Mohammad Alauthman | Detection | Excellence in Research

Assist Prof Dr. Mohammad Alauthman | Detection | Excellence in Research

Assistant Professor at Information Security Department, University of Petra, Jordan

Dr. Mohammad Alauthman is an accomplished academic with a focus on cybersecurity and network security. Currently serving as an Assistant Professor at Petra University in Amman, Jordan, since 2020, Mohammad teaches a variety of courses in the Department of Information Security, including topics such as SOC analyst, Ethical Hacking, and Digital Forensics Investigation. Prior to this role, Mohammad was an Assistant Professor at Zarqa University from 2016 to 2020, where they taught courses in computer science, including Advanced Information and Networks Security and Introduction to Cybersecurity. Mohammad’s research interests lie in the application of artificial intelligence to cybersecurity, particularly in areas such as botnet detection, DDoS detection, and spam email detection. They have received grants for several research projects, demonstrating their dedication to advancing knowledge in their field. Mohammad’s academic background and teaching experience make them a valuable asset to the academic community, contributing to both research and education in the field of cybersecurity.

Profile

Education

Dr. Mohammad Alauthman is an Assistant Professor with a strong background in computer science and a specialization in network security. They earned their Ph.D. in Computer Science from Northumbria University at Newcastle, UK, in 2016, with a focus on Network Security. Their doctoral thesis, titled “An Efficient Approach to Online Bot Detection Based on a Reinforcement Learning Technique,” demonstrates their expertise in this field. Prior to their Ph.D., Mohammad completed a Master’s degree in Computer Science from Amman Arab University, Jordan, in 2005, and a Bachelor’s degree in Computer Science from Hashemite University, Jordan, in 2002. Mohammad’s academic journey has equipped them with a comprehensive understanding of computer science principles, particularly in the realm of network security.

Experience:

Dr. Mohammad Alauthman has a wealth of experience in academia, holding key positions at various institutions. Since 2021, they have served as the Chairman of the Information Security department at the Faculty of Information Technology, University of Petra, Amman, Jordan. Mohammad has also been a Full-time Assistant Professor in the Department of Information Security at the same university since 2020. Prior to their current role, Mohammad was the Chairman of the Internet Technology department and an Assistant Professor at the Faculty of Information Technology, Zarqa University, Jordan, from 2018 to 2020. Before that, they were a Full-time Assistant Professor in the Computer Science Department at Zarqa University from 2016 to 2018. Mohammad’s academic career also includes positions as a Lecturer in the Department of Computer Science and Information at Majmmah University, Saudi Arabia, from 2008 to 2012, and as a Lecturer at Al-Balqa Applied University, Jordan, from 2007 to 2008. These roles have provided Mohammad with a diverse range of experiences in academia, contributing to their expertise in computer science and information security.

Research Interest:

Dr. Mohammad Alauthman’s research interests are primarily focused on cybersecurity and network security, with a particular emphasis on cross-layered solutions for intrusion detection systems. Their central research revolves around the use of artificial intelligence for early botnet detection, DDoS detection, spam email detection, Internet of Things (IoT) security, and network traffic classification. In addition to their work in cybersecurity, Mohammad also has research interests in healthcare, specifically in the areas of skin cancer detection, diabetic retinopathy, and pain intensity assessment, utilizing deep learning techniques. Their research projects are interdisciplinary and aimed at addressing real-life problems, reflecting their commitment to advancing knowledge and solving practical challenges in these fields.

Grants:

Dr. Mohammad Alauthman has received several grants to support their research in cybersecurity and network security. In 2022, they were awarded a grant from the Dean of Scientific Research at the University of Petra (UoP) for a project titled “Forecasting Citation Counts Using Deep Recurrent Neural Network Techniques.” In 2021, Mohammad received a grant from Al-Balqa Applied University for a project focused on “Darknet Traffic Identification Using Max Voting Algorithms.” Prior to that, in 2019, they received another grant from Al-Balqa Applied University for their work on “Fast Flux Botnet Catcher Approach (FFBCA).” At Zarqa University (ZU), Mohammad received grants from the Dean of Scientific Research for two projects. In 2017, they received a grant for a project titled “P2P Bot Detection Using Deep Learning with Traffic Reduction Schema.” In 2018, Mohammad received a grant for a project titled “Botnet Spam Email Detection Using Deep Recurrent Neural Network.” These grants highlight Mohammad’s dedication to advancing research in cybersecurity and network security, focusing on innovative approaches to detect and mitigate threats.

