Mousa Tawfiq AL-Akhras

Mousa Tawfiq AL-Akhras
University of Jordan | UJ · Department of Computer Information Systems

Ph.D.

About

68
Publications
81,104
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
589
Citations
Citations since 2017
30 Research Items
476 Citations
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
Introduction
Mousa Tawfiq AL-Akhras currently works at the Department of Computer Science, Saudi Electronic University. Mousa does research in Human-computer Interaction, Data Mining and Engineering. Their most recent publication is 'Using Blockchain Technology to Validate the Integrity and Confidentiality of Backups Versions on the Cloud'.
Additional affiliations
August 2014 - December 2014
University of Jordan
Position
  • Professor (Associate)
October 2007 - December 2012
University of Jordan
Position
  • Professor (Assistant)
August 2007 - October 2016
University of Jordan
Position
  • Professor (Associate)

Publications

Publications (68)
Article
The Internet of Things (IoT) is one of the most evolving technologies, which has a major impact on our daily life. Almost all new devices will have a feature to be connected and controlled over the Internet. Several applications are utilizing IoT to enhance routine processes and actions efficiently. The Internet of Vehicles (IoV) evolved from IoT,...
Article
IoT devices with weak security designs are a serious threat to organizations. They are the building blocks of Botnets, the platforms that launch organized attacks that are capable of shutting down an entire infrastructure. Researchers have been developing IDS solutions that can counter such threats, often by employing innovation from other discipli...
Article
The Android operating system is the most used mobile operating system in the world, and it is one of the most popular operating systems for different kinds of devices from smartwatches, IoT, and TVs to mobiles and cockpits in cars. Security is the main challenge to any operating system. Android malware attacks and vulnerabilities are known as emerg...
Article
Due to the fact that an enormous amount of data is available to any user on the Internet, this leads to increased requests of Internet users to download or process their data among different servers. In fact, the need for increasing the reliability and performance of such servers has become an importance subject to tackle. Replicating servers is a...
Article
Background: Domain Name System (DNS) is considered the phone book of the Internet. Its main goal is to translate a domain name to an IP address that the computer can understand. However, DNS can be vulnerable to various kinds of attacks, such as DNS poisoning attacks and DNS tunneling attacks. Objective: The main objective of this paper is to allo...
Article
Full-text available
Technology has revolutionized into connecting ‘things’ together with the rebirth of the global network called Internet of Things (IoT). This is achieved through Wireless Sensor Network (WSN) which introduces new security challenges for Information Technology (IT) scientists and researchers. This paper addresses the security issues in WSN by establi...
Article
Full-text available
Decision trees learning is one of the most practical classification methods in machine learning, which is used for approximating discrete-valued target functions. However, they may overfit the training data, which limits their ability to generalize to unseen instances. In this study, we investigated the use of instance reduction techniques to smoot...
Article
Full-text available
Optimizing the detection of intrusions is becoming more crucial due to the continuously rising rates and ferocity of cyber threats and attacks. One of the popular methods to optimize the accuracy of intrusion detection systems (IDSs) is by employing machine learning (ML) techniques. However, there are many factors that affect the accuracy of the ML...
Article
Full-text available
Glaucoma is a major cause of blindness. Most patients start to observe that late after the disease causes a high level of damage in the optic nerve head and the high percentage of vision loss. Early diagnosis and treatment are essential and must be taken. Image processing mass-screening and machine learning classification can support early and auto...
Article
Internet of things (IoT) has led to several security threats and challenges within society. Regardless of the benefits that it has brought with it to the society, IoT could compromise the security and privacy of individuals and companies at various levels. Denial of Service (DoS) and Distributed DoS (DDoS) attacks, among others, are the most common...
Article
The current immersive increase of cyber-attacks requires constant evolution of the used security solutions. Current malware detection solutions are only able to identify known malwares that were previously detected. They also lack the ability to deeply investigate every file in the system. Therefore, new detection techniques are needed to fill this...
Chapter
