Ammar Odeh

Ammar Odeh
Princess Sumaya University for Technology · King Hussein Faculty for Computing Sciences

PhD Computer Science and Engineering

About

63
Publications
40,036
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
441
Citations
Introduction
Ammar Odeh received his Ph.D. Degree in Computer science and Engineering with a concentration in Computer Security (Steganography) from University of Bridgeport. During the Ph.D. period, he worked as research Assistant, Teaching Assistant, and Instructor. He is currently an assistant professor in the computer science at Princess Sumaya University for Technology.
Additional affiliations
September 2019 - September 2022
Princess Sumaya University for Technology
Position
  • Professor (Assistant)
August 2015 - September 2019
AlMaarefa College for Science and Technology
Position
  • Professor (Assistant)
August 2011 - May 2015
University of Bridgeport
Position
  • Research Assistant
Education
August 2011 - May 2015
University of Bridgeport
Field of study
  • Computer Science and Engineering
September 2004 - August 2006
University of Jordan
Field of study
  • Computer science
September 1999 - July 2002
Hashemite University
Field of study
  • Computer Science

Publications

Publications (63)
Article
Full-text available
Portable document format (PDF) files are one of the most universally used file types. This has incentivized hackers to develop methods to use these normally innocent PDF files to create security threats via infection vector PDF files. This is usually realized by hiding embedded malicious code in the victims’ PDF documents to infect their machines....
Preprint
Full-text available
Portable Document Format (PDF) files are one of the most universally used file types. This has fascinated hackers to develop methods to use these normally innocent PDF files to create security threats via infection vectors PDF files. This is usually realized by hiding embedded malicious code in the victims’ PDF documents to infect their machines. T...
Article
Full-text available
The emergence of blockchain technology makes it possible to address disparate distributed system security concerns in formerly ridiculous practices. A key factor of this ability is the decentralization of the symmetrically distributed ledgers of blockchain. Such decentralization has replaced several security functionalities of centralized authority...
Article
Full-text available
Medical images are one of the most significant and sensitive data types in computer systems. Sending medical images over the internet necessitates using a robust encryption scheme that is resistant to cryptographic attacks. Confidentiality is the most critical part of the three security objectives for information systems security, namely confidenti...
Preprint
Full-text available
The emergence of blockchain know-how currently presents the opportunity for the health sector to adopt such technologies in electronic health records. Blockchain assists in maintaining and sharing the relevant medical records of the patient with the relevant group of healthcare providers and the hospital. Numerous specific applications include trac...
Article
Full-text available
Besides the economic impact and loss of jobs and revenues, COVID-19 have a great impact on the education sector, with several learning institutions across the world remaining shut down for months. This study evaluated the impact of COVID-19 pandemic on education. The study employed a crosssectional study design in which data was collected using qua...
Article
Full-text available
Weather detection systems (WDS) have an indispensable role in supporting the decisions of autonomous vehicles, especially in severe and adverse circumstances. With deep learning techniques, autonomous vehicles can effectively identify outdoor weather conditions and thus make appropriate decisions to easily adapt to new conditions and environments....
Article
Full-text available
Phishing is a Social Engineering attack technique that is commonly used to obtain usersensitive information such as login credentials, credit and debit card information, and so on. A phishing website has the same name and appearance as an official website. Also known as a fake website, which is designed to trick a person into stealing their identit...
Article
Full-text available
In this paper, we have proposed a model for the implementation of SP 1.1, "Estimate the Scope of the Project" by utilizing the practitioners' different experiences of and opinions on such implementation. The model has four elements, which are plan, create, review meeting, and rework/update-that help practitioners implement SP 1.1 effectively by pro...
Article
Full-text available
Every day, cyberattacks increase and use different strategies. One of the most common cyberattacks is Phishing, where the attacker collects sensitive and confidential information by pretending as a trusted party. Different traditional strategies have been introduced for anti-phishing, such as blacklisted, heuristic search, and visual similarity. Mo...
Conference Paper
Full-text available
Websites phishing is a cyber-attack that targets online users to steal their sensitive information including login credentials and banking details. Attackers fool the users by presenting the masked webpage as a legitimate or trustworthy to retrieve their essential data. Several solutions to phishing websites attacks have been proposed such as heuri...
Article
Full-text available
Globalization and technological advancement have driven up the demand for software as many enterprises seek to gain a competitive edge through efficient business operations. Whereas software provides this capacity, the resources involved in software development sometimes provide a stumbling block, especially for startups and smaller businesses. Sof...
Article
Full-text available
Electronic Medical Records (EMRs) can provide many benefits to physicians, patients and healthcare services if they are adopted by healthcare organizations. But concerns about privacy and security that relate to patient information can cause there to be relatively low EMR adoption by a number of health institutions. Safeguarding a huge quantity of...
Article
Full-text available
Maximizing user protection from Phishing website is a primary objective in the design of these networks. Intelligent phishing detection management models can assist designers to achieve this objective. Our proposed model aims to reduce the computational time and increase the security against the phishing websites by applying the intelligent detecti...
Article
Full-text available
Objective In the last decade, with the advancement of big data technology and the internet of things, Wireless Sensor Networks (WSN) become fundamental for the success of a different range of applications especially those demanding massive data processing. Methods This paper investigates several tracking methods to introduce a novel cluster-based...
