Dr. Ammar AlMomani

Professor This email address is being protected from spambots. You need JavaScript enabled to view it.

Educational Background

Dr. Ammar Almomani received his Ph.D. Degree from Universiti Sains Malaysia(USM) in 2013.
currently he is a Professor and ahead of research and innovation department in Skyline University College-Sharjah-UAE.

Academic and Research Interest

He has published more than 76 published and 20 articles under revision in 2022, Area Specialist: Computer network /advanced Internet security and monitoring, his research interest include Cybersecurity based on Artificial Intelligence, he has more than 1857 Google Scholar citations, H.index=22, i10-index= 44 with more than 65,500 readers and followers of ResearchGate

  • Publications

    • Abutahoun, B. M., Nashwan, S. I., Shakhatreh, S., Alauthman, M., & Ammar Almomani, Network-Based Detection of Mirai Botnet Using Machine Learning and Feature Selection Methods.
    • Ahmad, A.-Q., Mohammad, A., Ammar Almomani, , & B. B, G. (2019). IoT transaction processing through cooperative concurrency control on fog–cloud computing environment. Soft Computing, 1-17.
    • Al Issa, H. A., Al-Jarah, M. H., Ammar Almomani, & Al-Nawasrah, A. (2022). Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm. International Journal of Cloud Applications and Computing (IJCAC), 12(1), 1-10.
    • Alauthman, M., Ammar Almomani, A., Alweshah, M., Alomoush, W., & Alieyan, K. (2019). Machine learning for phishing detection and mitigation. In Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices (Vol. 1, pp. 275): CRC press Taylor and Frances group.
    • Al-Betar, M. A., Awadallah, M. A., Khader, A. T., Bolaji, A. L. a., & Ammar Almomani, (2018). Economic load dispatch problems with valve-point loading using natural updated harmony search. Neural Computing and Applications, 29(10), 767-781.
    • Alhalabi, W., Alhudali, A., Ammar Almomani., Gandhar, S., Gupta, B. B., & KumarSingh., S. (2022). Intelligentes Verteidigungssystem gegen verteilte Denial of Service (DDoS) Angriffe in Internet of Things (IoT) Netzen. In: GR Patent 20 2022 102 631.
    • Al-Hazaimeh, O. M., Alhindawi, N., Hayajneh, S. M. A., & Ammar Almomani. (2014). HANON Chaotic Map -Based New Digital Image Encryption Algorithm. MAGNT Research Report, 2(4), 261-266.
    • Alieyan, K., Ammar Almomani., Abdullah, R., Almutairi, B., & Alauthman, M. (2021). Botnet and Internet of Things (IoTs): a definition, taxonomy, challenges, and future directions. In Research Anthology on Combating Denial-of-Service Attacks (pp. 138-150): IGI Global.
    • Alieyan, K., Ammar Almomani., Anbar, M., Alauthman, M., Abdullah, R., & Gupta, B. B. (2021). DNS rule-based schema to botnet detection. Enterprise Information Systems, 15(4), 545-564.
    • Alieyan, K., Ammar Almomani, Manasrah, A., & Kadhum, M. M. (2017). A survey of botnet detection based on DNS. Neural Computing and Applications, 28(7), 1541-1558.
    • Alieyan, K., Anbar, M., Ammar Almomani., Abdullah, R., & Alauthman, M. (2018). Botnets Detecting attack based on DNS features. Paper presented at the The 19th International Arab Conference on Information Technology (ACIT'2018).
    • Ammar Almomani. (2014). Dynamic Evolving Neural Fuzzy Framework for phishing E-mail detection. In: Scholars' Press.
    • Ammar Almomani. (2018). Fast-flux hunter: a system for filtering online fast-flux botnet. Neural Computing and Applications, 29(7), 483-493.
    • Ammar Almomani. (2018). An online intrusion detection system to cloud computing based on NeuCube algorithms. International Journal of Cloud Applications and Computing (IJCAC), 8(2), 96–112.
    • Ammar Almomani. (2022). Classification of Virtual Private networks encrypted traffic using ensemble learning algorithms. Egyptian Informatics Journal, 1-12.
    • Ammar Almomani, Alauthman, M., Alweshah, M., Dorgham, O., & Albalas, F. (2019). A comparative study on spiking neural network encoding schema: implemented with cloud computing. Cluster Computing The Journal of Networks, Software Tools and Applications, 1-15.
