default search action
Qussai Yaseen
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Mohammed N. AlJarrah, Qussai M. Yaseen, Ahmad M. Mustafa:
Correction: AlJarrah et al. A Context-Aware Android Malware Detection Approach Using Machine Learning. Information 2022, 13, 563. Inf. 15(6): 313 (2024) - 2023
- [j16]Esraa Odat, Qussai M. Yaseen:
A Novel Machine Learning Approach for Android Malware Detection Based on the Co-Existence of Features. IEEE Access 11: 15471-15484 (2023) - [j15]Qussai M. Yaseen:
The Effect of the Ransomware Dataset Age on the Detection Accuracy of Machine Learning Models. Inf. 14(3): 193 (2023) - [c22]Hani AlOmari, Qussai M. Yaseen, Mohammed Azmi Al-Betar:
A Comparative Analysis of Machine Learning Algorithms for Android Malware Detection. ANT/EDI40 2023: 763-768 - 2022
- [j14]Mohammed N. AlJarrah, Qussai M. Yaseen, Ahmad M. Mustafa:
A Context-Aware Android Malware Detection Approach Using Machine Learning. Inf. 13(12): 563 (2022) - [c21]Ashraf S. Mashaleh, Noor Farizah Binti Ibrahim, Mohammed Azmi Al-Betar, Hossam M. J. Mustafa, Qussai M. Yaseen:
Detecting Spam Email with Machine Learning Optimized with Harris Hawks optimizer (HHO) Algorithm. ANT/EDI40 2022: 659-664 - 2021
- [j13]Qussai Yaseen, Yaser Jararweh:
Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System. J. Netw. Syst. Manag. 29(4): 45 (2021) - [c20]Mothanna Almahmoud, Dalia Alzu'bi, Qussai Yaseen:
ReDroidDet: Android Malware Detection Based on Recurrent Neural Network. ANT/EDI40 2021: 841-846 - [c19]Isra'a AbdulNabi, Qussai Yaseen:
Spam Email Detection Using Deep Learning Techniques. ANT/EDI40 2021: 853-858 - 2020
- [j12]Yaser Jararweh, Mohammed A. Shehab, Qussai Yaseen, Mahmoud Al-Ayyoub:
Improving classification and clustering techniques using GPUs. Concurr. Comput. Pract. Exp. 32(21) (2020) - [j11]Qutaibah Althebyan, Yaser Jararweh, Qussai Yaseen, Rami Mohawesh:
A knowledgebase insider threat mitigation model in the cloud: a proactive approach. Int. J. Adv. Intell. Paradigms 15(4): 417-436 (2020) - [c18]Nour Alqudah, Qussai Yaseen:
Machine Learning for Traffic Analysis: A Review. ANT/EDI40 2020: 911-916
2010 – 2019
- 2019
- [c17]Qussai Yaseen, Aman Alabdulrazzaq, Firas AlBalas:
A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases. CCWC 2019: 721-727 - [c16]Firas AlBalas, Wail Mardini, Majd Al-Soud, Qussai Yaseen:
A topology-based performance Evaluation for an adaptive tuning protocol for service and resource discovery in the Internet of Things. CCWC 2019: 905-909 - [c15]Zain A. Halloush, Qussai M. Yaseen:
A blockchain model for preserving intellectual property. DATA 2019: 53:1-53:5 - 2018
- [j10]Qussai Yaseen, Firas AlBalas, Yaser Jararweh, Mahmoud Al-Ayyoub:
Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks. Trans. Emerg. Telecommun. Technol. 29(4) (2018) - [j9]Qussai Yaseen, Monther Aldwairi, Yaser Jararweh, Mahmoud Al-Ayyoub, Brij B. Gupta:
Collusion attacks mitigation in internet of things: a fog based model. Multim. Tools Appl. 77(14): 18249-18268 (2018) - [c14]Qussai M. Yaseen, Monther Aldwairi:
An Enhanced AODV Protocol for Avoiding Black Holes in MANET. FNC/MobiSPC 2018: 371-376 - 2017
- [j8]Qussai Yaseen, Yaser Jararweh, Brajendra Panda, Qutaibah Althebyan:
