Ammar Almomani

Prof. Ammar Almomani is an Internet Infrastructures Security and Cybersecurity based on AI specialist with a Ph.D. Degree in Computer Science from Universiti Sains Malaysia (USM), which is ranked #142 in the QS World University Rankings 2021. He is recognized as One of the Top 2% of Global Influential Researchers by Stanford University and the Scopus Index-Oct-2023. His academic background also includes a Master of Science in Computer Information Systems and a Bachelor of Computer Science. He has an extensive publication record, with over 113+ articles published in reputable journals and conferences, most of them in Scopus Q1 and Q2 categories, and 8 patents and utility models published as six German utility models and Two India-grated patents. More than 21 articles and patents are under revision.

He has significant experience in 20 years of teaching more than 42 topics with various subjects related to cybersecurity and Cybersecurity Engineering area such as “Network Security, Wireless Computer Networks security, Cryptography, Cloud computing, and security special topics (Ethical hacking) Enterprises Information System Security, Big data analytics, artificial intelligence, cybersecurity, networks, communications, and programming languages. with many international certificates. He taught at reputable 5 academic institutions, Supervising many undergraduate and postgraduate students' research projects and theses (Masters/Ph.D.) from many countries such as the UK, Malaysia, Jordan ..etc. As a cybersecurity and Internet infrastructure security specialist, he actively contributed to the field by managing AI and cybersecurity projects with international teams of top researchers and universities. He has authored 76 Scopus articles, H-index-20, 1380 citations, and garnered over 2,762 citations on Google Scholar, with an H-index of 27. Also he actively engaged in the academic community, with a strong online presence and a large readership and following on ResearchGate with about 89390 readers and followers.

Currently, he hold the position of Professor and Head of the research and innovation department at (SUC) in Sharjah, School of Computing, UAE. He has Five years of management experience with a UAE Golden Visa Holder, and my focus is on improving educational institutes. Moreover, he has made significant contributions to the development of courses and programs, including ABET and AACSB Accreditation.

Publications

Machine Learning-Based Automatic Litter Detection and Classification Using Neural Networks in Smart Cities
Meena Malik, Chander Prabha, Punit Soni, Varsha Arya, Wadee Alhalabi Alhalabi, Brij B. Gupta, Aiiad A. Albeshri, Ammar Almomani. © 2023. 20 pages.
Machine learning and deep learning are one of the most sought-after areas in computer science which are finding tremendous applications ranging from elementary education to...
Adaptive and Convex Optimization-Inspired Workflow Scheduling for Cloud Environment
Kamlesh Lakhwani, Gajanand Sharma, Ramandeep Sandhu, Naresh Kumar Nagwani, Sandeep Bhargava, Varsha Arya, Ammar Almomani. © 2023. 25 pages.
Scheduling large-scale and resource-intensive workflows in cloud infrastructure is one of the main challenges for cloud service providers (CSPs). Cloud infrastructure is more...
A Rule-Based Expert Advisory System for Restaurants Using Machine Learning and Knowledge-Based Systems Techniques
Khalid M. O. Nahar, Mustafa Banikhalaf, Firas Ibrahim, Mohammed Abual-Rub, Ammar Almomani, Brij B. Gupta. © 2023. 25 pages.
A healthy diet and daily physical activity are a cornerstone in preventing serious diseases and conditions such as heart disease, diabetes, high blood pressure, and hypertension....
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study
Ammar Almomani, Mohammad Alauthman, Mohd Taib Shatnawi, Mohammed Alweshah, Ayat Alrosan, Waleed Alomoush, Brij B. Gupta, Brij B. Gupta, Brij B. Gupta. © 2022. 24 pages.
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our...
Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm
Huthaifa A. Al Issa, Mustafa Hamzeh Al-Jarah, Ammar Almomani, Ahmad Al-Nawasrah. © 2022. 10 pages.
Cloud computing is a very large storage space, can be accessed via an internet connection, this concept has appeared to facilitate the preservation of personal and corporate data...
Performance Optimization of Multi-Hop Routing Protocols With Clustering-Based Hybrid Networking Architecture in Mobile Adhoc Cloud Networks
Deepak Srivastava, Ajay Kumar, Anupama Mishra, Varsa Arya, Ammar Almomani, Ching Hsien Hsu, Domenico Santaniello. © 2022. 15 pages.
Mobile networks, in particular, are composed of wireless cellular communication nodes (MANET). Communication between these mobile nodes is not under centric systems. MANET is a...
Traffic Accident Prevention in Low Visibility Conditions Using VANETs Cloud Environment
Kwok Tai Chui, Tanveer Singh Kochhar, Amit Chhabra, Sunil K. Singh, Deepinder Singh, Dragan Peraković, Ammar Almomani, Varsha Arya. © 2022. 21 pages.
Road accidents have become a major concern for safety today. The increase in the number of vehicles has significantly increased the real-time road traffic, leading to many fatal...
Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions
Kamal Alieyan, Ammar Almomani, Rosni Abdullah, Badr Almutairi, Mohammad Alauthman. © 2021. 13 pages.
In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure...
Information Management and IoT Technology for Safety and Security of Smart Home and Farm Systems
Ammar Almomani, Ahmad Al-Nawasrah, Waleed Alomoush, Mustafa Al-Abweh, Ayat Alrosan, Brij B. Gupta. © 2021. 23 pages.
Information management collects data from several online systems. They analyze the information. They issue reports about information for supporting decision-making management....
Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions
Kamal Alieyan, Ammar Almomani, Rosni Abdullah, Badr Almutairi, Mohammad Alauthman. © 2020. 13 pages.
In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure...
Network-Based Detection of Mirai Botnet Using Machine Learning and Feature Selection Methods
Ahmad Al-Qerem, Bushra Mohammed Abutahoun, Shadi Ismail Nashwan, Shatha Shakhatreh, Mohammad Alauthman, Ammar Almomani. © 2020. 11 pages.
The spread of IoT devices is significantly increasing worldwide with a low design security that makes it more easily compromised than desktop computers. This gives rise to the...
A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing
Ahmad Al-Nawasrah, Ammar Ali Almomani, Samer Atawneh, Mohammad Alauthman. © 2020. 37 pages.
A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and...