Mohammad Alauthman
Orcid: 0000-0003-0319-1968
According to our database1,
Mohammad Alauthman
authored at least 67 papers
between 2016 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Knowl. Based Syst., 2025
Intelligent Control Agent For IoT Network Attack Detection: A Machine Learning Approach.
IT Prof., 2025
Enhancing Organizational Performance: Synergy of Cyber-Physical Systems, Cloud Services, and Crowdsensing.
Int. J. Crowd Sci., 2025
Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes.
Int. J. Crowd Sci., 2025
Remote Labs in Cybersecurity Education: Analyzing Software Requirements and Challenges.
Int. J. Cloud Appl. Comput., 2025
Int. J. Cloud Appl. Comput., 2025
Information Theory-Based DDoS Attack Detection in Cloud Computing: A Systematic Survey of Approaches, Challenges, and Future Directions.
Int. J. Cloud Appl. Comput., 2025
Int. J. Cloud Appl. Comput., 2025
HECOCP: hybrid edge-cloud optimistic concurrency protocol for sensor data transactional services.
Int. Arab J. Inf. Technol., 2025
Comput. Hum. Behav., 2025
Anomaly-based network intrusion detection using denoising autoencoder and Wasserstein GAN synthetic attacks.
Appl. Soft Comput., 2025
Ethical Foundations of AI-Driven Avatars in the Metaverse for Innovation and User Privacy.
IEEE Access, 2025
Proceedings of the 27th International Conference on Enterprise Information Systems, 2025
2024
Unintended Data Behaviour Analysis Using Cryptography Stealth Approach Against Security and Communication Network.
Mob. Networks Appl., December, 2024
Deep learning-based route reconfigurability for intelligent vehicle networks to improve power-constrained using energy-efficient geographic routing protocol.
Wirel. Networks, February, 2024
Mlora-CBF: efficient cluster-based routing protocol against resource allocation using modified location routing algorithm with cluster-based flooding.
Wirel. Networks, February, 2024
Deep reinforcement learning based Evasion Generative Adversarial Network for botnet detection.
Future Gener. Comput. Syst., January, 2024
Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting.
Int. J. Cloud Appl. Comput., 2024
Analyzing Darknet Traffic Through Machine Learning and Neucube Spiking Neural Networks.
Intell. Converged Networks, 2024
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models.
Int. Arab J. Inf. Technol., 2024
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Machine Learning for Enhanced Autism Screening: A Comparative Evaluation of Classification Algorithms.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024
Adverserial network augmentation and tabular data for a new covid-19 diagnostics approach.
Proceedings of the 10th International Conference on Control, 2024
Advancing Stroke Prediction: Explainable Machine Learning Models and Data Augmentation Strategies.
Proceedings of the 25th International Arab Conference on Information Technology, 2024
Proceedings of the 25th International Arab Conference on Information Technology, 2024
Proceedings of the 25th International Arab Conference on Information Technology, 2024
2023
IEEE Trans. Artif. Intell., October, 2023
Transactional Services for Concurrent Mobile Agents over Edge/Cloud Computing-Assisted Social Internet of Things.
ACM J. Data Inf. Qual., September, 2023
Appl. Intell., May, 2023
Informatics, March, 2023
Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks.
J. Ambient Intell. Humaniz. Comput., 2023
Redefining E-Commerce Experience: An Exploration of Augmented and Virtual Reality Technologies.
Int. J. Semantic Web Inf. Syst., 2023
Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments.
Int. J. Softw. Sci. Comput. Intell., 2023
Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols.
Int. J. Cloud Appl. Comput., 2023
The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds.
Int. J. Cloud Appl. Comput., 2023
A Robust Model for Translating Arabic Sign Language into Spoken Arabic Using Deep Learning.
Intell. Autom. Soft Comput., 2023
Intell. Autom. Soft Comput., 2023
Int. Arab J. Inf. Technol., 2023
IEEE Access, 2023
Proceedings of the Asia Conference on Artificial Intelligence, 2023
Enhancing Phishing URL Detection: A Comparative Study of Machine Learning Algorithms.
Proceedings of the Asia Conference on Artificial Intelligence, 2023
The effect of Data Augmentation Using SMOTE: Diabetes Prediction by Machine Learning Techniques.
Proceedings of the 6th Artificial Intelligence and Cloud Computing Conference, 2023
2022
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study.
Int. J. Semantic Web Inf. Syst., 2022
Proceedings of the International Arab Conference on Information Technology, 2022
Proceedings of the International Arab Conference on Information Technology, 2022
2021
Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks.
Wirel. Pers. Commun., 2021
Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm.
Int. J. Ad Hoc Ubiquitous Comput., 2021
IEEE Access, 2021
Proceedings of the International Conference on Information Technology, 2021
2020
IoT transaction processing through cooperative concurrency control on fog-cloud computing environment.
Soft Comput., 2020
J. Netw. Comput. Appl., 2020
Int. J. Cloud Appl. Comput., 2020
CoRR, 2020
Evaluation of Class Decomposition based on Clustering Validity and K-means Algorithm.
Proceedings of the 21st International Arab Conference on Information Technology, 2020
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020
2019
A comparative study on spiking neural network encoding schema: implemented with cloud computing.
Clust. Comput., 2019
2018
A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks.
Neural Comput. Appl., 2018
Int. J. Cloud Appl. Comput., 2018
Proceedings of the International Arab Conference on Information Technology, 2018
2016
An efficient approach to online bot detection based on a reinforcement learning technique.
PhD thesis, 2016