    • Ammar Almomani., ALAUTHMAN, M., ASLAM, N., DORGHAM, O., & AL-REFAI, M. (2019). Botnet Behavior and Detection Techniques: A Review. In Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives (Vol. 1, pp. 666): CRC press Taylor and Frances group.
    • Ammar Almomani., Alauthman, M., Taib' shatnawi, M., Alweshah, M., Alrosan, A., omosh, w., & Gupta, B. B. (2022). Phishing Website Detection with semantic features Based on Machine learning models: A Comparison Study. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-24.
    • Ammar Almomani., Al-Nawasrah, A., Al-Abweh, M., & Gupta, B. B. (2021). Information Management and IoT Technology for Safety and Security of Smart Home and Farm Systems. Journal of Global Information Management (JGIM), 29(6).
    • Ammar Almomani., Al-Nawasrah, A., Alauthman, M., Al-Betar, M. A., & Mezian, F. (2021). Botnet Detection Used Fast-Flux Technique, Based on Adaptive Dynamic Evolving Spiking Neural Network Algorithm. International Journal of Ad Hoc and Ubiquitous Computing.
    • Ammar Almomani., & Alrosan, A. (2021). Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System. Journal of Web Engineering.
    • Ammar Almomani., Al-Weshah, M., Al Khalayleh, S., Al-Refai, Mohammed, & Qashi, R. (2019). Metaheuristic Algorithms Based Feature Selection Approach for Intrusion Detection. In Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices (Vol. 1, pp. 275): CRC press Taylor and Frances group.
    • Ammar Almomani., Alweshah, M., Alomoush, W., Alauthman, M., Jabai, A., Abbass, A., . . . Gupta, B. B. (2022). Age and Gender Classification Using Backpropagation and Bagging Algorithms. Computers, Materials & Continua, 1-19.
    • Ammar Almomani., Gupta, B. B., Atawneh, S., Meulenberg, A., & Almomani, E. (2013). A survey of phishing email filtering techniques. IEEE Communications Surveys & Tutorials, 15(4), 2070-2090.
    • Ammar Almomani., Gupta, B. B., Wan, T.-C., Altaher, A., & Manickam, S. (2013). Phishing dynamic evolving neural fuzzy framework for online detection zero-day phishing email. arXiv preprint arXiv:1302.0629.
    • Ammar Almomani, Wan, T.-C., Altaher, A., Manasrah, A., ALmomani, E., Anbar, M., . . . Ramadass, S. (2012). Evolving fuzzy neural network for phishing emails detection. Journal of Computer Science, 8(7), 1099.
    • Ammar Almomani., Wan, T.-C., Manasrah, A., Altaher, A., Almomani, E., Al-Saedi, K., . . . Ramadass, S. (2012). A survey of learning based techniques of phishing email filtering. International Journal of Digital Content Technology and its Applications, 6(18), 119.
    • Al-Nawasrah, A., Ammar Almomani., Al_Issa, H. A., Almania, M. A., Alrosan, A., & gupta. (2021). Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System. Journal of Web Engineering, 21(2), 1-24.
    • Al-Nawasrah, A., Ammar Almomani. A., Atawneh, S., & Alauthman, M. (2020). A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing. International Journal of Cloud Applications and Computing, 10(3), 1-37.
    • Alomoush, W., Alrosan, A., Ammar Almomani., Alissa, K., Khashan, O. A., & Al-Nawasrah., A. (2021). Spatial information of fuzzy clustering based mean best artificial bee colony algorithm for phantom brain image segmentation. Int J Electr Comput Eng (IJECE), 11(5), 4050-4058.
    • Alomoush, W., Alrosan, A., Alomari, Yazan M., Alomoush, Alaa A., Ammar Almomani., & Alamri, Hammoudeh S. (2021). Fully automatic grayscale image segmentation based fuzzy C‑means with firefly mate algorithm. Journal of Ambient Intelligence and Humanized Computing, 1-24.
    • Alomoush, W., Omar, K., Alrosan, A., Alomari, Y. M., Albashish, D., & Ammar Almomani. (2020). Firefly photinus search algorithm. Journal of King Saud University-Computer and Information Sciences, 32(5), 599-607. al-Qerem, A., Abutahoun, B., Nashwan, S., Shakhatreh, S., Alauthman, M., & Ammar Almomani. (2020). Network-Based Detection of Mirai Botnet Using Machine Learning and Feature Selection Methods. In Multimedia Cyber Security (pp. 1-14): IGI global.
