Mohammad Rasmi AlMousa

@zu.edu.jo

Cybersecurity Department/Faculty of Information Technology
Zarqa University



                 

https://researchid.co/mohammadrasmi

RESEARCH INTERESTS

Network Security, Digital Forensics, Software Engineering

43

Scopus Publications

715

Scholar Citations

15

Scholar h-index

25

Scholar i10-index

Scopus Publications

  • Applicability of IoT-Aware Models in Healthcare Systems: Potential and Challenges
    Mohammad Rasmi Al-Mousa, Ala’a Saeb Al-Sherideh, Ala’a Al-shaikh, Mohammad Alqudah, Ayman Ghaben, Hani Almimi, Mohammad Arabiat, and Suha Afaneh

    World Scientific and Engineering Academy and Society (WSEAS)
    The innovative Internet of Things (IoT) concept has become a worldwide phenomenon. The growing use of IoT devices over the past few decades has changed the way we interact with the embedded devices around us. The exponential rise of IoT devices and the data flowing from these devices is creating an impact on various fields such as healthcare, transportation, smart cities, and more. This paper aims to describe the potential and discuss challenges for using IoT-Aware models in the healthcare domain, identifying threats that should be mitigated to guarantee the successful applicability of those models. The most recent research on each component of the model is then presented, along with an assessment of its advantages, disadvantages, and applicability to a wearable IoT healthcare system. Security, privacy, wearability, and low-power operation are only a few of the difficulties that the IoT in healthcare must overcome. IoT challenges in healthcare include wearability, security, and privacy issues. Recommendations are also offered for future research paths. This paper concludes that IoT might assist governments in enhancing societal health care and business connections.

  • Antecedents of cloud-based financial information systems usage: An integrated model
    Raed Masadeh, Dmaithan Abdelkarim Almajali, Manaf Al-Okaily, Nida AL-Sous, and Mohammad Rasmi Al-Mousa

    Growing Science
    The recent progress of Financial Information System (FIS) has significantly affected businesses’ sustainable production process. Businesses generally employ FIS to automate their operational procedures and increase their corporate efficiencies through improvement in output quality and sustainability. The performance of FIS has been attributed to its key success criteria. Accordingly, this study examined antecedents of FIS intention to use among Small and Medium-Size Enterprises (SMEs) in Jordan at individual level, with specific focus on the acceptance and use of FIS among accounting department employees. Based on 436 respondents from Jordanian SMEs, results showed an impact of COVID-19 risk, trust, performance expectancy, and perceived severity on the intention to use FIS, whereas effort expectancy and perceived vulnerability showed no impact on the intention to use FIS among Jordanian SMEs.

  • DATA INTEGRITY CONCERNS, REQUIREMENTS, AND PROOFING IN CLOUD COMPUTING


  • Penetration Testing Overview-Opportunities and Ethical Considerations: Literature Notes
    Mahmoud Asassfeh, Ghassan Samara, Ali Abu Zaid, Dena Abu Laila, Shouq Al-Anzi, Abdullah Alqammaz, Ahmad Al Smadi, Ala'a Al-Shaikh, and Mohammad Rasmi Al-Mousa

    IEEE
    The paper relates to how Large Language Models and penetration testing practices interlink, providing a critical outlook on the potential of LLMs, along with their ethical ramifications. It performs an overview of the state-of-art in LLM-driven penetration testing through the analysis of three different studies. The first introduces PENTESTGPT, an LLM specifically designed for the purpose of penetration testing. This is indeed an LLM that proves to be quite efficient in performing tasks and giving logical reasoning. This study, however, also underlines several challenges on the narrow scope and generalizability of this model and questions its greater applicability. The second involves research into LLMs as AI sparring partners for the simulation of real-world cyberattacks that target vulnerabilities in systems. In the interest of finding flaws in security, the study exposes some strong ethical concerns-particularly on adversarial uses of AI in that direction. This third study shall explore the role of penetration testing in cloud security frameworks and help indicate how such practice is indispensable in maintaining security in cloud infrastructures. The paper further outlines the shared responsibility that exists in the maintenance of security between the cloud service providers and users besides highlighting what LLMs can do in this area. Aggregately, these studies help to outline the transformative power of LLMs in improving pen-testing. Yet, they also at the same time require great attention to ethical considerations and further research to make sure that deployment of LLMs really is responsible within the evolving cybersecurity landscape.

