Amjad Aldweesh

Amjad Aldweesh is a computer associate professor interested in the Blockchain and Smart contracts technology as well as cyber security. Amjad has a Bachelor degree in computer science. He has a MSc degree in advanced computer science and security from the University of Manchester with distinction. Amjad is the second in the UK and the first in the middle east to have a PhD in the Blockchain and Smart contracts technology from Newcastle University.

Publications

AI Augmented Incident Response Playbooks: Aligning Policy Triggers With SOC Automation
Mohammad Alauthman, Amjad Aldweesh, Ahmad Al-Qerem, Someah Alangari, Mouhammd Alkasassbeh. © 2026. 26 pages.
Organizations have turned to artificial intelligence methods to strengthen cybersecurity incident-response processes. Many existing protocols lack alignment between policy-based...
Privacy Preserving Analytics in Cyber Insurance: Federated Learning and Secure Multiparty Computation
Mohammad Al Khaldy, Saad Alateef, Amjad Aldweesh, Ahmad Al-Qerem. © 2026. 36 pages.
Cyber insurance faces challenges with data scarcity and privacy restrictions limiting analytical capabilities across institutional boundaries. Insurance providers struggle to...
Complexities and Challenges for Securing Digital Assets and Infrastructure
Amjad Yousef Aldweesh. © 2025. 672 pages.
Autonomous and digital systems have changed numerous industries, including healthcare, finance, and business. However, they are not exclusive to industries and have been used in...
Revolutionizing Urban Development and Governance With Emerging Technologies
Ali Al Maqousi, Ammar Almomani, Amjad Aldweesh, Mohammad Alauthman. © 2025. 656 pages.
Emerging technologies revolutionize urban development and governance, offering innovative solutions to the complex challenges faced by modern cities. From smart infrastructure...
Artificial Intelligence for Financial Risk Management and Analysis
Mohammad Al Khaldy, Ahmad al-Qerem, Amjad Aldweesh, Mouhammd Alkasassbeh, Ammar Almomani, Mohammad Alauthman. © 2025. 26 pages.
Financial institutions face dynamic threats that range from credit defaults to money laundering. Traditional risk management models struggle with large data and shifting market...
Building Trust in AI-Driven Urban Environments: Privacy, Accountability, and Ethical Frameworks
Mohammad Alauthman, Saad Alateef, Ahmad al-Qerem, Ala Hamarsheh, Amjad Aldweesh. © 2025. 28 pages.
Cities now implement artificial intelligence to optimize public services. Policymakers face issues concerning data management, fairness, and oversight. This chapter examines how...
The Role of Academic Leadership in Accelerating Smart Urban Governance
Faisal Aburub, Saad Alateef, Ala Hamarsheh, Amjad Aldweesh. © 2025. 26 pages.
Urban settings in developing contexts face pressures arising from population growth, restricted resources, and evolving policy demands. Research insights from universities often...
Digital Twins and Social Intelligence for Urban Early Warning Systems
Ali Al Maqousi, Ahmad al-Qerem, Kashinath Basu, Amjad Aldweesh, Mouhammd Alkasassbeh. © 2025. 26 pages.
Early warning and public warning systems exist to reduce harm in urban regions through timely alerts and coordinated actions. Officials often face challenges in converting...
Federated Learning in Distributed Cyber Defense: Privacy-Preserving Collaborative Security Through Decentralized AI Training
Mohammad Alauthman, Amjad Aldweesh, Ahmad Al-Qerem, Mouhammd Alkasassbeh, Saad Alateef, Ammar Almomani. © 2025. 24 pages.
This chapter investigates how Federated Learning (FL) can reshape cyber defense by enabling collaborative model training without consolidating sensitive data, thus safeguarding...
Swarm AI for Distributed Cyber Defense and Autonomous Threat Detection
Wael Hadi, Ala Hamarsheh, Ahmad Al-Qerem, Amjad Aldweesh. © 2025. 24 pages.
Collective intelligence and swarm AI have shaped recent explorations of distributed cybersecurity strategies. Many traditional approaches rely on centralized analytics or static...
Reinforcement Learning for Adaptive Cyber Defense Training Autonomous Systems for Dynamic Threat Response and Strategy Optimization
Mohammad Alauthman, Amjad Aldweesh, Ahmad Al-Qerem, Saad Alateef, Mouhammd Alkasassbeh. © 2025. 26 pages.
