Izzat Alsmadi

Orcid: 0000-0001-7832-5081

According to our database1, Izzat Alsmadi authored at least 141 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fake or not? Automated detection of COVID-19 misinformation and disinformation in social networks and digital media.
Comput. Math. Organ. Theory, September, 2024

Data fusion and network intrusion detection systems.
Clust. Comput., September, 2024

Benchmark assessment for the DeepSpeed acceleration library on image classification.
Clust. Comput., June, 2024

Using Large Language Models in Public Transit Systems, San Antonio as a case study.
CoRR, 2024

Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models.
CoRR, 2024

Predicting Question Quality on StackOverflow with Neural Networks.
CoRR, 2024

Cyber Ready Rural: Understanding Law Enforcement Cyber Readiness.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Ensemble-based Cyber Intrusion Detection for Robust Smart City Protection.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024

Enhancing Machine Learning Based SQL Injection Detection Using Contextualized Word Embedding.
Proceedings of the 2024 ACM Southeast Conference, 2024

2023
Adversarial NLP for Social Network Applications: Attacks, Defenses, and Research Directions.
IEEE Trans. Comput. Soc. Syst., December, 2023

Recognition of Arabic Air-Written Letters: Machine Learning, Convolutional Neural Networks, and Optical Character Recognition (OCR) Techniques.
Sensors, December, 2023

Towards the design of real-time autonomous IoT NIDS.
Clust. Comput., October, 2023

Zero-day attack detection: a systematic literature review.
Artif. Intell. Rev., October, 2023

A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption.
CoRR, 2023

Mutation-Based Adversarial Attacks on Neural Text Detectors.
CoRR, 2023

Balanced Datasets for IoT IDS.
CoRR, 2023

Warm-Starting for Improving the Novelty of Abstractive Summarization.
IEEE Access, 2023

Trust Management and Attribute-Based Access Control Framework for Protecting Maritime Cyber Infrastructure.
Proceedings of the 18th International Conference on Software Technologies, 2023

Towards Cyber Readiness Assessment in Rural Areas.
Proceedings of the 2023 International Conference on Advances in Computing Research, 2023

2022
Anomaly detection in blockchain using network representation and machine learning.
Secur. Priv., 2022

A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks.
J. Inf. Secur. Appl., 2022

Deep reinforcement and transfer learning for abstractive text summarization: A review.
Comput. Speech Lang., 2022

A Mutation-based Text Generation for Adversarial Machine Learning Applications.
CoRR, 2022

Synthetic Text Detection: Systemic Literature Review.
CoRR, 2022

Benchmark Assessment for DeepSpeed Optimization Library.
CoRR, 2022

Data-driven analysis and predictive modeling on COVID-19.
Concurr. Comput. Pract. Exp., 2022

A comprehensive deep learning benchmark for IoT IDS.
Comput. Secur., 2022

Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective function.
Clust. Comput., 2022

Vulnerability assessment of industrial systems using Shodan.
Clust. Comput., 2022

Towards building data analytics benchmarks for IoT intrusion detection.
Clust. Comput., 2022

Adversarial Machine Learning in Text Processing: A Literature Survey.
IEEE Access, 2022

Practical web security testing: Evolution of web application modules and open source testing tools.
Proceedings of the 3rd International Conference on Intelligent Data Science Technologies and Applications, 2022

Malware analysis and multi-label category detection issues: Ensemble-based approaches.
Proceedings of the 3rd International Conference on Intelligent Data Science Technologies and Applications, 2022

Dark Web Analytics: A Comparative Study of Feature Selection and Prediction Algorithms.
Proceedings of the 3rd International Conference on Intelligent Data Science Technologies and Applications, 2022

New and Efficient Lightweight Cryptography Algorithm for Mobile and Web Applications.
Proceedings of the 17th International Conference on Future Networks and Communications / 19th International Conference on Mobile Systems and Pervasive Computing / 12th International Conference on Sustainable Energy Information Technology (FNC/MobiSPC/SEIT 2022), 2022

A Comparitive Study of Machine Learning Algorithms for Identifying Mental States from EEG Recordings.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

New Waves of Cyber Attacks in the Time of COVID19.
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022

Prediction and Analysis of Bus Adherence to Scheduled Times: San Antonio Transit System.
Proceedings of the 28th Americas Conference on Information Systems, 2022

2021
Ensemble Detection Model for IoT IDS.
Internet Things, 2021

Machine learning approaches to IoT security: A systematic literature review.
Internet Things, 2021

Fault-based testing for discovering SQL injection vulnerabilities in web applications.
Int. J. Inf. Comput. Secur., 2021

Misconfiguration in Firewalls and Network Access Controls: Literature Review.
Future Internet, 2021

Models versus Datasets: Reducing Bias through Building a Comprehensive IDS Benchmark.
Future Internet, 2021

