Mohammad Rasmi Al-Mousa

Orcid: 0000-0002-5176-0910

Affiliations:
  • Zarqa University, Jordan


According to our database1, Mohammad Rasmi Al-Mousa authored at least 28 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Agile proactive cybercrime evidence analysis model for digital forensics.
Int. Arab J. Inf. Technol., 2025

Energy Efficiency Optimization in the IoT using Whale Optimization Algorithm and Simulated Annealing.
Proceedings of the 12th International Conference on Information Technology, 2025

2024
Enhancing Facial Feature Detection: Hybrid Active Shape and Active Appearance Model (HASAAM).
IEEE Access, 2024

Efficient Road Status Monitoring in Vehicular Ad-Hoc Networks: An Optimization Framework.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Enhancing Convergence Efficiency in Federated Learning Models.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Application of Big Data Analytics in Hashemite Kingdom of Jordan: Perspectives on the Mobile Telecommunications Industry.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

An Overview of Tools and Techniques in Network Forensics.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Main Confidentiality Challenges in Network Security: A Literature Review.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Unveiling Android Malware: A Deep Learning Perspective Using RNN and LSTM.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

Digital Evidence and Forensic Tools in Cyber Law: A Comprehensive Analysis.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

The Challenges of Using Generative AI Applications in Electronic Commerce.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

A secure IoT limited Devices by applying Multi-Round Lightweight Cryptography.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

IoT Security Based On Lightewight Cryptographic (LWC) Algorithms: A survey.
Proceedings of the 25th International Arab Conference on Information Technology, 2024

2023
A Comparative Study on the Performance of 64-bit ARM Processors.
Int. J. Interact. Mob. Technol., July, 2023

Security Challenges Review in Agile and DevOps Practices.
Proceedings of the International Conference on Information Technology, 2023

Analyzing and contrasting machine learning algorithms for Intrusion Detection System.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

2022
Vulnerabilities in Vehicular Ad Hoc Networks and Possible Countermeasures.
Proceedings of the International Arab Conference on Information Technology, 2022

Examining Digital Forensic Evidence for Android Applications.
Proceedings of the International Arab Conference on Information Technology, 2022

2021
Proposed E-payment Process Model to Enhance Quality of Service through Maintaining the Trust of Availability.
CoRR, 2021

Analyzing Cyber-Attack Intention for Digital Forensics Using Case-Based Reasoning.
CoRR, 2021

Using Chaotic Stream Cipher to Enhance Data Hiding in Digital Images.
CoRR, 2021

Intelligent security in the era of AI: The key vulnerability of RC4 algorithm.
Proceedings of the International Conference on Information Technology, 2021

Generic Proactive IoT Cybercrime Evidence Analysis Model for Digital Forensics.
Proceedings of the International Conference on Information Technology, 2021

Improving VANET's Performance by Incorporated Fog-Cloud Layer (FCL).
Proceedings of the 22nd International Arab Conference on Information Technology, 2021

2018
A Proposed Wireless Intrusion Detection Prevention and Attack System.
Proceedings of the International Arab Conference on Information Technology, 2018

2013
Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse.
J. Netw. Syst. Manag., 2013

2012
A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2011
Attack Intention Analysis Model for Network Forensics.
Proceedings of the Software Engineering and Computer Systems, 2011


  Loading...