Reinforcement Learning (RL) offers a process for creating cyber defense methods that adjust to changing threats. Through training an RL agent, defenders discover ways to block...
Autonomous Cyber Defense in Smart Cities: An AI-Driven Framework for Integrated Urban Infrastructure Protection
Ali Al Maqousi, Kashinath Basu, Amjad Aldweesh, Mouhammd Alkasassbeh. © 2025. 36 pages.
Smart cities integrate IoT devices, edge computing, and data analytics to enhance public services while creating new cyber vulnerabilities. This chapter proposes an autonomous...
Critical Infrastructure Autonomous Defense: AI-Enabled Protection Strategies for Power Grids, Water Systems, and Industrial Control Networks
Ali Al Maqousi, Kashinath Basu, Ahmad Al-Qerem, Amjad Aldweesh. © 2025. 26 pages.
Critical infrastructure, including power grids, water systems, and industrial control networks, supports essential societal functions. As cyber threats intensify, AI-driven...
Secure SDLC Frameworks: Leveraging DevSecOps to Enhance Software Security
Mohammad Alauthman, Ahmad Al-Qerem, Amjad Aldweesh, Ammar Almomani. © 2025. 42 pages.
Software applications have become indispensable across sectors, necessitating robust security throughout their lifecycle. This chapter examines transforming the Software...
Charting the Uncharted: A Taxonomy of Emerging Cybersecurity Threats From Generative AI Systems
Amjad Aldweesh, Mohammad Alauthman, Saad Alateef, Ahmed Al-Qerem, Mohammed M. Al-Kasasbeh, Mohammad Alkhaldy, Someah Alangari, Bakri Alawaji. © 2025. 20 pages.
This chapter explores the multifaceted cybersecurity threats emerging from the rapid proliferation of generative artificial intelligence systems. It examines how generative AI...
Deepfake Threats Detection and Countermeasures in Cybersecurity
Mohammad Alauthman, Ahmad al-Qerem, Saad Alateef, Wael Hadi, Amjad Aldweesh, Ammar Almomani. © 2025. 20 pages.
Machine learning techniques currently generate pictures, videos and audio which are called deepfake content that have become a threat to security, trust and privacy....
Synthetic Content Generation Impacts on Phishing and Impersonation Attacks
Mohammad Alauthman, Amjad Aldweesh, Ahmad al-Qerem, Mouhammd Alkasassbeh, Saad Alateef, Ammar Almomani. © 2025. 22 pages.
Synthetic content generation has transformed digital landscapes by enabling the rapid production of highly personalized and authentic-seeming text, audio, and video materials....
Behavioral Analysis of AI-Generated Malware: New Frontiers in Threat Detection
Ammar Almomani, Samer Aoudi, Ahmad al-Qerem, Amjad Aldweesh, Mouhammd Alkasassbeh. © 2025. 24 pages.
This chapter explores the emergent threat landscape posed by AI-generated malware and investigates the effectiveness of behavior-based analysis as a primary line of defense....
Automated Vulnerability Discovery Generative AI in Offensive Security
Mohammad Alauthman, Ammar Almomani, Samer Aoudi, Ahmad al-Qerem, Amjad Aldweesh. © 2025. 20 pages.
This chapter investigates how generative AI techniques transform offensive security. It explores automated methods that identify software flaws, generate targeted exploits, and...
A Framework for Addressing Cybersecurity Risks in the Metaverse Safeguarding Against Generative AI Threats
Abdelraouf Ishtaiwi, Ahmad al-Qerem, Amjad Aldweesh, Mouhammd Alkasassbeh. © 2025. 20 pages.
This chapter addresses cybersecurity risks posed by generative AI in the metaverse, a convergence of virtual reality and real-time user interactions. By exploring deepfakes...
Empowering Cyber Defense: Leveraging Generative AI for Enhanced Security in Resource-Constrained Academic Institutions
Abdelraouf Ishtaiwi, Ala Hamarsheh, Ahmad al-Qerem, Amjad Aldweesh. © 2025. 16 pages.
Academic institutions explore generative artificial intelligence for varied educational and research goals, yet they often operate with limited budgets and specialized personnel...
