qussai mahmoud yaseen
• Computer Information System Department - Faculty Member
• Department of Software Engineering - Faculty Member
-
-
-
-
-
- Ph.D. of Computer Science from Univertsity of Arkansas, 2012
- Msc. of Computer Science from Jordan University of Science and Technology, 2006
- Bsc. of Computer Science from Yarmouk University, 2002
Publications
-
Qutaibah Althebyan · Qussai Yaseen· Yaser Jararweh · Mahmoud Al-Ayyoub, "Cloud support for large scale e-healthcare systems," Ann. Telecommun., vol. , no. , pp. 0-0, 2016
-
Qussai Yaseen, Qutaibah Althebyan, Brajendra Panda and Yaser Jararweh, "Mitigating insider threat in cloud relational databases," SECURITY AND COMMUNICATION NETWORKS, vol. , no. , pp. 0-0, 2016
-
Qutaibah Althebyan, Yaser Jararweh, Qussai Yaseen, Omar AlQudah and Mahmoud Al-Ayyoub, "Evaluating map reduce tasks scheduling algorithms over cloud computing infrastructure," CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE, vol. , no. , pp. 0-0, 2015
-
Qussai Yaseen and Jordan Ismail Hmeidi, "Extracting the roots of Arabic Words without removing affixes," Journal of Information Science, vol. , no. , pp. 0-0, 2014
-
Qussai Yaseen & Brajendra Panda, "Insider threat mitigation: preventing unauthorized knowledge acquisition," International Journal of Information Security, vol. , no. , pp. 0-0, 2012
-
Amer F. Al-Badarneh, Qussai Yaseen and Ismail Hmeidi, "A new enhancement to the R-tree node splitting," Journal of Information Science, vol. , no. , pp. 0-0, 2009
-
"A Context-Aware Android Malware Detection Approach Using Machine Learning", Information (Switzerland)
-
"A Novel Machine Learning Approach for Android Malware Detection Based on the Co-Existence of Features", IEEE Access
-
"A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance", Computers, Materials & Continua
-
"An Evaluation and Analysis of Static and Adaptive Bayesian Spam Filters", Journal of Internet Technology
-
"An insider threat aware access control for cloud relational databases", journal of cluster computing
-
"Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System", Journal of Network and Systems Management
-
"Collusion attacks mitigation in internet of things: a fog based model", Multimedia Tools and Applications
-
"Improving Classification and Clustering Techniques Using GPUs", Concurrency and Computation: Practice and Experience
-
"Leveraging Fog Computing and Software Defined Systems for Selective Forwarding Attacks Detection in Mobile Wireless Sensor Networks", Transactions on Emerging Telecommunications Technologies
-
"The Effect of the Ransomware Dataset Age on the Detection Accuracy of Machine Learning Models", Information
- Acting Head of Department, Computer Information System Department, Sep 2018 - Sep 2019
- Faculty Member, Computer Information System Department, Sep 2014 - Present
- Assistant Professor, Jordan University of Science and Technology,, Jordan, Sep 2014-Present
- Assistant Professor, Yarmouk University, Jordan, Sep 2012- Sep 2014
- Teaching Assistant, University of Arkansas, Fayetteville, AR,, U.S.A, Aug 2011- May 2012
- Research Assistant, University of Arkansas, Fayetteville, AR, U.S.A, Aug 2008- Aug 2012
- Instructor, Al Balqaa University, Jordan, Sep 2003- Aug 2008
- Lab Supervisor, Irbid Private University, Jordan, Mar 2003- Sep 2006
- ARTIFICIAL INTELLIGENCE
- BUSINESS DATA COMMUNICATION
- BUSINESS DATA COMMUNICATION AND COMPUTER NETWORKS
- Business Data Communication
- COMPUTER SKILLS (REMEDIAL COURSE)
- DATA - DRIVEN SECURITY
- Data mining
- Information security
- PRACTICAL TRAINING
- Practical training
- SECURITY & PRIVACY OF HEALTHCARE INFORMATION
- SELECTED PROGRAMMING LANGUAGES (FOR NON COMPUTER SCIENCE INFORMATION STUDENTS)
|