![]() |
Contact InformationQussai M. Yaseen, Ph.D.Engineering Building A3 L2 Rm#5 Department of Computer Information Systems Jordan University of Science and Technology Irbid, Jordan 22110 Phone: (02) 720 1000 ext. 22863 E-mail: qmyaseen@just.edu.jo |
Research
I am mainly interested in cybersecurity; Networks Security, Malware Detection and Insider Threat. I published many papers in Malware Detection, insider threat mitigation and IoT security. Moreover, I am a member in many events and conferences in these fields.
Publications
Click for the complete list of publications.
- Book Chapters
- Q. Yaseen, Insider Threat in Banking Systems. Book: Online Banking Security Measures and Data Protection. In the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series, IGI Publications, USA, 2017.
- Articles Published in Professional Journals
- Q. Yaseen and Y. Jararweh. Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System. Journal of Network and Systems Management/Special Issue on Cybersecurity Management in the Era of AI, Springer. 2021. To Appear.
- Q. Althebyan, Y. Jararweh, Q. Yaseen, R. Mohawesh. A knowledgebase insider threat mitigation model in the cloud: a proactive approach. International Journal of Advanced Intelligence Paradigms. 15(4), 417-436, 2020.
- Y. Jararweh, M. Shehab, Q. Yaseen and M. Al-Ayyoub. Improving Classification and Clustering Techniques Using GPUs. Journal of Concurrency and Computation: Practice and Experience. 2019.
- Q. Yaseen, Y. Jararweh and K. N. Viet. An Evaluation and Analysis of Static and Adaptive Bayesian Spam Filters. Journal of Internet Technology 19 (4), 1015-1022, 2018.
- Q. Yaseen, Y. Jararweh, B. Panda and Q. Althebyan. An Insider Threat Aware Access Control for Cloud Relational Databases. Journal of Cluster Computing, Springer, 2017.
- Q. Yaseen, F. Albalas, Y. Jararweh and M. AlAyyoub. Leveraging Fog Computing and Software Defined Systems for Selective Forwarding Attacks Detection in Mobile Wireless Sensor Networks. Journal of Transactions on Emerging Telecommunications Technologies, Wiley, 2017.
- Q. Yaseen, Y. Jararweh and K. N. Viet. An Evaluation and Analysis of Static and Adaptive Bayesian Spam Filters. Journal of Internet Technology, 2017.
- Q. Althebyan, O. Alqudah, Y. Jararweh, Q. Yaseen. A Scalable Map Reduce Tasks Scheduling: A Threading Based Approach, International Journal of Computational Science and Engineering, InderScience, 2017.
- Q. Althebyan, Q. Yaseen, Y. Jararweh,M. AlAyyoub. Cloud Support for Large Scale E-Healthcare Systems. Journal of Annals of Telecommunications/Special Issue Healthcare on Smart and Mobile Devices. Springer,2016.
- Q. Yaseen , Q. Althebyan, B. Panda, Y. Jararweh. Mitigating Insider Threat in Cloud Relational Databases. Journal of Security and Communication Networks, Wiley, 2016, 2016.
- Q. Althebyan, Y. Jararweh, Q. Yaseen, O. AlQudah, M. AlAyyoub. Evaluating map reduce tasks scheduling algorithms over cloud computing infrastructure, Journal of Concurrency and Computation: Practice and Experience, Wiley, DOI: 10.1002/cpe.3595. 2015.
- Q. Yaseen and I. Hmeidi. Extracting the Roots of Arabic Words without Removing Affixes, Journal of Information Science, Sage Publications, vol. 40 no. 3 376-385, doi: 10.1177/0165551514526348. 2014.
- Q.Yaseen and B. Panda. Insider Threat Mitigation: Preventing Unauthorized Knowledge Acquisition, International Journal of Information Security, Springer, Volume 11, Issue 4, pp 269-280, 2012.
- A. Badarneh, Q. Yaseen and I. Hmeidi. A new enhancement to the R-tree node splitting, Journal of Information Science, Sage Publications, Volume 36, Issue 1, pp. 3-18. 2010.
- Articles Published in Refereed Conferences Proceedings
- M. Almahmoud, D. Alzubi and Q. Yaseen. ReDroidDet: Android Malware Detection Based on Recurrent Neural Network. In Proceedings of the 4th International Conference on Emerging Data and Industry 4.0 (EDI40), Warsaw, Poland, March 2021.
- I. Abdulnabi and Q. Yaseen. Spam e-mail detection using deep learning techniques. In Proceedings of the 4th International Conference on Emerging Data and Industry 4.0 (EDI40), Warsaw, Poland, March 2021.
- Nour Alqudah and Q. Yaseen. Traffic analysis with machine learning: A review. In Proceedings of the International Workshop of Data Driven Security DDSW2020/3rd International Conference on Emerging Data and Industry 4.0 (EDI40), Warsaw, Poland, April 2020.
- Z. Halloush and Q. Yaseen. A Blockchain Model for Preserving Intellectual Property. In Proceedings of the International Conference on Data Science, E-learning and Information Systems, Dubai, UAE, December 2019.
- Q. Yaseen, A. Alabdulrazzaq, F. Albalas. A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases. In Proceedings of the 9th IEEE Annual Computing and Communication Workshop and Conference (CCWC), Athens, Greece, January 2019.