Event Detection in Twitter: A Content and Time-Based Analysis.
CoRR, 2021

Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions.
CoRR, 2021

An ontological analysis of misinformation in online social networks.
CoRR, 2021

Adversarial Machine Learning in Text Analysis and Generation.
CoRR, 2021

Challenges of Software Requirements Quality Assurance and Validation: A Systematic Literature Review.
IEEE Access, 2021

Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Generating Optimal Attack Paths in Generative Adversarial Phishing.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Performance Comparison of Several Deep Learning-Based Object Detection Algorithms Utilizing Thermal Images.
Proceedings of the Second International Conference on Intelligent Data Science Technologies and Applications, 2021

2020
U.S. News & World Report Best Colleges rankings: Which institutional metrics contribute to sustained stratification?
Scientometrics, 2020

Integration of Data Envelopment Analysis and Clustering Methods.
J. Inf. Knowl. Manag., 2020

How Many Bots in Russian Troll Tweets?
Inf. Process. Manag., 2020

A model for reputation rank in online social networks and its applications.
Int. J. Soc. Netw. Min., 2020

RBAC for Healthcare-Infrastructure and data storage.
CoRR, 2020

Mutation Testing Framework for Ad-hoc Networks Protocols.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Mutation Testing to Validate Networks Protocols.
Proceedings of the IEEE International Systems Conference, 2020

Deceiving Machine Learning-Based Saturation Attack Detection Systems in SDN.
Proceedings of the 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2020

Exploring hackers assets: topics of interest as indicators of compromise.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

Using Data Analytics to Filter Insincere Posts from Online Social Networks A Case Study: Quora Insincere Questions.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

An Ensemble Feature Selection Method for IoT IDS.
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020

Disease Outbreak Detection Using Search Keywords Patterns.
Proceedings of 35th International Conference on Computers and Their Applications, 2020

Pro-ISIS Tweets Analysis Using Machine Learning Techniques.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Machine Learning Methods for Anomaly Detection in Industrial Control Systems.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Combining Blockchain and Machine Learning to Forecast Cryptocurrency Prices.
Proceedings of the 2020 Second International Conference on Blockchain Computing and Applications, 2020

Analysis and Prediction of COVID-19 Timeline and Infection Rates.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2019
A Near Real-Time Approach for Sentiment Analysis Approach Using Arabic Tweets.
J. Comput., 2019

IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries.
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019

Using Popular Search Terms in Stock Price Prediction.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

Users' Internet Searches as Proxies for Disease Escalation Trends.
Proceedings of the 4th IEEE/ACM International Conference on Connected Health: Applications, 2019

Popular Search Terms and Stock Price Prediction.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Regions-of-interest discovering and predicting in smartphone environments.
Pervasive Mob. Comput., 2018

Google n-gram viewer does not include arabic corpus! towards n-gram viewer for arabic corpus.
Int. Arab J. Inf. Technol., 2018

Evaluating social context in arabic opinion mining.
Int. Arab J. Inf. Technol., 2018

A multithreading and hashing technique for indexing Target-Decoy peptides databases.
Concurr. Comput. Pract. Exp., 2018

Network slicing to improve multicasting in HPC clusters.
Clust. Comput., 2018

Examining University Ranking Metrics: Articulating Issues of Size and Web Dependency.
Proceedings of the International Conference on Computing and Big Data, 2018

Interactive based Access Control Framework for Connected Vehicle Communication.
Proceedings of the 14th IEEE International Conference on Control and Automation, 2018

2017
Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach.
J. Netw. Comput. Appl., 2017

Evaluating network test scenarios for network simulators systems.
Int. J. Distributed Sens. Networks, 2017

Software fault proneness prediction: a comparative study between bagging, boosting, and stacking ensemble and base learner methods.
Int. J. Data Anal. Tech. Strateg., 2017

Protein interaction based features' extraction.
Int. J. Bioinform. Res. Appl., 2017

Deep vs. shallow learning-based filters of MS/MS spectra in support of protein search engines.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Deep learning-based MSMS spectra reduction in support of running multiple protein search engines on cloud.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

Towards Centralized MS/MS Spectra Preprocessing: An Empirical Evaluation of Peptides Search Engines using Ground Truth Datasets.
Proceedings of the 17th IEEE International Conference on Bioinformatics and Bioengineering, 2017

2016
Polarity Classification of Arabic Sentiments.
Int. J. Inf. Technol. Web Eng., 2016

The integration of access control levels based on SDN.
Int. J. High Perform. Comput. Netw., 2016

KP-Trie algorithm for update and search operations.
Int. Arab J. Inf. Technol., 2016

A prototype for a standard arabic sentiment analysis corpus.
Int. Arab J. Inf. Technol., 2016

E-government website security concerns and citizens' adoption.
Electron. Gov. an Int. J., 2016

