<?xml version="1.0"?>
<dblpperson name="Ahmad Abusukhon" pid="03/583" n="14">
<person key="homepages/03/583" mdate="2009-06-09">
<author pid="03/583">Ahmad Abusukhon</author>
</person>
<r><inproceedings key="conf/icitjo/LafiFA25" mdate="2025-07-09">
<author pid="212/3285">Mohammad Lafi</author>
<author pid="05/6989">Khalid A. Farhan</author>
<author pid="03/583">Ahmad Abusukhon</author>
<title>Machine Learning Model for Fault Prediction in Object-Oriented Systems.</title>
<pages>644-646</pages>
<year>2025</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT64950.2025.11049103</ee>
<crossref>conf/icitjo/2025</crossref>
<url>db/conf/icitjo/icit2025.html#LafiFA25</url>
</inproceedings>
</r>
<r><article key="journals/itiis/Abusukhon23" mdate="2025-01-30">
<author pid="03/583">Ahmad Abusukhon</author>
<title>Intelligent Shoes for Detecting Blind Falls Using the Internet of Things.</title>
<pages>2377-2398</pages>
<year>2023</year>
<volume>17</volume>
<journal>KSII Trans. Internet Inf. Syst.</journal>
<number>9</number>
<ee type="oa">https://doi.org/10.3837/tiis.2023.09.005</ee>
<url>db/journals/itiis/itiis17.html#Abusukhon23</url>
</article>
</r>
<r><article key="journals/jucs/AbusukhonAH23" mdate="2024-03-22">
<author orcid="0000-0002-8028-7907" pid="03/583">Ahmad Abusukhon</author>
<author orcid="0000-0002-0903-1204" pid="22/2131">Ala I. Al-Fuqaha</author>
<author orcid="0000-0002-4913-6940" pid="05/3465">Bilal Hawashin</author>
<title>A Novel Technique for Detecting Underground Water Pipeline Leakage Using the Internet of Things.</title>
<pages>838-865</pages>
<year>2023</year>
<month>August</month>
<volume>29</volume>
<journal>J. Univers. Comput. Sci.</journal>
<number>8</number>
<ee type="oa">https://doi.org/10.3897/jucs.96377</ee>
<url>db/journals/jucs/jucs29.html#AbusukhonAH23</url>
</article>
</r>
<r><inproceedings key="conf/icitjo/AbusukhonA23" mdate="2024-02-05">
<author pid="03/583">Ahmad Abusukhon</author>
<author orcid="0000-0002-8724-7414" pid="184/9873">Bareeq Alghannam</author>
<title>The Role of the Internet of Things in Monitoring Air Pollution-A Survey.</title>
<pages>583-585</pages>
<year>2023</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT58056.2023.10225826</ee>
<crossref>conf/icitjo/2023</crossref>
<url>db/conf/icitjo/icit2023.html#AbusukhonA23</url>
</inproceedings>
</r>
<r><article key="journals/concurrency/AbusukhonMA22" mdate="2023-10-21">
<author orcid="0000-0002-8028-7907" pid="03/583">Ahmad Abusukhon</author>
<author pid="265/2850">Zeyad Mohammad</author>
<author pid="312/9737">Ali Al-Thaher</author>
<title>An authenticated, secure, and mutable multiple-session-keys protocol based on elliptic curve cryptography and text-to-image encryption algorithm.</title>
<year>2022</year>
<volume>34</volume>
<journal>Concurr. Comput. Pract. Exp.</journal>
<number>4</number>
<ee>https://doi.org/10.1002/cpe.6649</ee>
<ee>https://www.wikidata.org/entity/Q122507511</ee>
<url>db/journals/concurrency/concurrency34.html#AbusukhonMA22</url>
</article>
</r>
<r><article key="journals/iotj/Abusukhon21" mdate="2021-07-13">
<author orcid="0000-0002-8028-7907" pid="03/583">Ahmad Abusukhon</author>
