Izzat Alsmadi

Izzat Alsmadi
Texas A&M University San Antonio · College of Business

PhD in software engineering

About

370
Publications
193,890
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,771
Citations
Citations since 2016
161 Research Items
2269 Citations
20162017201820192020202120220100200300400
20162017201820192020202120220100200300400
20162017201820192020202120220100200300400
20162017201820192020202120220100200300400
Additional affiliations
July 2016 - present
Texas A&M University San Antonio
Position
  • Professor (Assistant)
August 2015 - July 2016
University of New Haven
Position
  • Professor (Assistant)
June 2014 - August 2015
Boise State University
Position
  • Assistant Research Professor
Education
August 2004 - March 2008
North Dakota State University
Field of study
  • Software Engineering

Publications

Publications (370)
Article
The coronavirus (COVID‐19) started in China in 2019, has spread rapidly in every single country and has spread in millions of cases worldwide. This paper presents a proposed approach that involves identifying the relative impact of COVID‐19 on a specific gender, the mortality rate in specific age, investigating different safety measures adopted by...
Conference Paper
Full-text available
Detection of malware and security attacks is a complex process that can vary in its details and analysis activities. As part of the detection process, malware scanners try to categorize a malware once it is detected under one of the known malware categories (e.g. worms, spywares, viruses, etc.). However, many studies and researches indicate problem...
Article
Essentially all forms of online communication involve the use of cryptography to ensure that only the intended recipient of a message can read it. Nearly every protocol includes message encryption as a part of its standard. Whether it is https, sh, or S[MIME, the most common types of connections have encryption enabled by default. Most computers ca...
Article
Full-text available
The Internet, and many of the related things, hence the term Internet of Things, IoT, continue to expand and take more roles in human lives. Indeed, this enables us to be connected with our devices and the environment. The Internet also enabled us to be continuously informed about the status of our cars, homes, health, family, friends, etc. However...
Article
Full-text available
Data analytics projects span all types of domains and applications. Researchers publish results using certain datasets and classification models. They present results with a summary of the performance metrics of their evaluated classifiers. However, readers and evaluators may not be able to compare results from the different papers for several reas...
Article
The majority of the intrusion detection solutions proposed using machine learning and deep learning approaches are based on known attack classes only. Comprehensive threat detection systems should consider both known and unknown attacks. Rapidly changing network environment and the advanced tools and techniques used by adversaries to launch new sop...
Chapter
For hackers and many actors in the cyber world, crises can make opportunities. With the continuous spread of Covid-19 pandemics, new waves of cyber-attacks are witnessed. Attackers are taking advantage of possibly increasing vulnerabilities due to lack of awareness of best security practices when using online resources by many new users. While the...
Preprint
Full-text available
Deep Learning (DL) models are widely used in machine learning due to their performance and ability to deal with large datasets while producing high accuracy and performance metrics. The size of such datasets and the complexity of DL models cause such models to be complex, consuming large amount of resources and time to train. Many recent libraries...
Article
Full-text available
Availability is one of the three main goals of information security. This paper contributes to systems’ availability by introducing an optimization model for the adaptation (controlling the capturing, coding, and sending features of the video communication system) of live broadcasting of video to limited and varied network bandwidth and/or limited...
Chapter
The intelligence extracted through machine learning algorithms (MLAs) plays an important role in most of the smart applications and systems around us. Those MLAs make intelligence decisions on behalf of humans based on knowledge extracted from historical and current data. With such growth of MLA roles in human lives, the rise of adversarial attempt...
Chapter
Firewalls have been one of the most important networks access control mechanisms for several decades. Their ability to filter traffic flowing through them has been instrumental to the task of keeping malicious activity from occurring on the network. This crucial role to the network means that properly configuring the firewall is of the utmost impor...
Chapter
Cyber threat behaviors can take different forms, approaches, and goals. For threat detection systems, it is essential to monitor URLs known for previous malicious attempts. It is also vital to study attack behaviors for the ultimate goal of designing autonomous threat detection systems. We collected a large dataset of URL links annotated toward tha...
Article
Full-text available
Machine learning algorithms represent the intelligence that controls many information systems and applications around us. As such, they are targeted by attackers to impact their decisions. Text created by machine learning algorithms has many types of applications, some of which can be considered malicious especially if there is an intention to pres...
Article
Full-text available
Using data analytics in the problem of Intrusion Detection and Prevention Systems (IDS/IPS) is a continuous research problem due to the evolutionary nature of the problem and the changes in major influencing factors. The main challenges in this area are designing rules that can predict malware in unknown territories and dealing with the complexity...
Article
Full-text available
The growing use of media has led to the development of several machine learning (ML) and natural language processing (NLP) tools to process the unprecedented amount of social media content to make actionable decisions. However, these ML and NLP algorithms have been widely shown to be vulnerable to adversarial attacks. These vulnerabilities allow ad...
Article
Full-text available
