<?xml version="1.0"?>
<dblpperson name="Ala'a Saeb Al-Sherideh" pid="337/3138" n="9">
<person key="homepages/337/3138" mdate="2023-01-11">
<author pid="337/3138">Ala'a Saeb Al-Sherideh</author>
</person>
<r><inproceedings key="conf/acit3/Al-MousaAAAASAK24" mdate="2025-08-05">
<author orcid="0000-0002-5176-0910" pid="283/4643">Mohammad Rasmi Al-Mousa</author>
<author pid="399/9969">Samah Suleiman Al-Zou'bi</author>
<author pid="400/2914">Sami Askar</author>
<author pid="64/8460">Khaled E. Al-Qawasmi</author>
<author pid="337/3138">Ala'a Saeb Al-Sherideh</author>
<author pid="62/8263">Ghassan Samara</author>
<author orcid="0000-0003-1689-1330" pid="400/0991">Rami Almatarneh</author>
<author pid="400/2971">Mohammed Khouj</author>
<author pid="326/2288">Mahmoud Odeh</author>
<title>IoT Security Based On Lightewight Cryptographic (LWC) Algorithms: A survey.</title>
<pages>1-9</pages>
<year>2024</year>
<booktitle>ACIT</booktitle>
<ee>https://doi.org/10.1109/ACIT62805.2024.10876942</ee>
<crossref>conf/acit3/2024</crossref>
<url>db/conf/acit3/acit2024.html#Al-MousaAAAASAK24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acit3/Al-MousaABAAASE24" mdate="2026-05-07">
<author orcid="0000-0002-5176-0910" pid="283/4643">Mohammad Rasmi Al-Mousa</author>
<author pid="400/1778">Mohammad Abdulqawi</author>
<author pid="270/2987">Hazem Jihad Badarneh</author>
<author orcid="0000-0002-1888-759X" pid="354/0523">Ala'a Al-Shaikh</author>
<author orcid="0000-0002-4342-2567" pid="337/3655">Mahmoud Asassfeh</author>
<author pid="337/3138">Ala'a Saeb Al-Sherideh</author>
<author pid="62/8263">Ghassan Samara</author>
<author pid="117/5250">Ali Elrashidi</author>
<author pid="286/3895">Raed Alazaidah</author>
<title>A secure IoT limited Devices by applying Multi-Round Lightweight Cryptography.</title>
<pages>1-8</pages>
<year>2024</year>
<booktitle>ACIT</booktitle>
<ee>https://doi.org/10.1109/ACIT62805.2024.10876960</ee>
<crossref>conf/acit3/2024</crossref>
<url>db/conf/acit3/acit2024.html#Al-MousaABAAASE24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acit3/Al-SheridehAAEA24" mdate="2025-05-01">
<author pid="337/3138">Ala'a Saeb Al-Sherideh</author>
<author pid="399/9969">Samah Suleiman Al-Zou'bi</author>
<author pid="400/2395">Fuad Alshraiedeh</author>
<author pid="332/5766">Esraa Abu Elsoud</author>
<author pid="119/6387">Suha Afaneh</author>
<author orcid="0000-0002-5176-0910" pid="283/4643">Mohammad Rasmi Al-Mousa</author>
<author pid="286/3895">Raed Alazaidah</author>
<author pid="400/2971">Mohammed Khouj</author>
<author pid="62/8263">Ghassan Samara</author>
<title>Digital Evidence and Forensic Tools in Cyber Law: A Comprehensive Analysis.</title>
<pages>1-6</pages>
<year>2024</year>
<booktitle>ACIT</booktitle>
<ee>https://doi.org/10.1109/ACIT62805.2024.10877028</ee>
<crossref>conf/acit3/2024</crossref>
<url>db/conf/acit3/acit2024.html#Al-SheridehAAEA24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acit3/AlrjoobABKEAEAA24" mdate="2025-10-14">
<author pid="399/9784">Hmmam M. Alrjoob</author>
<author pid="286/3895">Raed Alazaidah</author>
<author pid="400/2576">Radwan Batyha</author>
<author pid="188/8167">Hayel Khafajeh</author>
<author pid="332/5766">Esraa Abu Elsoud</author>
<author pid="337/3138">Ala'a Saeb Al-Sherideh</author>
<author pid="117/5250">Ali Elrashidi</author>