    • Alrawashdeh, T. A., Elbes, M. W., Ammar Almomani., ElQirem, F., & Tamimi, A. (2020). User acceptance model of open source software: an integrated model of OSS characteristics and UTAUT. Journal of Ambient Intelligence and Humanized Computing, 11(8), 3315-3327.
    • Alrawashed, T. A., Ammar Almomani., Althunibat, A., & Tamimi, A. (2019). An automated approach to generate test cases from use case description model. Computer Modeling in Engineering & Sciences, 119(3), 409-425.
    • Al-Saedi, K., Manickam, S., Ramadass, S., Al-Salihy, W., & Ammar Almomani. (2013). Research proposal: an intrusion detection system alert reduction and assessment framework based on data mining. Journal of Computer Science, 9(4), 421.
    • Al-Saedi, K. H., Ramadass, S., Ammar Almomani., Manickam, S., & Alsalihy, W. (2012). Collection mechanism and reduction of IDS alert. International Journal of Computer Applications, 975, 8887.
    • Altaher, A., Ammar Almomani., & Ramadass, S. (2012). Application of adaptive neuro-fuzzy inference system for information secuirty. Journal of Computer Science, 8(6), 983.
    • Altaher, A., Ramadass, S., Ammar Almomani. (2011). Computer virus detection using features ranking and machine learning. Australian Journal of Basic and Applied Sciences, 5(9), 1482-1486.
    • Altaher, A., Ramadass, S., & Ammar Almomani. (2012). An intelligent soft approach for malware detection in dual stack IPV4/IPv6 networks. International Journal of Physical Sciences, 7(10), 1607 - 1612.
    • Altaher, A., Ramadass, S., & Ammar Almomani. (2012). An intelligent soft approach for malware detection in dual stack IPV4/IPv6 networks. International Journal of Physical Sciences, 7(10), 1607-1612.
    • Altaher, A., Ramadass, S., Meulenberg, A., Abdat, M., & Ammar Almomani. (2012). Combined Behavior-and Signature-Based Internet Worm Detection System. International Information Institute (Tokyo). Information, 15(10), 4213.
    • Altyeb Altaher, S., Ammar Almomani, Mohammed Anbar, & Ramadass, S. (2012). Malware Detection Based on Evolving Clustering Method for Classification. Scientific Research and Essays, 7(22), 2031-2036.
    • Alweshah, M., Al‑Daradkeh, A., Al‑Betar, M. A., Ammar Almomani., & Oqeili, S. (2019). ˇ‑Hill climbing algorithm with probabilistic neural network for classification problems.
    • Alweshah, M., Al-Sendah, M., Dorgham, O. M., Ammar Almomani, & Tedmori2, S. (2020). Improved water cycle algorithm with probabilistic neural network to solve classification problems. Cluster Computing "The Journal of Networks, Software Tools and Applications, 1-16.
    • Alweshah, M., Khalaileh, S. A., Gupta, B. B., Ammar Almomani, Hammouri, A. I., & Al-Betar, M. A. (2020). The monarch butterfly optimization algorithm for solving feature selection problems. Neural Computing and Applications, 1-15.
    • Alweshah, M., Rababa, L., Ryalat, M. H., Al Momani, A., & Ababneh, M. F. (2022). African Buffalo algorithm: training the probabilistic neural network to solve classification problems. Journal of King Saud University-Computer and Information Sciences, 34(5), 1808-1818.
    • Ammar Almomani, & et al. (2011). An Online Model on Evolving Phishing E-mail Detection and Classification Method. journal of applied science, 11(11), 3301-3307.
    • Ammar Almomani, & et al. (2013). An enhanced online phishing e-mail detection framework based on “Evolving connectionist system". International Journal of Innovative Computing, Information and Control (IJICIC), 9(3).
    • Ammar Almomani, A. O., Karim Alsaedi. (2015). Spam E-mail Filtering using ECOS Algorithms. Indian Journal of Science and Technology, 8(s9), 256-268.
    • Ammar Almomani, E. A., & et al. (2014). A Framework of Childhood Obesity Intervention Using Persuasive Mobile Game Technology. Australian Journal of Basic and Applied Sciences, 8(7), 499-509.
