Faisal Aburub’s research while affiliated with Petra University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (32)


AI-Powered Social Engineering and Impersonation Attacks
  • Chapter

May 2025

·

14 Reads

·

Louay Karadsheh

·

Faisal Aburub

·

Sabreen Alhariri

This chapter presents a comprehensive analysis of advanced social engineering attack vectors enhanced by Generative Artificial Intelligence (GenAI) technologies, focusing on impersonation methodologies and synthetic content generation. The research employs a systematic evaluation framework to analyze attack patterns leveraging Large Language Models (LLMs) and deepfake architectures within social engineering campaigns. Through quantitative analysis, we investigate the efficacy of GenAI-driven phishing content, examining success rates, behavioral patterns, and attack sophistication metrics across multiple enterprise environments. The study presents empirical evidence demonstrating a 45% increase in attack effectiveness when leveraging AI-driven impersonation techniques compared to traditional methods. Our primary contribution encompasses the development and validation of novel detection methodologies and defensive frameworks engineered for AI-enhanced social engineering threats.


Building Human-Centric Defenses Against Generative AI Threats in Developing Countries

May 2025

·

7 Reads

Developing countries face heightened cybersecurity risks due to the accelerating adoption of generative AI tools. These technologies have created new vulnerabilities and widened existing protection gaps, especially in resource-constrained regions. This chapter investigates how the rapid expansion of generative AI intensifies threats in emerging economies by examining malicious applications, unauthorized data generation, and social engineering exploits. It aims to uncover approaches that bolster defenses through human-centric methods and responsible governance mechanisms. Analysis of empirical studies indicates that generative AI already affects many sectors, leaving individuals and institutions exposed to novel attack vectors. Findings suggest targeted policy actions and capacity-building measures can mitigate these risks. The chapter concludes by underscoring human oversight and ethical AI deployment as essential countermeasures. This work contributes strategic guidance for safeguarding digitally evolving societies.


Advanced AI for Network Security: Predictive Detection and Autonomous Defense

April 2025

·

2 Reads

·

1 Citation

Organizations continue facing threats that exploit network vulnerabilities. Defenders seek approaches that detect anomalies and respond quickly to attacks. This chapter examines predictive models and automated mechanisms for network defense. It explores how artificial intelligence approaches learn evolving patterns in large-scale data, offering insights and mitigation strategies. Researchers observe advantages in automated recognition, anomaly forecasts, and coordinated countermeasures. Studies indicate success in reducing detection delays and halting malicious actions. Defense frameworks featuring reinforcement agents, neural architectures, and adaptive analytics show promise in lessening manual involvement. Outcomes suggest that ongoing refinements in data handling, architecture design, and interpretability are essential. This chapter provides a synthesis of methods, findings, and future research directions for next-generation AI-driven network defense.


The Role of Academic Leadership in Accelerating Smart Urban Governance

April 2025

·

6 Reads

Urban settings in developing contexts face pressures arising from population growth, restricted resources, and evolving policy demands. Research insights from universities often fail to guide governance actions or inform new strategies. This chapter examines how academic leadership can connect theoretical work with practical applications in contexts that adopt emerging digital tools. The purpose is to assess ways to align faculty resources, research units, municipal agencies, and community stakeholders. Findings reveal that administrative support, collaborative programs, and targeted capacity-building foster tangible outcomes in key areas such as infrastructure, resource management, and service delivery. The chapter concludes that universities can accelerate digital adoption by shaping policy agendas and funding pathways, providing a structured route toward more effective governance outcomes.


Data-Driven Cyber Defense Leveraging Business Intelligence

April 2025

·

1 Citation

Organizations operate in a global digital landscape where cyber threats continue to escalate in both complexity and volume, rendering traditional security models insufficient. This chapter addresses the gap in understanding how data-driven methods, enriched by b usiness intelligence, can enhance protective measures for digital assets and infrastructure. It aims to explore the interplay between predictive analytics, automated detection, and proactive incident response to strengthen overall security postures. The methodology involves synthesizing leading industry and governmental reports with academic literature to highlight critical insights. Findings demonstrate that embedding business intelligence within cybersecurity ecosystems yields improved threat visibility, reduced response times, and a more resilient security architecture.