<author orcid="0009-0001-9103-2002" pid="366/1928">Muhyeeddin Alqaraleh</author>
<author pid="312/9391">Waleed Amer</author>
<title>Classifying Psychiatric Patients Using Machine Learning.</title>
<pages>1-9</pages>
<year>2024</year>
<booktitle>ACIT</booktitle>
<ee>https://doi.org/10.1109/ACIT62805.2024.10877074</ee>
<crossref>conf/acit3/2024</crossref>
<url>db/conf/acit3/acit2024.html#AlrjoobABKEAEAA24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acit3/KhattabAAE24" mdate="2026-05-07">
<author pid="328/3529">Hebatullah Khattab</author>
<author orcid="0000-0002-1888-759X" pid="354/0523">Ala'a Al-Shaikh</author>
<author pid="337/3138">Ala'a Saeb Al-Sherideh</author>
<author pid="117/5250">Ali Elrashidi</author>
<title>Energy-Efficient Parallel Approach for Cloud Service Broker Scheduling.</title>
<pages>1-6</pages>
<year>2024</year>
<booktitle>ACIT</booktitle>
<ee>https://doi.org/10.1109/ACIT62805.2024.10877113</ee>
<crossref>conf/acit3/2024</crossref>
<url>db/conf/acit3/acit2024.html#KhattabAAE24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/desec/DaoudDAAAA24" mdate="2026-05-07">
<author pid="312/2297">Essam Al Daoud</author>
<author pid="372/0238">Laith Al Daoud</author>
<author orcid="0000-0002-4342-2567" pid="337/3655">Mahmoud Asassfeh</author>
<author orcid="0000-0002-1888-759X" pid="354/0523">Ala'a Al-Shaikh</author>
<author pid="337/3138">Ala'a Saeb Al-Sherideh</author>
<author pid="119/6387">Suha Afaneh</author>
<title>Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media Scams.</title>
<pages>31-36</pages>
<year>2024</year>
<booktitle>DSC</booktitle>
<ee>https://doi.org/10.1109/DSC63325.2024.00017</ee>
<crossref>conf/desec/2024</crossref>
<url>db/conf/desec/desec2024.html#DaoudDAAAA24</url>
</inproceedings>
</r>
<r><article key="journals/ijim/AlShaikhSAAAK23" mdate="2024-12-24">
<author orcid="0000-0002-1888-759X" pid="354/0523">Ala'a Al-Shaikh</author>
<author orcid="0009-0003-3120-1892" pid="223/8836">Ameen Shaheen</author>
<author orcid="0000-0002-5176-0910" pid="283/4643">Mohammad Rasmi Al-Mousa</author>
<author orcid="0000-0003-1422-5561" pid="64/8460">Khaled E. Al-Qawasmi</author>
<author pid="337/3138">Ala'a Saeb Al-Sherideh</author>
<author pid="328/3529">Hebatullah Khattab</author>
<title>A Comparative Study on the Performance of 64-bit ARM Processors.</title>
<pages>94-113</pages>
<year>2023</year>
<month>July</month>
<volume>17</volume>
<journal>Int. J. Interact. Mob. Technol.</journal>
<number>13</number>
<ee type="oa">https://doi.org/10.3991/ijim.v17i13.39395</ee>
<url>db/journals/ijim/ijim17.html#AlShaikhSAAAK23</url>
</article>
</r>
<r><inproceedings key="conf/acit3/AlazaidahHASYA23" mdate="2024-04-01">
<author pid="286/3895">Raed Alazaidah</author>
<author pid="243/9904">Mohammad A. Hassan</author>
<author pid="371/6896">Lara Al-Rbabah</author>
<author pid="62/8263">Ghassan Samara</author>
<author pid="04/2434">Marina Yusoff</author>
<author pid="337/3138">Ala'a Saeb Al-Sherideh</author>
<title>Utilizing Machine Learning in Medical Diagnosis: Systematic Review and Empirical Analysis.</title>
<pages>1-9</pages>
<year>2023</year>
<booktitle>ACIT</booktitle>
<ee>https://doi.org/10.1109/ACIT58888.2023.10453690</ee>
<crossref>conf/acit3/2023</crossref>
<url>db/conf/acit3/acit2023.html#AlazaidahHASYA23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acit3/Al-MousaAAASAA22" mdate="2026-03-24">