    • Anbar, M., Manasrah, A., Ramadass, S., Altaher, A., Aljmmal, A., & Ammar Almomani. (2013). Investigating study on network scanning techniques. International Journal of Digital Content Technology and its Applications, 7(9), 312.
    • Anbar, M., Manickam, S., Hosam, A.-S., Chai, K.-S., Baklizi, M., & Ammar Almomani. (2011). Behaviour based worm detection and signature automation. Journal of Computer Science, 7(11), 1724.
    • Atawneh, S., Ammar Almomani., Bazar, H. A., Sumar, P., & Gupta ., B. (2017). Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimedia Tools and Applications, 76(18), 18451–18472.
    • Atawneh, S., Ammar Almomani., & Sumari, P. (2013). Steganography in digital images: Common approaches and tools. IETE Technical Review, 30(4), 344-358.
    • Baklizi, M., Abdel-Jaber, H., Abu-Alhaj, M. M., Abdullah, N., Ramadass, S., & Ammar Almomani. (2013). Dynamic stochastic early discovery: a new congestion control technique to improve networks performance. International Journal of Innovative Computing, Information and Control, 9(3), 1118-1126.
    • Chhabra, M., Gupta, B., & Ammar Almomani. (2013). A novel solution to handle DDOS attack in MANET.
    • Dorgham, O., Al-Rahamneh, B., Ammar Almomani., & Khatatneh, K. F. (2018). Enhancing the security of exchanging and storing DICOM medical images on the cloud. International Journal of Cloud Applications and Computing (IJCAC), 8(1), 154-172.
    • Firas Albalas, M. A.-S., Omar Almomani, Ammar Almomani. (2018). Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-curve cryptography. The International Arab Journal of Information Technology, 15(3A), 550-558.
    • Hu, B., Gaurav, A., Choi, C., & Ammar Almomani. (2022). evaluation and Comparative Analysis of Semantic Web-Based Strategies for enhancing educational System development. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-14.
    • Kwafha, M. M., Al-Betar, M. A., Ammar Almomani., Alkoffash, M., & Jaradat, A. (2014). A Novel Model for Global Schema Integration and Optimization. MAGNT Research Report, 2(4), 470-475.
    • Manasrah, A. M., Smadi, T., & Ammar Almomani. (2017). A variable service broker routing policy for data center selection in cloud analyst. Journal of King Saud University-Computer and Information Sciences, 29(3), 365-377.
    • Mohammed, A., Aram, A.-D., Azmi, A.-B. M., Ammar Almomani., & Saleh., O. (2019). β -Hill climbing algorithm with probabilistic neural network for classification problems. Journal of Ambient Intelligence and Humanized Computing, 3405–3416.
    • Mohammed Al-Refai, Y. A. N., Mohammed Alauthman, Ammar Almomani, Mouhammd Al-Kasassbeh, & Alweshah, M. (2019). A Novel Leader Election Algorithm For Honeycomb Meshnetworks. Journal of Theoretical and Applied Information Technology, 97(14), 3783-3795.
    • Mouhammd alkasassbeh , m. S., Mohammad Alauthman, Ammar Almomani. (2019). Feature Selection using a Machine Learning to Classify a Malware. In Computer Networks and Cyber Security: Principles and Paradigms: Springer Nature.
    • Ramadass, S. Ammar Almomani (2011). An approach to assessment of network worm detection using threatening-database mining. Australian Journal of Basic and Applied Sciences, 5(12), 2676-2683.
    • Saad, R. M., Ammar Almomani., Altaher, A., Gupta, B., & Manickam, S. (2014). ICMPv6 flood attack detection using DENFIS algorithms. Indian Journal of Science and Technology, 7(2), 168.
    • Tripathi, S., Gupta, B., Ammar Almomani., Mishra, A., & Veluru, S. (2013). Hadoop based defense solution to handle distributed denial of service (ddos) attacks.
    • Waleed Alomoush, A. A., Norita Norwawi, Yazan Alomari, Dheeb Albashish, Ammar Almomani, Mohammed Alqahtani. (2018). A Survey: Challenges Of Image Segmentation Based Fuzzy C-Means Clustering Algorithm. Journal Of Theoretical And Applied Information Technology, 96(16), 1817-3195.
  • Conferences

