
Iman AlmomaniUniversity of Jordan | UJ · Department of Computer Science
Iman Almomani
PhD
About
81
Publications
83,916
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,179
Citations
Citations since 2017
Introduction
Skills and Expertise
Additional affiliations
August 2014 - September 2019
Publications
Publications (81)
Cybersecurity attacks are still causing significant threats to individuals and organizations, affecting almost all aspects of life. Therefore, many countries worldwide try to overcome this by introducing and applying cybersecurity regularity frameworks to maintain organizations’ information and digital resources. Saudi Arabia has taken practical st...
Nowadays, ransomware is considered one of the most critical cyber-malware categories. In recent years various malware detection and classification approaches have been proposed to analyze and explore malicious software precisely. Malware originators implement innovative techniques to bypass existing security solutions. This paper introduces an effi...
This paper presents a robust multi-stage security solution based on fusion, encryption, and watermarking processes to transmit color healthcare images, efficiently. The presented solution depends on the features of discrete cosine transform (DCT), lifting wavelet transform (LWT), and singular value decomposition (SVD). The primary objective of this...
The digital revolution has taken business sectors to a new height through the advancement of technology. The healthcare sector also embraced digital technology to facilitate technological change from mechanical and analogue electronic devices to the digital technology that is available today. The common use of digital technology in the healthcare s...
Nowadays, there is tremendous growth in biometric authentication and cybersecurity applications. Thus, the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors. Therefore, designing and implementing robust security algorithms for users' biometrics is still a hot research area to be...
Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels by overwhelming the network with jamming packets, especially for self-driving cars, as it is essential to send/receive messages without any interruptions to control the vehicles remotely. In wireless vehicular ad hoc network...
The continuous digitization of healthcare services makes them more targeted by security attackers that attempt to steal the patients’ confidential records and hijack their healthcare rights. Consequently, many existing approaches were proposed to protect healthcare data and services. However, these current solutions lack efficiency, as indicated by...
The Internet of Things (IoT) has been used in various critical fields, including healthcare, elderly surveillance, autonomous transportation, and energy management. As a result of its emergence, several IoT-based smart applications have been established in various domains. Wireless Sensor Networks (WSNs) are the most common infrastructure for these...
Nowadays, cybercriminals are carrying out many forms of cyberattacks. Malware attacks, in particular, have emerged as one of the most challenging concerns in the cybersecurity area, as well as a key weapon used by cybercriminals. Malware is a term used to describe harmful software. Malware can be used to modify or destroy data on target computers,...
Data encryption and steganography algorithms are heavily used in current systems to achieve data confidentiality. This paper presents a comprehensive Defensive/Offensive (DefOff) system that offers different hiding technologies and encryption algorithms, whether symmetric or asymmetric, to ensure the secrecy of the transmitted data, whether this da...
This paper offers a comprehensive analysis model for android malware. The model presents the essential factors affecting the analysis results of android malware that are vision-based. Current android malware analysis and solutions might consider one or some of these factors while building their malware predictive systems. However, this paper compre...
The Internet of Things (IoT) is prone to malware assaults due to its simple installation and autonomous operating qualities. IoT devices have become the most tempting targets of malware due to well-known vulnerabilities such as weak, guessable, or hard-coded passwords, a lack of secure update procedures, and unsecured network connections. Tradition...
The coronavirus pandemic has spread over the past two years in our highly connected and information-dense society. Nonetheless, disseminating accurate and up-to-date information on the spread of this pandemic remains a challenge. In this context, opting for a solution based on conversational artificial intelligence, also known under the name of the...
The coronavirus pandemic has spread over the past two years in our highly connected and information-dense society. Nonetheless, disseminating accurate and up-to-date information on the spread of this pandemic remains a challenge. In this context, opting for a solution based on conversational artificial intelligence, also known under the name of the...