Teaching Experience:

Dr. Mohammad Alauthman has been serving as an Assistant Professor at Petra University in the Department of Information Security, Faculty of Information Technology, Amman, Jordan, since 2020. In this role, they teach a range of courses covering topics such as SOC analyst, Ethical Hacking, Intrusion Detection System, Digital Forensics Investigation, Database Security, E-commerce Environment Security, Information and Network Security, Wireless Networks, and Introduction to Data Communication & Networking. Prior to joining Petra University, Mohammad was an Assistant Professor at Zarqa University in the Department of Computer Science, Faculty of Information Technology, Zarqa, Jordan, from 2016 to 2020. During their tenure at Zarqa University, Mohammad taught courses including Advanced Information and Networks Security (Master Level), Introduction to Cybersecurity, Introduction to Machine Learning, Networks, Artificial Intelligence, Special Languages in CS II (Python), Information Retrieval, Programming Language I (Java), Concepts of Programming Languages, Research Methodology and Ethics, and Advanced Programming Language (C#). These positions highlight Mohammad’s expertise in teaching a wide range of topics related to computer science and information security.

Publications:

  1. IoT transaction processing through cooperative concurrency control on fog–cloud computing environment
    • Authors: A Al-Qerem, M Alauthman, A Almomani, BB Gupta
    • Citations: 244
    • Year: 2019
  2. An efficient reinforcement learning-based Botnet detection approach
    • Authors: M Alauthman, N Aslam, M Al-Kasassbeh, S Khan, A Al-Qerem, KKR Choo
    • Citations: 131
    • Year: 2020
  3. A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks
    • Authors: M Alauthaman, N Aslam, L Zhang, R Alasem, MA Hossain
    • Citations: 129
    • Year: 2018
  4. Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study
    • Authors: A Almomani, M Alauthman, MT Shatnawi, M Alweshah, A Alrosan
    • Citations: 120
    • Year: 2022
  5. DNS rule-based schema to botnet detection
    • Authors: K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta
    • Citations: 113
    • Year: 2021
  6. Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks
    • Authors: A Alsarhan, M Alauthman, E Alshdaifat, AR Al-Ghuwairi, A Al-Dubai
    • Citations: 49
    • Year: 2023
  7. Feature selection using a machine learning to classify a malware
    • Authors: M Al-Kasassbeh, S Mohammed, M Alauthman, A Almomani
    • Citations: 49
    • Year: 2020
  8. An online intrusion detection system to cloud computing based on NeuCube algorithms
    • Authors: A Almomani, M Alauthman, F Albalas, O Dorgham, A Obeidat
    • Citations: 43
    • Year: 2018
  9. Machine learning for phishing detection and mitigation
    • Authors: M Alauthman, A Almomani, M Alweshah, W Alomoush, K Alieyan
    • Citations: 28*
    • Year: 2019
  10. Botnet Spam E-Mail Detection Using Deep Recurrent Neural Network
    • Authors: M ALAUTHMAN
    • Citations: 26
    • Year: 2020

 

Ms. Sharmila B S | Intrusion Detection and Prevention | Women Researcher Award

Ms. Sharmila B S | Intrusion Detection and Prevention | Women Researcher Award

Assistant Professor at Intrusion Detection and Prevention, The National Institute of Engineering, Mysuru, India

Sharmila B S is currently pursuing a Ph.D. focusing on Network Security for IoT devices. Their research interests primarily lie in Network Security, Internet of Things (IoT), and Artificial Intelligence (AI). With 7 years of combined teaching and industry experience, Sharmila has also delivered talks on Python, AI, and IoT for technical talks and workshops.

Professional profiles

🎓Education:

Sharmila B S completed their academic qualifications as follows: a Ph.D. from the Department of ECE at the National Institute of Engineering, Mysuru, under Visweshwaraiah Technological University in 2018; an MTech in VLSI Design & Embedded Systems from SJCE, Mysore; and a BE in E&C from Kalpataru Institute of Technology, Tiptur, both under Visweshwaraiah Technological University, obtained in 2013 and 2011 respectively.

👩‍🏫Professional Experience:

Sharmila B S has professional experience as an Assistant Professor at the National Institute of Engineering, Mysuru, from July 25, 2016, to the present. Prior to this, they worked as a Lecturer at the same institute from July 27, 2015, to June 26, 2016. Before joining the National Institute of Engineering, Sharmila was an Assistant Professor at PESITM, Shivamogga, from July 21, 2014, to June 30, 2015. They also have internship experience at LG Soft India, Bangalore, from July 11, 2012, to December 31, 2013.

Subjects Taught:

Sharmila B S has taught a range of subjects, including Internet of Things, Data Structures using C++, Information Theory and Network Security, Embedded Systems, and Fundamentals of CMOS VLSI.

Publications:

“Intrusion Detection System using Naive Bayes algorithm” by BS Sharmila, R Nagapadma, published in the 2019 IEEE International WIE Conference on Electrical and Computer, with 24 citations in 2019.

“Comparison of time complexity in median filtering on multi-core architecture” by BS Sharmila, N Kaulgud, published in the 2017 3rd International Conference on Advances in Computing, Communication, with 2 citations in 2017.