Today, deep learning approaches are widely used to build Intrusion Detection Systems for securing IoT environments. However, the models’ hidden and complex nature raises various concerns, such as trusting the model output and understanding why the model made certain decisions. Researchers generally publish their proposed model’s settings and perfor...
Article
The significance of an intrusion detection system (IDS) in networks security cannot be overstated in detecting and responding to malicious attacks. Failure to detect large-scale attacks like DDoS not only makes the networks vulnerable, but a failure of critical lifesaving medical and industrial equipment can also put human lives at risk. Lack of av...
Article
Full-text available
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control...
Conference Paper
Full-text available
Abstract—Phishing attacks have witnessed a rapid increase thanks to the matured social engineering techniques, COVID-19 pandemic, and recently adversarial deep learning techniques. Even though adversarial phishing attacks are recent, attackers are crafting such attacks by considering context, testing different attack paths, then selecting paths...
Preprint
Full-text available
The growing use of social media has led to the development of several Machine Learning (ML) and Natural Language Processing(NLP) tools to process the unprecedented amount of social media content to make actionable decisions. However, these MLand NLP algorithms have been widely shown to be vulnerable to adversarial attacks. These vulnerabilities all...
Preprint
Full-text available
The detection of events from online social networks is a recent, evolving field that attracts researchers from across a spectrum of disciplines and domains. Here we report a time-series analysis for predicting events. In particular, we evaluated the frequency distribution of top n-grams of terms over time, focusing on two indicators: high-frequency...
Article
Full-text available
Validation of software requirements is a primary phase in requirements engineering that ensures requirements match the target system with the intended needs of the acquirer. It aims to detect and correct errors that prevail in the specified requirements. Although there are tremendous requirements validation approaches, some software may fail becaus...
Article
Automatic Text Summarization (ATS) is an important area in Natural Language Processing (NLP) with the goal of shortening a long text into a more compact version by conveying the most important points in a readable form. ATS applications continue to evolve and utilize effective approaches that are being evaluated and implemented by researchers. Stat...
Article
The constant development of interrelated computing devices and the emergence of new network technologies have dramatically increased the Internet of Things (IoT) devices. Intrusion Detection Systems (IDSs) play a significant role in securing IoT networks. Designing an IDS that performs with maximum accuracy with minimum false alarms is a challengin...
Article
The power of information and information exchange defines the current Internet and Online Social Networks (OSNs). With such power and influence, individuals and entities expose those networks to different types of false information. This paper proposes several classification models based on Quora insincere questions; a dataset released by Kaggle. W...
Preprint
Full-text available
The internet, Online Social Networks (OSNs) and smart phones enable users to create tremendous amount of information. Users who search for general or specific knowledge may not have these days problems of information scarce but misinformation. Misinformation nowadays can refer to a continuous spectrum between what can be seen as "facts" or "truth",...
Book
Nowadays, security is becoming number one priority for governments, organization, companies, and individuals. Security is all about protecting critical and valuable assets. Protecting valuable and critical assets, whether they are tangible or intangible, is a process that can be ranged from being unsophisticated to being very sophisticated. Securit...
Article
With the continuous expansion and evolution of IoT applications, attacks on those IoT applications continue to grow rapidly. In this systematic literature review (SLR) paper, our goal is to provide a research asset to researchers on recent research trends in IoT security. As the main driver of our SLR paper, we proposed six research questions relat...
Article
Full-text available
Classic security methods become less effective against the Internet of Things (IoT) cyber-attacks, such as cryptography. An urgent need for real-time and lightweight detection of cyber-attacks is needed to secure IoT networks. This demand is achieved by a reliable and efficient intrusion detection system (IDS) that can meet IoT environments' high s...
Preprint
Full-text available
The research field of adversarial machine learning witnessed a significant interest in the last few years. A machine learner or model is secure if it can deliver main objectives with acceptable accuracy, efficiency, etc. while at the same time, it can resist different types and/or attempts of adversarial attacks. This paper focuses on studying aspe...
Article
Technology innovations have led to modern society’s inevitable use of data to execute day-to-day operations. However, by its nature, these technologies are centralized, which makes them targets to malicious hackers and jeopardizes citizens’ privacy. Blockchain increases security and privacy; it limits who can access the data, and it gives citizens...
Conference Paper
Recently, different machine learning-based detection systems are proposed to detect DDoS saturation attacks in Software-defined Networking (SDN). Meanwhile, different research studies highlight the vulnerabilities of adapting such systems in SDN. For instance, an adversary can fool the machine learning classifiers of these systems by crafting speci...
Article
Increased usage of bots through the Internet in general, and social networks in particular, has many implications related to influencing public opinion. Mechanisms to distinguish humans from machines span a broad spectrum of applications and hence vary in their nature and complexity. Here we use several public Twitter datasets to build a model that...
Conference Paper