  • Enhancing Facial Feature Detection: Hybrid Active Shape and Active Appearance Model (HASAAM)
    Musab Iqtait, Jafar Ababneh, Mohammad Rasmi, Amer Abu-Jassar, and Suhaila Abuowaida

    Institute of Electrical and Electronics Engineers (IEEE)

  • Security System for Bank Cash Safe
    Ahmad Al-Fandi, Ahmad Toma, Basim Alsayid, Samer Alsadi, Tareq Foqha, Ali Elrashidi, and Mohammad Rasmi Al-Mousa

    Springer Nature Switzerland

  • Design a Smart Turbines for Power Generation
    Mohammad Kaik, Momen Zarour, Faris Sabha, Tawfiq Abu-salah, M. Muntaser-Aldabe, Samer Alsadi, Tareq Foqha, and Mohammad Rasmi Al-Mousa

    Springer Nature Switzerland

  • Automatic Smart Parking
    Abdullah Ziadeh, Heba Zedan, Taima’a Theeb, Waseem Kharoof, Arafat Zedan, Samer Alsadi, Tareq Foqha, and Mohammed Rasmi Al-Mousa

    Springer Nature Switzerland

  • Website Phishing Detection Using Machine Learning Techniques
    R. Alazaidah, A. Al-Shaikh, M. Al-Mousa, H. Khafajah, G. Samara, M. Alzyoud, N. Al-Shanableh and S. Almatarneh

    Natural Sciences Publishing
    : Phishing is a cybercrime that is constantly increasing in the recent years due to the increased use of the Internet and its applications. It is one of the most common types of social engineering that aims to disclose or steel users sensitive or personal information. In this paper, two main objectives are considered. The first is to identify the best classifier that can detect phishing among twenty-four different classifiers that represent six learning strategies. The second objective aims to identify the best feature selection method for websites phishing datasets. Using two datasets that are related to Phishing with different characteristics and considering eight evaluation metrics, the results revealed the superiority of RandomForest, FilteredClassifier, and J-48 classifiers in detecting phishing websites. Also, InfoGainAttributeEval method showed the best performance among the four considered feature selection methods.

  • Development of a Secure Model for Mobile Government Applications in Jordan
    Saeb Al-Sherideh, Roesnita Ismail, M. Al-Mousa, Khaled E. Al-Qawasmi, Ala'a F. Al-Shaikh, H. Awwad, K. Maabreh and Mohammad Alauthman

    Natural Sciences Publishing
    : This paper develops a secure model for mobile government (M-G) applications using effective privacy methods and validates the model through semi-structured interviews with eight Jordanian e-government experts. The experts emphasized the importance of M-G applications in enhancing services such as bill payments, civil services, civil defense, and police services. To improve privacy, the experts suggested methods such as strong textual passwords, data encryption, login tracking, SMS login confirmation

  • Numerical Analysis of Friction Stir Welding on an Alumunium Butt Joint
    Aman R. Anand, V. Srivastav, M. Al-Mousa, A. Paul, S. Thota, R. Anand, K. Srivastav, R. Al-Mousa, Akshoy Mohammad R. Paul and An International

