Mahmoud AlJamal

Orcid: 0009-0007-5389-6778

According to our database1, Mahmoud AlJamal authored at least 15 papers between 2023 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Optimized Novel Text Embedding Approach for Fake News Detection on Twitter X: Integrating Social Context, Temporal Dynamics, and Enhanced Interpretability.
Int. J. Comput. Intell. Syst., December, 2025

Optimized digital watermarking: Harnessing the synergies of Schur matrix factorization, DCT, and DWT for superior image ownership proofing.
Multim. Tools Appl., May, 2025

Securing the Mobile Future: An Extensive Analysis of the Threat Landscape from Mobile Devices User Perspectives.
Int. J. Interact. Mob. Technol., 2025

2024
Optimizing risk mitigation: A simulation-based model for detecting fake IoT clients in smart city environments.
Sustain. Comput. Informatics Syst., 2024

Optimizing Electric Vehicle Charging Infrastructure through Machine Learning: A Study of Charging Patterns and Energy Consumption.
Int. J. Interact. Mob. Technol., 2024

A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks.
Future Internet, 2024

Detection of Trojan Horse in the Internet of Things: Comparative Evaluation of Machine Learning Approaches.
Proceedings of the International Conference on Multimedia Computing, 2024

Machine Learning as the Shield: Mitigating ARP Poisoning Attacks in Software Defined Networks.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Proactive Insider Threat Detection Using Facial and Behavioral Biometrics.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Securing Internet of Vehicles IoV Communications: A Biometric and Hash-Key Derivation Function HKDF-Based Approach.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Design and Simulation of a Network Infrastructure for a Multi-Branch Organization Using Cisco Packet Tracer.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Harnessing ML and NLP for Enhanced Cybersecurity: A Comprehensive Approach for Phishing Email Detection.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

2023
A Novel Machine Learning Cyber Approach for Detecting WannaLocker Ransomware Attack on Android Devices.
Proceedings of the International Conference on Information Technology, 2023

Simulated Model for Preventing IoT Fake Clients over the Smart Cities Environment.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Utilizing Machine Learning Algorithms for Effectively Detection IoT DDoS Attacks.
Proceedings of the 2023 International Conference on Advances in Computing Research, 2023


  Loading...