<title>Toward Achieving a Balance Between the User Satisfaction and the Power Conservation in the Internet of Things.</title>
<pages>10998-11015</pages>
<year>2021</year>
<volume>8</volume>
<journal>IEEE Internet Things J.</journal>
<number>14</number>
<ee>https://doi.org/10.1109/JIOT.2021.3051764</ee>
<url>db/journals/iotj/iotj8.html#Abusukhon21</url>
</article>
</r>
<r><inproceedings key="conf/cit/AbusukhonA21" mdate="2023-06-26">
<author orcid="0000-0002-8028-7907" pid="03/583">Ahmad Abusukhon</author>
<author pid="298/7760">Fadel AlTamimi</author>
<title>Water Preservation Using IoT: A proposed IoT System for Detecting Water Pipeline Leakage.</title>
<pages>115-119</pages>
<year>2021</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT52682.2021.9491667</ee>
<crossref>conf/cit/2021</crossref>
<url>db/conf/cit/cit2021.html#AbusukhonA21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cit/MohammadALAAA21" mdate="2023-09-30">
<author pid="265/2850">Zeyad Mohammad</author>
<author pid="142/9135">Ahmad A. A. Alkhatib</author>
<author orcid="0000-0003-1893-9510" pid="212/3285">Mohammed Lafi</author>
<author orcid="0000-0002-8028-7907" pid="03/583">Ahmad Abusukhon</author>
<author pid="221/3991">Dheeb Albashish</author>
<author pid="154/3283">Jaffar Atwan</author>
<title>Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem.</title>
<pages>218-223</pages>
<year>2021</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT52682.2021.9491743</ee>
<crossref>conf/cit/2021</crossref>
<url>db/conf/cit/cit2021.html#MohammadALAAA21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cit/MohammadNA21" mdate="2023-06-26">
<author pid="265/2850">Zeyad Mohammad</author>
<author orcid="0000-0001-6546-8083" pid="291/6925">Vincent Omollo Nyangaresi</author>
<author orcid="0000-0002-8028-7907" pid="03/583">Ahmad Abusukhon</author>
<title>On the Security of the Standardized MQV Protocol and Its Based Evolution Protocols.</title>
<pages>320-325</pages>
<year>2021</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT52682.2021.9491775</ee>
<crossref>conf/cit/2021</crossref>
<url>db/conf/cit/cit2021.html#MohammadNA21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sds/HawashinAMFA20" mdate="2026-02-01">
<author orcid="0000-0002-4913-6940" pid="05/3465">Bilal Hawashin</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="f/FarshadFotouhi">Farshad Fotouhi</author>
<author orcid="0000-0002-8028-7907" pid="03/583">Ahmad Abusukhon</author>
<title>An Efficient Cold Start Solution for Recommender Systems Based on Machine Learning and User Interests.</title>
<pages>220-225</pages>
<year>2020</year>
<booktitle>SDS</booktitle>
<ee>https://doi.org/10.1109/SDS49854.2020.9143953</ee>
<crossref>conf/sds/2020</crossref>
<url>db/conf/sds/sds2020.html#HawashinAMFA20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sds/AbusukhonA20" mdate="2026-02-01">
<author orcid="0000-0002-8028-7907" pid="03/583">Ahmad Abusukhon</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<title>New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value.</title>
<pages>235-239</pages>
<year>2020</year>
<booktitle>SDS</booktitle>
