Moutaz Alazab

@bau.edu.jo

Faculty of AI
Al-Balqa Applied University



              

https://researchid.co/azab_moutaz

Dr. Moutaz Alazab is a computer security expert with industry, academic, teaching and research experience. He completed his PhD degree in cybersecurity from Deakin university, Australia in 2014. During his PhD, he was an active scholar in the Securing Cyberspace Laboratory and Network and System Security Laboratory (NSCLab). He received B.Eng. Degree in Computer Engineering from Faculty of Engineering, Al-Balqa Applied University, Jordan in 2009. Dr. Alazab has proved the ability in delivering a high-quality content for several courses for both level (undergraduate students and postgraduate students). He has lectured, coordinated, tutored and moderated in several well-known universities including in BAU, CCQ, Deakin, RMIT, CQU and MIT.

EDUCATION

-PhD. School of Information Technology, Faculty of Science, Engineering and Built Environment at Deakin University, Victoria, Australia, April 2011 – August 2014.
Thesis Title: “Analysis on Smartphone Devices for Detection and Prevention of Malware using Machine Learning algorithms"

-BEng. Department of Electrical & Computer Engineering, Faculty of Engineering, Al-Balqa Applied University, Amman – Jordan, October 2005 - August 2009.
Thesis Title: “Designing and Implementing an Intelligent Wireless-Enabled Robot Car”

-High School, Scientific Stream, Al-Salt Secondary School, Amman – Jordan, September 2004 - June 2005.

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Science, Artificial Intelligence, Computer Engineering, Computer Engineering

2416

Scholar Citations

22

Scholar h-index

32

Scholar i10-index

RECENT SCHOLAR PUBLICATIONS

  • Enhanced threat intelligence framework for advanced cybersecurity resilience
    M Alazab, RA Khurma, M Garca-Arenas, V Jatana, A Baydoun, ...
    Egyptian Informatics Journal 27, 100521 2024

  • Advances in Cybersecurity and Reliability
    M Alazab, A Alazab
    Information 15 (6), 361 2024

  • Enhanced Android Ransomware Detection Through Hybrid Simultaneous Swarm-Based Optimization
    M Alazab, RA Khurma, D Camacho, A Martn
    Cognitive Computation, 1-15 2024

  • Natural language inference model for customer advocacy detection in online customer engagement
    B Abu-Salih, M Alweshah, M Alazab, M Al-Okaily, M Alahmari, ...
    Machine Learning 113 (4), 2249-2275 2024

  • A novel IDS with a dynamic access control algorithm to detect and defend intrusion at IoT nodes
    M Alazab, A Awajan, H Alazzam, M Wedyan, B Alshawi, R Alturki
    Sensors 24 (7), 2188 2024

  • An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron
    M Alazab, RA Khurma, PA Castillo, B Abu-Salih, A Martn, D Camacho
    Egyptian Informatics Journal 25, 100423 2024

  • Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing.
    NA Karim, WK Abdulraheem, OA Khashan, M Alazab, H Kanaker, ...
    Computers, Materials & Continua 78 (2) 2024

  • Industry 4.0 Innovation: A Systematic Literature Review on the Role of Blockchain Technology in Creating Smart and Sustainable Manufacturing Facilities
    M Alazab, S Alhyari
    Information 15 (2), 78 2024

  • Integration Approaches for Heterogeneous Big Data: A Survey
    A Quraan, FN AL-Aswadi, RS Alkhawaldeh, M Alazab, A Awajan
    Cybernetics and Information Technologies 24 (1), 3-20 2024

  • Android ransomware detection using binary Jaya optimization algorithm
    M Alazab
    Expert Systems 41 (1), e13479 2024

  • Unifying Genetics and Imaging: MRI-Based Classification of MGMT Genetic Subtypes Using Visual Transformers
    I Babar, A Tahir, A Haider, HU Rehman, M Alazab
    2023 18th International Conference on Emerging Technologies (ICET), 122-128 2023

  • CapGAN: Text-to-Image Synthesis Using Capsule GANs
    M Omar, H Ur Rehman, OB Samin, M Alazab, G Politano, A Benso
    Information 14 (10), 552 2023

  • Evolving Generative Adversarial Networks to improve image steganography
    A Martn, A Hernndez, M Alazab, J Jung, D Camacho
    Expert Systems with Applications 222, 119841 2023

  • Improving semantic information retrieval using multinomial naive Bayes classifier and Bayesian networks
    W Chebil, M Wedyan, M Alazab, R Alturki, O Elshaweesh
    Information 14 (5), 272 2023

  • Cyber-physical system security based on human activity recognition through IoT cloud computing
    S Achar, N Faruqui, M Whaiduzzaman, A Awajan, M Alazab
    Electronics 12 (8), 1892 2023

  • Grapharizer: a graph-based technique for extractive multi-document summarization
    Z Jalil, M Nasir, M Alazab, J Nasir, T Amjad, A Alqammaz
    Electronics 12 (8), 1895 2023