Vehicular Sensor Networks (VSN) introduced a new paradigm for modern transportation systems by improving traffic management and comfort. However, the increasing adoption of smart sensing technologies with the Internet of Things (IoT) made VSN a high-value target for cybercriminals. In recent years, Machine Learning (ML) and Deep Learning (DL) techn...
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. This hiding aims to achieve the confidentiality of the IoT secret data; whether it is benign or malicious (e.g., ransomware) and for defensive or offensive purposes. This paper introduces a hybrid crypto-steganography approach for rans...
Recently, cybersecurity experts and researchers have given special attention to developing cost-effective deep learning (DL)-based algorithms for Android malware detection (AMD) systems. However, the conventional AMD solutions necessitate extensive computations to achieve high accuracy in detecting Android malware apps. Consequently, there is a sig...
Automatic License Plate (LP) detection and recognition algorithms have become a necessity for intelligent transportation systems due to their efficiency in multiple applications such as parking control and traffic management. Vehicle LP detection and recognition is the process of identifying and locating the LP from the vehicle and then extracting...
The cloud market is characterized by fierce rivalry among cloud service providers. The availability of various services with identical functionalities on the market complicates the selection decision for service requesters. Although objective trust measurements can be used to evaluate the trustworthiness of services, they are not always available a...
Android ransomware is one of the most threatening attacks that is increasing at an alarming rate. Ransomware attacks usually target Android users by either locking their devices or encrypting their data files and then requesting them to pay money to unlock the devices or recover the files back. Existing solutions for detecting ransomware mainly use...
The Saudi Arabia government has proposed different frameworks such as the CITC's Cybersecurity Regulatory Framework (CRF) and the NCA's Essential Cybersecurity Controls (ECC) to ensure data and infrastructure security in all IT-based systems. However, these frameworks lack a practical, published mechanism that continuously assesses the organization...
Ransomware is considered one of the most threatening cyberattacks. Existing solutions have focused mainly on discriminating ransomware by analyzing the apps themselves, but they have overlooked possible ways of hiding ransomware apps and making them difficult to be detected and then analyzed. Therefore, this paper proposes a novel ransomware hiding...
In the last decade, the devices and appliances utilizing the Internet of things (IoT) have expanded tremendously, which has led to revolutionary developments in the network industry. Smart homes and cities, wearable devices, traffic monitoring, health systems, and energy savings are typical IoT applications. The diversity in IoT standards, protocol...
There is a massive growth in malicious software (Malware) development, which causes substantial security threats to individuals and organizations. Cybersecurity researchers makes continuous efforts to defend against these malware risks. This research aims to exploit the significant advantages of Transfer Learning (TL) and Fine-Tuning (FT) methods t...
The security of IoT networks is an important concern to researchers and business owners, which is taken into careful consideration due to its direct impact on the availability of the services offered by IoT devices and the privacy of the users connected with the network. An intrusion detection system ensures the security of the network and detects...
In recent years, Ransomware has been a critical threat that attacks smartphones. Ransomware is a kind of malware that blocks the mobile’s system and prevents the user of the infected device from accessing their data until a ransom is paid. Worldwide, Ransomware attacks have led to serious losses for individuals and stakeholders. However, the dramat...
Intrusion detection of IoT-based data is a hot topic and has received a lot of interests from researchers and practitioners since the security of IoT networks is crucial. Both supervised and unsupervised learning methods are used for intrusion detection of IoT networks. This paper proposes an approach of three stages considering a clustering with r...
The rapid growth of multimedia communication systems has expanded the High-Efficiency Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent, elevated need to protect and secure the HEVC content during streaming and communication over insecure channels to ensure the privacy of HEVC data against intruders and attacker...
Ransomware analysis and detection has been recently applied using supervised and unsupervised machine learning approaches. Combining both approaches simplifies the complexity of the data and builds an expert classifier for each predicted cluster. In this paper, a hybrid approach for detecting ransomware is proposed. It combines evolutionary cluster...
