Mohammad Alauthman

Orcid: 0000-0003-0319-1968

According to our database1, Mohammad Alauthman authored at least 67 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
An enhanced BiGAN architecture for network intrusion detection.
Knowl. Based Syst., 2025

Intelligent Control Agent For IoT Network Attack Detection: A Machine Learning Approach.
IT Prof., 2025

Enhancing Organizational Performance: Synergy of Cyber-Physical Systems, Cloud Services, and Crowdsensing.
Int. J. Crowd Sci., 2025

Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes.
Int. J. Crowd Sci., 2025

Remote Labs in Cybersecurity Education: Analyzing Software Requirements and Challenges.
Int. J. Cloud Appl. Comput., 2025

Unified Transformer Framework for Automated Cyberbullying Detection.
Int. J. Cloud Appl. Comput., 2025

Information Theory-Based DDoS Attack Detection in Cloud Computing: A Systematic Survey of Approaches, Challenges, and Future Directions.
Int. J. Cloud Appl. Comput., 2025

Comprehensive Evaluation of XBNet for Multi-Class IoT Attack Detection.
Int. J. Cloud Appl. Comput., 2025

HECOCP: hybrid edge-cloud optimistic concurrency protocol for sensor data transactional services.
Int. Arab J. Inf. Technol., 2025

Balancing consistency and performance in edge-cloud transaction management.
Comput. Hum. Behav., 2025

Anomaly-based network intrusion detection using denoising autoencoder and Wasserstein GAN synthetic attacks.
Appl. Soft Comput., 2025

Ethical Foundations of AI-Driven Avatars in the Metaverse for Innovation and User Privacy.
IEEE Access, 2025

TGAN and CTGAN: A Comparative Analysis for Augmenting COVID 19 Tabular Data.
Proceedings of the 27th International Conference on Enterprise Information Systems, 2025

2024
Unintended Data Behaviour Analysis Using Cryptography Stealth Approach Against Security and Communication Network.
Mob. Networks Appl., December, 2024

Deep learning-based route reconfigurability for intelligent vehicle networks to improve power-constrained using energy-efficient geographic routing protocol.
Wirel. Networks, February, 2024

Mlora-CBF: efficient cluster-based routing protocol against resource allocation using modified location routing algorithm with cluster-based flooding.
Wirel. Networks, February, 2024

Deep reinforcement learning based Evasion Generative Adversarial Network for botnet detection.
Future Gener. Comput. Syst., January, 2024

Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting.
Int. J. Cloud Appl. Comput., 2024

Analyzing Darknet Traffic Through Machine Learning and Neucube Spiking Neural Networks.
Intell. Converged Networks, 2024

Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models.
Int. Arab J. Inf. Technol., 2024

CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

A Framework for Cybersecurity in the Metaverse.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

IoT Security Challenges in Modern Smart Cities.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Malware Threats Targeting Cryptocurrency: A Comparative Study.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Machine Learning for Enhanced Autism Screening: A Comparative Evaluation of Classification Algorithms.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Next Generation Image Watermarking via Combined DWT-SVD Technique.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Cyberbullying Detection Using Deep Learning: A Comparative Study.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Adverserial network augmentation and tabular data for a new covid-19 diagnostics approach.
Proceedings of the 10th International Conference on Control, 2024

Advancing Stroke Prediction: Explainable Machine Learning Models and Data Augmentation Strategies.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Unveiling Deception: Different Strategies for Combatting Arabic Fake News.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Detection of Thyroid Disease Through Machine Learning Technique.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

2023
Evasion Generative Adversarial Network for Low Data Regimes.
IEEE Trans. Artif. Intell., October, 2023

Transactional Services for Concurrent Mobile Agents over Edge/Cloud Computing-Assisted Social Internet of Things.
ACM J. Data Inf. Qual., September, 2023

Ensembling validation indices to estimate the optimal number of clusters.
Appl. Intell., May, 2023

Enhancing Small Medical Dataset Classification Performance Using GAN.
Informatics, March, 2023

Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks.
J. Ambient Intell. Humaniz. Comput., 2023

Redefining E-Commerce Experience: An Exploration of Augmented and Virtual Reality Technologies.
Int. J. Semantic Web Inf. Syst., 2023

Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments.
Int. J. Softw. Sci. Comput. Intell., 2023

Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols.
Int. J. Cloud Appl. Comput., 2023

The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds.
Int. J. Cloud Appl. Comput., 2023

A Robust Model for Translating Arabic Sign Language into Spoken Arabic Using Deep Learning.
Intell. Autom. Soft Comput., 2023

Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic.
Intell. Autom. Soft Comput., 2023

RoboGuard: enhancing robotic system security with ensemble learning.
Int. Arab J. Inf. Technol., 2023

CTELC: A Constant-Time Ensemble Learning Classifier Based on KNN for Big Data.
IEEE Access, 2023

Efficient Scanning Activity Detection in IoT Networks Using Ensemble Learning.
Proceedings of the Asia Conference on Artificial Intelligence, 2023

Enhancing Phishing URL Detection: A Comparative Study of Machine Learning Algorithms.
Proceedings of the Asia Conference on Artificial Intelligence, 2023

The effect of Data Augmentation Using SMOTE: Diabetes Prediction by Machine Learning Techniques.
Proceedings of the 6th Artificial Intelligence and Cloud Computing Conference, 2023

2022
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study.
Int. J. Semantic Web Inf. Syst., 2022

A Proposed Framework for Early Detection IoT Botnet.
Proceedings of the International Arab Conference on Information Technology, 2022

Machine learning Scheme for Managing Virtual Computing Resources in Cloud Market.
Proceedings of the International Arab Conference on Information Technology, 2022

2021
Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks.
Wirel. Pers. Commun., 2021

Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm.
Int. J. Ad Hoc Ubiquitous Comput., 2021

DNS rule-based schema to botnet detection.
Enterp. Inf. Syst., 2021

EVAGAN: Evasion Generative Adversarial Network for Low Data Regimes.
CoRR, 2021

Security Hardening of Botnet Detectors Using Generative Adversarial Networks.
IEEE Access, 2021

Diabetic Retinopathy Detection using Ensemble Machine Learning.
Proceedings of the International Conference on Information Technology, 2021

2020
IoT transaction processing through cooperative concurrency control on fog-cloud computing environment.
Soft Comput., 2020

An efficient reinforcement learning-based Botnet detection approach.
J. Netw. Comput. Appl., 2020

A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing.
Int. J. Cloud Appl. Comput., 2020

Energy-Efficiency Routing algorithms in Wireless Sensor Networks: a Survey.
CoRR, 2020

Evaluation of Class Decomposition based on Clustering Validity and K-means Algorithm.
Proceedings of the 21st International Arab Conference on Information Technology, 2020

Feature Selection Using a Machine Learning to Classify a Malware.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
A comparative study on spiking neural network encoding schema: implemented with cloud computing.
Clust. Comput., 2019

2018
A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks.
Neural Comput. Appl., 2018

An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms.
Int. J. Cloud Appl. Comput., 2018

Botnets Detecting Attack Based on DNS Features.
Proceedings of the International Arab Conference on Information Technology, 2018

2016
An efficient approach to online bot detection based on a reinforcement learning technique.
PhD thesis, 2016


  Loading...