    • Alarqan, M. A., Zaaba, Z. F., & Ammar Almomani, A. (2019). Detection mechanisms of DDoS attack in cloud computing environment: A survey. Paper presented at the International Conference on Advances in Cyber Security.
    • Alieyan, K., Ammar Almomani, Abdullah, R., & Anbar, M. (2018). A rule-based approach to detect botnets based on DNS. Paper presented at the 2018 8th IEEE International Conference on Control System, Computing and Engineering (ICCSCE).
    • Ammar Almomani, Alauthman, M., Alkasassbeh, M., Samara, G., & Liu, R. W. (2022). A proposed Darknet Traffic Classification System Based on Max Voting algorithms. Paper presented at the ICSPN-2022: International Conference on Cyber Security, Privacy and Networking.
    • Ammar Almomani, E., Husain, W., San, O. Y., Almomani, A., & Al-Betar, M. (2014). Mobile game approach to prevent childhood obesity using persuasive technology. Paper presented at the 2014 International Conference on Computer and Information Sciences (ICCOINS).
    • Al-Nawasrah, A., Ammar Almomani., Meziane, F., & Alauthman, M. (2018). Fast flux botnet detection framework using adaptive dynamic evolving spiking neural network algorithm. Paper presented at the 2018 9th International Conference on Information and Communication Systems (ICICS).
    • Altaher, A., Ramadass, S., & Ammar Almomani. (2011). A dual stack IPv4/IPv6 testbed for malware detection in IPv6 networks. Paper presented at the 2011 IEEE International Conference on Control System, Computing and Engineering.
    • Altaher, A., Ramadass, S., & Ammar Almomani. (2011). Real time network anomaly detection using relative entropy. Paper presented at the 8th International Conference on High-capacity Optical Networks and Emerging Technologies.
    • Ammar Almomani, M. A., Omar almomani, Firas Albalas. (2017). A proposed framework for Botnet Spam-email Filtering using Neucube. Paper presented at the The International Arab Conference on Information Technology (ACIT) publisher; IEEE.
    • Dorgham, O., Abu Nasser, M., Ryalat, M., & Ammar Almomani. (2019). Proposed Method for an Automatic Segmentation of Medical Images. Paper presented at the The 19th International Arab Conference on Information Technology (ACIT'2018).
    • Fi rasAlbalas, A., Omar, Al-Soud, M., & Ammar Almomani. (2017). Secure and Energy-effictive CoAP Application Layer Protocol for the Internet of Things. Power (mw), 1333, 151.
    • Jain, A. K., Gupta, B. B., Kaur, K., Bhutani, P., Alhalabi, W., & Ammar Almomani. (2022). A Content and URL analysis based Efficient Approach to Detect Smishing SMS in Intelligent Systems. International Journal of Intelligent Systems, 1-25 Botnets Detecting.
Image
Image
Image
Image
Image
Image

Main campus

Open on location Google Map