×
qussai mahmoud yaseen
• Computer Information System Department - Faculty Member
• Department of Software Engineering - Faculty Member

  • Ph.D. of Computer Science from Univertsity of Arkansas, 2012
  • Msc. of Computer Science from Jordan University of Science and Technology, 2006
  • Bsc. of Computer Science from Yarmouk University, 2002

    Publications
  • Qutaibah Althebyan · Qussai Yaseen· Yaser Jararweh · Mahmoud Al-Ayyoub, "Cloud support for large scale e-healthcare systems," Ann. Telecommun., vol. , no. , pp. 0-0, 2016
  • Qussai Yaseen, Qutaibah Althebyan, Brajendra Panda and Yaser Jararweh, "Mitigating insider threat in cloud relational databases," SECURITY AND COMMUNICATION NETWORKS, vol. , no. , pp. 0-0, 2016
  • Qutaibah Althebyan, Yaser Jararweh, Qussai Yaseen, Omar AlQudah and Mahmoud Al-Ayyoub, "Evaluating map reduce tasks scheduling algorithms over cloud computing infrastructure," CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE, vol. , no. , pp. 0-0, 2015
  • Qussai Yaseen  and Jordan Ismail Hmeidi, "Extracting the roots of Arabic Words without removing affixes," Journal of Information Science, vol. , no. , pp. 0-0, 2014
  • Qussai Yaseen & Brajendra Panda, "Insider threat mitigation: preventing unauthorized knowledge acquisition," International Journal of Information Security, vol. , no. , pp. 0-0, 2012
  • Amer F. Al-Badarneh, Qussai Yaseen and Ismail Hmeidi, "A new enhancement to the R-tree node splitting," Journal of Information Science, vol. , no. , pp. 0-0, 2009
  • "A Context-Aware Android Malware Detection Approach Using Machine Learning", Information (Switzerland)
  • "A Novel Machine Learning Approach for Android Malware Detection Based on the Co-Existence of Features", IEEE Access
  • "A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance", Computers, Materials & Continua
  • "An Evaluation and Analysis of Static and Adaptive Bayesian Spam Filters", Journal of Internet Technology
  • "An insider threat aware access control for cloud relational databases", journal of cluster computing
  • "Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System", Journal of Network and Systems Management
  • "Collusion attacks mitigation in internet of things: a fog based model", Multimedia Tools and Applications
  • "Improving Classification and Clustering Techniques Using GPUs", Concurrency and Computation: Practice and Experience
  • "Leveraging Fog Computing and Software Defined Systems for Selective Forwarding Attacks Detection in Mobile Wireless Sensor Networks", Transactions on Emerging Telecommunications Technologies
  • "The Effect of the Ransomware Dataset Age on the Detection Accuracy of Machine Learning Models", Information
  • Acting Head of Department, Computer Information System Department, Sep 2018 - Sep 2019
  • Faculty Member, Computer Information System Department, Sep 2014 - Present
  • Assistant Professor, Jordan University of Science and Technology,, Jordan, Sep 2014-Present
  • Assistant Professor, Yarmouk University, Jordan, Sep 2012- Sep 2014
  • Teaching Assistant, University of Arkansas, Fayetteville, AR,, U.S.A, Aug 2011- May 2012
  • Research Assistant, University of Arkansas, Fayetteville, AR, U.S.A, Aug 2008- Aug 2012
  • Instructor, Al Balqaa University, Jordan, Sep 2003- Aug 2008
  • Lab Supervisor, Irbid Private University, Jordan, Mar 2003- Sep 2006
  • ARTIFICIAL INTELLIGENCE
  • BUSINESS DATA COMMUNICATION
  • BUSINESS DATA COMMUNICATION AND COMPUTER NETWORKS
  • Business Data Communication
  • COMPUTER SKILLS (REMEDIAL COURSE)
  • DATA - DRIVEN SECURITY
  • Data mining
  • Information security
  • PRACTICAL TRAINING
  • Practical training
  • SECURITY & PRIVACY OF HEALTHCARE INFORMATION
  • SELECTED PROGRAMMING LANGUAGES (FOR NON COMPUTER SCIENCE INFORMATION STUDENTS)