<?xml version="1.0"?>
<dblpperson name="Ala Mughaid" pid="255/3000" n="51">
<person key="homepages/255/3000" mdate="2023-04-01">
<author pid="255/3000">Ala Mughaid</author>
<url>https://orcid.org/0000-0002-1298-6933</url>
</person>
<r><article key="journals/eswa/HendawiKEMA26" mdate="2025-10-14">
<author pid="354/5642">Samar Hendawi</author>
<author pid="16/8419">Tarek Kanan</author>
<author pid="280/9330">Mohammed W. Elbes</author>
<author pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<title>Automated prompt engineering pipelines: fine-tuning LLMs for enhanced response accuracy.</title>
<pages>129689</pages>
<year>2026</year>
<volume>298</volume>
<journal>Expert Syst. Appl.</journal>
<ee>https://doi.org/10.1016/j.eswa.2025.129689</ee>
<url>db/journals/eswa/eswa298.html#HendawiKEMA26</url>
<stream>streams/journals/eswa</stream>
</article>
</r>
<r><article key="journals/cluster/ObeidatAMO25" mdate="2025-09-29">
<author pid="44/9058">Ibrahim Obeidat</author>
<author pid="354/5599">Rabee Alqura'n</author>
<author pid="255/3000">Ala Mughaid</author>
<author pid="389/0019">Ala Obeidat</author>
<title>Adding extra security layer to chatGPT: machine learning based model to detect malicious cybersecurity prompts.</title>
<pages>795</pages>
<year>2025</year>
<month>November</month>
<volume>28</volume>
<journal>Clust. Comput.</journal>
<number>12</number>
<ee>https://doi.org/10.1007/s10586-025-05144-z</ee>
<url>db/journals/cluster/cluster28.html#ObeidatAMO25</url>
<stream>streams/journals/cluster</stream>
</article>
</r>
<r><article key="journals/ijim/AlJamalAAMAT25" mdate="2026-01-04">
<author orcid="0009-0007-5389-6778" pid="354/5535">Mahmoud AlJamal</author>
<author orcid="0000-0001-9075-2828" pid="37/9609">Ayoub Alsarhan</author>
<author pid="221/9035">Mohammad Aljaidi</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author orcid="0009-0002-6404-5526" pid="397/5135">Wafa' Q. Al-Jamal</author>
<author pid="406/3277">Abdullah Ewayed Twairesh</author>
<title>Securing the Mobile Future: An Extensive Analysis of the Threat Landscape from Mobile Devices User Perspectives.</title>
<pages>140-158</pages>
<year>2025</year>
<volume>19</volume>
<journal>Int. J. Interact. Mob. Technol.</journal>
<number>8</number>
<ee type="oa">https://doi.org/10.3991/ijim.v19i08.51959</ee>
<url>db/journals/ijim/ijim19.html#AlJamalAAMAT25</url>
<stream>streams/journals/ijim</stream>
</article>
</r>
<r><article key="journals/simpra/MughaidAAAGA25" mdate="2025-03-17">
<author pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="142/9135">Ahmad A. A. Alkhatib</author>
<author pid="395/9972">Adel Alzioud</author>
<author orcid="0000-0001-7029-4487" pid="396/0454">Alaa Al Ghazo</author>
<author pid="355/8797">Issa Al-Aiash</author>
<title>Simulation-based framework for authenticating SCADA systems and cyber threat security in edge-based autonomous environments.</title>
<pages>103078</pages>
<year>2025</year>
<volume>140</volume>
<journal>Simul. Model. Pract. Theory</journal>
<ee>https://doi.org/10.1016/j.simpat.2025.103078</ee>
<url>db/journals/simpra/simpra140.html#MughaidAAAGA25</url>
<stream>streams/journals/simpra</stream>
</article>
</r>
<r><inproceedings key="conf/fllm/AljawabrahAOKSM25" mdate="2026-03-03">
<author pid="243/7831">Nadera Aljawabrah</author>
<author pid="354/5535">Mahmoud AlJamal</author>
<author pid="155/2719">Saif Okour</author>
<author pid="243/7819">Mohammad Kharabsheh</author>
<author pid="399/6419">Tariq Samarah</author>
<author pid="255/3000">Ala Mughaid</author>
<title>Architecture Search using AI Agent: Novel IDS for Edge-Based IoT Security.</title>
<pages>16-22</pages>
<year>2025</year>
<booktitle>FLLM</booktitle>
<ee>https://doi.org/10.1109/FLLM67465.2025.11391011</ee>
<crossref>conf/fllm/2025</crossref>
<url>db/conf/fllm/fllm2025.html#AljawabrahAOKSM25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fllm/AlZubiM25" mdate="2026-03-03">
<author pid="99/9215">Shadi AlZu'bi</author>
<author pid="255/3000">Ala Mughaid</author>
<title>The Digital Farmer Agents in Precise and Sustainable Agricultural Ecosystems.</title>
<pages>202-209</pages>
<year>2025</year>
<booktitle>FLLM</booktitle>
<ee>https://doi.org/10.1109/FLLM67465.2025.11391213</ee>
<crossref>conf/fllm/2025</crossref>
<url>db/conf/fllm/fllm2025.html#AlZubiM25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fllm/KharabshehMIAA25" mdate="2026-03-03">
<author pid="243/7819">Mohammad Kharabsheh</author>
<author pid="255/3000">Ala Mughaid</author>
<author pid="428/2974">Dalal Idreis</author>
<author pid="428/2916">Sewar ALdassouqi</author>
<author pid="354/5535">Mahmoud AlJamal</author>
<title>Hybrid Multilingual Sentiment Analysis and Emotional Support System for Arabic and English Texts.</title>
<pages>586-591</pages>
<year>2025</year>
<booktitle>FLLM</booktitle>
<ee>https://doi.org/10.1109/FLLM67465.2025.11391091</ee>
<crossref>conf/fllm/2025</crossref>
<url>db/conf/fllm/fllm2025.html#KharabshehMIAA25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fllm/KhassawnehJMA25" mdate="2026-04-07">
<author pid="364/2555-1">Bashar Khassawneh 0001</author>
<author pid="67/8181">Ghaith M. Jaradat</author>