Business Intelligence Threat Detection Through Advanced AI and ML

April 2025

·

2 Reads

Business intelligence (BI) systems are integral to strategic and operational decision-making in contemporary data-driven organizations. As these platforms accumulate increasingly large and intricate datasets, they become prime targets for sophisticated cyber threats. This chapter examines how artificial intelligence (AI) and machine learning (ML) methods fortify the security of BI environments and mitigate the escalating incidence of advanced attacks. The discussion reviews BI's evolution from static reporting functionalities to dynamic, real-time analytics, a transformation that parallels increased vulnerabilities and novel adversarial tactics. It then analyzes the theoretical foundations of AI- and ML-based threat detection, encompassing anomaly detection, adversarial machine learning defenses, and explainable AI (XAI).


Figure 1: Membership degree for each customer Figure 1 displays a bar chart showing the degree of membership for each customer to both clusters:  Each customer (1 to 5) is represented along the x-axis.  Blue bars represent membership in Cluster 1 (moderate spenders).  Red bars represent membership in Cluster 2 (high spenders).
Figure 2: Correlation matrix of economic indicators (low growth vs high growth clusters) Here is figure 2, a heatmap of the correlation matrix showing the relationship between economic indicators for both Low Growth and High Growth clusters. The heatmap, on the other hand, is useful to see how the indicators are correlated with each other (GDP growth, investment rate, employment rate and innovation index). Positive or negative very strong correlations are shown in bolder intensities of colour.
Fuzzy Clustering for Economic Data Mining: Mathematical Algorithmic Interpretations
  • Article
  • Full-text available

April 2025

·

15 Reads

Journal of Posthumanism

Faisal Asad Farid Aburub

·

·

Suleiman Ibrahim Shelash Mohammad

·

[...]

·

Mohammad Faleh Ahmmad Hunitie

Fuzzy clustering techniques represent a natural extension of traditional clustering methodologies that have been developed to more accurately model uncertainty and imprecision in economic datasets. We argue that fuzzy clustering is well-suited to tackle many real-world economic problems, including, but not limited to, market segmentation and economic forecasting. Instead of forcing a data point would belong to only one cluster, the fuzzy clustering method allows a data point to belong to multiple clusters with a certain degree of membership, making them a more flexible technique compared to well-known hard clustering methods. Subsequently, the article discusses the problems and limitations of fuzzy clustering in economics, computational complexity, fuzzy parameters and uncertainty, and result interpretation.Contributions include fuzzy clustering to other machine learning methods, apply fuzzy clustering to big data, and fuzzy clustering to improve economy policy making. In conclusion fuzzy clustering represents a precious resource for in-depth and timely insights which can contribute to policy maker, business and researcher developments by discovering new target areas to invest, consequently increasing fountains of knowledge.

Download

Figure 1: Example of a fuzzy graph with degrees of membership on vertices and edges.
Figure 3: Graph showing(G ⊕ H) ⊕ I = G ⊕ (H ⊕ I)
Figure 5: Union and Intersection of two small fuzzy graphs, G and H
Figure 6: Fuzzy Line Graph L (G)
Figure 7: Operators for two fuzzy graphs G and H with 2 vertices each
A Comprehensive Algebraic Framework for Fuzzy Graphs and Their Operators

