Mohammed Amin Almaiah

Orcid: 0000-0002-2215-2481

According to our database1, Mohammed Amin Almaiah authored at least 35 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms.
Sensors, January, 2024

Assessment of Cybersecurity Risks and threats on Banking and Financial Services.
J. Internet Serv. Inf. Secur., 2024

Enhancing IoT Intelligence: A Transformer-based Reinforcement Learning Methodology.
CoRR, 2024

Security Risk and Breach Detection Approach Based Blockchain for Medical Applications.
IEEE Access, 2024

D-BlockAuth: An Authentication Scheme-Based Dual Blockchain for 5G-Assisted Vehicular Fog Computing.
IEEE Access, 2024

2023
The impact of empowering internal auditors on the quality of electronic internal audits: A case of Jordanian listed services companies.
Int. J. Inf. Manag. Data Insights, November, 2023

A New Technological Model on Investigating the Utilization of Mobile Learning Applications: Extending the TAM.
Multimodal Technol. Interact., 2023

Digital Certificate Validation Using Blockchain: A Survey.
Proceedings of the International Conference on Information Technology, 2023

Using of Blockchain in the Context of Automotive Industry: A Survey.
Proceedings of the International Conference on Information Technology, 2023

2022
A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS.
Sensors, 2022

A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things.
Sensors, 2022

An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network.
Sensors, 2022

2021
Secure Health Monitoring Communication Systems Based on IoT and Cloud Computing for Medical Emergency Applications.
Comput. Intell. Neurosci., 2021

Multi-Agent System Combined With Distributed Data Mining for Mutual Collaboration Classification.
IEEE Access, 2021

Cyber Security Threats in Cloud: Literature Review.
Proceedings of the International Conference on Information Technology, 2021

Cybersecurity Concerns in Smart-phones and applications: A survey.
Proceedings of the International Conference on Information Technology, 2021

Machine Learning Classifiers for Network Intrusion Detection System: Comparative Study.
Proceedings of the International Conference on Information Technology, 2021

Cybersecurity in Smart City: A Systematic Mapping Study.
Proceedings of the International Conference on Information Technology, 2021

2020
An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks.
Sensors, 2020

Mobile Government Adoption Model Based on Combining GAM and UTAUT to Explain Factors According to Adoption of Mobile Government Services.
Int. J. Interact. Mob. Technol., 2020

Factors influencing the adoption of e-government services among Jordanian citizens.
Electron. Gov. an Int. J., 2020

Exploring the critical challenges and factors influencing the E-learning system usage during COVID-19 pandemic.
Educ. Inf. Technol., 2020

Investigating the main determinants of mobile cloud computing adoption in university campus.
Educ. Inf. Technol., 2020

Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks.
IEEE Access, 2020

Analysis the Effect of Different Factors on the Development of Mobile Learning Applications at Different Stages of Usage.
IEEE Access, 2020

The Role of Compatibility and Task-Technology Fit (TTF): On Social Networking Applications (SNAs) Usage as Sustainability in Higher Education.
IEEE Access, 2020

An Energy Proficient Load Balancing Routing Scheme for Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment.
IEEE Access, 2020

An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks.
IEEE Access, 2020

MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks.
IEEE Access, 2020

2019
Towards a Model of Quality Features for Mobile Social Networks Apps in Learning Environments: An Extended Information System Success Model.
Int. J. Interact. Mob. Technol., 2019

Analysis of the essential factors affecting of intention to use of mobile learning applications: A comparison between universities adopters and non-adopters.
Educ. Inf. Technol., 2019

Examination of factors influencing the use of mobile learning system: An empirical study.
Educ. Inf. Technol., 2019

Applying the UTAUT Model to Explain the Students' Acceptance of Mobile Learning System in Higher Education.
IEEE Access, 2019

Analysis of the Effect of Course Design, Course Content Support, Course Assessment and Instructor Characteristics on the Actual Use of E-Learning System.
IEEE Access, 2019

2014
Investigating Students' Perceptions on Mobile Learning Services.
Int. J. Interact. Mob. Technol., 2014


  Loading...