Mohammad Al-Shurman

Orcid: 0000-0001-8764-7947

Affiliations:
  • Jordan University of Science and Technology, Network Engineering and Security Department


According to our database1, Mohammad Al-Shurman authored at least 36 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Exploring Deep Learning-Based Visual Localization Techniques for UAVs in GPS-Denied Environments.
IEEE Access, 2024

2022
High Performance Changeable Dynamic Gentle Random Early Detection (CDGRED) for Congestion Control at Router Buffer.
Int. J. Grid High Perform. Comput., 2022

2021
A Collaborative Learning-Based Algorithm for Task Offloading in UAV-Aided Wireless Sensor Networks.
Comput. J., 2021

2020
DoS and DDoS attack detection using deep learning and IDS.
Int. Arab J. Inf. Technol., 2020

On detection and prevention of zero-day attack using cuckoo sandbox in software-defined networks.
Int. Arab J. Inf. Technol., 2020

WSNB: Wearable Sensors with Neural Networks Located in a Base Station for IoT Environment.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020

A Novel Gateway Selection Protocol for Three-layers Integrated Wireless Networks.
Proceedings of the 7th International Conference on Internet of Things: Systems, 2020

MSCLP: Multi-Sinks Cluster-Based Location Privacy Protection scheme in WSNs for IoT.
Proceedings of the 32nd International Conference on Microelectronics, 2020

Enhancement of WSN Network Lifetime.
Proceedings of the 32nd International Conference on Microelectronics, 2020

2019
Energy-Efficient Fuzzy-Logic-Based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks.
Sensors, 2019

Energy-Aware and Density-Based Clustering and Relaying Protocol (EA-DB-CRP) for gathering data in wireless sensor networks.
Appl. Soft Comput., 2019

IoT Denial-of-Service Attack Detection and Prevention Using Hybrid IDS.
Proceedings of the International Arab Conference on Information Technology, 2019

Priority-Based Channel Access for SAN Protocol in M2M Communication.
Proceedings of the International Arab Conference on Information Technology, 2019

Zero-Day Attack Detection and Prevention in Software-Defined Networks.
Proceedings of the International Arab Conference on Information Technology, 2019

2016
Performance analysis of amplify-and-forward cognitive relay networks with interference power constraints over Nakagami-m fading channels.
IET Commun., 2016

N-BEB: New Binary Exponential Back-off Algorithm for IEEE 802.11.
Ad Hoc Sens. Wirel. Networks, 2016

DCWI: Dynamic Contention Window Intervals for IEEE 802.11 MAC Protocol.
Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, 2016

2015
Performance evaluation of multiuser diversity in multiuser two-hop cooperative multi-relay wireless networks using maximal ratio combining over Rayleigh fading channels.
Int. J. Commun. Syst., 2015

Static cluster and dynamic cluster head (SCDCH) adaptive prediction-based algorithm for target tracking in wireless sensor networks.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

Outage probability of amplify-and-forward underlay cognitive relay networks with selection diversity over Nakagami-m fading channels.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

Outage probability of dual-hop amplify-and-forward cognitive relay networks under interference power constraints over Nakagami-m fading channels.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

2014
N-BEB: New backoff algorithm for IEEE 802.11 MAC protocol.
Proceedings of the 37th International Convention on Information and Communication Technology, 2014

LEACH enhancements for wireless sensor networks based on energy model.
Proceedings of the IEEE 11th International Multi-Conference on Systems, Signals & Devices, 2014

Closed-form expression of bit error rate in dual-hop dual-branch mixed relaying cooperative networks with best-path selection over Rayleigh fading channels.
Proceedings of the IEEE 11th International Multi-Conference on Systems, Signals & Devices, 2014

A collaborative reputation approach to avoid misbehaving nodes in MANETs.
Proceedings of the IEEE 11th International Multi-Conference on Systems, Signals & Devices, 2014

2012
Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks.
J. Netw. Comput. Appl., 2012

2011
Tree based dynamic address autoconfiguration in mobile ad hoc networks.
Comput. Networks, 2011

2010
Two Distributive Key Management Schemes In Mobile Ad Hoc Networks.
Intell. Autom. Soft Comput., 2010

Network Address Assignment In Mobile Ad-Hoc networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010

2008
Distributive Key Management for Mobile Ad Hoc Networks.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

2006
Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

2005
ARM: Anticipated route maintenance scheme in location-aided mobile ad hoc networks.
J. Commun. Networks, 2005

A quantum no-key protocol for secure data communication.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

Decreasing broadcast in route discovery using vectors in mobile ad hoc networks.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Black hole attack in mobile Ad Hoc networks.
Proceedings of the 42nd Annual Southeast Regional Conference, 2004

A performance simulation for route maintenance in wireless ad hoc networks.
Proceedings of the 42nd Annual Southeast Regional Conference, 2004


  Loading...