April 2025

·

39 Reads

Journal of Posthumanism

This study presents a comprehensive algebraic framework for fuzzy graphs that extends classical graph theory to accommodate uncertainty and partial relationships. We define fuzzy graph operators—namely, fuzzy union (via the maximum function), fuzzy intersection (via the minimum function), and fuzzy complement (via membership inversion)—and demonstrate that these operations endow the set of fuzzy graphs with an idempotent semiring or lattice-like structure. Fundamental graph-theoretic concepts such as homomorphisms, isomorphisms, and structural invariants (including degree sequences and connectivity measures) are rigorously redefined within this fuzzy context, with detailed proofs and illustrative examples provided. Through step-by-step computations and visualizations using this concept, we highlight how our approach not only recovers classical crisp graph properties as a special case but also offers enhanced analytical capabilities for modeling real-world networks characterized by uncertainty. Additionally, potential extensions to intuitionistic fuzzy graphs, interval-valued fuzzy graphs, and multi-attribute fuzzy structures are discussed, along with computational implications and applications in network analysis and decision support systems. This framework's consistency and completeness were validated through rigorous proofs, ensuring that all fuzzy operations remain coherent with their classical counterparts. Moreover, the framework facilitates efficient algorithm design and opens new research directions, thereby providing a unified platform for both theoretical advancements and practical applications in complex network analysis.


AI Applications in Digital Marketing Interms of Automation and Personalization

March 2025

·

23 Reads

Today, in the rapidly changing digital world, combining AI with traditional marketing can yield tremendous results. This paper elucidates the potential of AI for automation and customization in digital marketing. There are two chief issues with old-school approaches to online advertising: they cannot scale well enough and thus cannot be customized for use on different demographics. In addition, targeting inaccuracies due to manual processes may lead to ineffective campaigns. To overcome these hurdles, this research suggests the integration of Automation and Personalization using Artificial Intelligence Technology (AP-AIT) into digital marketing strategies. The utility of AP-AIT permits marketers to cope with massive volumes of campaigns at the same time as providing personalised content material and reviews for each customer phase. The real-time statistics evaluation also enabled with the aid of machine learning capabilities helps AP-AIT optimize engagement metrics ensuing in stepped forward performance on conversion rates which finally ends in improved client loyalty over an prolonged period of time. The outcomes acquired from this observe provide a strong basis for knowledge the profound implications that AP-AIT has in remodeling how corporations interact their clients digitally via computerized personalisation strategies driven by way of synthetic intelligence programs along with chat bots. Businesses who contain AI’s automation—pushed personalization can acquire unmatched performance degrees, effectiveness costs in addition to general satisfaction among customer undertaking such advertising initiatives as by no means seen before.


Impact of Business Intelligence Capabilities on Competitive Performance of Jordanian Hypermarkets

March 2025

·

12 Reads

This study aims to understand the impact of business intelligence (BI) capabilities on the competitive performance of supermarkets in Jordan. Data were collected through surveys conducted on 239 managers within supermarkets in Jordan. SEM analysis was used to explore the direct effects of business intelligence capabilities on competitive performance. The results showed a positive impact of business intelligence capabilities on the competitive performance of supermarkets in Jordan. Recommendations included investing in business intelligence infrastructure and talent development, fostering a culture of data-driven decision-making, and leveraging analytics to gain insights into customer behavior, market trends, and competitor strategies. This study provides practical insights for supermarket managers and executives seeking to improve the performance of their stores and achieve a competitive advantage in the Jordanian supermarket market.


Citations (14)


... The proliferation of Internet of Things (IoT) devices, mobile computing, and cloud services has significantly expanded the potential attack surface, making traditional perimeter-based security models less effective [3]. Cyber adversaries International Journal of Science and Research Archive, 2025, 15(02), 063-080 64 now exploit vulnerabilities in highly interconnected systems, often using automation and AI-powered tools to accelerate attack cycles and evade traditional defenses [4]. Moreover, the growing interdependence of critical infrastructure sectors, such as healthcare, finance, and energy, has heightened the risks of cyberattacks leading to widespread societal disruption [5]. ...

Reference:

Integrating edge computing, data science and advanced cyber defense for autonomous threat mitigation
Advanced AI for Network Security: Predictive Detection and Autonomous Defense
  • Citing Chapter
  • April 2025

... Metaheuristic optimisation algorithms have emerged as essential tools for tackling complex, real-world challenges, often nonlinear, high-dimensional, and constrained by multiple factors [1][2][3][4]. These algorithms excel in navigating vast and intricate search spaces, offering near-optimal solutions where traditional methods, like gradient-based techniques or exhaustive searches, struggle due to computational inefficiencies or their inability to handle non-convex landscapes. ...

Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes

International Journal of Crowd Science

... As ML continues to evolve, various ethical considerations must be addressed. Among these, unbiased data utilization [33,34], and the preservation of data privacy [35][36][37], are crucial for implementing new technologies [38][39][40]. Overcoming these challenges will foster trust and enhance transparency in AI-driven methodologies, ultimately allowing predictive modeling in prebiotic and microbiome research to reach its full potential without compromising fundamental ethical principles. ...

Artificial Intelligence and Machine Learning Techniques for Suicide Prediction: Integrating Dietary Patterns and Environmental Contaminants

Heliyon

... Resource efficiency is critical, especially in IoT environments where computing power, memory, and energy are limited [12]. Hybrid approaches must be lightweight while maintaining robust security properties. ...

Privacy-Preserving Machine Learning Cryptographic Techniques for Secure Data Analysis
  • Citing Chapter
  • July 2024

... The Jordan Customs Department (JCD), a key government agency, faces challenges in adapting to evolving demands. There is a critical need to examine how Six Sigma implementation affects organizational agility within JCD [60][61][62][63][64][65][66][67]. Although Six Sigma is recognized for improving processes and quality management, its impact on organizational agility, especially in government settings like the JCD, is less explored. ...

The Impact of Big Data Analytics Capabilities on Decision Making at the Telecommunications Sector in Jordan

... Users' perceptions around trust, reliability and risk involved with these systems create the challenge not only on https://sesjournal.com | Ara et al., 2025 | Page 650 technological integration, but also (Ahmad et al., 2025;Al-Qerem et al., 2025). As per several studies, it has been highlighted that there is a need to comprehend the psychological and behavioral aspects that are responsible for the cloud adoption intentions of the end users (Chanda et al., 2024;Soomro et al., 2024). ...

Enhancing Organizational Performance: Synergy of Cyber-Physical Systems, Cloud Services, and Crowdsensing
  • Citing Article
  • June 2024

International Journal of Crowd Science

... Essential among these changes is Industry 4.0, which brings together such technologies as cloud computing and Big Data Analytics (BDA) [10]. With this technology, real-time data collection, predictive maintenance, and optimized resource use are possible, leading to eco-friendly and efficient operations [1,11]. ...

Competitive Advantage Through Analytical Capabilities: An Examination of the Relationship Between Business Analytics Capabilities and Competitiveness of Jordanian SMEs

... Although Six Sigma is recognized for improving processes and quality management, its impact on organizational agility, especially in government settings like the JCD, is less explored. Understanding the influence of Six Sigma on the department's responsiveness, flexibility, and innovation capabilities is vital in adapting to changing trade dynamics, regulatory shifts, and technological advancements [68][69][70][71][72][73][74][75][76][77][78]. Therefore, the primary problem statement for this research is: "How does Six Sigma implementation influence organizational agility in the Jordan Customs Department, and what are the key mechanisms through which this relationship operates?". ...

Impact of Knowledge Management Systems on Customer Perspective

... Yet, these results may not translate uniformly into everyday practice, particularly if the practitioners themselves are not adequately informed or trained in these innovations (6). Several studies have attempted to map the landscape of technology adoption in rehabilitation, with findings suggesting that physical therapists may hold mixed views on the usefulness, usability, and reliability of AI-enhanced tools (7)(8)(9)(10). For instance, concerns about data privacy, reduced human interaction, and professional autonomy often surface in qualitative inquiries (8). ...

Clinical Applications of AI in Post-Cancer Rehabilitation
  • Citing Conference Paper
  • February 2024

... The findings from Table 1 revealed robust and positively oriented relationships between latent constructs and their observed indicators, with factor loadings ranging from 0.562 to 0.835. These loadings surpassed the 0.50 threshold recommended by [82]. Convergent validity, assessed through average variance extracted (AVE), showed values ranging from 0.512 to 0.600 across all constructs, exceeding the accepted threshold of 0.5 according to [83]. ...

Big Data Analytics Capabilities and Decision-Making in Jordan's Telecommunications Sector
  • Citing Conference Paper
  • February 2024