Mustafa Al-Fayoumi

Orcid: 0000-0002-3129-5193

According to our database1, Mustafa Al-Fayoumi authored at least 22 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
XAI-PDF: a robust framework for malicious PDF detection leveraging SHAP-based feature engineering.
Int. Arab J. Inf. Technol., 2024

2023
Capturing low-rate DDoS attack based on MQTT protocol in software Defined-IoT environment.
Array, September, 2023

An intelligent identification and classification system for malicious uniform resource locators (URLs).
Neural Comput. Appl., August, 2023

Generalized Ethereum Blockchain-based recommender system framework.
Inf. Syst., 2023

Enhancing Financial System Resilience Against Cyber Threats via SWIFT Customer Security Framework.
Proceedings of the International Conference on Information Technology, 2023

Enhancing Password Security via Supervised Learning.
Proceedings of the International Conference on Information Technology, 2023

2022
Email phishing detection based on naïve Bayes, Random Forests, and SVM classifications: A comparative study.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Efficient Email phishing detection using Machine learning.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2021
Enhanced collision resolution and throughput analysis for the 802.11 distributed coordination function.
Int. J. Commun. Syst., 2021

Exposing Bot Attacks Using Machine Learning and Flow Level Analysis.
Proceedings of the DATA'21: International Conference on Data Science, 2021

Detecting Twitter Fake Accounts using Machine Learning and Data Reduction Techniques.
Proceedings of the 10th International Conference on Data Science, 2021

2020
Intelligent Association Classification Technique for Phishing Website Detection.
Int. Arab J. Inf. Technol., July, 2020

Detecting Network Anomalies using Rule-based machine learning within SNMP-MIB dataset.
CoRR, 2020

2018
SSOAM: Automated Security Testing Framework for SOA Middleware in Banking Domain.
J. Comput. Sci., 2018

Performance Analysis of SAP-NFC Protocol.
Int. J. Commun. Networks Inf. Secur., 2018

A new model of multi-key generation for RFID access control system.
Int. Arab J. Inf. Technol., 2018

Scalable Agile Transformation Process (SATP) to Convert Waterfall Project Management Office into Agile Project Management Office.
Proceedings of the International Arab Conference on Information Technology, 2018

Modernization of a Classical Data Center (CDC) vs. Adoption in Cloud Computing Calculate Total Cost of Ownership for Both Cloud and CDC - Jordanian Case Study.
Proceedings of the International Arab Conference on Information Technology, 2018

2017
An Efficient E-Exam Scheme.
Int. J. Emerg. Technol. Learn., 2017

2010
A New Digital Signature Scheme Based on Integer Factoring and Discrete Logarithm Problem.
Int. J. Comput. Their Appl., 2010

2008
An Efficient RSA Public Key Encryption Scheme.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

2007
A New Hybrid Approach of Symmetric/Asymmetric Authentication Protocol for Future Mobile Networks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007


  Loading...