Generative AI in Supply Chain Security: Unseen Threats and Resilient Solutions
Ali Al Maqousi, Amjad Aldweesh, Ahmad al-Qerem. © 2025. 22 pages.
Generative artificial intelligence (AI) is reshaping supply chain security, providing innovative tools for risk management while introducing formidable new threats. This chapter...
Adaptive Risk Mitigation Strategies for Generative AI-Driven Threats
Abdelraouf Ishtaiwi, Amjad Aldweesh, Ahmad al-Qerem. © 2025. 34 pages.
This chapter examines the emerging landscape of threats posed by generative artificial intelligence (AI) technologies and outlines adaptive risk mitigation strategies designed to...
Institutional Policies, Governance, and Regulatory Responses to Generative AI
Wael Hadi, Ahmad al-Qerem, Amjad Aldweesh. © 2025. 24 pages.
This chapter details how institutions craft policies for generative AI. It explores data rules, liability decisions, and compliance checks used by universities, city offices, and...
Blockchain Technology in Energy Supply Chain Management: A Path to Transparency, Efficiency, and Sustainability
Saad Alateef, Amjad Aldweesh, Mohammad Alauthman, Mohammed Alkasassbeh, Ahmed Al-Qerem. © 2025. 18 pages.
This paper proposes a blockchain-based framework to optimize energy supply chain management, delineating its potential to transform energy sourcing, allocation, and consumption...
Blockchain for Energy Financing and Investment: Revolutionizing Models for a Sustainable Future
Saad Alateef, Amjad Aldweesh, Ahmed Al-Qerem, Mohammad Alauthman, Mohammad Alkhaldy. © 2025. 16 pages.
Blockchain technology has emerged as a disruptive force across various industries, promising decentralization, transparency, and enhanced efficiency. In the energy sector...
Blockchain-Driven Zero-Trust Architectures for Critical Infrastructure
Mohammad Alauthman, Ahmad H. al-Qerem, Amjad Aldweesh, Mouhammd Alkasassbeh, Ala Hamarsheh. © 2025. 22 pages.
In an era of escalating cyber threats that increasingly target critical infrastructure, there is growing urgency to protect operational technology (OT) systems in energy and...
IoBc-Blockchain Solutions for Secure and Private IoT Ecosystems
Mohammad Alauthman, Ammar Almomani, Amjad Aldweesh, Ahmad al-Qerem, Saad Alateef, Ala Hamarsheh, Wael Hadi. © 2025. 32 pages.
The exponential growth of Internet of Things (IoT) devices has created unprecedented security and privacy challenges that traditional centralized architectures struggle to...
Blockchain-Enabled Grid Resilience and Disaster Response
Amjad Yousef Aldweesh, Saad Alateef, Mohammad Alauthman, Ahmed Al-Qerem. © 2025. 20 pages.
The reliability of modern power grids is vital for sustaining essential services,especially amid threats like natural disasters and cyberattacks. Blockchain technology offers a...
Blockchain for Transparent Governance: Enhancing Accountability and Trust in E-Government
Mohammad Alauthman, Amjad Aldweesh, Ahmad al-Qerem, Saad Alateef, Ammar Almomani. © 2025. 20 pages.
Blockchain technology has emerged as a transformative tool for enhancing accountability, transparency, and efficiency in e-government systems. This study explores the integration...
AI and Blockchain Integration for Advanced Metering Infrastructure (AMI)
Mohammad Alauthman, Ammar Almomani, Ahmad al-Qerem, Saad Alateef, Amjad Aldweesh, Mouhammd Alkasassbeh. © 2025. 22 pages.
This chapter examines how Artificial Intelligence (AI) and blockchain converge in the context of Advanced Metering Infrastructure (AMI) within smart grids. It presents...
AI-Powered Smart Contracts for Energy Grid Optimization: A Hybrid Intelligence Approach
Abdelraouf Ishtaiwi, Amjad Aldweesh, Ahmad al-Qerem, Mouhammd Alkasassbeh. © 2025. 30 pages.
Societies worldwide are reshaping their energy infrastructures to address evolving sustainability targets, economic requirements, and regulatory goals. In this chapter, I examine...