    Natural Sciences Publishing
    : In this paper, we present a three-dimensional numerical analysis of friction stir welding on an alumunium butt joint. A thin sheet of aluminum marking material was embedded into the 6061-aluminum alloy panel and its rear weld path. The positions after friction stir welding were investigated by metallographic techniques. Looking at the visualized material flow pattern, a three-dimensional model was developed to numerically simulate the temperature profile and plastic effects. The calculated velocity profile for plastic flow in the immediate vicinity of the tool generally agrees with the visualized results. Increasing the tool speed while maintaining a constant tool feed rate increases the material flow near the pin. The shape and size of the predicted weld zone match the experimentally measured ones

  • Awareness model for minimizing the effects of social engineering attacks in web applications
    Maher Al-Khateeb, Mohammad Rasmi Al-Mousa, Ala’a Saeb Al-Sherideh, Dmaithan Almajali, Mahmoud Asassfeha, and Hayel Khafajeh

    Growing Science
    Social Engineering (SE) Attacks against information systems continue to pose a potentially devastating impact. Security information systems are becoming increasingly significant as the number of SE incidents rapidly increased and became more aggressive than before. The World Wide Web (WWW) has evolved for information exchange and knowledge-sharing. It enables the sharing of information in a timely, effective, and transparent manner. Identity theft and identity misuse are two sides of cybercrime in which hackers and fraudulent users collect sensitive information from current legal users in order to perform fraud or deceit for financial gain. Malicious links are used as phishing methods, in which malicious links are planted beneath legitimate-looking links. As the number of web pages grows, the number of malicious web pages and the attacks of such become more complex. In this paper, we provide a method for identifying malicious web pages using a crawling and classification approach that helps to support the automatic discovery of the malicious links. The proposed approach can successfully complete the crawling session even if the page requires partial page refreshment and authentication credentials. The evaluation of the proposed approach shows a higher accuracy compared to an existing approach with an overall accuracy of 72% in three custom applications. Moreover, the proposed approach will calculate the significance and the impact severances of each link on the website and it better differentiates malicious web pages and normal links. The results of the proposed approach will also help in providing a set of recommendations which can increase the awareness level of the end-users, website administrators on how to better deal with these types of SE attacks.

  • Analyzing and contrasting machine learning algorithms for Intrusion Detection System
    Shrouq Al-Daja, Ala'Alyabrodi, Mohammad Rasmi Al-Mousa, Abdullah Al-Qammaz, Kholod Naser Olimat, Hamza M Olemat, and Mohammad Sh Daoud

    IEEE
    As the prevalence of sophisticated network attacks continues to rise, enhancing conventional intrusion detection systems (IDS) methods presents a significant challenge. Machine learning (ML)-based anomaly detection and cybersecurity analytics have been widely used in research and development projects related to network IDS. This study explores a set of classifiers on specific domain is a cybersecurity. A significant aspect of this study involves data preparation, including a selection of important features to enhance detection accuracy. Additionally, the study introduces the Synthetic Minority Over-sampling Technique (SMOTE) to address the challenge of classifying imbalanced data. The primary aim of this study is to evaluate various classifiers, such as Random Forest (RF), Decision Tree (DT), K-Nearest Neighbors (KNN), and Multi-layer perceptron (MLP) neural network. The experiments involve different feature groups distributed at percentages of 25%, 50%, 75%, and 100%. The evaluation is conducted from the perspectives of evaluation measurements, time consumption, and space utilization. The experimental findings highlight that RF outperforms the other classifiers, achieving an accuracy of 0.96778, precision of 0.73007, recall of 0.74087, F1 score of 0.73184, and G-mean of 0.22136.