Identifying DoS attacks on software defined networks: A relation context approach.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Interaction-based Reputation Model in Online Social Networks.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Privacy and Social Capital in Online Social Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Websites' Input Validation and Input-Misuse-Based Attacks.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

Building a standard dataset for Arabie sentiment analysis: Identifying potential annotation pitfalls.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Building an Islamic financial information system based on policy managements.
J. King Saud Univ. Comput. Inf. Sci., 2015

Clustering and classification of email contents.
J. King Saud Univ. Comput. Inf. Sci., 2015

A novel root based Arabic stemmer.
J. King Saud Univ. Comput. Inf. Sci., 2015

Evaluation of Spam Impact on Arabic Websites Popularity.
J. King Saud Univ. Comput. Inf. Sci., 2015

Lexicon-based sentiment analysis of Arabic tweets.
Int. J. Soc. Netw. Min., 2015

Mobile agents modelling using UML.
Int. J. Bus. Inf. Syst., 2015

Security of Software Defined Networks: A survey.
Comput. Secur., 2015

Model-Based Testing of SDN Firewalls: A Case Study.
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015

2014
Evaluating the impact of software metrics on defects prediction. Part 2.
Comput. Sci. J. Moldova, 2014

The Evaluation of the Public Opinion - A Case Study: MERS-CoV Infection Virus in KSA.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Collaboration Networks of Levantine Biomedical Researchers.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

The analysis of large-scale climate data: Jordan case study.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

2013
Using Mutation to Enhance GUI Testing Coverage.
IEEE Softw., 2013

Video spam and public opinion in current Middle Eastern conflicts.
Int. J. Soc. Netw. Min., 2013

The use of educational games for learning basic math skills in early classes.
Int. J. Soc. Media Interact. Learn. Environ., 2013

A Business Classifier to Detect Readability Metrics on Software Games and Their Types.
Int. J. E Entrepreneurship Innov., 2013

A software development process for open source and open competition projects.
Int. J. Bus. Inf. Syst., 2013

Design and code coupling assessment based on defects prediction. Part 1.
Comput. Sci. J. Moldova, 2013

Evaluation of Cost Estimation Metrics: Towards a Unified Terminology.
J. Comput. Inf. Technol., 2013

Sentiment analysis of arabic social media content: a comparative study.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Query classification and study of university students' search trends.
Program, 2012

Content-based analysis to detect Arabic web spam.
J. Inf. Sci., 2012

A Conceptual Organization for Websites Metrics and E-Government Websites: A Case Study.
Int. J. Inf. Commun. Technol. Hum. Dev., 2012

Implications for Website Trust and Credibility Assessment.
Int. J. E Entrepreneurship Innov., 2012

Checking the efficiency of integrity tests in distributed and parallel database.
Int. J. Bus. Inf. Syst., 2012

Using Test Case Mutation to Evaluate the Model of the User Interface.
Comput. Sci. J. Moldova, 2012

Annotations, Collaborative Tagging, and Searching Mathematics in E-Learning
CoRR, 2012

Indexing of Arabic documents automatically based on lexical analysis
CoRR, 2012

Automatic Coverage Evaluation for a Medical Expert System.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

2011
Evaluating Google queries based on language preferences.
J. Inf. Sci., 2011

The Effect of Stemming on Arabic Text Classification: An Empirical Study.
Int. J. Inf. Retr. Res., 2011

GUI structural metrics.
Int. Arab J. Inf. Technol., 2011

Evaluating the change of software fault behavior with dataset attributes based on categorical correlation.
Adv. Eng. Softw., 2011

2010
The Automatic Evaluation of Website Metrics and State.
Int. J. Web Based Learn. Teach. Technol., 2010

Building an e-Commerce Infrastructure in Jordan: Challenges and Requirements.
Int. J. Interact. Mob. Technol., 2010

Challenges of Utilizing E-Learning Systems in Public Universities in Jordan.
Int. J. Emerg. Technol. Learn., 2010

Jordan E-Government Challenges and Progresses.
Int. J. Adv. Corp. Learn., 2010

Using genetic algorithms for test case generation and selection optimization.
Proceedings of the 23rd Canadian Conference on Electrical and Computer Engineering, 2010

2009
Separation of Concerns in Teaching Software Engineering.
Proceedings of the Innovations in Computing Sciences and Software Engineering, 2009

2008
Using XML Trees to Represent GUI States.
Proceedings of the 2008 International Conference on Software Engineering Research & Practice, 2008

The Utilization of User Sessions in Testing.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
GUI Path Oriented Test Case Generation.
Proceedings of the International Conference on Software Engineering Theory and Practice, 2007

GUI Test Automation Framework.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

Model Checking Aspect-Oriented Design Specification.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Open Source Evolution Analysis.
Proceedings of the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 2006


  Loading...