<author pid="255/3000">Ala Mughaid</author>
<author pid="354/5535">Mahmoud AlJamal</author>
<title>A Spatio-Temporal Deep Neural Architecture Combining CNN and LSTM for Intelligent Exoplanet Detection and Classification.</title>
<pages>654-659</pages>
<year>2025</year>
<booktitle>FLLM</booktitle>
<ee>https://doi.org/10.1109/FLLM67465.2025.11391219</ee>
<crossref>conf/fllm/2025</crossref>
<url>db/conf/fllm/fllm2025.html#KhassawnehJMA25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fllm/AlokushMA25" mdate="2026-03-03">
<author pid="298/7849">Basem Alokush</author>
<author pid="255/3000">Ala Mughaid</author>
<author pid="99/9215">Shadi AlZu'bi</author>
<title>Fine-Tuned LLMs in Programming Education to Improve Student Performance in Syntax Mastery and Problem-Solving Skills.</title>
<pages>845-850</pages>
<year>2025</year>
<booktitle>FLLM</booktitle>
<ee>https://doi.org/10.1109/FLLM67465.2025.11390961</ee>
<crossref>conf/fllm/2025</crossref>
<url>db/conf/fllm/fllm2025.html#AlokushMA25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/snams/SamarahKMA25" mdate="2026-03-05">
<author pid="399/6419">Tariq Samarah</author>
<author pid="16/8419">Tarek Kanan</author>
<author pid="255/3000">Ala Mughaid</author>
<author pid="99/9215">Shadi AlZu'bi</author>
<title>Intelligent Modeling of Customer Emotional Intelligence in Social Network Behavioral Analysis.</title>
<pages>74-79</pages>
<year>2025</year>
<booktitle>SNAMS</booktitle>
<ee>https://doi.org/10.1109/SNAMS67467.2025.11391162</ee>
<crossref>conf/snams/2025</crossref>
<url>db/conf/snams/snams2025.html#SamarahKMA25</url>
</inproceedings>
</r>
<r><article key="journals/cluster/ElbesAKMA24" mdate="2026-02-01">
<author pid="280/9330">Mohammed W. Elbes</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="16/8419">Tarek Kanan</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="355/7323">Samia A. Abu-Shanab</author>
<title>Big dermatological data service for precise and immediate diagnosis by utilizing pre-trained learning models.</title>
<pages>6931-6951</pages>
<year>2024</year>
<month>August</month>
<volume>27</volume>
<journal>Clust. Comput.</journal>
<number>5</number>
<ee>https://doi.org/10.1007/s10586-024-04331-8</ee>
<url>db/journals/cluster/cluster27.html#ElbesAKMA24</url>
<stream>streams/journals/cluster</stream>
</article>
</r>
<r><article key="journals/cluster/MughaidAEAA24" mdate="2026-02-01">
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="332/6442">Asma Alnajjar</author>
<author orcid="0000-0002-9700-4862" pid="116/5250">Subhieh M. El-Salhi</author>
<author pid="08/11109">Khaled Almakadmeh</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<title>A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks.</title>
<pages>10359-10375</pages>
<year>2024</year>
<month>November</month>
<volume>27</volume>
<journal>Clust. Comput.</journal>
<number>8</number>
<ee>https://doi.org/10.1007/s10586-024-04495-3</ee>
<url>db/journals/cluster/cluster27.html#MughaidAEAA24</url>
<stream>streams/journals/cluster</stream>
</article>
</r>
<r><article key="journals/ijisec/MughaidOAADM24" mdate="2026-02-01">
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="44/9058">Ibrahim Obeidat</author>
<author pid="190/6566">Laith Abualigah</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="49/10511">Mohammad Sh. Daoud</author>
<author pid="258/6126">Hazem Migdady</author>
<title>Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things.</title>
<pages>2123-2137</pages>
<year>2024</year>
<month>June</month>
<volume>23</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10207-024-00832-0</ee>
<url>db/journals/ijisec/ijisec23.html#MughaidOAADM24</url>
</article>
</r>
<r><article key="journals/mta/ObeidatMAAAAAAA24" mdate="2026-02-01">
<author pid="44/9058">Ibrahim Obeidat</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="298/7279">Ahmed Al-Arjan</author>
<author pid="299/7639">Rula Al-Amrat</author>
<author pid="299/7621">Rathaa Al-Ajmi</author>
<author pid="372/8710">Razan Al-Hayajneh</author>
<author pid="46/9834">Belal Abuhaija</author>
<author orcid="0000-0002-2203-4549" pid="190/6566">Laith Abualigah</author>
<title>A novel secure cryptography model for data transmission based on Rotor64 technique.</title>
<pages>37295-37314</pages>
<year>2024</year>
<month>April</month>
<volume>83</volume>
<journal>Multim. Tools Appl.</journal>
<number>13</number>
<ee>https://doi.org/10.1007/s11042-023-16889-3</ee>
<url>db/journals/mta/mta83.html#ObeidatMAAAAAAA24</url>
</article>
</r>
<r><article key="journals/mta/AlZubiZRMA24" mdate="2026-02-01">
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="381/2649">Amjed Zreiqat</author>
<author pid="381/2374">Worood Radi</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0002-2203-4549" pid="190/6566">Laith Abualigah</author>
<title>An intelligent healthcare monitoring system-based novel deep learning approach for detecting covid-19 from x-rays images.</title>
<pages>63479-63496</pages>
<year>2024</year>
<month>July</month>
<volume>83</volume>
<journal>Multim. Tools Appl.</journal>
<number>23</number>
<ee>https://doi.org/10.1007/s11042-023-18056-0</ee>
<ee>https://www.wikidata.org/entity/Q130163317</ee>
<url>db/journals/mta/mta83.html#AlZubiZRMA24</url>
<stream>streams/journals/mta</stream>
</article>
</r>
<r><article key="journals/suscom/AlJamalMABAA24" mdate="2026-02-01">
<author orcid="0009-0007-5389-6778" pid="354/5535">Mahmoud AlJamal</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="38/10606">Bashar Al-Shboul</author>
<author orcid="0000-0002-2962-9449" pid="00/1083">Hani Bani-Salameh</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author orcid="0000-0002-2203-4549" pid="190/6566">Laith Abualigah</author>
<title>Optimizing risk mitigation: A simulation-based model for detecting fake IoT clients in smart city environments.</title>
<pages>101019</pages>
<year>2024</year>
<volume>43</volume>
<journal>Sustain. Comput. Informatics Syst.</journal>
<ee>https://doi.org/10.1016/j.suscom.2024.101019</ee>
<url>db/journals/suscom/suscom43.html#AlJamalMABAA24</url>
<stream>streams/journals/suscom</stream>
</article>
</r>
<r><article key="journals/taslp/KananAAHMKK24" mdate="2024-01-13">
<author orcid="0000-0003-2777-8077" pid="16/8419">Tarek Kanan</author>
<author orcid="0009-0003-0374-6203" pid="298/7559">Amani AbedAlghafer</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author orcid="0000-0002-4913-6940" pid="05/3465">Bilal Hawashin</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0002-9289-3189" pid="25/6411">Ghassan Kanaan</author>
<author orcid="0000-0001-8464-1523" pid="122/5040">M. M. Kamruzzaman</author>
<title>An Intelligent Health Care System for Detecting Drug Abuse in Social Media Platforms Based on Low Resource Language.</title>
<pages>691-703</pages>
<year>2024</year>
<volume>32</volume>
<journal>IEEE ACM Trans. Audio Speech Lang. Process.</journal>
<ee>https://doi.org/10.1109/TASLP.2023.3294699</ee>
<url>db/journals/taslp/taslp32.html#KananAAHMKK24</url>
</article>
</r>
<r><inproceedings key="conf/fllm/SamarahAMA24" mdate="2026-02-01">
<author pid="399/6419">Tariq Samarah</author>
<author orcid="0000-0003-0084-5102" pid="342/9596">Tawfiq Alrawashdeh</author>
<author pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<title>Utilizing LLMs for Enhancing Search Engine Optimization Strategies in Digital Marketing.</title>
<pages>284-288</pages>
<year>2024</year>
<booktitle>FLLM</booktitle>
<ee>https://doi.org/10.1109/FLLM63129.2024.10852433</ee>
<crossref>conf/fllm/2024</crossref>
<url>db/conf/fllm/fllm2024.html#SamarahAMA24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mcna/MughaidIAA24" mdate="2025-12-25">
<author pid="255/3000">Ala Mughaid</author>
<author pid="389/0277">Ruba Ibrahim</author>
<author orcid="0009-0007-5389-6778" pid="354/5535">Mahmoud AlJamal</author>
<author pid="355/8797">Issa Al-Aiash</author>
<title>Detection of Trojan Horse in the Internet of Things: Comparative Evaluation of Machine Learning Approaches.</title>
<pages>35-41</pages>
<year>2024</year>
<booktitle>MCNA</booktitle>
<ee>https://doi.org/10.1109/MCNA63144.2024.10703911</ee>
<crossref>conf/mcna/2024</crossref>
<url>db/conf/mcna/mcna2024.html#MughaidIAA24</url>
<stream>streams/conf/mcna</stream>
</inproceedings>
</r>
<r><article key="journals/cluster/KananMAAES23" mdate="2023-09-30">
<author orcid="0000-0003-2777-8077" pid="16/8419">Tarek Kanan</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0003-1075-4490" pid="66/4830">Riyad Al-Shalabi</author>
<author pid="10/7992">Mahmoud Al-Ayyoub</author>
<author pid="271/8605">Mohammad W. Elbes</author>
<author pid="255/3052">Odai Sadaqa</author>
<title>Business intelligence using deep learning techniques for social media contents.</title>
<pages>1285-1296</pages>
<year>2023</year>
<month>April</month>
<volume>26</volume>
<journal>Clust. Comput.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10586-022-03626-y</ee>
<url>db/journals/cluster/cluster26.html#KananMAAES23</url>
</article>
</r>
<r><article key="journals/fi/AlZubiEMBAFZ23" mdate="2023-11-12">
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="271/8605">Mohammad W. Elbes</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="343/2997">Noor Bdair</author>
<author orcid="0000-0002-2203-4549" pid="190/6566">Laith Abualigah</author>
<author orcid="0000-0002-3025-7689" pid="61/1566">Agostino Forestiero</author>
<author orcid="0000-0003-2693-2132" pid="z/RAZitar">Raed Abu Zitar</author>
<title>Diabetes Monitoring System in Smart Health Cities Based on Big Data Intelligence.</title>
<pages>85</pages>
<year>2023</year>
<month>February</month>
<volume>15</volume>
<journal>Future Internet</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.3390/fi15020085</ee>
<url>db/journals/fi/fi15.html#AlZubiEMBAFZ23</url>
</article>
</r>
<r><article key="journals/ijim/AljammalQMTWO23" mdate="2025-03-03">
<author orcid="0000-0003-3071-4752" pid="200/9601">Ashraf Hamdan Aljammal</author>
<author orcid="0000-0003-2629-031X" pid="121/1901">Ahmad Qawasmeh</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="179/5269">Salah Taamneh</author>
<author orcid="0000-0003-4464-8688" pid="18/6320">Fadi Wedyan</author>
<author pid="186/7460">Mamoon Obiedat</author>
<title>Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks.</title>
<pages>136-146</pages>
<year>2023</year>
<month>October</month>
<volume>17</volume>
<journal>Int. J. Interact. Mob. Technol.</journal>
<number>19</number>
<ee type="oa">https://doi.org/10.3991/ijim.v17i19.41379</ee>
<url>db/journals/ijim/ijim17.html#AljammalQMTWO23</url>
</article>
</r>
<r><article key="journals/mta/MughaidAAASIA23" mdate="2026-02-01">
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="332/6442">Asma Alnajjar</author>
<author orcid="0009-0000-0796-8522" pid="332/5766">Esraa AbuElsoud</author>
<author orcid="0000-0002-9700-4862" pid="116/5250">Subhieh El-Salhi</author>
<author orcid="0000-0001-6255-236X" pid="186/1076">Bashar Igried</author>
<author orcid="0000-0002-2203-4549" pid="190/6566">Laith Abualigah</author>
<title>Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches.</title>
<pages>13973-13995</pages>
<year>2023</year>
<month>April</month>
<volume>82</volume>
<journal>Multim. Tools Appl.</journal>
<number>9</number>
<ee>https://doi.org/10.1007/s11042-022-13914-9</ee>
<url>db/journals/mta/mta82.html#MughaidAAASIA23</url>
</article>
</r>
<r><article key="journals/mta/MughaidAAASIA23a" mdate="2026-02-01">
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="332/6442">Asma Alnajjar</author>
<author orcid="0009-0000-0796-8522" pid="332/5766">Esraa AbuElsoud</author>
<author orcid="0000-0002-9700-4862" pid="116/5250">Subhieh El-Salhi</author>
<author orcid="0000-0001-6255-236X" pid="186/1076">Bashar Igried</author>
<author orcid="0000-0002-2203-4549" pid="190/6566">Laith Abualigah</author>
<title>Correction to: Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches.</title>
<pages>13997-13998</pages>
<year>2023</year>
<month>April</month>
<volume>82</volume>
<journal>Multim. Tools Appl.</journal>
<number>9</number>
<ee>https://doi.org/10.1007/s11042-022-14059-5</ee>
<url>db/journals/mta/mta82.html#MughaidAAASIA23a</url>
</article>
</r>
<r><article key="journals/mta/MughaidOAEAAA23" mdate="2026-02-01">
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="44/9058">Ibrahim Obeidat</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author orcid="0009-0000-0796-8522" pid="332/5766">Esraa Abu Elsoud</author>
<author pid="332/6442">Asma Alnajjar</author>
<author pid="150/0847">Anas Ratib Alsoud</author>
<author orcid="0000-0002-2203-4549" pid="190/6566">Laith Abualigah</author>
<title>A novel machine learning and face recognition technique for fake accounts detection system on cyber social networks.</title>
<pages>26353-26378</pages>
<year>2023</year>
<month>July</month>
<volume>82</volume>
<journal>Multim. Tools Appl.</journal>
<number>17</number>
<ee>https://doi.org/10.1007/s11042-023-14347-8</ee>
<url>db/journals/mta/mta82.html#MughaidOAEAAA23</url>
</article>
</r>
<r><article key="journals/snam/ObaidatAMA23" mdate="2025-03-03">
<author pid="359/8548">Ibrahim Obaidat</author>
<author pid="359/8513">Aseel Al-zou'bi</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0002-2203-4549" pid="190/6566">Laith Abualigah</author>
<title>Investigating the cyberbullying risk in digital media: protecting victims in school teenagers.</title>
<pages>139</pages>
<year>2023</year>
<month>December</month>
<volume>13</volume>
<journal>Soc. Netw. Anal. Min.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s13278-023-01152-2</ee>
<url>db/journals/snam/snam13.html#ObaidatAMA23</url>
</article>
</r>
<r><inproceedings key="conf/acr/HendawiAMA23" mdate="2026-02-01">
<author pid="354/5642">Samar Hendawi</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="350/9591">Nayef Alqahtani</author>
<title>Ensuring Cybersecurity While Leveraging Social Media as a Data Source for Internet of Things Applications.</title>
<pages>587-604</pages>
<year>2023</year>
<booktitle>ACR</booktitle>
<ee>https://doi.org/10.1007/978-3-031-33743-7_47</ee>
<crossref>conf/acr/2023</crossref>
<url>db/conf/acr/acr2023.html#HendawiAMA23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acr/MughaidAAOAAA23" mdate="2026-02-01">
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="00/9062-3">Ali Alqahtani 0003</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="44/9058">Ibrahim Obeidat</author>
<author pid="354/5599">Rabee Alqura'n</author>
<author orcid="0009-0007-5389-6778" pid="354/5535">Mahmoud AlJamal</author>
<author pid="354/5615">Raid AL-Marayah</author>
<title>Utilizing Machine Learning Algorithms for Effectively Detection IoT DDoS Attacks.</title>
<pages>617-629</pages>
<year>2023</year>
<booktitle>ACR</booktitle>
<ee>https://doi.org/10.1007/978-3-031-33743-7_49</ee>
<crossref>conf/acr/2023</crossref>
<url>db/conf/acr/acr2023.html#MughaidAAOAAA23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dasc/AlJamalMAAA23" mdate="2026-02-01">
<author orcid="0009-0007-5389-6778" pid="354/5535">Mahmoud AlJamal</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="354/5599">Rabee Alqura'n</author>
<author orcid="0000-0003-0021-2364" pid="191/3296">Muder Almiani</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<title>Simulated Model for Preventing IoT Fake Clients over the Smart Cities Environment.</title>
<pages>757-761</pages>
<year>2023</year>
<booktitle>DASC/PiCom/CBDCom/CyberSciTech</booktitle>
<ee>https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361308</ee>
<crossref>conf/dasc/2023</crossref>
<url>db/conf/dasc/dasc2023.html#AlJamalMAAA23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fmec/MughaidOSAA23" mdate="2026-02-01">
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="44/9058">Ibrahim Obeidat</author>
<author pid="360/6949">Andaleeb Shdaifat</author>
<author pid="360/7710">Razan Alhayjna</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<title>Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning.</title>
<pages>123-127</pages>
<year>2023</year>
<booktitle>FMEC</booktitle>
<ee>https://doi.org/10.1109/FMEC59375.2023.10305867</ee>
<crossref>conf/fmec/2023</crossref>
<url>db/conf/fmec/fmec2023.html#MughaidOSAA23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fmec/AlmianiGMJ23" mdate="2025-03-03">
<author orcid="0000-0003-0021-2364" pid="191/3296">Muder Almiani</author>
<author pid="220/8950">Alia Abu Ghazleh</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="53/4234">Yaser Jararweh</author>
<title>Botnet Detection Using Label Propagation and Batch K-means Clustering for Securing IoT Networks.</title>
<pages>167-174</pages>
<year>2023</year>
<booktitle>FMEC</booktitle>
<ee>https://doi.org/10.1109/FMEC59375.2023.10305882</ee>
<crossref>conf/fmec/2023</crossref>
<url>db/conf/fmec/fmec2023.html#AlmianiGMJ23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fmec/AlZubiHAAM23" mdate="2026-02-01">
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="354/5642">Samar Hendawi</author>
<author pid="343/2525">Islam AlTalahin</author>
<author orcid="0000-0003-0021-2364" pid="191/3296">Muder Almiani</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<title>Securing the Digital Fortress: Unveiling the Modern Battleground for Sustainable OSs and the Digital Threatscape.</title>
<pages>292-297</pages>
<year>2023</year>
<booktitle>FMEC</booktitle>
<ee>https://doi.org/10.1109/FMEC59375.2023.10306151</ee>
<crossref>conf/fmec/2023</crossref>
<url>db/conf/fmec/fmec2023.html#AlZubiHAAM23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icitjo/AlJamalAAMAA23" mdate="2026-02-01">
<author orcid="0009-0007-5389-6778" pid="354/5535">Mahmoud AlJamal</author>
<author pid="354/5599">Rabee Alqura'n</author>
<author pid="355/8797">Issa Al-Aiash</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="355/9244">Ala A. Abutabanjeh</author>
<title>A Novel Machine Learning Cyber Approach for Detecting WannaLocker Ransomware Attack on Android Devices.</title>
<pages>135-142</pages>
<year>2023</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT58056.2023.10226130</ee>
<crossref>conf/icitjo/2023</crossref>
<url>db/conf/icitjo/icit2023.html#AlJamalAAMAA23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icitjo/KananHAEM23" mdate="2026-02-01">
<author pid="16/8419">Tarek Kanan</author>
<author pid="354/5642">Samar Hendawi</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="280/9330">Mohammed W. Elbes</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<title>Revolutionizing Cyberbullying Prevention: A Cutting-Edge Natural Language Processing-Based Approach.</title>
<pages>220-225</pages>
<year>2023</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT58056.2023.10225847</ee>
<crossref>conf/icitjo/2023</crossref>
<url>db/conf/icitjo/icit2023.html#KananHAEM23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icitjo/ElbesHAKM23" mdate="2026-02-01">
<author pid="280/9330">Mohammed W. Elbes</author>
<author pid="354/5642">Samar Hendawi</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="16/8419">Tarek Kanan</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<title>Unleashing the Full Potential of Artificial Intelligence and Machine Learning in Cybersecurity Vulnerability Management.</title>
<pages>276-283</pages>
<year>2023</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT58056.2023.10225910</ee>
<crossref>conf/icitjo/2023</crossref>
<url>db/conf/icitjo/icit2023.html#ElbesHAKM23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icitjo/AlZubiHEKM23" mdate="2026-02-01">
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="354/5642">Samar Hendawi</author>
<author pid="280/9330">Mohammed W. Elbes</author>
<author orcid="0000-0003-2777-8077" pid="16/8419">Tarek Kanan</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<title>Towards a Sustainable Future: Exploring Key Features, Challenges, and Global Examples of Building Smart Cities.</title>
<pages>284-291</pages>
<year>2023</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT58056.2023.10225987</ee>
<crossref>conf/icitjo/2023</crossref>
<url>db/conf/icitjo/icit2023.html#AlZubiHEKM23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icitjo/AlTalahinAAM23" mdate="2026-02-01">
<author pid="343/2525">Islam AlTalahin</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="40/8882">Assal A. M. Alqudah</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<title>Unmasking the Truth: A Deep Learning Approach to Detecting Deepfake Audio Through MFCC Features.</title>
<pages>511-518</pages>
<year>2023</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT58056.2023.10226172</ee>
<crossref>conf/icitjo/2023</crossref>
<url>db/conf/icitjo/icit2023.html#AlTalahinAAM23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/snams/AbuShanabMA23" mdate="2026-02-01">
<author pid="355/7323">Samia A. Abu-Shanab</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<title>Elevating Employment Practices in Agricultural Corporations with Large Language Models and AI.</title>
<pages>1-5</pages>
<year>2023</year>
<booktitle>SNAMS</booktitle>
<ee>https://doi.org/10.1109/SNAMS60348.2023.10375423</ee>
<crossref>conf/snams/2023</crossref>
<url>db/conf/snams/snams2023.html#AbuShanabMA23</url>
</inproceedings>
</r>
<r><article key="journals/cluster/AqelAMJ22" mdate="2023-03-21">
<author pid="86/9862">Darah Aqel</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="53/4234">Yaser Jararweh</author>
<title>Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture.</title>
<pages>2007-2020</pages>
<year>2022</year>
<volume>25</volume>
<journal>Clust. Comput.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10586-021-03397-y</ee>
<url>db/journals/cluster/cluster25.html#AqelAMJ22</url>
</article>
</r>
<r><article key="journals/cluster/AqelAMJ22a" mdate="2023-03-21">
<author pid="86/9862">Darah Aqel</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="53/4234">Yaser Jararweh</author>
<title>Correction to: Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture.</title>
<pages>2303</pages>
<year>2022</year>
<volume>25</volume>
<journal>Clust. Comput.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10586-021-03485-z</ee>
<url>db/journals/cluster/cluster25.html#AqelAMJ22a</url>
</article>
</r>
<r><article key="journals/cluster/MughaidAHTAE22" mdate="2026-02-01">
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="38/7867">Adnan Hnaif</author>
<author orcid="0000-0002-2414-0193" pid="179/5269">Salah Taamneh</author>
<author pid="332/6442">Asma Alnajjar</author>
<author orcid="0009-0000-0796-8522" pid="332/5766">Esraa Abu Elsoud</author>
<title>An intelligent cyber security phishing detection system using deep learning techniques.</title>
<pages>3819-3828</pages>
<year>2022</year>
<volume>25</volume>
<journal>Clust. Comput.</journal>
<number>6</number>
<ee>https://doi.org/10.1007/s10586-022-03604-4</ee>
<url>db/journals/cluster/cluster25.html#MughaidAHTAE22</url>
</article>
</r>
<r><article key="journals/ijet/WangM22" mdate="2023-06-26">
<author pid="181/2842">Yang Wang</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<title>Design of a Virtual Reality-Based Learning System for Spoken English.</title>
<pages>25-41</pages>
<year>2022</year>
<month>December</month>
<volume>17</volume>
<journal>Int. J. Emerg. Technol. Learn.</journal>
<number>24</number>
<ee type="oa">https://doi.org/10.3991/ijet.v17i24.35655</ee>
<url>db/journals/ijet/ijet17.html#WangM22</url>
</article>
</r>
<r><article key="journals/soco/MughaidAAAAZA22" mdate="2024-04-10">
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="99/9215">Shadi AlZu'bi</author>
<author pid="298/7279">Ahmed Al-Arjan</author>
<author pid="299/7639">Rula Al-Amrat</author>
<author pid="299/7621">Rathaa Al-Ajmi</author>
<author orcid="0000-0003-2693-2132" pid="z/RAZitar">Raed Abu Zitar</author>
<author orcid="0000-0002-2203-4549" pid="190/6566">Laith Abualigah</author>
<title>An intelligent cybersecurity system for detecting fake news in social media websites.</title>
<pages>5577-5591</pages>
<year>2022</year>
<volume>26</volume>
<journal>Soft Comput.</journal>
<number>12</number>
<ee>https://doi.org/10.1007/s00500-022-07080-1</ee>
<url>db/journals/soco/soco26.html#MughaidAAAAZA22</url>
</article>
</r>
<r><inproceedings key="conf/iotsms/AlZubiAAM22" mdate="2026-02-01">
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="298/8289">Samia A. Abushanap</author>
<author orcid="0000-0003-0021-2364" pid="191/3296">Muder Almiani</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<title>Transfer Learning Enabled CAD System for Monkey Pox Classification.</title>
<pages>1-5</pages>
<year>2022</year>
<booktitle>IOTSMS</booktitle>
<ee>https://doi.org/10.1109/IOTSMS58070.2022.10062163</ee>
<crossref>conf/iotsms/2022</crossref>
<url>db/conf/iotsms/iotsms2022.html#AlZubiAAM22</url>
</inproceedings>
</r>
<r><article key="journals/mta/AlZubiHMB21" mdate="2023-03-21">
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author orcid="0000-0002-4913-6940" pid="05/3465">Bilal Hawashin</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author orcid="0000-0002-5166-4873" pid="83/2178">Thar Baker</author>
<title>Efficient 3D medical image segmentation algorithm over a secured multimedia network.</title>
<pages>16887-16905</pages>
<year>2021</year>
<volume>80</volume>
<journal>Multim. Tools Appl.</journal>
<number>11</number>
<ee>https://doi.org/10.1007/s11042-020-09160-6</ee>
<url>db/journals/mta/mta80.html#AlZubiHMB21</url>
</article>
</r>
<r><inproceedings key="conf/cit/AlZubiAM21" mdate="2026-02-01">
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="86/9862">Darah Aqel</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<title>Recent intelligent Approaches for Managing and Optimizing smart Blood Donation process.</title>
<pages>679-684</pages>
<year>2021</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT52682.2021.9491125</ee>
<crossref>conf/cit/2021</crossref>
<url>db/conf/cit/cit2021.html#AlZubiAM21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cit/MughaidARA21" mdate="2026-02-01">
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="298/7279">Ahmed Al-Arjan</author>
<author orcid="0000-0002-5176-0910" pid="283/4643">Mohammad Rasmi 0001</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<title>Intelligent security in the era of AI: The key vulnerability of RC4 algorithm.</title>
<pages>691-694</pages>
<year>2021</year>
<booktitle>ICIT</booktitle>
<ee>https://doi.org/10.1109/ICIT52682.2021.9491709</ee>
<crossref>conf/cit/2021</crossref>
<url>db/conf/cit/cit2021.html#MughaidARA21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sds/HawashinAMFA20" mdate="2026-02-01">
<author orcid="0000-0002-4913-6940" pid="05/3465">Bilal Hawashin</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="f/FarshadFotouhi">Farshad Fotouhi</author>
<author orcid="0000-0002-8028-7907" pid="03/583">Ahmad Abusukhon</author>
<title>An Efficient Cold Start Solution for Recommender Systems Based on Machine Learning and User Interests.</title>
<pages>220-225</pages>
<year>2020</year>
<booktitle>SDS</booktitle>
<ee>https://doi.org/10.1109/SDS49854.2020.9143953</ee>
<crossref>conf/sds/2020</crossref>
<url>db/conf/sds/sds2020.html#HawashinAMFA20</url>
</inproceedings>
</r>
<r><article key="journals/ijim/ObeidatMA19" mdate="2025-03-13">
<author pid="44/9058">Ibrahim Obeidat</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="255/2996">Shadi AlZoubi</author>
<title>A Secure Encrypted Protocol for Clients' Handshaking in the Same Network.</title>
<pages>47-57</pages>
<year>2019</year>
<volume>13</volume>
<journal>Int. J. Interact. Mob. Technol.</journal>
<number>5</number>
<ee type="oa">https://doi.org/10.3991/ijim.v13i05.9845</ee>
<ee>https://www.wikidata.org/entity/Q122441454</ee>
<url>db/journals/ijim/ijim13.html#ObeidatMA19</url>
</article>
</r>
<r><inproceedings key="conf/snams/AlZubiAMJ19" mdate="2026-02-01">
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="86/9862">Darah Aqel</author>
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="53/4234">Yaser Jararweh</author>
<title>A Multi-Levels Geo-Location based Crawling Method for Social Media Platforms.</title>
<pages>494-498</pages>
<year>2019</year>
<booktitle>SNAMS</booktitle>
<ee>https://doi.org/10.1109/SNAMS.2019.8931856</ee>
<crossref>conf/snams/2019</crossref>
<url>db/conf/snams/snams2019.html#AlZubiAMJ19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/snams/MughaidOHAA19" mdate="2026-02-01">
<author orcid="0000-0002-1298-6933" pid="255/3000">Ala Mughaid</author>
<author pid="44/9058">Ibrahim Obeidat</author>
<author orcid="0000-0002-4913-6940" pid="05/3465">Bilal Hawashin</author>
<author orcid="0000-0003-4173-2323" pid="99/9215">Shadi AlZu'bi</author>
<author pid="86/9862">Darah Aqel</author>
<title>A smart Geo-Location Job Recommender System Based on Social Media Posts.</title>
<pages>505-510</pages>
<year>2019</year>
<booktitle>SNAMS</booktitle>
<ee>https://doi.org/10.1109/SNAMS.2019.8931854</ee>
<crossref>conf/snams/2019</crossref>
<url>db/conf/snams/snams2019.html#MughaidOHAA19</url>
</inproceedings>
</r>
<coauthors n="84" nc="1">
<co c="0"><na f="a/AbedAlghafer:Amani" pid="298/7559">Amani AbedAlghafer</na></co>
<co c="0"><na f="a/Abu=Shanab:Samia_A=" pid="355/7323">Samia A. Abu-Shanab</na></co>
<co c="0" n="2"><na f="a/Abualigah:Laith_Mohammad" pid="190/6566">Laith Mohammad Abualigah</na><na>Laith Abualigah</na></co>
<co c="0"><na f="a/Abuhaija:Belal" pid="46/9834">Belal Abuhaija</na></co>
<co c="0"><na f="a/Abushanap:Samia_A=" pid="298/8289">Samia A. Abushanap</na></co>
<co c="0"><na f="a/Abusukhon:Ahmad" pid="03/583">Ahmad Abusukhon</na></co>
<co c="0"><na f="a/Abutabanjeh:Ala_A=" pid="355/9244">Ala A. Abutabanjeh</na></co>
<co c="0"><na f="a/Al=Aiash:Issa" pid="355/8797">Issa Al-Aiash</na></co>
<co c="0"><na f="a/Al=Ajmi:Rathaa" pid="299/7621">Rathaa Al-Ajmi</na></co>
<co c="0"><na f="a/Al=Amrat:Rula" pid="299/7639">Rula Al-Amrat</na></co>
<co c="0"><na f="a/Al=Arjan:Ahmed" pid="298/7279">Ahmed Al-Arjan</na></co>
<co c="0"><na f="a/Al=Ayyoub:Mahmoud" pid="10/7992">Mahmoud Al-Ayyoub</na></co>
<co c="0"><na f="a/Al=Hayajneh:Razan" pid="372/8710">Razan Al-Hayajneh</na></co>
<co c="0"><na f="a/Al=Jamal:Wafa=_Q=" pid="397/5135">Wafa' Q. Al-Jamal</na></co>
<co c="0"><na f="a/AL=Marayah:Raid" pid="354/5615">Raid AL-Marayah</na></co>
<co c="0" n="2"><na f="a/Al=Mousa:Mohammad_Rasmi" pid="283/4643">Mohammad Rasmi Al-Mousa</na><na>Mohammad Rasmi 0001</na></co>
<co c="0"><na f="a/Al=Shalabi:Riyad" pid="66/4830">Riyad Al-Shalabi</na></co>
<co c="0"><na f="a/Al=Shboul:Bashar" pid="38/10606">Bashar Al-Shboul</na></co>
<co c="0" n="2"><na f="a/Al=Soud:Anas_Ratib" pid="150/0847">Anas Ratib Al-Soud</na><na>Anas Ratib Alsoud</na></co>