Android Operating System becomes a major target for malicious attacks. Static analysis approach is widely used to detect malicious applications. Most of existing studies on static analysis frameworks are limited to certain features. This paper presents an Android Static Analysis Framework (ASAF) which models the overall static analysis phases and a...
Android is one of the most essential and highly used operating systems. Android permissions system is a core security component that offers an access-control mechanism to protect system resources and users' privacy. As such, it has experienced continuous change over each Android release. However, previous research on the permissions system has empl...
Nowadays, smartphones are an essential part of people’s lives and a sign of a contemporary world. Even that smartphones bring numerous facilities, but they form a wide gate into personal and financial information. In recent years, a substantial increasing rate of malicious efforts to attack smartphone vulnerabilities has been noticed. A serious com...
Applying Software Engineering (SE) processes is vital to critical and complex systems including security and networking systems. Nowadays, Wireless Sensor Networks (WSNs) and their applications are found in many military and civilian systems which make them attractive to security attackers. The increasing risks and system vulnerabilities of WSNs ha...
The applications of Wireless Sensor Networks (WSNs) are very important nowadays and could be found in many different life aspects. Broadcast authentication (BA) protocols are solutions to guarantee that commands and requests sent by the Base Station (BS), which controls the services provided by WSN, are authentic. Network mobility is considered one...
We are pleased to invite you to submit Full Papers to the 2020 International Conference of Smart Systems and Emerging Technologies (SMARTTECH 2020)
which will be held in the beautiful city of Riyadh - Saudi Arabia from 03-05 November 2020
: The connection between collaborative learning and the new mobile technology has become tighter. Mobile learning enhances collaborative learning as learners can access information and learning materials from anywhere and at any time. However, supporting efficient mobile learning in education is a critical challenge. In addition, incorporating tech...
Android ransomware is one of the most threatening attacks nowadays. Ransomware in general encrypts or locks the files on the victim’s device and requests a payment in order to recover them. The available technologies are not enough as new ransomwares employ a combination of techniques to evade anti-virus detection. Moreover, the literature counts o...
This chapter presents the security scanning process for Android applications. The aim is to guide researchers and developers to the core phases/steps required to analyze Android applications, check their trustworthiness, and protect Android users and their devices from being victims to different malware attacks. The scanning process is comprehensiv...
Efficient detection of security attacks in Wireless Sensor Networks (WSNs) is very crucial in their Intrusion Detection Systems (IDSs). This is due to the sensitivity of WSN and its strong presence in the current and future Internet of Things (IoT) services. This paper provides a comprehensive empirical study aims at examining several Data mining t...
Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarante...
The Kingdom of Saudi Arabia (KSA) gives great attention to improving the quality of services provided by health care sectors including outpatient clinics. One of the main drawbacks in outpatient clinics is long waiting time for patients—which affects the level of patient satisfaction and the quality of services. This article addresses this problem...
Multimedia streaming sessions in general and Voice over Internet Protocol (VoIP) calls in specific are more vulnerable to security attacks than traditional telephone calls due to the vulnerability of the IP network itself. Currently, there is a great interest in securing VoIP calls especially after many recent leaks and eavesdropping cases. The mos...
Wireless Sensor Networks (WSN) have become increasingly one of the hottest research areas in computer science due to their wide range of applications including critical military and civilian applications. Such applications have created various security threats, especially in unattended environments. To ensure the security and dependability of WSN s...
Nowadays, Wireless Sensor Networks (WSN) services are applied in many civilian and military scenarios. This has initiated various security threats, especially in unattended environments. Low Energy Aware Cluster Hierarchy (LEACH) is one of the most popular hierarchical routing protocols in WSN that consumes limited energy; thus increases the networ...
Nowadays, Wireless Sensor Networks (WSN) services are applied in many civilian and military scenarios. This has initiated various security threats, especially in unattended environments. Low Energy Aware Cluster Hierarchy (LEACH) is one of the most popular hierarchical routing protocols in WSN that consumes limited energy; thus increases the networ...
