Mohammad Alauthman

Mohammad Alauthman received PhD degree from Northumbria University Newcastle, UK in 2016. He received a B.Sc. degree in Computer Science from Hashemite University, Jordan, in 2002, and received M.Sc. degrees in Computer Science from Amman Arab University, Jordan, in 2004. Currently, he is Assistant Professor and senior lecturer at Department of Information Security, Petra University, Jordan. His main research areas cyber-security, Cyber Forensics, advanced machine learning and data science applications.

Publications

Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting
Abdelraouf Ishtaiwi, Ali Mohd Ali, Ahmad Al-Qerem, Mohammad Sabahean, Bilal Alzubi, Ammar Almomani, Mohammad Alauthman, Amjad Aldweesh, Mohammad A. Al Khaldy. © 2024. 17 pages.
Machine learning has become ubiquitous across industries for its ability to uncover in- sights from data. This research explores the application of machine learning for...
Quantum Computing for Cybersecurity: A Comparative Study of Classical and Quantum Techniques
Mohammad Alauthman, Ammar Almomani, Ahmad Al-Qerem, Mohammad A. Al Khaldy, Amjad Aldweesh, Ali Younis Al Maqousi, Mouhammd Alkasassbeh. © 2024. 25 pages.
This chapter explores the impact of quantum computing on cybersecurity, comparing classical and quantum techniques. It provides an overview of the current quantum landscape...
Homomorphic Encryption Enabling Computation on Encrypted Data for Secure Cloud Computing
Ali Maqousi, Mohammad Alauthman, Ammar Almomani. © 2024. 26 pages.
Homomorphic encryption enables computations on encrypted data, providing confidentiality for cloud computing applications. This chapter explains the foundations, classifications...
Revolutionizing Cryptography Blockchain as a Catalyst for Advanced Security Systems
Amjad Aldweesh, Mohammad Alauthman, Ahmad al-Qerem, Abdelraouf Ishtaiwi, Ammar Almomani, Mohammad A. Al Khaldy. © 2024. 17 pages.
Blockchain's decentralized trust models are spurring rapid advances in applied cryptography. This chapter explores the accelerating convergence between cryptographic...
Cryptographic Techniques for Securing Blockchain-Based Cryptocurrency Transactions Against Botnet Attacks
Ammar Almomani, Ahmad Al-Qerem, Mohammad A. Al Khaldy, Mohammad Alauthman, Amjad Aldweesh, Khalid M. O. Nahar. © 2024. 25 pages.
This chapter analyzes the most sophisticated cryptography methods which are used to protect blockchain-based cryptocurrency transactions against attacks by botnets. First, a...
Privacy-Preserving Machine Learning Cryptographic Techniques for Secure Data Analysis
Mohammad Alauthman, Ahmad Al-Qerem, Ammar Almomani, Amjad Aldweesh, Faisal Aburub, Mouhammd Alkasassbeh. © 2024. 26 pages.
Machine learning models rely on sensitive personal data, creating tension between utility and privacy. Privacy-preserving machine learning aims to enable secure data analysis...
Cryptographic Protocols for Internet of Things (IoT) Security Lightweight Schemes and Practical Deployment
Mohammad Alauthman, Amjad Aldweesh, Ahmad Al-Qerem, Ali Younis Al Maqousi, Ammar Almomani, Mouhammd Alkasassbeh. © 2024. 18 pages.
The proliferation of Internet of Things (IoT) devices has revolutionized many industries and daily life, however these resource-constrained devices also present significant...
The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds
Amjad Aldweesh, Mohammad Alauthman, Mohammad Al Khaldy, Abdelraouf Ishtaiwi, Ahmad al-Qerem, Ammar Almoman, Brij B. Gupta. © 2023. 24 pages.
Blockchain technology and the metaverse are revolutionizing digital experiences by merging secure, cryptographic systems with shared virtual spaces. These advancements have...
Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments
Mohammad Alauthman, Ahmad al-Qerem, Someah Alangari, Ali Mohd Ali, Ahmad Nabo, Amjad Aldweesh, Issam Jebreen, Ammar Almomani, Brij B. Gupta. © 2023. 24 pages.
Cost estimation for software development is crucial for project planning and management. Several regression models have been developed to predict software development costs...
Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols
Ala Hamarsheh, Ahmad Alqeerm, Iman Akour, Mohammad Alauthman, Amjad Aldweesh, Ali Mohd Ali, Ammar Almomani, Someah Alangari. © 2023. 26 pages.
The impending exhaustion of internet protocol (IP) version four (IPv4) addresses necessitates a transition to the more expansive IP version six (IPv6) protocol. However, this...
Redefining E-Commerce Experience: An Exploration of Augmented and Virtual Reality Technologies
Mohammad Al Khaldy, Abdelraouf Ishtaiwi, Ahmad Al-Qerem, Amjad Aldweesh, Mohammad Alauthman, Ammar Almomani, Varsha Arya. © 2023. 24 pages.
Integrating virtual reality (VR) and augmented reality (AR) technology into online stores enables more immersive and engaging shopping experiences, which is crucial for...
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study
Ammar Almomani, Mohammad Alauthman, Mohd Taib Shatnawi, Mohammed Alweshah, Ayat Alrosan, Waleed Alomoush, Brij B. Gupta, Brij B. Gupta, Brij B. Gupta. © 2022. 24 pages.
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our...
Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions
Kamal Alieyan, Ammar Almomani, Rosni Abdullah, Badr Almutairi, Mohammad Alauthman. © 2021. 13 pages.
In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure...
Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions
Kamal Alieyan, Ammar Almomani, Rosni Abdullah, Badr Almutairi, Mohammad Alauthman. © 2020. 13 pages.
In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure...
Network-Based Detection of Mirai Botnet Using Machine Learning and Feature Selection Methods
Ahmad Al-Qerem, Bushra Mohammed Abutahoun, Shadi Ismail Nashwan, Shatha Shakhatreh, Mohammad Alauthman, Ammar Almomani. © 2020. 11 pages.
The spread of IoT devices is significantly increasing worldwide with a low design security that makes it more easily compromised than desktop computers. This gives rise to the...
A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing
Ahmad Al-Nawasrah, Ammar Ali Almomani, Samer Atawneh, Mohammad Alauthman. © 2020. 37 pages.
A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and...