Decentralized Energy Markets Transforming Energy Distribution and Trading With Blockchain Technology
Amjad Yousef Aldweesh, Mohammad Alauthman, Saad Alateef, Ahmed Al-Qerem. © 2025. 20 pages.
Decentralized energy markets are transforming energy trading by leveraging blockchain to enhance transparency, efficiency, and resilience. These markets allow producers and...
Smart Building Energy Management: Blockchain Solutions for Urban Efficiency
Ali Al Maqousi, Kashinath Basu, Amjad Aldweesh. © 2025. 20 pages.
Abstract This chapter examines how blockchain technology can advance energy management in smart buildings and urban areas. It analyzes the theoretical foundations of blockchain...
Securing Blockchain Solutions in the Energy Sector: Mitigating Advanced Persistent Threats (APTs)
Mohammad Alauthman, Ala Hamarsheh, Ammar Almomani, Amjad Aldweesh, Saad Alateef, Mouhammd Alkasassbeh. © 2025. 26 pages.
The energy sector faces expanding risks associated with Advanced Persistent Threats (APTs). These incidents pose challenges for securing power generation, distribution, and other...
Cyber Threat Intelligence and APTs: Proactive Measures for Evolving Threat Landscapes
Mohammad Alauthman, Ahmad al-Qerem, Amjad Aldweesh, Saad Alateef, Ammar Almomani, Wael Hadi. © 2025. 20 pages.
This chapter explains how cyber threat intelligence (CTI) supports defenses against advanced persistent threats (APTs) that gain access to systems. It reviews the progression of...
Human-Centric Cybersecurity: Addressing Insider Threats and Organizational Culture
Mohammad Alauthman, Ahmad Al-Qerem, Saad Alateef, Ammar Almomani, Amjad Aldweesh. © 2025. 22 pages.
Abstract This chapter delves into the human-centric dimension of cybersecurity, with particular emphasis on insider threats and the influence of organizational culture. The...
Securing 5G Networks: Opportunities and Threats in Next-Generation Connectivity
Mohammad Alauthman, Amjad Aldweesh, Ahmad al-Qerem, Saad Alateef, Mouhammd Alkasassbeh, Ammar Almomani. © 2025. 32 pages.
The advent of the fifth generation – 5G – mobile networks mean a revolution in telecommunication infrastructure that can be hardly limited to the higher bandwidth rates and less...
Cybersecurity Challenges in Startup-Driven Digital Governance Ecosystems: Strategies and Solutions
Mohammad Alauthman, Ammar Almomani, Ahmad al-Qerem, Ali Al Maqousi, Amjad Aldweesh. © 2025. 26 pages.
This chapter examines cybersecurity challenges that arise in startup-driven digital governance ecosystems. It explores how limited resources, rapid development cycles, and...
Water Resource Management in the Digital Age: E-Government Strategies for Sustainability
Ali Al Maqousi, Amjad Aldweesh, Ammar Almomani, Mohammad Alauthman. © 2025. 22 pages.
This chapter addresses how digital technologies and e-government approaches transform water resource management (WRM). Traditional governance methods, often slow and fragmented...
Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting
Abdelraouf Ishtaiwi, Ali Mohd Ali, Ahmad Al-Qerem, Mohammad Sabahean, Bilal Alzubi, Ammar Almomani, Mohammad Alauthman, Amjad Aldweesh, Mohammad A. Al Khaldy. © 2024. 17 pages.
Machine learning has become ubiquitous across industries for its ability to uncover in- sights from data. This research explores the application of machine learning for...
Artificial Intelligence in Cryptographic Evolution: Bridging the Future of Security
Abdelraouf Ishtaiwi, Mohammad A. Al Khaldy, Ahmad Al-Qerem, Amjad Aldweesh, Ammar Almomani. © 2024. 24 pages.
The combination of artificial intelligence (AI) methods like machine learning with cryptography is essential for more intelligent and adaptable security measures. This chapter of...
Quantum Computing for Cybersecurity: A Comparative Study of Classical and Quantum Techniques
Mohammad Alauthman, Ammar Almomani, Ahmad Al-Qerem, Mohammad A. Al Khaldy, Amjad Aldweesh, Ali Younis Al Maqousi, Mouhammd Alkasassbeh. © 2024. 26 pages.