Preprint
Full-text available
In the last decade, with the advancement of big data technology and the internet of things, wireless sensor networks (WSN) become fundamental for the success of different range of applications specially those demanding massive data processing. A target tracking system is a significant part of WSNs that has its own advantages and challenges. In this...
Conference Paper
Full-text available
Abstract—Effects of ping of death attack from standalone and multiple attacking machines are compared with healthy network configuration by applying the attack to the Database and File Transfer Protocol (FTP) server. Riverbed Modeler Academic Edition 17.5 is used to design and analyze the performance of the network. A comparison of three scenarios...
Article
Full-text available
Nowadays, many researchers try to find out a system that enables to detect and expect diseases early so as to find the appropriate precaution or medical treatment of it. One of the leading causes of death worldwide is Cancer. Most of the deaths from this disease are due to late prediction and detection. According to the American Cancer Society (ACS...
Conference Paper
Full-text available
Quantum algorithms have gained a lot of consideration especially for the need of searching unsorted database in a faster way rather than using the classical search mechanisms. This paper introduces a new quantum sort algorithm by employing the quantum features to expedite the searching process in conventional environments. The proposed efficient so...
Article
Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that enables mobile transmission of streaming high definition video in real time. This paper analyzes the development and LTE performance in streaming multimedia through an analysis of the video transmission package performance. Furthermore, we examined the in...
Conference Paper
Full-text available
This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text...
Conference Paper
Full-text available
Different strategies were introduced in the literature to protect data. Some techniques change the data form while other techniques hide the data inside another file. Steganography techniques conceal information inside different digital media like image, audio, and text files. Most of the introduced techniques use software implementation to embed s...
Conference Paper
Full-text available
Different strategies were introduced in the literature to protect data. Some techniques change the data form while other techniques hide the data inside another file. Steganography techniques conceal information inside different digital media like image, audio, and text files. Most of the introduced techniques use software implementations to embed...
Conference Paper
Full-text available
Different strategies were introduced in the literature to protect data. Some techniques change the data form while other techniques hide the data inside another file. Steganography techniques conceal information inside different digital media like image, audio, and text files. Most of the introduced techniques use software implementation to embed s...
Conference Paper
Full-text available
The massive amount of data transfer over internet raises different challenges such as channel types, transmission time and data security. In this paper, we present a novel secure algorithm to hide the data inside document files, where four symbols are used to embed the data inside the carrier file. The main process depends on a key to produce a sym...
Chapter
Full-text available
Different security strategies have been developed to protect the transfer of information between users. This has become especially important after the tremendous growth of internet use. Encryption techniques convert readable data into a ciphered form. Other techniques hide the message in another file, and some powerful techniques combine hiding and...
Conference Paper
Full-text available
Different security strategies have been developed to protect the transfer of information between users. This has become especially important after the tremendous growth of internet use. Encryption techniques convert readable data into a ciphered form. Other techniques hide the message in another file, and some powerful techniques combine hiding and...
Article
Full-text available
Wireless sensor networks are rapidly growing as they have many outstanding characteristics such as the low power consumption, remote location sensing, low cost wirelessly communication and mobility. There has been increase in using wireless sensor networks in the biomedical and healthcare. However, using wireless sensor network introduce new challe...
Conference Paper
Full-text available
Classical cryptography is based on the computational difficulty to compute the secret key using the current computing systems. Depending only on the difficulty of computational complexity does not provide enough security because finding a fast method to calculate the secret key will compromise the security of the systems. Quantum computing uses the...
Data
The need for secure communication methods has significantly increased with the explosive growth of the internet and mobile communications. The usage of text documents has doubled several times over the past years especially with mobile devices. In this paper we propose a new steganography algorithm for Arabic text. The algorithm employs some letter...
Data
Full-text available
The need for secure communications has significantly increased with the explosive growth of the internet and mobile communications. The usage of text documents has doubled several times over the past years especially with mobile devices. In this paper, we propose a new steganography algorithm for Unicode language (Arabic). The algorithm employs som...
Data
Vast amount of data transfer over internet, raises different issues such as channel types, transmission time and data security. In this paper, we present a novel secure algorithm to hide data inside document files, where four symbols are used to embed data inside the carrier file. The main process depends on a key to produce a symbol table and matc...
Data
Full-text available
Secure communication is essential for data confidentiality and integrity especially with the massive growth of the internet and mobile communication. Steganography is an art for data hiding by embedding the data to different objects such as text, images, audio and video objects. In this paper we propose a new algorithm for data hiding using Text St...
Conference Paper
Full-text available
this paper aims to solve the security issues between two parties communicating through a Quantum channel. One of the most effective factors in Quantum cryptography is the trust between two or more parties. Communication parties need to verify the authenticity of each other and who they claim to be. The proposed model introduces a trusted center as...
Conference Paper