Nowadays, cyber-attacks are beginning to be smart and hard to be detected, these attacks can be classified as Advance Persistence Threat(APT), which are hard to be detected and need sophisticated mechanisms of cybersecurity detection systems to be implemented to detect these types of attacks. Snort is an Intrusion Detection System (IDS) open source...
Article
Full-text available
: The connection between collaborative learning and the new mobile technology has become tighter. Mobile learning enhances collaborative learning as learners can access information and learning materials from anywhere and at any time. However, supporting efficient mobile learning in education is a critical challenge. In addition, incorporating tech...
Chapter
The security and the proper identification of individuals are vital requirements for many different applications. Biometric systems in general provide automatic recognition and identification of individuals taking advantage of the unique features of every individual. Iris recognition has a great advantage over other biometric recognition techniques...
Article
Full-text available
Mobile applications affect user’s privacy based on the granted application’s permissions as attackers exploit mobile application permissions in Android and other mobile operating systems. This research divides permissions based on Google’s classification of dangerous permissions into three groups. The first group contains the permissions that can a...
Conference Paper
Full-text available
The introduction of digital currency (Cryptocurrency) was a consequence of digital revolution that changed the lifestyle worldwide. One of the most successful examples of cryptocurrency is bitcoin, which was established by Satoshi Nakamoto who proposed the establishment of a new financial system based on blockchain technology to enable payment tran...
Conference Paper
Full-text available
Security is a concern in e-Health as patients’ data and other private information must be kept secured. Ministry of Health (MOH) is responsible for settings standards for information security in health care systems. MOH has well-structured ICT division with functional capacity to include e-Health functions and roles. To assess information security...
Conference Paper
Full-text available
Security is a concern in e-Health as patients’ data and other private information must be kept secured. Ministry of Health (MOH) is responsible for settings standards for information security in health care systems. MOH has well-structured ICT division with functional capacity to include e-Health functions and roles. To assess information security...
Article
Full-text available
Wireless Sensor Networks (WSN) have become increasingly one of the hottest research areas in computer science due to their wide range of applications including critical military and civilian applications. Such applications have created various security threats, especially in unattended environments. To ensure the security and dependability of WSN s...
Article
Full-text available
Security is a basic element of distributed systems such as ad hoc and sensor communication networks. Several standards define security requirements and enforcers, such as ITU-T Recommendations X.800 and X.805. It is essential to specify and analyze protocols to know which security requirements they achieve. This paper presents a logic-based securit...
Conference Paper
Full-text available
This paper presents our experiences in introducing robotics platforms competed in robotics contest to the second year undergraduate students at Philadelphia University, Jordan and The University of Jordan. These robotics platforms helped students to easily build a robot structure and integrate sensors and actuators within this structure. Furthermor...
Conference Paper
Full-text available
توفر شبكة الانترنت وسيلة هامة للوصول لمصادر هائلة من شتى أنواع المعلومات لمختلف فئات القراء. يقوم الباحثون على وجه الخصوص بإستخدام شبكة الانترنت للوصول للمصادر المعرفية الضرورية لإجراء البحوث العلمية كما يستخدم الباحثون شبكة الإنترنت أيضاً لنشر البحوث العلمية والإتصال مع دور النشر. جاء هذا البحث ليساعد على ربط البحث العلمي بالانترنت وتطوير مهارات...
Article
Full-text available
This work addresses the problem of overfitting the training data. We suggest smoothing the decision boundaries by eliminating border instances from the training set before training Artificial Neural Networks (ANNs). This is achieved by using a variety of instance reduction techniques. A large number of experiments were performed using 21 benchmark...
Article
Full-text available
All Rights Reserved. No part of this work may be reproduced, stored in retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise -except for personal and internal use to the extent permitted by national copyright law -without the permission and/or a fee of the Publisher. AB...
Conference Paper
Full-text available
Wireless Sensor Networks (WSNs) are resource-constrained networks that have been applied in several military and civilian applications. Many protocols have been proposed for the simple, low power, low cost WSNs. In this paper we propose a new routing protocol based on Tree Routing (TR). The proposed protocol exploits neighbors' links in addition to...
Conference Paper
Full-text available
This paper provides the design and implementation details of a remotely controlled, battery-powered robot that is able to follow a pre-defined path and to avoid obstacles. The proposed system is divided into three modules for path following, path searching and decision making. Path following controller is responsible for following a pre-defined pat...
Article
Full-text available
Voice over Internet Protocol (VoIP) networks are an increasingly important field in the world of telecommunication due to many involved advantages and potential revenue. Measuring speech quality in VoIP networks is an important aspect of such networks for legal, commercial and technical reasons. The E-model is a widely used objective approach for m...
Article
Full-text available
Due to the widespread use of computer technologies in almost all aspects of life, organisations that are connected to the Internet started extending their services to their customers to include new applications and services that satisfy their customers’ desires to make better businesses. One of these emerging applications is mobile banking. The ter...
Article
Full-text available
Bluetooth version “Bluetooth 2.1+EDR” adopts a Secure Simple Pairing (SSP) procedure which is a secure method for establishing a Bluetooth connection that uses Diffie-Hellman public-key cryptography in its communication. Despite the high security mechanism provided by this method, it is still vulnerable to attacks, especially Man-In-The-Middle (MIT...
Article
Full-text available
—This paper provides the design and implementation details of an autonomous, battery-powered robot that is based on Fuzzy Logic. The robot is able to follow a pre-defined path and to avoid obstacles, after avoiding an obstacle, the robot returns back to the path. The proposed system is divided into two main modules for path following and for obstac...
Article
Full-text available
Wireless Sensor Networks (WSNs) are a recent promising technology used to facilitate the provision of many civilian, military, and industrial services. Many challenges hinder the effective use of WSNs to support different applications, such as the resource limitations of sensor devices and the finite battery power. This paper proposes a new routing...
Article
Full-text available
With the emergence of multimedia databases, exact keyword search performed in traditional databases is not applicable due to the complex semantic nature of multimedia data. In this paper, Content Based Image Retrieval approach was introduced to solve this problem by providing metadata for multimedia databases based on their actual contents (feature...
Article
Full-text available
Estate appraisal can be defined as valuing a land or property as of a given date using common data utilising standardised methods and statistical testing. Estate appraisal has several applications such as asset valuation for lenders, property tax estimation, insurance estimation, and estate planning, grant new mortgages to new home buyers, and purc...
Article
Full-text available
Automated vessel detection has great applicability in medical diagnosis for the purpose of detecting many diseases. Gabor filter is one of the most important methods in automated detection of blood vessels in digital retinal images. This paper proposes a new method to optimise the parameters of Gabor filter using Genetic Algorithm in order to impro...
Conference Paper
This work aims to enhance the Quality of Service (QoS) of the third-generation (3G) cellular networks. The quality of voice traffic over IP networks (VoIP) is greatly reduced due to the fact that packets in IP networks suffer from packet loss which is inevitable due to the best-effort nature of these networks. Many techniques have been proposed to...
Conference Paper
Speech enhancement is the process of de-noising a speech signal for improved quality and better intelligibility. Several speech enhancement methods have been proposed including: DWFM filtering, Donoho, Massart, and Kalman. To measure the performance of these filters, a speech evaluation method is needed. SNR is one of the most common methods for sp...
Conference Paper
This paper describes the theoretical and technical aspects that were taken into consideration in the design process of a web-based adaptive e-learning environment we called (AdaLearn). AdaLearn system saves learner's responses into learner's profile then they will be used in future guidance. This paper presents an adaptation scenario in order to gi...
Conference Paper
Full-text available
Automatic property appraisal has several applications such as asset valuation for lenders, property tax estimation, insurance estimation, and estate planning, grant new mortgages to new homebuyers, and purchase mortgage packages, which can contain hundreds or even thousands of mortgages, on the secondary market as in-vestments. Automatic property a...
Conference Paper
Full-text available
Wireless Sensor Network (WSN) consists of distributed sensors that are used to sense different parameters in the environment. It is currently used in many military and civilian applications and it becomes an active research area nowadays. These sensors are very limited in resources such as energy, memory and available bandwidth. One of the major ch...
Article
Full-text available
In this paper, we propose an efficient fuzzy k-medoids clustering method (will be termed FKM). The fuzzy c-means clustering algorithm is first executed producing the membership grade matrix. The medoids are then selected as the objects with the highest membership grades in each cluster. Different datasets have been tested and the results showed tha...
Conference Paper
Full-text available
Detecting blood vessels is useful in medical diagnosis for the purpose of detecting many diseases. Gabor filter in one of the most important methods used in automated detection of blood vessels in digital retinal images, therefore, improving its response is highly desirable. This filter has many parameters that govern its response. This paper deriv...
Article
Full-text available
Cleansing data of errors is an important processing step particularly when integrating heterogeneous data sources. Dirty data files are prevalent in data warehouses because of incorrect or missing data values, inconsistent attribute naming conventions or incomplete information. This paper improves the data cleansing ordinal association rules techni...
Article
Full-text available
Multimedia systems such as Voice over IP (VoIP) play an increasingly important role in the telecommunication world. Such systems have wide applicability in many fields and especially in areas such as e-learning or distance learning. This paper proposes and presents the design and implementation details of a VoIP system that follows the latest multim...
Conference Paper
Full-text available
This work addresses the problem of overfitting the training data. We suggest smoothing the decision boundaries by eliminating border instances from the training set before training neural networks. Our empirical results show not only a reduction in the number of training epochs but also a significant improvement in classification accuracy.
Conference Paper
Full-text available
Multimedia applications such as Voice over IP (VoIP) are one of the most important applications and traffic types in today's networks. Almost all network management solutions and hardware appliances test for VoIP traffic for the purposes of network management and packet shaping in addition to Quality of Service (QoS) provisioning as the quality of...
Article
Measuring speech quality in Voice over Internet Protocol (VoIP) networks is an increasingly important application for legal, commercial and technical reasons. Any proposed solution for measuring the quality should be applicable in monitoring live-traffic non-intrusively. The E-Model proposed by the International Telecommunication Union-Telecommunica...
Conference Paper
In this paper a new proactive customer relationship management system (CRM), BlueCRM, is proposed. The proposed system employs Bluetooth as an automatic identification token in addition to its common use as a communication channel. The system offers a low-cost proactive CRM system which is the future trend of such systems. The implementation of the...
Conference Paper
Full-text available
Multimedia systems in general and Voice over IP (VoIP) system especially are playing an increasingly important role in the world of communication. Such systems have have wide applicability in many fields and especially in areas such as e-learning or distant learning. This paper proposes and presents the design and implementation of a VoIP system tha...
Conference Paper
Multimedia applications play an increasingly important role in the world of communication. To be able to present an effective multimedia service, the quality of the multimedia service should be acceptable to the user. As measuring the multimedia and mainly the voice quality is needed while the network is running, therefore an automated, non-intrusi...
Conference Paper
Full-text available
Media services over IP networks are provided through Voice over IP (VoIP) Protocols. In this paper an architecture for Quality of Service (QoS) service within an enterprise business model is presented. In the proposed architecture an enterprise offers media streaming services to its clients and the client needs to pay for this service. The quality...
Thesis
Voice over Internet Protocol (VoIP) is an active area of research in the world of communication. The high revenue made by the telecommunication companies is a motivation to develop solutions that transmit voice over other media rather than the traditional, circuit switching network. However, while IP networks can carry data traffic very well due to...

Network

Cited By