An insider threat aware access control for cloud relational databases. Clust. Comput. 20(3): 2669-2685 (2017) - [j7]Qutaibah Althebyan, Omar AlQudah, Yaser Jararweh, Qussai Yaseen:
A scalable Map Reduce tasks scheduling: a threading-based approach. Int. J. Comput. Sci. Eng. 14(1): 44-54 (2017) - 2016
- [j6]Qutaibah Althebyan, Qussai Yaseen, Yaser Jararweh, Mahmoud Al-Ayyoub:
Cloud support for large scale e-healthcare systems. Ann. des Télécommunications 71(9-10): 503-515 (2016) - [j5]Qussai Yaseen, Qutaibah Althebyan, Brajendra Panda, Yaser Jararweh:
Mitigating insider threat in cloud relational databases. Secur. Commun. Networks 9(10): 1132-1145 (2016) - [c13]Mahmoud Al-Ayyoub, Qussai Yaseen, Mohammed A. Shehab, Yaser Jararweh, Firas AlBalas, Elhadj Benkhelifa:
Exploiting GPUs to accelerate clustering algorithms. AICCSA 2016: 1-6 - [c12]Qussai Yaseen, Firas AlBalas, Yaser Jararweh, Mahmoud Al-Ayyoub:
A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks. FAS*W@SASO/ICCAC 2016: 256-262 - 2015
- [j4]Qutaibah Althebyan, Yaser Jararweh, Qussai Yaseen, Omar AlQudah, Mahmoud Al-Ayyoub:
Evaluating map reduce tasks scheduling algorithms over cloud computing infrastructure. Concurr. Comput. Pract. Exp. 27(18): 5686-5699 (2015) - [c11]Qutaibah Althebyan, Rami Mohawesh, Qussai Yaseen, Yaser Jararweh:
Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability. ICITST 2015: 226-231 - 2014
- [j3]Qussai Yaseen, Ismail Hmeidi:
Extracting the roots of Arabic words without removing affixes. J. Inf. Sci. 40(3): 376-385 (2014) - 2013
- [c10]Qussai Yaseen, Qutaibah Althebyan, Yaser Jararweh:
PEP-side caching: An insider threat port. IRI 2013: 137-144 - 2012
- [j2]Qussai Yaseen, Brajendra Panda:
Insider threat mitigation: preventing unauthorized knowledge acquisition. Int. J. Inf. Sec. 11(4): 269-280 (2012) - [c9]Weihan Li, Brajendra Panda, Qussai Yaseen:
Mitigating Insider Threat on Database Integrity. ICISS 2012: 223-237 - [c8]Weihan Li, Brajendra Panda, Qussai Yaseen:
Malicious Users' Transactions: Tackling Insider Threat. SEC 2012: 211-222 - [c7]Qussai Yaseen, Brajendra Panda:
Mitigating Insider Threat without Limiting the Availability in Concurrent Undeclared Tasks. SERE 2012: 235-244 - [c6]Qussai Yaseen, Brajendra Panda:
Tackling Insider Threat in Cloud Relational Databases. UCC 2012: 215-218 - 2011
- [c5]Qussai Yaseen, Brajendra Panda:
Enhanced Insider Threat Detection Model that Increases Data Availability. ICDCIT 2011: 267-277 - 2010
- [j1]Amer F. Al-Badarneh, Qussai Yaseen, Ismail Hmeidi:
A new enhancement to the R-tree node splitting. J. Inf. Sci. 36(1): 3-18 (2010) - [c4]Qussai Yaseen, Brajendra Panda:
Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase. NSS 2010: 312-317 - [c3]Qussai Yaseen, Brajendra Panda:
Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention. SocialCom/PASSAT 2010: 849-856 - [c2]Qussai Yaseen, Brajendra Panda:
Predicting and Preventing Insider Threat in Relational Database Systems. WISTP 2010: 368-383
2000 – 2009
- 2009
- [c1]Qussai Yaseen, Brajendra Panda:
Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems. CSE (3) 2009: 450-455
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint