Ahmad Al-Qerem

Ahmad al-Qerem graduated in applied mathematics and MSc in Computer Science at the Jordan University of Science and Technology and Jordan University in 1997 and 2002, respectively. After that, he was appointed as full-time lecturer at the Zarqa University. He was a visiting professor at Princess Sumaya University for Technology (PSUT). He obtained a PhD from Loughborough University, UK. His research interests are in performance and analytical modeling, mobile computing environments, protocol engineering, communication networks, transition to IPv6, machine learning and transaction processing. He has published several papers in various areas of computer science. Currently, he has a full academic post as a full professor at computer science department at Zarqa University-Jordan.

Publications

Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting
Abdelraouf Ishtaiwi, Ali Mohd Ali, Ahmad Al-Qerem, Mohammad Sabahean, Bilal Alzubi, Ammar Almomani, Mohammad Alauthman, Amjad Aldweesh, Mohammad A. Al Khaldy. © 2024. 17 pages.
Machine learning has become ubiquitous across industries for its ability to uncover in- sights from data. This research explores the application of machine learning for...
Artificial Intelligence in Cryptographic Evolution: Bridging the Future of Security
Abdelraouf Ishtaiwi, Mohammad A. Al Khaldy, Ahmad Al-Qerem, Amjad Aldweesh, Ammar Almomani. © 2024. 24 pages.
The combination of artificial intelligence (AI) methods like machine learning with cryptography is essential for more intelligent and adaptable security measures. This chapter of...
Quantum Computing for Cybersecurity: A Comparative Study of Classical and Quantum Techniques
Mohammad Alauthman, Ammar Almomani, Ahmad Al-Qerem, Mohammad A. Al Khaldy, Amjad Aldweesh, Ali Younis Al Maqousi, Mouhammd Alkasassbeh. © 2024. 25 pages.
This chapter explores the impact of quantum computing on cybersecurity, comparing classical and quantum techniques. It provides an overview of the current quantum landscape...
Secure Key Generation and Management Using Generative Adversarial Networks
Mohammad Al Khaldy, Faisal Aburub, Ahmad Al-Qerem, Amjad Aldweesh, Ammar Almomani. © 2024. 25 pages.
The generation and control of cryptographic keys are the most important things when it comes to the security and integrity of encrypted data. The traditional key generation...
Revolutionizing Cryptography Blockchain as a Catalyst for Advanced Security Systems
Amjad Aldweesh, Mohammad Alauthman, Ahmad al-Qerem, Abdelraouf Ishtaiwi, Ammar Almomani, Mohammad A. Al Khaldy. © 2024. 17 pages.
Blockchain's decentralized trust models are spurring rapid advances in applied cryptography. This chapter explores the accelerating convergence between cryptographic...
Cryptographic Techniques for Securing Blockchain-Based Cryptocurrency Transactions Against Botnet Attacks
Ammar Almomani, Ahmad Al-Qerem, Mohammad A. Al Khaldy, Mohammad Alauthman, Amjad Aldweesh, Khalid M. O. Nahar. © 2024. 25 pages.
This chapter analyzes the most sophisticated cryptography methods which are used to protect blockchain-based cryptocurrency transactions against attacks by botnets. First, a...
Cryptography in Business Intelligence and Data Analytics
Mohammad A. Al Khaldy, Abdelraouf Ishtaiwi, Ahmad Al-Qerem, Amjad Aldweesh, Ammar Almomani, Mouhammd Alkasassbeh. © 2024. 24 pages.
This chapter aims to determine the role of cryptography in the provision of secure applications of business intelligence and data analytics. Through this, the legal implications...
Privacy-Preserving Machine Learning Cryptographic Techniques for Secure Data Analysis
Mohammad Alauthman, Ahmad Al-Qerem, Ammar Almomani, Amjad Aldweesh, Faisal Aburub, Mouhammd Alkasassbeh. © 2024. 26 pages.
Machine learning models rely on sensitive personal data, creating tension between utility and privacy. Privacy-preserving machine learning aims to enable secure data analysis...
Cryptographic Protocols for Internet of Things (IoT) Security Lightweight Schemes and Practical Deployment
Mohammad Alauthman, Amjad Aldweesh, Ahmad Al-Qerem, Ali Younis Al Maqousi, Ammar Almomani, Mouhammd Alkasassbeh. © 2024. 18 pages.
The proliferation of Internet of Things (IoT) devices has revolutionized many industries and daily life, however these resource-constrained devices also present significant...
The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds
Amjad Aldweesh, Mohammad Alauthman, Mohammad Al Khaldy, Abdelraouf Ishtaiwi, Ahmad al-Qerem, Ammar Almoman, Brij B. Gupta. © 2023. 24 pages.
Blockchain technology and the metaverse are revolutionizing digital experiences by merging secure, cryptographic systems with shared virtual spaces. These advancements have...
Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments
Mohammad Alauthman, Ahmad al-Qerem, Someah Alangari, Ali Mohd Ali, Ahmad Nabo, Amjad Aldweesh, Issam Jebreen, Ammar Almomani, Brij B. Gupta. © 2023. 24 pages.
Cost estimation for software development is crucial for project planning and management. Several regression models have been developed to predict software development costs...
Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols
Ala Hamarsheh, Ahmad Alqeerm, Iman Akour, Mohammad Alauthman, Amjad Aldweesh, Ali Mohd Ali, Ammar Almomani, Someah Alangari. © 2023. 26 pages.
The impending exhaustion of internet protocol (IP) version four (IPv4) addresses necessitates a transition to the more expansive IP version six (IPv6) protocol. However, this...
Redefining E-Commerce Experience: An Exploration of Augmented and Virtual Reality Technologies
Mohammad Al Khaldy, Abdelraouf Ishtaiwi, Ahmad Al-Qerem, Amjad Aldweesh, Mohammad Alauthman, Ammar Almomani, Varsha Arya. © 2023. 24 pages.
Integrating virtual reality (VR) and augmented reality (AR) technology into online stores enables more immersive and engaging shopping experiences, which is crucial for...
Network-Based Detection of Mirai Botnet Using Machine Learning and Feature Selection Methods
Ahmad Al-Qerem, Bushra Mohammed Abutahoun, Shadi Ismail Nashwan, Shatha Shakhatreh, Mohammad Alauthman, Ammar Almomani. © 2020. 11 pages.
The spread of IoT devices is significantly increasing worldwide with a low design security that makes it more easily compromised than desktop computers. This gives rise to the...