This chapter explores the impact of quantum computing on cybersecurity, comparing classical and quantum techniques. It provides an overview of the current quantum landscape...
Secure Key Generation and Management Using Generative Adversarial Networks
Mohammad Al Khaldy, Faisal Aburub, Ahmad Al-Qerem, Amjad Aldweesh, Ammar Almomani. © 2024. 26 pages.
The generation and control of cryptographic keys are the most important things when it comes to the security and integrity of encrypted data. The traditional key generation...
Revolutionizing Cryptography Blockchain as a Catalyst for Advanced Security Systems
Amjad Aldweesh, Mohammad Alauthman, Ahmad al-Qerem, Abdelraouf Ishtaiwi, Ammar Almomani, Mohammad A. Al Khaldy. © 2024. 18 pages.
Blockchain's decentralized trust models are spurring rapid advances in applied cryptography. This chapter explores the accelerating convergence between cryptographic...
Cryptographic Techniques for Securing Blockchain-Based Cryptocurrency Transactions Against Botnet Attacks
Ammar Almomani, Ahmad Al-Qerem, Mohammad Al Khaldy, Mohammad Alauthman, Amjad Aldweesh, Khalid M. O. Nahar. © 2024. 26 pages.
This chapter analyzes the most sophisticated cryptography methods which are used to protect blockchain-based cryptocurrency transactions against attacks by botnets. First, a...
Cryptography in Business Intelligence and Data Analytics
Mohammad A. Al Khaldy, Abdelraouf Ishtaiwi, Ahmad Al-Qerem, Amjad Aldweesh, Ammar Almomani, Mouhammd Alkasassbeh. © 2024. 24 pages.
This chapter aims to determine the role of cryptography in the provision of secure applications of business intelligence and data analytics. Through this, the legal implications...
Privacy-Preserving Machine Learning Cryptographic Techniques for Secure Data Analysis
Mohammad Alauthman, Ahmad Al-Qerem, Ammar Almomani, Amjad Aldweesh, Faisal Aburub, Mouhammd Alkasassbeh. © 2024. 26 pages.
Machine learning models rely on sensitive personal data, creating tension between utility and privacy. Privacy-preserving machine learning aims to enable secure data analysis...
Cryptographic Protocols for Internet of Things (IoT) Security Lightweight Schemes and Practical Deployment
Mohammad Alauthman, Amjad Aldweesh, Ahmad Al-Qerem, Ali Younis Al Maqousi, Ammar Almomani, Mouhammd Alkasassbeh. © 2024. 18 pages.
The proliferation of Internet of Things (IoT) devices has revolutionized many industries and daily life, however these resource-constrained devices also present significant...
The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds
Amjad Aldweesh, Mohammad Alauthman, Mohammad Al Khaldy, Abdelraouf Ishtaiwi, Ahmad al-Qerem, Ammar Almoman, Brij B. Gupta. © 2023. 24 pages.
Blockchain technology and the metaverse are revolutionizing digital experiences by merging secure, cryptographic systems with shared virtual spaces. These advancements have...
Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments
Mohammad Alauthman, Ahmad al-Qerem, Someah Alangari, Ali Mohd Ali, Ahmad Nabo, Amjad Aldweesh, Issam Jebreen, Ammar Almomani, Brij B. Gupta. © 2023. 24 pages.
Cost estimation for software development is crucial for project planning and management. Several regression models have been developed to predict software development costs...
Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols
Ala Hamarsheh, Ahmad Alqeerm, Iman Akour, Mohammad Alauthman, Amjad Aldweesh, Ali Mohd Ali, Ammar Almomani, Someah Alangari. © 2023. 26 pages.
The impending exhaustion of internet protocol (IP) version four (IPv4) addresses necessitates a transition to the more expansive IP version six (IPv6) protocol. However, this...
Redefining E-Commerce Experience: An Exploration of Augmented and Virtual Reality Technologies
Mohammad Al Khaldy, Abdelraouf Ishtaiwi, Ahmad Al-Qerem, Amjad Aldweesh, Mohammad Alauthman, Ammar Almomani, Varsha Arya. © 2023. 24 pages.
Integrating virtual reality (VR) and augmented reality (AR) technology into online stores enables more immersive and engaging shopping experiences, which is crucial for...