المؤهلات العلمية
  • 2009
    الدكتوراة

    الجامعة : جامعة انجليا
    الكلية : الحوسبة
    بلد التخرج : المملكة المتحدة
    التخصص العام : الأمن السيبراني
    التخصص الدقيق : امن الحاسب والشبكات
    التقدير : ممتاز

  • 2003
    الماجستير

    الجامعة : الجامعة الاردنية
    الكلية : كلية الدراسات العليا
    بلد التخرج : الأردن
    التخصص العام :
    التخصص الدقيق :
    التقدير : جيد جدا

  • 2001
    البكالوريوس

    الجامعة : جامعة الازهر
    الكلية : العلوم
    بلد التخرج : فلسطين
    التخصص العام : علم الحاسوب
    التخصص الدقيق : علم الحاسوب
    التقدير : جيد

النتاج البحثي
الأبحاث المنشورة
عنوان البحثاسم المجلةسنة النشر
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions ModelsInternational Arab Journal of Information Technology (IAJIT)2024
Secure Three-Factor Authentication Scheme for Remote Healthcare SystemsComputer Systems Science & Engineering (CSSE)2022
Fully Authentication Services Scheme for NFC Mobile Payment SystemsIntelligent Automation & Soft Computing (IASC)2022
Cyber Threat Intelligence using PCA-DNN Model to detect Abnormal Network BehaviorEgyptian Informatics Journal2022
Network Traffic Classification of VPN and Non-VPN Traffic Using Time-Related FeaturesMaterials and Continua CMC2022
Analysis of the Desynchronization Attack Impact on the E2EA SchemeComputer Systems Science & Engineering (CSSE)2022
Reducing the overhead messages cost of the SAK-AKA authentication Scheme for 4G/5G mobile networksIEEE Access2021
An analytic model for reducing authentication signaling traffic in an End-to-End authentication schemesensors2021
An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSNMaterials and Continua CMC2021
AAA-WSN: Anonymous Access Authentication Scheme for Wireless Sensor Networks in Big Data EnvironmentEgyptian Informatics Journal2021
Secure Authentication Scheme using Diffie Hellman Key Agreement for Smart IoT Irrigation SystemsElectronics2021
Avalanche Analysis of Variant Polynomials for AESTurkish Journal of Computer and Mathematics Education2021
Design a secure IoT architecture using smart wireless networksInternational Journal of Communication Networks and Information Security (IJCNIS)2020
Recent impediments in deploying IPv6Adv. Sci., Technol. Eng. Syst. J.2020
General model for best feature extraction of EEG using discrete wavelet transform wavelet family and differential evolutionInt. J. Distrib. Sensor Netw2020
Performance Analysis of SAP-NFC protocolInternational Journal of Communication Networks and Information Security (IJCNIS)2018
SE-H: Secure and Efficient Hash Protocol for RFID SystemInternational Journal of Communication Networks and Information Security (IJCNIS)2017
OCC-Mix Approach for Concurrent Mixture of Fixed and Mobile TransactionsJournal of Digital Information Management (JDIM)2017
A Secure Anonymity Key of Authentication and Key Agreement protocol for LTE networkInternational Arab Journal of Information Technology (IAJIT)2017
Secure Authentication Protocol for NFC Mobile Payment SystemsInternational Journal of Computer Science and Network Security (IJCSNS)2017
Synchronous Authentication Key Management Scheme for Inter-eNB Handover over LTE NetworksInternational Journal of Advanced Computer Science and Applications, (IJACSA)2017
An Extended Approach for Enhancing Packet-Loss of inter-SGSN in 3G Mobile NetworksInternational Journal of Computer Network and Information Security (IJCNIS)2017