Follow
Qussai Yaseen, Ph.D.
Qussai Yaseen, Ph.D.
Ajman University, UAE, and Jordan University of Science and Technology, Jordan
Verified email at ajman.ac.ae - Homepage
Title
Cited by
Cited by
Year
Spam Email Detection Using Deep Learning Techniques
I AbdulNabi, QM Yaseen
Procedia Computer Science, Pages 853-858, 2021
96*2021
A fog computing based system for selective forwarding detection in mobile wireless sensor networks
Q Yaseen, F AlBalas, Y Jararweh, M Al-Ayyoub
2016 IEEE 1st International Workshops on Foundations and Applications of …, 2016
732016
Machine learning for traffic analysis: a review
N Alqudah, Q Yaseen
Procedia Computer Science 170, 911-916, 2020
522020
Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks
Q Yaseen, F Albalas, Y Jararwah, M Al‐Ayyoub
Transactions on Emerging Telecommunications Technologies 29 (4), e3183, 2018
482018
Knowledge acquisition and insider threat prediction in relational database systems
Q Yaseen, B Panda
2009 International Conference on Computational Science and Engineering 3 …, 2009
482009
Cloud support for large scale e-healthcare systems
Q Althebyan, Q Yaseen, Y Jararweh, M Al-Ayyoub
Annals of telecommunications 71, 503-515, 2016
462016
Collusion attacks mitigation in internet of things: a fog based model
Q Yaseen, M Aldwairi, Y Jararweh, M Al-Ayyoub, B Gupta
Multimedia Tools and Applications 77, 18249-18268, 2018
452018
Insider threat mitigation: preventing unauthorized knowledge acquisition
Q Yaseen, B Panda
International Journal of Information Security 11, 269-280, 2012
422012
Predicting and preventing insider threat in relational database systems
Q Yaseen, B Panda
Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010
422010
An enhanced AODV protocol for avoiding black holes in MANET
QM Yaseen, M Aldwairi
Procedia Computer Science 134, 371-376, 2018
352018
ReDroidDet: Android Malware Detection Based on Recurrent Neural Network
QY Mothanna Almahmoud, Dalia Alzu’bi
Procedia Computer Science, Pages 841-846, 2021
292021
Evaluating map reduce tasks scheduling algorithms over cloud computing infrastructure
Q Althebyan, Y Jararweh, Q Yaseen, O AlQudah, M Al‐Ayyoub
Concurrency and Computation: Practice and Experience 27 (18), 5686-5699, 2015
262015
A new enhancement to the R-tree node splitting
AF Al-Badarneh, Q Yaseen, I Hmeidi
Journal of Information Science 36 (1), 3-18, 2010
262010
Extracting the roots of Arabic words without removing affixes
Q Yaseen, I Hmeidi
Journal of Information Science 40 (3), 376-385, 2014
242014
Mitigating insider threat in cloud relational databases
Q Yaseen, Q Althebyan, B Panda, Y Jararweh
Security and Communication Networks 9 (10), 1132-1145, 2016
232016
Multi-threading based map reduce tasks scheduling
Q Althebyan, O ALQudah, Y Jararweh, Q Yaseen
2014 5th International Conference on Information and Communication Systems …, 2014
232014
Tackling insider threat in cloud relational databases
Q Yaseen, B Panda
2012 IEEE Fifth International Conference on Utility and Cloud Computing, 215-218, 2012
232012
An Android Malware Detection Approach Based on Static Feature Analysis Using Machine Learning Algorithms
AY Ahmed S.Shatnawi, Qussai Yassen
Procedia Computer Science 201, 653-658, 2022
222022
Detecting Spam Email with Machine Learning Optimized with Harris Hawks optimizer (HHO) Algorithm
QMY Ashraf S.Mashaleha, Noor Farizah Binti Ibrahim, Mohammed Azmi Al-Betar ...
Procedia Computer Science 201, 659-664, 2022
222022
An insider threat aware access control for cloud relational databases
Q Yaseen, Y Jararweh, B Panda, Q Althebyan
Cluster Computing 20, 2669-2685, 2017
222017
The system can't perform the operation now. Try again later.
Articles 1–20