<author orcid="0000-0002-5176-0910" pid="283/4643">Mohammad Rasmi Al-Mousa</author>
<author pid="337/3174">Qutaiba Al-Zaqebah</author>
<author pid="337/3138">Ala'a Saeb Al-Sherideh</author>
<author pid="379/2010">Mohammed Alghanim</author>
<author orcid="0000-0001-8415-0572" pid="62/8263">Ghassan Samara</author>
<author orcid="0000-0002-6970-4888" pid="210/5774">Sattam Al-Matarneh</author>
<author orcid="0000-0002-4342-2567" pid="337/3655">Mahmoud Asassfeh</author>
<title>Examining Digital Forensic Evidence for Android Applications.</title>
<pages>1-8</pages>
<year>2022</year>
<booktitle>ACIT</booktitle>
<ee>https://doi.org/10.1109/ACIT57182.2022.9994221</ee>
<crossref>conf/acit3/2022</crossref>
<url>db/conf/acit3/acit2022.html#Al-MousaAAASAA22</url>
</inproceedings>
</r>
<coauthors n="32" nc="1">
<co c="0"><na f="a/Abdulqawi:Mohammad" pid="400/1778">Mohammad Abdulqawi</na></co>
<co c="0"><na f="a/Afaneh:Suha" pid="119/6387">Suha Afaneh</na></co>
<co c="0"><na f="a/Al=Mousa:Mohammad_Rasmi" pid="283/4643">Mohammad Rasmi Al-Mousa</na></co>
<co c="0"><na f="a/Al=Qawasmi:Khaled_E=" pid="64/8460">Khaled E. Al-Qawasmi</na></co>
<co c="0"><na f="a/Al=Rbabah:Lara" pid="371/6896">Lara Al-Rbabah</na></co>
<co c="0"><na f="a/Al=Shaikh:Ala=a" pid="354/0523">Ala'a Al-Shaikh</na></co>
<co c="0"><na f="a/Al=Zaqebah:Qutaiba" pid="337/3174">Qutaiba Al-Zaqebah</na></co>
<co c="0"><na f="a/Al=Zou=bi:Samah_Suleiman" pid="399/9969">Samah Suleiman Al-Zou'bi</na></co>
<co c="0"><na f="a/Alazaidah:Raed" pid="286/3895">Raed Alazaidah</na></co>
<co c="0"><na f="a/Alghanim:Mohammed" pid="379/2010">Mohammed Alghanim</na></co>
<co c="0"><na f="a/Almatarneh:Rami" pid="400/0991">Rami Almatarneh</na></co>
<co c="0" n="2"><na f="a/Almatarneh:Sattam" pid="210/5774">Sattam Almatarneh</na><na>Sattam Al-Matarneh</na></co>
<co c="0"><na f="a/Alqaraleh:Muhyeeddin" pid="366/1928">Muhyeeddin Alqaraleh</na></co>
<co c="0"><na f="a/Alrjoob:Hmmam_M=" pid="399/9784">Hmmam M. Alrjoob</na></co>
<co c="0"><na f="a/Alshraiedeh:Fuad" pid="400/2395">Fuad Alshraiedeh</na></co>
<co c="0"><na f="a/Amer:Waleed" pid="312/9391">Waleed Amer</na></co>
<co c="0"><na f="a/Asassfeh:Mahmoud" pid="337/3655">Mahmoud Asassfeh</na></co>
<co c="0"><na f="a/Askar:Sami" pid="400/2914">Sami Askar</na></co>
<co c="0"><na f="b/Badarneh:Hazem_Jihad" pid="270/2987">Hazem Jihad Badarneh</na></co>
<co c="0"><na f="b/Batyha:Radwan" pid="400/2576">Radwan Batyha</na></co>
<co c="0"><na f="d/Daoud:Essam_Al" pid="312/2297">Essam Al Daoud</na></co>
<co c="0"><na f="d/Daoud:Laith_Al" pid="372/0238">Laith Al Daoud</na></co>
<co c="0"><na f="e/Elrashidi:Ali" pid="117/5250">Ali Elrashidi</na></co>
<co c="0"><na f="e/Elsoud:Esraa_Abu" pid="332/5766">Esraa Abu Elsoud</na></co>
<co c="0"><na f="h/Hassan:Mohammad_A=" pid="243/9904">Mohammad A. Hassan</na></co>
<co c="0"><na f="k/Khafajeh:Hayel" pid="188/8167">Hayel Khafajeh</na></co>
<co c="0"><na f="k/Khattab:Hebatullah" pid="328/3529">Hebatullah Khattab</na></co>
<co c="0"><na f="k/Khouj:Mohammed" pid="400/2971">Mohammed Khouj</na></co>
<co c="0"><na f="o/Odeh:Mahmoud" pid="326/2288">Mahmoud Odeh</na></co>
<co c="0"><na f="s/Samara:Ghassan" pid="62/8263">Ghassan Samara</na></co>
<co c="0"><na f="s/Shaheen:Ameen" pid="223/8836">Ameen Shaheen</na></co>
<co c="0"><na f="y/Yusoff:Marina" pid="04/2434">Marina Yusoff</na></co>
</coauthors>
</dblpperson>