“Multi Core DNN based IDS for Botnet Attacks using KPCA Reduction Techniques” by BS Sharmila, R Nagapadma, published in 2021.

“Design of memristor based multiplier” by N Jagan, U NS, S Kouser, published in the International Research Journal of Engineering and Technology, 6(1), 2019.

“Optimizing Deep Learning Networks for Edge Devices with an Instance of Skin Cancer and Corn Leaf Disease Dataset” by BS Sharmila, HS Santhosh, S Parameshwara, MS Swamy, WH Baig, published in SN Computer Science, 4(6), 793, 2023.

“QAE-IDS: DDoS anomaly detection in IoT devices using Post-Quantization Training” by BS Sharmila, R Nagapadma, published in Smart Science, 11(4), 774-789, 2023.

“Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset” by BS Sharmila, R Nagapadma, published in Cybersecurity, 6(1), 41, 2023.

“P‐DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities” by S BS, R Nagapadma, published in Security and Privacy, e330, 2023.

“KNN classification using multi-core architecture for intrusion detection system” by BS Sharmila, R Nagapadma, published in the Communication and Computing Systems: Proceedings of the 2nd International Conference.

 

 

Mohammad Eyadat | Cybersecurity Models / Higher Education | Best Researcher Award

Mohammad Eyadat | Cybersecurity Models / Higher Education | Best Researcher Award

Mohammad Eyadat California States University, Dominguez Hills, United States

He is currently a full professor at California State University Dominguez Hills, with an extensive academic background spanning various institutions. He holds a Ph.D. in Computer Science/Engineering Mathematics from Claremont Graduate School, a Master of Science Degree in Mathematics from the same institution, a Master of Science Degree in Computer Science from the University of Southern California, and a Bachelor of Science Degree in Computer Science from Yarmouk University in Jordan. Throughout his career, he has taught courses in Computer Science, Computer Information Systems, Information Technology, and Mathematics at both graduate and undergraduate levels. His professional experience ranges from Software Designer and developer to Business Consultant. Additionally, he has contributed as a collaborator in organizing numerous research activities and professional conferences. His research interests encompass multimedia software security, watermarking algorithms for images and video data, software engineering, software reliability models, systems performance evaluation, Education and Information Technology, and Web accessibility.

Education:

He earned his Ph.D. in Computer Science/Engineering Mathematics from Claremont Graduate University in California in 2003, following a Master of Science Degree in Engineering Mathematics from Claremont Graduate School in 1997. Prior to this, he completed a Master of Science Degree in Computer Science at the University of Southern California (USC) in California in 1994. In 1993, he obtained a Programming Certificate of Completion from the International College of Success in Studio City, CA. He began his academic journey with a Bachelor of Science Degree in Computer Science from Yarmouk University in Jordan in 1984. Throughout his educational pursuits, he has displayed a dedication to advancing his knowledge and expertise in computer science and engineering mathematics.

Profile:

Experience:

He has been self-employed as a Programmer/Contractor in California since 1990, demonstrating his entrepreneurial spirit and expertise in software development. From August 1998 to July 2000, he served as a Consultant for a research grant awarded to El Camino College, where he played a vital role in revitalizing the ESL Placement Process, overseeing testing and validation processes. Prior to this, from May 1996 to November 1996, he worked as a Software Designer and Business Consultant at KB Computer in California, showcasing his skills in software design and his ability to provide valuable business insights. His experience also includes a role as a Software Developer and Software Consultant at 3COM in California from August 1995 to May 1996, where he further honed his technical skills. Additionally, he served as a Computer Programmer at Mu’tah University in Jordan from 1985 to 1988, laying the foundation for his career in computer programming. Throughout his career, he has demonstrated versatility, innovation, and a commitment to excellence in the field of software development and consulting.

Publication:

  1. Performance evaluation of an incorporated DCT block-based watermarking algorithm with human visual system model Cited By : 33, Published By : 2015
  2. Deploying bioinformatics workflows on clouds with galaxy and globus provision Cited By : 32, Published By : 2012
  3. Factors that affect the performance of the DCT-block based image watermarking algorithms Cited By : 22, Published By : 2004
  4. Routing protocol for low power and lossy network–load balancing time-based Cited By : 17, Published By : 2021
  5. Compression standards roles in image processing: case study Cited By : 12, Published By : 2005
  6. Web accessibility factor a key focus for serving students Cited By : 11, Published By : 2011
  7. Information security: SETA program status at jordanian universities Cited By : 5, Published By : 2015
  8. Web accessibility in information systems Cited By : 5, Published By : 2007
  9. Javascript and Perl Combo in On-line Examinations Cited By : 5, Published By : 2004
  10. Higher education administrators roles in fortification of information security program. Cited By : 4, Published By : 2015