networks.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Privacy and Social Capital in Online Social Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Websites' Input Validation and Input-Misuse-Based Attacks.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

Building a standard dataset for Arabie sentiment analysis: Identifying potential annotation pitfalls.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Building an Islamic financial information system based on policy managements.
J. King Saud Univ. Comput. Inf. Sci., 2015

Clustering and classification of email contents.
J. King Saud Univ. Comput. Inf. Sci., 2015

A novel root based Arabic stemmer.
J. King Saud Univ. Comput. Inf. Sci., 2015

Evaluation of Spam Impact on Arabic Websites Popularity.
J. King Saud Univ. Comput. Inf. Sci., 2015

Lexicon-based sentiment analysis of Arabic tweets.
Int. J. Soc. Netw. Min., 2015

Mobile agents modelling using UML.
Int. J. Bus. Inf. Syst., 2015

Security of Software Defined Networks: A survey.
Comput. Secur., 2015

Model-Based Testing of SDN Firewalls: A Case Study.
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015

2014
Evaluating the impact of software metrics on defects prediction. Part 2.
Comput. Sci. J. Moldova, 2014

The Evaluation of the Public Opinion - A Case Study: MERS-CoV Infection Virus in KSA.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Collaboration Networks of Levantine Biomedical Researchers.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

The analysis of large-scale climate data: Jordan case study.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

2013
Using Mutation to Enhance GUI Testing Coverage.
IEEE Softw., 2013

Video spam and public opinion in current Middle Eastern conflicts.
Int. J. Soc. Netw. Min., 2013

The use of educational games for learning basic math skills in early classes.
Int. J. Soc. Media Interact. Learn. Environ., 2013

A Business Classifier to Detect Readability Metrics on Software Games and Their Types.
Int. J. E Entrepreneurship Innov., 2013

A software development process for open source and open competition projects.
Int. J. Bus. Inf. Syst., 2013

Design and code coupling assessment based on defects prediction. Part 1.
Comput. Sci. J. Moldova, 2013

Evaluation of Cost Estimation Metrics: Towards a Unified Terminology.
J. Comput. Inf. Technol., 2013

Sentiment analysis of arabic social media content: a comparative study.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Query classification and study of university students' search trends.
Program, 2012

Content-based analysis to detect Arabic web spam.
J. Inf. Sci., 2012

A Conceptual Organization for Websites Metrics and E-Government Websites: A Case Study.
Int. J. Inf. Commun. Technol. Hum. Dev., 2012

Implications for Website Trust and Credibility Assessment.
Int. J. E Entrepreneurship Innov., 2012

Checking the efficiency of integrity tests in distributed and parallel database.
Int. J. Bus. Inf. Syst., 2012

Using Test Case Mutation to Evaluate the Model of the User Interface.
Comput. Sci. J. Moldova, 2012

Annotations, Collaborative Tagging, and Searching Mathematics in E-Learning
CoRR, 2012

Indexing of Arabic documents automatically based on lexical analysis
CoRR, 2012

Automatic Coverage Evaluation for a Medical Expert System.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

2011
Evaluating Google queries based on language preferences.
J. Inf. Sci., 2011

The Effect of Stemming on Arabic Text Classification: An Empirical Study.
Int. J. Inf. Retr. Res., 2011

GUI structural metrics.
Int. Arab J. Inf. Technol., 2011

Evaluating the change of software fault behavior with dataset attributes based on categorical correlation.
Adv. Eng. Softw., 2011

2010
The Automatic Evaluation of Website Metrics and State.
Int. J. Web Based Learn. Teach. Technol., 2010

Building an e-Commerce Infrastructure in Jordan: Challenges and Requirements.
Int. J. Interact. Mob. Technol., 2010

Challenges of Utilizing E-Learning Systems in Public Universities in Jordan.
iJET, 2010

Jordan E-Government Challenges and Progresses.
Int. J. Adv. Corp. Learn., 2010

Using genetic algorithms for test case generation and selection optimization.
Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering, 2010

2009
Separation of Concerns in Teaching Software Engineering.
Proceedings of the Innovations in Computing Sciences and Software Engineering, 2009

2008
Using XML Trees to Represent GUI States.
Proceedings of the 2008 International Conference on Software Engineering Research & Practice, 2008

The Utilization of User Sessions in Testing.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
GUI Path Oriented Test Case Generation.
Proceedings of the International Conference on Software Engineering Theory and Practice, 2007

GUI Test Automation Framework.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

Model Checking Aspect-Oriented Design Specification.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Open Source Evolution Analysis.
Proceedings of the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 2006


  Loading...