- W. Mardini, M. Al-Soud, Q. Yaseen, A Topology–based Performance Evaluation for an Adaptive Tuning Protocol for Service and Resource Discovery in the Internet of Things. In Proceedings of the 9th IEEE Annual Computing and Communication Workshop and Conference (CCWC), Athens, Greece, January 2019.
- Q. Yaseen, Y. Jararweh, M. Alayoub and M. Aldwairi. Collusion Attacks in Internet of Things: Detection and Mitigation using a Fog Based Model. In the Proceedings of the 2017 IEEE Sensors Applications Symposium (SAS), New Jersey, USA, March 2017.
- M. Alayyoub, Q. Yaseen, M. Shehab, Y. Jararweh and F. Albalas . Exploiting GPUs to Accelerate Clustering Algorithms. In proceedings of the 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA, Agadir, Morocco, November 2016.
- M. Alayyoub, Q. Yaseen, M. Shehab, Y. Jararweh and F. Albalas. Accelerating Clustering Algorithms Using GPUs. The 14th IEEE High Performance Extreme Computing Conference (HPEC-2016), Boston , USA, 2016.
- M. Alayyoub, Q. Yaseen, M. Shehab, F. Albalas and Y. Jararweh. Accelerating FCM-Based Text Classification Algorithm Using GPUs. The 14th IEEE High Performance Extreme Computing Conference (HPEC-2016), Boston , USA, 2016.
- Q. Yaseen, F. Albalas, Y. Jararweh, M. Alayyoub. A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks. In Proceedings of FAS* Foundations and Applications of Self* Systems Conference, Augsburg, Germany, September 2016.
- Q. Althebyan, R. Mohawesh, Q. Yaseen and Y. Jararweh. Mitigating Insider Threats in a Cloud Using a Knowledgebase Approach while Maintaining Data Availability. In Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), London, UK, December 2015.
- B. Panda and Q. Yaseen, Defending Integrity against Insiders in Cloud Relational Databases, In Proceedings of the 14th Annual Security Security Conference, Las Vegas, NV, USA, May 2015
- R. Mohawesh, Q. Althebyan, Q. Yaseen, Y. Jararweh. A Knowledge Base Insider Threat Prevention Model in a Cloud Data Center. In Proceedings of the 3rd International IBM Cloud Academy Conference, Budapest, Hungary, May 2015.
- Q. Althebyan, O.Alqudah, Y. Jararweh and Q. Yaseen, Evaluating Map-Reduce Tasks Scheduling Algorithms over Virtualized Infrastructure, In Proceedings of the 2nd International IBM Cloud Academy Conference (ICA CON 2014), Atlanta, GA, USA, May 2014.
- Q. Althebyan, O. Alqudah, Y. Jararweh and Q. Yaseen, Multi-Threading Based Map Reduce Tasks Scheduling, In the Proceedings of the 5th International Conference on Information and Communication Systems (ICICS 2014), Jordan, April 2014.
- Q. Yaseen, Qutaibah Althebyan, and Yaser Jararweh, PEP-Side Caching: An Insider Threat Port, In Proceedings of the 14th IEEE Conference on Information Reuse and Integration (IRI2013), San Francisco, California, USA, August 2013.
- Q. Yaseen and B. Panda, Tackling Insider Threat in Cloud Relational Database Systems, In Proceedings of the 5th IEEE/ACM International Conference on Utility and Cloud Computing, Chicago, USA, Nov 2012.
- W. Li, B. Panda and Q. Yaseen, Mitigating Insider Threat on Database Integrity, In Proceedings of the 8th International Conference on Information Systems Security, Guwahati, India, Dec 2012.
- Q. Yaseen and B. Panda, Mitigating Insider Threat without Limiting the Availability in Undeclared Tasks?, In Proceedings of the 6th IEEE Conference on Software Security and Reliability (SERE2012), Washington D.C, June 2012.
- W. Li, B. Panda and Q. Yaseen, ?Malicious Users' Transactions: Tackling Insider Threat, In Proceedings of 27th IFIP International Information Security and Privacy Conference (SEC2012), Greece, June 2012.
- Q. Yaseen and B. Panda, Enhanced Insider Threat Detection Model that Increases Data Availability, In Proceedings of the 7th International Conference of Distributed Computing and Internet Technology, Bhubaneswar, India, February 2011 (Acceptance Rate 13%).
- Q. Yaseen and B. Panda, Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention, In Proceedings of the Second IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), Minneapolis, Minnesota, August 2010. (Acceptance Rate: 11%)
- Q. Yaseen and B. Panda, Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders Knowledgebase, In Proceedings of the Fourth international Conference on Network and System Security (NSS2010), Melbourne, Australia, September 2010.
- Q. Yaseen and B. Panda, Predicting and Preventing Insider Threat in Relational Databases, In Proceedings of the 4th Workshop in Information Security Theory and Practice, Passau, Germany, pp.368-383, April 2010.
- Q. Yaseen and B. panda, Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems, In Proceedings of the 2009 International Conference on Computational Science and Engineering, Vancouver, Canada, August 2009, Vancouver, Canada, pp.450-455, August 2009.
- J. White, B. Panda, Q. Yaseen, W. Li and K. Nguyen, Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation, In Proceedings of the 7th International Workshop on Security in Information Systems (WOSIS 2009), Milan, Italy, May 2009.