The exposure of Internet of Things (IoT) networks led to an exponential increase in traffic size. Thus, the traffic data meet the 5V big data model, which results in the rise of many cyber threats and the appearance of new security challenges. Intrusion Detection Systems (IDS) need to apply dimensionality reduction to handle the enormous data size...
Preprint
Full-text available
word count: 184 Abstract The new Coronavirus, (A.K.A. COVID-19) created a global crisis that impacted the world not only in health perspectives but in most aspects of life. Many teams across the globe from difference, science, and health domains continue as of the time of writing this paper to find proper treatments for COVID-19. In this scope, our...
Article
Full-text available
Universities compete to improve their ranking in the different ranking systems and expend resources toward this goal. Higher rankings attract elite students, research funds, government and public support, among other benefits. However, perhaps the most influential ranking system in U.S. contexts—the U.S. News & World Report Best Colleges rankings—h...
Article
Full-text available
In an era of billions of dollars in outstanding student loan debt, researchers have posited that the U.S. News & World Report rankings continue to be an influential source of information for prospective students, yet these rankings do not include college affordability metrics in their ranking algorithm. As a result, this study performed a series of...
Chapter
Software management chapter considers security-related activities throughout the lifecycle of software development. Software applications exist in all applications around us. Vulnerabilities in those software applications can cause serious issues. Those vulnerabilities may come from software design, construction, testing, or usage.
Chapter
Risks in Information systems and technologies come from different dimensions in addition to security such as financial risks, managerial risks, people risks, etc. The cycle of risk and security management include 4 main stages: (1) Risks identifications, (2) Risk assessment and prioritizations, (3) Risk mitigations (e.g., prevention, tolerance, etc...
Chapter
Information Systems Security (ISS) is a broad term that covers all security aspects in enterprises, including system analysis and design method, manual information systems, managerial issues, and both societal and ethical problems. Information systems security management (ISSM) evolved recently to be a discipline by itself. Some universities offer...
Chapter
Information Systems exist these days in all business domains. They form core business IT infrastructures. Security and vulnerability issues in information systems can come from the systems themselves, applications developed on those systems, how those systems are configured or administered or users of those systems. In this chapter, we will survey...
Chapter
Training and certification in cyber security are key elements to provide alternative education to colleges and universities. Many jobs require certain types of certificates. Due to the nature of this field, continuous training and practice are necessary to ensure that employees are gaining knowledge on recent trends and technologies. Cyber awarenes...
Article
Full-text available
Data Envelopment Analysis (DEA) has been applied creatively in various study domains to compare and evaluate different Decision Making Units (DMUs) based on multiple input–output attributes. In this paper, the performance of Jordanian public hospitals is assessed via a methodology combining DEA with data mining methods, specifically, clustering. In...
Article
News claims that travel the Internet and online social networks (OSNs) originate from different, sometimes unknown sources, which raises issues related to the credibility of those claims and the drivers behind them. Fact-checking websites such as Snopes, FactCheck, and Emergent use human evaluators to investigate and label news claims, but the proc...
Book
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge a...
Chapter
Securing the cyberspace is a challenging task that needs well educated and trained professionals. Developing a workforce that can hold the burden of monitoring and ensure cyberspace security is becoming prominent nowadays. Accordingly, developing effective cybersecurity programs is gaining more focus in academia and industry. This paper examines th...
Article
Full-text available
Online social networks (OSNs) typically promote information sharing and publicity without consideration of the nature of the content’s credibility and quality issues in created and shared content. OSNs have little interest in dealing with information accuracy because such tasks are resource and time consuming and might contradict or limit their mai...
Chapter
The extraction of clique relations in social networks can show information related to groups and how those groups are formed or interact with each other. In one pending application, we are showing how such “detection of abnormal cliques’ behaviors” can be possibly used to detect sub-communities’ behaviors based on information from Online Social Net...
Article
Full-text available
Detection of malwares and security attacks is a complex process that can vary in its details, analysis activities, etc. As part of the detection process, malware scanners try to categorize a malware once it is detected under one of the known malware categories (e.g. worms, spywares, viruses, etc.). However, many studies and researches indicate prob...
Article
Clique relations are useful in understanding the dynamics of a wide range of social interactions. One application of studying clique relations involves studying how such “detection of abnormal cliques’ behaviors” can be used to detect sub-communities’ behaviors based on information from Online Social Networks (OSNs).In social networks, a clique rep...
Article
Internet of Things (IoTs) continue to grow to cover different types of applications to connect us, our appliances, our gadgets, etc. with the Internet. Information uploaded from those devices or exchanged with them is very vital and can affect us significantly. As a result, security threats and attacks that can come through those devices impact us...
Article
Full-text available
University ranking systems influence a wide range of educational stakeholders, including students, faculty members, and campus administrators. Of these ranking systems, the U.S. News & World Report ranking of colleges and universities has been the subject of much research. However, little research has examined specific U.S. News disciplinary rankin...