  • Machine Learning-Based Detection of Smartphone Malware: Challenges and Solutions
    Mesopotamian Academic Press
    The goal of this research is to review the researcher's different attempts with respect to new and emerging technology in malware detection techniques based on machine learning approaches over smartphones. The aim is to evaluate and benchmark these techniques, identify the current landscape of research in this area, and construct a cohesive taxonomy. The available options and gaps will be analyzed to provide valuable insights for researchers regarding the technological environments within this research area. A deep analysis review was conducted to identify studies addressing smartphone security based on machine learning approaches in order to identify all related articles. The outcomes of the last classification scheme of these articles were categorized into types of detection: dynamic analysis, static analysis, hybrid analysis, and uniform resource locator (URL) analysis. The evaluation criteria used in malware detection techniques, with respect to machine learning approaches for smartphones, include accuracy, precision rates (including true positive, false positive, true negative, false negative), training time, f-measure, detection time, area under the curve, true positive, true negative, false positive, false negative, and error rate. Additionally, our classification covers the main machine learning techniques used in the reviewed studies. The taxonomy includes three distinct layers, each reflecting one aspect of the analysis. We also reviewed the details of various types of malicious and benign datasets used within malware detection. Furthermore, open issues and challenges were identified in terms of evaluation and benchmarking, which jeopardize the utilization of this technology. We have described a new recommendation pathway solution that aims to enhance the measurement process of smartphone security applications.

  • Security Challenges Review in Agile and DevOps Practices
    Suha Afaneh, Mohammad Rasmi Al-Mousa, Hilal Shrif Al-hamid, Bara'h Suliman AL-Awasa, Mohammad Alia, Hani Almimi, and Ahmad A Alkhatib

    IEEE
    Agile and DevOps methodologies are becoming increasingly popular in software development, as they offer many benefits to software development teams and the organizations they work for. Agile methods depend on speed in development, repetition, and an increase in focus on the main characteristics and functions of the system. The DevOps approach aims at continuous integration, continuous delivery, continuous improvement, and faster feedback. Security is a critical component of Agile and DevOps methodologies. Integrating security into the development process from the outset can help to reduce the risk of security vulnerabilities, improve collaboration between development and security teams, enable rapid response to security incidents, increase automation, and ensure compliance with regulatory requirements. In conclusion, security has challenges in agile and DevOps approaches, so this paper discusses the most important challenges of combining ensuring security and continuous development.


  • A Comparative Study on the Performance of 64-bit ARM Processors
    Ala'a Al-Shaikh, Ameen Shaheen, Mohammed Rasmi Al-Mousa, Khaled Alqawasmi, Ala'a Saeb Al Sherideh, and Hebatullah Khattab

    International Association of Online Engineering (IAOE)
    Mobile devices are playing an important role in our daily lives. Nowadays, mobile devices are not only phones to call and text, but they are also smart devices that enable users to do almost any task that could be done on a regular PC.  At the heart of the design of smartphones, there lies the processor to which almost all the development in the smartphone arena is attributed. Recently, ARM processors are among the most prominent processors used in mobile devices, smartphones, and embedded systems. This paper conducts an experimental comparative study of ARM 64-bit processors in terms of performance and their effect on power consumption, CPU temperature, and battery temperature.  We use a number of well-known benchmarks to evaluate those characteristics of three smartphones, namely, Snapdragon 778G+, Exynos 1280 and HiSilicon Kirin 980. Those smartphones are all equipped with ARM 64-bit processors. Our results reveal that none of the three-selected smartphones was the best in all characteristics; each has superiority amongst others in certain characteristics and is dominated by others in other characteristics.

  • Assessing the Impact and Effectiveness of Cybersecurity Measures in e-Learning on Students and Educators: A Case Study
    Alaa Saeb Al-Sherideh, Khaled Maabreh, Majdi Maabreh, Mohammad Rasmi Al Mousa, and Mahmoud Asassfeh

    The Science and Information Organization

  • Image Captions and Hashtags Generation Using Deep Learning Approach
    Yahya Qusay AL-Sammarraie, Khaled AL-Qawasmi, Mohammad Rasmi AL-Mousa, and Sameh F. Desouky

    IEEE
    social media are fantastic tools for public communication. Social media has become an integral part of our everyday lives, and an increasing number of individuals use it for marketing and communication. Social networking enables you to demonstrate your skills and knowledge without leaving home. Companies exert significant efforts to make social media more controlled and valuable while avoiding negative repercussions. They accomplish this with artificial intelligence (AI), which enables them to develop unique applications and algorithms. It can eliminate inappropriate information or spam automatically, for instance. The description and hashtags that grab the reader's attention are among the most critical aspects of a social media post's success. Typically, individuals generate multiple captions and hashtags before selecting the optimal content for a post. Occasionally, they employ content writers, which requires time, effort, and money. The suggested method makes correct captions and hashtags using conventional neural networks (CNN) trained on image datasets containing captions

  • Deep Learning for Automatic Determination of Bone Age in Children
    Pouya Khomand, Malihe Sabeti, Reza Boostani, Ehsan Moradi, Mahmoud Odeh, and Mohammad Rasmi AL-Mousa

    IEEE
    Skeletal bone age assessment (SBAA) is very important for both sides of parents and physicians to evaluate the irregular growth of children. SBAA process is carried out by radiologists who visually inspect the radiology image of the left hand according to the Greulich and Pyle (GP) or the Tanner-Whitehouse 2 (TW2) methods. However, human eyes have their own limitations and therefore the visual inspection procedure by radiologist involves a degree of error and also intra personal variability. To address these drawbacks, a deep learning-based approach is proposed here to precisely act on these X-ray images. The employed database contains 1391 X-ray left-hand image from Los Angeles children's hospital and 200 left hand x-ray image from different age and gender from Iranian children from Namazi hospital of Shiraz. Our results demonstrate the efficiency of proposed model (mean absolute error of 0.89) in this field.

  • Classifying Date Palm Tree Diseases Using Machine Learning
    Mooad Al-Shalout, Khalid Mansour, Khaled E. Al-Qawasmi, and Mohammad Rasmi

    IEEE
    One of Jordan's most significant agricultural crops is the date palm tree. The high level of interest in date palm farming is a result of the crop's superior economic viability when compared to other agricultural crops; Jordan's annual investments in this sector are expected to be more than $500 million. Recently, the Jordanian ministry of agriculture reported that many trees are vulnerable to damage because of several diseases related to date palms. In this study, the convolutional neural network (CNN) and support vector machine (SVM) algorithms are used to detect and classify date palm diseases. Four common diseases are considered in this paper: bacterial blight, brown spots, leaf smut, and white scales. The palm farms in the northern Jordan Valley, Kaggle, the National Center for Agricultural Research, and other sources provided the dataset used in this study. The experimental results show that CNN is effective mechanism for detecting and classifying Date Palm disease especially when large dataset is used in training the algorithm.

  • Two-Layer SVM, Towards Deep Statistical Learning
    Alireza Kazemi, Reza Boostani, Mahmoud Odeh, and Mohammad Rasmi AL-Mousa

    IEEE
    Support Vector Machine (SVM) is originally a binary large-margin classifier emerged from the concept of structural risk minimization. Multiple solutions such as one-versus-one and one-versus-all have been proposed for creating multi-class SVM using elementary binary SVMs. Also multiple solutions have been proposed for SVM model selection, adjusting margin-parameter C and the Gaussian kernel variance. Here, an improved classifier named SVM-SVM is proposed for multi-class problems which increases accuracy and decreases dependency to margin-parameter selection. SVM-SVM adopts two K-class one-vs-one SVMs in a cascaded two-layer structure. In the first layer, input features are fed to one-vs-one SVM with non-linear kernels. We introduce this layer as a large-margin non-linear feature transform that maps input feature space to a discriminative K*(K-1)/2 dimensional space. To assess our hierarchical classifier, some datasets from the UCI repository are evaluated. Standard one-vs-one SVM and one-vs-one fuzzy SVM are used as reference classifiers in experiments. Results show significant improvements of our proposed method in terms of test accuracy and robustness to the model (margin and kernel) parameters in comparison with the reference classifiers. Our observations suggest that a multi-layer (deep) SVM structures can gain the same benefits as is seen in the deep neural nets (DNNs).