Full-text available
To search for an element in an unsorted database, it requires O(N) operations using classical computers, where it takes only O(√N) operations in quantum systems. In this paper, we provide an in-depth look at the existing quantum searching algorithms and emphasize the quantum entanglement feature to propose a new technique for sorting N elements and...
Conference Paper
Full-text available
Classical cryptography is based on the computational difficulty to compute the secret key using the current computing systems. Depending only on the difficulty of computational complexity does not provide enough security because finding a fast method to calculate the secret key will compromise the security of the systems. Quantum computing uses the...
Conference Paper
Full-text available
The need for secure communications has significantly increased with the explosive growth of the internet and mobile communications. The usage of text documents has doubled several times over the past years especially with mobile devices. In this paper, we propose a new steganography algorithm for Unicode language (Arabic). The algorithm employs som...
Conference Paper
Full-text available
With the rapid growth of networking mechanisms, where large amount of data can be transferred between users over different media, the necessity of secure systems to maintain data privacy increases significantly. Different techniques have been introduced to encrypt data during the transfer process to avoid any kind of attack. One of these techniques...
Conference Paper
Full-text available
Vehicular Ad-hoc Network (VANET) is a new network technology where the cars are used as mobile nodes to form a communication network. In VANET, routing protocols have a significant role in terms of the performance because they determine the way of sending and receiving packets between mobile nodes. In this paper, we examine and analyze the performa...
Conference Paper
Full-text available
Secure communication is essential for data confidentiality and integrity especially with the massive growth of the internet and mobile communication. Steganography is an art for data hiding by embedding the data to different objects such as text, images, audio and video objects. In this paper we propose a new algorithm for data hiding using Text St...
Article
Full-text available
Now a day with the Internet revolution, the online business has been one of the most popular and efficient marketing methods. The change of the economy has the biggest impact on the business method. For example: social networking and its influence, shopping type, creativity, and create a new business environment. Electronic business shows the su...
Article
Full-text available
Now a day with the Internet revolution, the online business has been one of the most popular and efficient marketing methods. The change of the economy has the biggest impact on the business method. For example: social networking and its influence, shopping type, creativity, and create a new business environment. Electronic business shows the succe...
Article
Full-text available
Different strategies used to protect data against attackers, whose try to read data and analysis message transfer between sender and receiver. Nowadays network represent main road for message transfer over internet, special after heavy use of wireless network. In this paper we explore network classification and main advantages and disadvantages. Ne...
Conference Paper
Full-text available
The need for secure communications has significantly increased with the explosive growth of the internet and mobile communications. The usage of text documents has doubled several times over the past years especially with mobile devices. In this paper we propose a new Steganogaphy algorithm for Arabic text. The algorithm employs some Arabic languag...
Article
Full-text available
Extensive use of wireless networks in different fields increases the need to improve their performance, as well as minimize the amplitude of loss messages. Device mobility, where there is no standard topology that can be applied or fixed routing that can be designed, is a topic that received recent attention in wireless networks. In a Mobile Ad Hoc...
Article
Full-text available
Extensive use of wireless networks in different fields increases the need to improve their performance, as well as minimize the amplitude of loss messages. Device mobility, where there is no standard topology that can be applied or fixed routing that can be designed, is a topic that received recent attention in wireless networks. In a Mobile Ad Hoc...
Article
Full-text available
A MANET is an ad Hoc network. It is a decentralized network where there are several nodes interacting with one another without the existence of a network infrastructure as shown in Figure 1. All the nodes in the ad-hoc network are temporary and are gathered together randomly. In infrastructure networks, the access point is responsible for the nodes...
Article
Full-text available
The need for secure communication methods has significantly increased with the explosive growth of the internet and mobile communications. The usage of text documents has doubled several times over the past years especially with mobile devices. In this paper we propose a new steganography algorithm for Arabic text. The algorithm employs some letter...
Conference Paper
Full-text available
Security methodologies are taken into consideration for many applications, where transferring sensitive data over network must be protected from any intermediate attacker. Privacy of data can be granted using encryption, by changing transmitted data into cipher form. Apart from encryption, hiding data represents another technique to transfer data w...
Conference Paper
Full-text available
Security methodologies are taken into consideration for many applications, where transferring sensitive data over network must be protected from any intermediate attacker. Privacy of data can be granted using encryption, by changing transmitted data into cipher form. Apart from encryption, hiding data represents another technique to transfer data w...
Article
Full-text available
Manhattan Mobility is a model of Vehicular Ad-hoc Network (VANET) where nodes have flexibility to connect and disconnect from the network at any time and have also freedom of movement. Manhattan Mobility Model is proposed generally for urban areas that have grid streets topology, this model is organized in a specific way where there are number of v...
Conference Paper
Full-text available
Abstract Security issues are taken into consideration for many applications and are also an integral part of computer networks. On one hand, security especially comes into picture when transferring data from one device to another. On the other hand, rapid migration of networks from wired to wireless increase security complications among these netwo...

Network

Cited By

Projects

Project (1)