Wireless Sensor Networks (WSNs) are resource-constrained networks that have been applied in many applications. Many researchers have presented routing protocols to prolong the lifetime of WSNs. In this paper we present a Dynamic Load Balancing Protocol (DLBP) that exploits all network nodes to achieve load balancing and prolong the lifetime of WSN....
Session Initiation Protocol (SIP) is the dominant protocol used for VoIP signaling. SIP is required to be adapted for use over decentralized environment instead of the overlay infrastructure-based networks. This research proposes a secure cluster-based SIP service over Ad hoc network to protect the adapted SIP service from several types of attacks....
Security is a basic element of distributed systems such as ad hoc and sensor communication networks. Several standards define security requirements and enforcers, such as ITU-T Recommendations X.800 and X.805. It is essential to specify and analyze protocols to know which security requirements they achieve. This paper presents a logic-based securit...
The need for securing Wireless Sensor Networks (WSNs) is essential especially in mission critical fields such as military and medical applications. Security techniques that are used to secure any network depend on the security requirements that should be achieved to protect the network from different types of attacks. Furthermore, the characteristi...
The contributions of this research are threefold. Firstly, a new, specialised Architectural Framework for WMANETs (AF-WMANETs) has been built, independent of any existing network architectures. Secondly, based upon AF-WMANET and exploiting ITU-T X.800 and X.805, a technology-independent Security Architecture for WMANETs has been defined in order to...
Global Positioning System (GPS) is becoming widely used for tracking and monitoring vehicles. Many systems have been created to provide such services which make them popular and needed more than ever before. In this paper a “GPS vehicle tracking system” is proposed. This system is useful for fleet operators in monitoring driving behavior of employe...
توفر شبكة الانترنت وسيلة هامة للوصول لمصادر هائلة من شتى أنواع المعلومات لمختلف فئات القراء. يقوم الباحثون على وجه الخصوص بإستخدام شبكة الانترنت للوصول للمصادر المعرفية الضرورية لإجراء البحوث العلمية كما يستخدم الباحثون شبكة الإنترنت أيضاً لنشر البحوث العلمية والإتصال مع دور النشر.
جاء هذا البحث ليساعد على ربط البحث العلمي بالانترنت وتطوير مهارات...
Wireless Sensor Networks (WSNs) are resource-constrained networks that have been applied in several military and civilian applications. Many protocols have been proposed for the simple, low power, low cost WSNs. In this paper we propose a new routing protocol based on Tree Routing (TR). The proposed protocol exploits neighbors' links in addition to...
Voice over Internet Protocol (VoIP) networks are an increasingly important field in the world of telecommunication due to many involved advantages and potential revenue. Measuring speech quality in VoIP networks is an important aspect of such networks for legal, commercial and technical reasons. The E-model is a widely used objective approach for m...
Wireless Sensor Networks (WSNs) are used in different civilian, military, and industrial applications. Recently , many routing protocols have been proposed attempting to find suitable routes to transmit data. In this paper we propose a Fuzzy Energy Aware tree-based Routing (FEAR) protocol that aims to enhance existing tree-based routing protocols a...
Bluetooth version “Bluetooth 2.1+EDR” adopts a Secure Simple Pairing (SSP) procedure which is a secure method for establishing a Bluetooth connection that uses Diffie-Hellman public-key cryptography in its communication. Despite the high security mechanism provided by this method, it is still vulnerable to attacks, especially Man-In-The-Middle (MIT...
Wireless Sensor Networks (WSNs) are a recent promising technology used to facilitate the provision of many civilian, military, and industrial services. Many challenges hinder the effective use of WSNs to support different applications, such as the resource limitations of sensor devices and the finite battery power. This paper proposes a new routing...
Broadcast authentication is an important process that is used to secure the applications from different kinds of attacks including Denial of service (DoS) attacks. Timed Efficient Stream Loss-tolerant Authentication (TESLA) and Digital Signature are used in Wireless Sensor Networks (WSNs) to provide broadcast authentication, but both are still vuln...