  • An Efficient Classifier: Kernel SVM-LDA
    Fahimeh Jamshidian Tehrani, Behrooz Nasihatkon, Khaled Al-Qawasmi, Mohammad Rasmi Al-Mousa, and Reza Boostani

    IEEE
    This study aims at designing an efficient combinatorial classifier, which fuses linear discriminant analysis (LDA) and kernel support vector machine (SVM) classifiers. The proposed method is called kernel SVM-LDA which benefits from global property of LDA, simultaneous with localized capability of SVM along with mapping ability of RBF kernel to project input data into a more separable high dimensional space. To assess the proposed scheme, Kernel SVM-LDA was applied to some standard datasets derived from UCI database and then compared to standard LDA and kernel SVM classifiers. Kernel SVM-LDA was also employed in cue-based brain computer interface to classify the left and right imagery movements. The results indicate that the introduced method is more superior to that of LDA and kernel SVM because it surpasses the counterparts in terms of robustness, complexity and performance.

  • Vulnerabilities in Vehicular Ad Hoc Networks and Possible Countermeasures
    Ghassan Samara, Mohammed Bhaa Eid, Mohammad Aljaidi, Sattam Almatarneh, Mohammad Rasmi, Raed Alazaideh, and Yasser Al-Lahham

    IEEE
    Recently, the Vehicular Ad Hoc Network, or VANET, has emerged as the most essential topic for researchers and the automobile industry to discuss in order to enhance the level of safety enjoyed by road users. Users of VANET need to be able to access both safety-related and non-safety-related apps. In this paper, we offer sixteen different kinds of attacks, as well as potential defenses against them.

RECENT SCHOLAR PUBLICATIONS

  • Penetration Testing Overview-Opportunities and Ethical Considerations: Literature Notes
    M Asassfeh, G Samara, AA Zaid, DA Laila, S Al-Anzi, A Alqammaz, ...
    2024 International Jordanian Cybersecurity Conference (IJCC), 131-135 2024

  • Application of Big Data Analytics in Hashemite Kingdom of Jordan: Perspectives on the Mobile Telecommunications Industry
    HJ Badarneh, M Al-Mousa, F Alshraiedeh, M Khouj
    2024 25th International Arab Conference on Information Technology (ACIT), 1-8 2024

  • Unveiling Android Malware: A Deep Learning Perspective Using RNN and LSTM
    A Alqammaz, MR Al-Mousa, AA Zaid, M Asassfeh, MA Rajab, S Dajah, ...
    2024 25th International Arab Conference on Information Technology (ACIT), 1-4 2024

  • The Challenges of Using Generative AI Applications in Electronic Commerce
    MS Al-Shaikh, MR Al-Mousa, HA Al-Ababneh, MW Ali, SM Alkaawneh, ...
    2024 25th International Arab Conference on Information Technology (ACIT), 1-5 2024

  • IoT Security Based On Lightewight Cryptographic (LWC) Algorithms: A survey
    MR Al-Mousa, SS Al-Zou'bi, S Askar, K AlQawasmi, G Samara, ...
    2024 25th International Arab Conference on Information Technology (ACIT), 1-9 2024

  • A secure IoT limited Devices by applying Multi-Round Lightweight Cryptography
    MR Al-Mousa, M Abdulqawi, HJ Badarneh, M Asassfeh, G Samara, ...
    2024 25th International Arab Conference on Information Technology (ACIT), 1-8 2024

  • Digital Evidence and Forensic Tools in Cyber Law: A Comprehensive Analysis
    SAS Ala’A, SS Al-Zou’Bi, F Alshraiedeh, EA Elsoud, S Afaneh, ...
    2024 25th International Arab Conference on Information Technology (ACIT), 1-6 2024

  • Efficient Road Status Monitoring in Vehicular Ad-Hoc Networks: An Optimization Framework
    G Samara, HM Turki, M Odeh, A Al-Oraiqat, M Aljaidi, R Alazaidah, ...
    2024 25th International Arab Conference on Information Technology (ACIT), 1-5 2024

  • Main Confidentiality Challenges in Network Security: A Literature Review
    M Asassfeh, MR Al-Mousa, W Amer, AM Almomani, S Afaneh, MN Alrefai, ...
    2024 25th International Arab Conference on Information Technology (ACIT), 1-9 2024

  • Enhancing Convergence Efficiency in Federated Learning Models
    G Samara, M Aljaidi, A Alamleh, MR Al-Mousa, R Batyha, R Alazaidah, ...
    2024 25th International Arab Conference on Information Technology (ACIT), 1-4 2024

  • An Overview of Tools and Techniques in Network Forensics
    M Asassfeh, MR Al-Mousa, H Al-Dweikat, MH Al-Mashagbeh, S Afaneh, ...
    2024 25th International Arab Conference on Information Technology (ACIT), 1-7 2024

  • DATA INTEGRITY CONCERNS, REQUIREMENTS, AND PROOFING IN CLOUD COMPUTING
    LL Scientific
    Journal of Theoretical and Applied Information Technology 102 (12) 2024

  • Automatic Smart Parking
    A Ziadeh, H Zedan, T Theeb, W Kharoof, A Zedan, S Alsadi, T Foqha, ...
    Intelligent Systems, Business, and Innovation Research, 609-616 2024

  • Design a Smart Turbines for Power Generation
    M Kaik, M Zarour, F Sabha, T Abu-salah, M Muntaser-Aldabe, S Alsadi, ...
    Intelligent Systems, Business, and Innovation Research, 597-608 2024

  • Security System for Bank Cash Safe
    A Al-Fandi, A Toma, B Alsayid, S Alsadi, T Foqha, A Elrashidi, ...
    Intelligent Systems, Business, and Innovation Research, 681-689 2024

  • Applicability of IoT-Aware Models in Healthcare Systems: Potential and Challenges
    M ALQUDAH, A GHABEN, H ALMIMI, M ARABIAT, S AFANEH
    2024

  • Intelligent systems, business, and innovation research
    R El Khoury, N Nasrallah
    Springer 2024

  • Development of a secure model for mobile government applications in Jordan
    AS Al-Sherideh, R Ismail, MR Al-Mousa, K Al-Qawasmi, A Al-Shaikh, ...
    Journal of Statistics Applications & Probability 13 (1), 145-155 2024

  • Antecedents of cloud-based financial information systems usage: An integrated model.
    R Masa’deh, DA Almajali, M Al-Okaily, N AL-Sous, MR Al-Mousa
    International Journal of Data & Network Science 8 (1) 2024

  • Development of a Secure Model for Mobile Government Applications in Jordan
    ... Ala’a Saeb Al-Sherideh1, Roesnita Ismail, Mohammad Rasmi Al-Mousa
    2024

MOST CITED SCHOLAR PUBLICATIONS

  • Healthcare professionals’ acceptance Electronic Health Records system: Critical literature review (Jordan case study)
    M Rasmi, MB Alazzam, MK Alsmadi, IA Almarashdeh, RA Alkhasawneh, ...
    International Journal of Healthcare Management 2020
    Citations: 130

  • Website phishing detection using machine learning techniques
    R Alazaidah, A Al-Shaikh, MR Al-Mousa, H Khafajah, G Samara, ...
    Journal of Statistics Applications & Probability 13 (1), 119-129 2024
    Citations: 50

  • Blockchain-based framework for interoperable electronic health record
    FA Reegu, MO Al-Khateeb, WA Zogaan, MR Al-Mousa, S Alam, ...
    Annals of the Romanian Society for Cell Biology 25 (3), 6486-6495 2021
    Citations: 35