  • Human Activity Recognition-based Cyber-Physical System Security Through IoT-Cloud Computing
    S Achar, N Faruqui, M Whaiduzzaman, A Awajan, M Alazab
    Preprints 2023

  • A new augmented reality system for calculating social distancing between children at school
    O Alshaweesh, M Wedyan, M Alazab, B Abu-Salih, A Al-Jumaily
    Electronics 12 (2), 358 2023

  • A new intrusion detection system based on Moth–Flame Optimizer algorithm
    M Alazab, RA Khurma, A Awajan, D Camacho
    Expert Systems with Applications 210, 118439 2022

  • Augmented reality-based English language learning: importance and state of the art
    M Wedyan, J Falah, O Elshaweesh, SFM Alfalah, M Alazab
    Electronics 11 (17), 2692 2022

MOST CITED SCHOLAR PUBLICATIONS

  • COVID-19 Prediction and Detection Using Deep Learning
    M Alazab, A Awajan, A Mesleh, A Abraham, V Jatana, S Alhyari
    International Journal of Computer Information Systems and Industrial 2020
    Citations: 319

  • Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures.
    M Alazab, S Venkatraman, PA Watters, M Alazab
    AusDM 11, 171-182 2011
    Citations: 309

  • Intelligent mobile malware detection using permission requests and API calls
    M Alazab, M Alazab, A Shalaginov, A Mesleh, A Awajan
    Future Generation Computer Systems 107, 509-521 2020
    Citations: 254

  • Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance
    M Alazab, S Alhyari, A Awajan, AB Abdallah
    Cluster Computing 24 (1), 83-101 2021
    Citations: 233

  • Using feature selection for intrusion detection system
    A Alazab, M Hobbs, J Abawajy, M Alazab
    2012 international symposium on communications and information technologies 2012
    Citations: 185

  • Cybercrime: the case of obfuscated malware
    M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab
    Global Security, Safety and Sustainability & e-Democracy: 7th International 2012
    Citations: 118

  • Performance evaluation of e‐government services using balanced scorecard: An empirical study in Jordan
    S Alhyari, M Alazab, S Venkatraman, M Alazab, A Alazab
    Benchmarking: an international journal 20 (4), 512-536 2013
    Citations: 96

  • Analysis of malicious and benign android applications
    M Alazab, V Moonsamy, L Batten, P Lantz, R Tian
    2012 32nd International Conference on Distributed Computing Systems 2012
    Citations: 75

  • Evolution of industry and blockchain era: monitoring price hike and corruption using BIoT for smart government and industry 4.0
    MK Hasan, M Akhtaruzzaman, SR Kabir, TR Gadekallu, S Islam, ...
    IEEE Transactions on Industrial Informatics 18 (12), 9153-9161 2022
    Citations: 71

  • A brief review of new threats and countermeasures in digital crime and cyber terrorism
    M Dawson
    New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 1-7 2015
    Citations: 71

  • Optimized Machine Learning-Based Intrusion Detection System for Fog and Edge Computing Environment
    O Alzubi, J Alzubi, M Alazab, A Alrabea, A Awajan, I Qiqieh
    MDPI-Electronics 2022
    Citations: 66

  • Trade-off among lean, agile, resilient and green paradigms: an empirical study on pharmaceutical industry in Jordan using a TOPSIS-entropy method
    T Suifan, M Alazab, S Alhyari
    International Journal of Advanced Operations Management 11 (1-2), 69-101 2019
    Citations: 55

  • Automated malware detection in mobile app stores based on robust feature generation
    M Alazab
    Electronics 9 (3), 435 2020
    Citations: 54

  • Augmented reality-based English language learning: importance and state of the art
    M Wedyan, J Falah, O Elshaweesh, SFM Alfalah, M Alazab
    Electronics 11 (17), 2692 2022
    Citations: 49

  • A new intrusion detection system based on Moth–Flame Optimizer algorithm
    M Alazab, RA Khurma, A Awajan, D Camacho
    Expert Systems with Applications 210, 118439 2022
    Citations: 43

  • Towards an understanding of the impact of advertising on data leaks
    V Moonsamy, M Alazab, L Batten
    International journal of security and networks 7 (3), 181-193 2012
    Citations: 41

  • Information security governance: the art of detecting hidden malware
    M Alazab, S Venkatraman, P Watters, M Alazab
    IT security governance innovations: theory and research, 293-315 2013
    Citations: 38

  • Evolving Generative Adversarial Networks to improve image steganography
    A Martn, A Hernndez, M Alazab, J Jung, D Camacho
    Expert Systems with Applications 222, 119841 2023
    Citations: 35

  • Detection of obfuscated malicious JavaScript code
    A Alazab, A Khraisat, M Alazab, S Singh
    Future Internet 14 (8), 217 2022
    Citations: 29

  • Web application protection against SQL injection attack
    A Alazab, M Alazab, J Abawajy, M Hobbs
    Proceedings of the 7th international conference on information technology 2011
    Citations: 29