<co c="0"><na f="a/Al=zou=bi:Aseel" pid="359/8513">Aseel Al-zou'bi</na></co>
<co c="0"><na f="a/ALdassouqi:Sewar" pid="428/2916">Sewar ALdassouqi</na></co>
<co c="0"><na f="a/Alhayjna:Razan" pid="360/7710">Razan Alhayjna</na></co>
<co c="0"><na f="a/Aljaidi:Mohammad" pid="221/9035">Mohammad Aljaidi</na></co>
<co c="0"><na f="a/AlJamal:Mahmoud" pid="354/5535">Mahmoud AlJamal</na></co>
<co c="0"><na f="a/Aljammal:Ashraf_Hamdan" pid="200/9601">Ashraf Hamdan Aljammal</na></co>
<co c="0"><na f="a/Aljawabrah:Nadera" pid="243/7831">Nadera Aljawabrah</na></co>
<co c="0"><na f="a/Alkhatib:Ahmad_A=_A=" pid="142/9135">Ahmad A. A. Alkhatib</na></co>
<co c="0"><na f="a/Almakadmeh:Khaled" pid="08/11109">Khaled Almakadmeh</na></co>
<co c="0"><na f="a/Almiani:Muder" pid="191/3296">Muder Almiani</na></co>
<co c="0"><na f="a/Alnajjar:Asma" pid="332/6442">Asma Alnajjar</na></co>
<co c="0"><na f="a/Alokush:Basem" pid="298/7849">Basem Alokush</na></co>
<co c="0"><na f="a/Alqahtani_0003:Ali" pid="00/9062-3">Ali Alqahtani 0003</na></co>
<co c="0"><na f="a/Alqahtani:Nayef" pid="350/9591">Nayef Alqahtani</na></co>
<co c="0"><na f="a/Alqudah:Assal_A=_M=" pid="40/8882">Assal A. M. Alqudah</na></co>
<co c="0"><na f="a/Alqura=n:Rabee" pid="354/5599">Rabee Alqura'n</na></co>
<co c="0"><na f="a/Alrawashdeh:Tawfiq" pid="342/9596">Tawfiq Alrawashdeh</na></co>
<co c="0"><na f="a/Alsarhan:Ayoub" pid="37/9609">Ayoub Alsarhan</na></co>
<co c="0"><na f="a/AlTalahin:Islam" pid="343/2525">Islam AlTalahin</na></co>
<co c="0"><na f="a/Alzioud:Adel" pid="395/9972">Adel Alzioud</na></co>
<co c="0"><na f="a/AlZoubi:Shadi" pid="255/2996">Shadi AlZoubi</na></co>
<co c="0"><na f="a/AlZu=bi:Shadi" pid="99/9215">Shadi AlZu'bi</na></co>
<co c="0"><na f="a/Aqel:Darah" pid="86/9862">Darah Aqel</na></co>
<co c="0"><na f="b/Baker:Thar" pid="83/2178">Thar Baker</na></co>
<co c="0"><na f="b/Bani=Salameh:Hani" pid="00/1083">Hani Bani-Salameh</na></co>
<co c="0"><na f="b/Bdair:Noor" pid="343/2997">Noor Bdair</na></co>
<co c="0" n="2"><na f="d/Daoud:Mohammad_Sharif" pid="49/10511">Mohammad Sharif Daoud</na><na>Mohammad Sh. Daoud</na></co>
<co c="0" n="2"><na f="e/El=Salhi:Subhieh" pid="116/5250">Subhieh El-Salhi</na><na>Subhieh M. El-Salhi</na></co>
<co c="0"><na f="e/Elbes:Mohammad_W=" pid="271/8605">Mohammad W. Elbes</na></co>
<co c="0"><na f="e/Elbes:Mohammed_W=" pid="280/9330">Mohammed W. Elbes</na></co>
<co c="0" n="2"><na f="e/Elsoud:Esraa_Abu" pid="332/5766">Esraa Abu Elsoud</na><na>Esraa AbuElsoud</na></co>
<co c="0"><na f="f/Forestiero:Agostino" pid="61/1566">Agostino Forestiero</na></co>
<co c="0"><na f="f/Fotouhi:Farshad" pid="f/FarshadFotouhi">Farshad Fotouhi</na></co>
<co c="0"><na f="g/Ghazleh:Alia_Abu" pid="220/8950">Alia Abu Ghazleh</na></co>
<co c="0"><na f="g/Ghazo:Alaa_Al" pid="396/0454">Alaa Al Ghazo</na></co>
<co c="0"><na f="h/Hawashin:Bilal" pid="05/3465">Bilal Hawashin</na></co>
<co c="0"><na f="h/Hendawi:Samar" pid="354/5642">Samar Hendawi</na></co>
<co c="0" n="2"><na f="h/Hnaif:Adnan_A=" pid="38/7867">Adnan A. Hnaif</na><na>Adnan Hnaif</na></co>
<co c="0"><na f="i/Ibrahim:Ruba" pid="389/0277">Ruba Ibrahim</na></co>
<co c="0"><na f="i/Idreis:Dalal" pid="428/2974">Dalal Idreis</na></co>
<co c="0"><na f="i/Igried:Bashar" pid="186/1076">Bashar Igried</na></co>
<co c="0"><na f="j/Jaradat:Ghaith_M=" pid="67/8181">Ghaith M. Jaradat</na></co>
<co c="0"><na f="j/Jararweh:Yaser" pid="53/4234">Yaser Jararweh</na></co>
<co c="0"><na f="k/Kamruzzaman:M=_M=" pid="122/5040">M. M. Kamruzzaman</na></co>
<co c="0"><na f="k/Kanaan:Ghassan" pid="25/6411">Ghassan Kanaan</na></co>
<co c="0"><na f="k/Kanan:Tarek" pid="16/8419">Tarek Kanan</na></co>
<co c="0"><na f="k/Kharabsheh:Mohammad" pid="243/7819">Mohammad Kharabsheh</na></co>
<co c="0"><na f="k/Khassawneh_0001:Bashar" pid="364/2555-1">Bashar Khassawneh 0001</na></co>
<co c="0"><na f="m/Migdady:Hazem" pid="258/6126">Hazem Migdady</na></co>
<co c="0"><na f="o/Obaidat:Ibrahim" pid="359/8548">Ibrahim Obaidat</na></co>
<co c="0"><na f="o/Obeidat:Ala" pid="389/0019">Ala Obeidat</na></co>
<co c="0"><na f="o/Obeidat:Ibrahim" pid="44/9058">Ibrahim Obeidat</na></co>
<co c="0"><na f="o/Obiedat:Mamoon" pid="186/7460">Mamoon Obiedat</na></co>
<co c="0"><na f="o/Okour:Saif" pid="155/2719">Saif Okour</na></co>
<co c="0"><na f="q/Qawasmeh:Ahmad" pid="121/1901">Ahmad Qawasmeh</na></co>
<co c="0"><na f="r/Radi:Worood" pid="381/2374">Worood Radi</na></co>
<co c="0"><na f="s/Sadaqa:Odai" pid="255/3052">Odai Sadaqa</na></co>
<co c="0"><na f="s/Samarah:Tariq" pid="399/6419">Tariq Samarah</na></co>
<co c="0"><na f="s/Shdaifat:Andaleeb" pid="360/6949">Andaleeb Shdaifat</na></co>
<co c="0"><na f="t/Taamneh:Salah" pid="179/5269">Salah Taamneh</na></co>
<co c="0"><na f="t/Twairesh:Abdullah_Ewayed" pid="406/3277">Abdullah Ewayed Twairesh</na></co>
<co c="-1"><na f="w/Wang:Yang" pid="181/2842">Yang Wang</na></co>
<co c="0"><na f="w/Wedyan:Fadi" pid="18/6320">Fadi Wedyan</na></co>
<co c="0"><na f="z/Zitar:Raed_Abu" pid="z/RAZitar">Raed Abu Zitar</na></co>
<co c="0"><na f="z/Zreiqat:Amjed" pid="381/2649">Amjed Zreiqat</na></co>
</coauthors>
</dblpperson>