  • Awareness model for minimizing the effects of social engineering attacks in web applications.
    M Al-Khateeb, MR Al-Mousa, AS Al-Sherideh, D Almajali, M Asassfeh, ...
    International Journal of Data & Network Science 7 (2) 2023
    Citations: 27

  • A new algorithm to estimate the similarity between the intentions of the cyber crimes for network forensics
    M Rasmi, A Jantan
    Procedia technology 11, 540-547 2013
    Citations: 27

  • Attack intention analysis model for network forensics
    M Rasmi, A Jantan
    Software Engineering and Computer Systems: Second International Conference 2011
    Citations: 26

  • A new approach for resolving cyber crime in network forensics based on generic process model
    M Rasmi, A Jantan, H Al-Mimi
    The 6th International Conference on Information Technology (ICIT 2013) 2013
    Citations: 21

  • Assessing the impact and effectiveness of cybersecurity measures in e-learning on students and educators: A case study
    AS Al-Sherideh, K Maabreh, M Maabreh, MR Al Mousa, M Asassfeh
    International Journal of Advanced Computer Science and Applications 14 (5) 2023
    Citations: 20

  • Generic Proactive IoT Cybercrime Evidence Analysis Model for Digital Forensics
    MR Al-Mousa
    2021 International Conference on Information Technology (ICIT), 654-659 2021
    Citations: 18

  • Pnfea: A proposal approach for proactive network forensics evidence analysis to resolve cyber crimes
    M Rasmi, A Al-Qerem
    International Journal of Computer Network and Information Security 7 (2), 25-32 2015
    Citations: 18

  • Service violation monitoring model for detecting and tracing bandwidth abuse
    AA Ahmed, A Jantan, M Rasmi
    Journal of network and systems management 21, 218-237 2013
    Citations: 17

  • AIA: Attack Intention Analysis Algorithm Based on D-S Theory with Causal Technique for Network Forensics- A Case Study
    M Rasmi, A Jantan
    International Journal of Digital Content Technology and its Applications 5 (9) 2011
    Citations: 17

  • Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis
    M Rasmi, KE Al-Qawasmi
    International Journal of Security and Its Applications 10 (5), 297-308 2016
    Citations: 16

  • An Enhanced Intrusion Detection System for Protecting HTTP Services from Attacks.
    H Al-Mimi, NA Hamad, MM Abualhaj, MS Daoud, A Al-Dahoud, M Rasmi
    International Journal of Advances in Soft Computing & Its Applications 15 (3) 2023
    Citations: 15

  • A New Iterative Approach for Designing Passive Harmonic Filters for Variable Frequency Drives
    T Foqha, S Alsadi, O Omari, M AL-Mousa, S Aljazzar, K Mohammad, ...
    Applied Mathematics & Information Sciences 2023
    Citations: 15

  • Two-layer SVM, towards deep statistical learning
    A Kazemi, R Boostani, M Odeh, MR AL-Mousa
    2022 International Engineering Conference on Electrical, Energy, and 2022
    Citations: 15

  • Intelligent security in the era of AI: The key vulnerability of RC4 algorithm
    A Al-Arjan, M Rasmi, S AlZu’bi
    2021 International Conference on Information Technology (ICIT), 691-694 2021
    Citations: 15

  • Analyzing cyber-attack intention for digital forensics using case-based reasoning
    MR Al-Mousa
    International Journal of Advanced Trends in Computer Science and Engineering 2019
    Citations: 15

  • A proposed wireless intrusion detection prevention and attack system
    JA Nada, MR Al-Mosa
    2018 International Arab Conference on Information Technology (ACIT), 1-5 2018
    Citations: 15

  • Development of a secure model for mobile government applications in Jordan
    AS Al-Sherideh, R Ismail, MR Al-Mousa, K Al-Qawasmi, A Al-Shaikh, ...
    Journal of Statistics Applications & Probability 13 (1), 145-155 2024
    Citations: 14