<ee>https://doi.org/10.1109/SDS49854.2020.9143891</ee>
<crossref>conf/sds/2020</crossref>
<url>db/conf/sds/sds2020.html#AbusukhonA20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cybersec/AbusukhonT12" mdate="2023-06-26">
<author orcid="0000-0002-8028-7907" pid="03/583">Ahmad Abusukhon</author>
<author pid="07/6310">Mohammad Talib</author>
<title>A novel network security algorithm based on private key encryption.</title>
<pages>33-37</pages>
<year>2012</year>
<booktitle>CyberSec</booktitle>
<ee>https://doi.org/10.1109/CyberSec.2012.6246080</ee>
<crossref>conf/cybersec/2012</crossref>
<url>db/conf/cybersec/cybersec2012.html#AbusukhonT12</url>
</inproceedings>
</r>
<r><phdthesis key="phd/ethos/Abusukhon08" mdate="2022-04-05">
<author pid="03/583">Ahmad Abusukhon</author>
<title>An investigation into improving the load balance and query throughput of distributed information retrieval.</title>
<year>2008</year>
<school>University of Bath, Somerset, UK</school>
<ee>https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.505715</ee>
<note type="source">British Library, EThOS</note>
</phdthesis>
</r>
<r><inproceedings key="conf/ista/AbusukhonTO08" mdate="2023-06-26">
<author orcid="0000-0002-8028-7907" pid="03/583">Ahmad Abusukhon</author>
<author pid="07/6310">Mohammad Talib</author>
<author orcid="0000-0003-2793-8245" pid="39/6868">Michael P. Oakes</author>
<title>An Investigation into Improving the Load Balance for Term-Based Partitioning.</title>
<pages>380-392</pages>
<year>2008</year>
<booktitle>UNISCON</booktitle>
<ee>https://doi.org/10.1007/978-3-540-78942-0_38</ee>
<crossref>conf/ista/2008</crossref>
<url>db/conf/ista/uniscon2008.html#AbusukhonTO08</url>
</inproceedings>
</r>
<coauthors n="17" nc="2">
<co c="0"><na f="a/Al=Fuqaha:Ala_I=" pid="22/2131">Ala I. Al-Fuqaha</na></co>
<co c="0"><na f="a/Al=Thaher:Ali" pid="312/9737">Ali Al-Thaher</na></co>
<co c="0"><na f="a/Albashish:Dheeb" pid="221/3991">Dheeb Albashish</na></co>
<co c="0"><na f="a/Alkhatib:Ahmad_A=_A=" pid="142/9135">Ahmad A. A. Alkhatib</na></co>
<co c="0"><na f="a/AlTamimi:Fadel" pid="298/7760">Fadel AlTamimi</na></co>
<co c="0"><na f="a/AlZu=bi:Shadi" pid="99/9215">Shadi AlZu'bi</na></co>
<co c="0"><na f="a/Atwan:Jaffar" pid="154/3283">Jaffar Atwan</na></co>
<co c="0"><na f="f/Farhan:Khalid_A=" pid="05/6989">Khalid A. Farhan</na></co>
<co c="0"><na f="f/Fotouhi:Farshad" pid="f/FarshadFotouhi">Farshad Fotouhi</na></co>
<co c="-1" n="2"><na f="g/Ghannam:Bareeq_A=_Al" pid="184/9873">Bareeq A. Al Ghannam</na><na>Bareeq Alghannam</na></co>
<co c="0"><na f="h/Hawashin:Bilal" pid="05/3465">Bilal Hawashin</na></co>
<co c="0" n="2"><na f="l/Lafi:Mohammed" pid="212/3285">Mohammed Lafi</na><na>Mohammad Lafi</na></co>
<co c="0"><na f="m/Mohammad:Zeyad" pid="265/2850">Zeyad Mohammad</na></co>
<co c="0"><na f="m/Mughaid:Ala" pid="255/3000">Ala Mughaid</na></co>
<co c="0"><na f="n/Nyangaresi:Vincent_Omollo" pid="291/6925">Vincent Omollo Nyangaresi</na></co>
<co c="1"><na f="o/Oakes:Michael_P=" pid="39/6868">Michael P. Oakes</na></co>
<co c="1"><na f="t/Talib:Mohammad" pid="07/6310">Mohammad Talib</na></co>
</coauthors>
</dblpperson>

