default search action
Mohammed Amin Almaiah
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Hussam Dheaa Kamel Al-Janabi, Saima Anwar Lashari, Mahmood A. Al-Shareeda, Ayman Khalil, Abeer Abdullah Alsadhan, Mohammed Amin Almaiah, Tayseer Alkhdour:
D-BlockAuth: An Authentication Scheme-Based Dual Blockchain for 5G-Assisted Vehicular Fog Computing. IEEE Access 12: 99321-99332 (2024) - [j27]Mohammed Amin Almaiah, Aitizaz Ali, Tayseer Alkhdour, Abdalwali Lutfi:
Security Risk and Breach Detection Approach Based Blockchain for Medical Applications. IEEE Access 12: 171876-171896 (2024) - [j26]Rami Shehab, Abrar s. alismail, Mohammed Amin Almaiah, Tayseer Alkhdour, Belal Mahmoud Al-Wadi, Mahmaod Alrawad:
Assessment of Cybersecurity Risks and threats on Banking and Financial Services. J. Internet Serv. Inf. Secur. 14(3): 167-190 (2024) - [j25]Esra Altulaihan, Mohammed Amin Almaiah, Ahmed Al Guqhaiman:
Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms. Sensors 24(2): 713 (2024) - [i1]Gaith Rjoub, Saidul Islam, Jamal Bentahar, Mohammed Amin Almaiah, Rana Al-Rawashdeh:
Enhancing IoT Intelligence: A Transformer-based Reinforcement Learning Methodology. CoRR abs/2404.04205 (2024) - 2023
- [j24]Hamza Alqudah, Abdalwali Lutfi, Shadi Habis Abualoush, Mohammad Zakaria Al Qudah, Ahmad Farhan Alshira'h, Mohammed Amin Almaiah, Mahmaod Alrawad, Magdy Tork:
The impact of empowering internal auditors on the quality of electronic internal audits: A case of Jordanian listed services companies. Int. J. Inf. Manag. Data Insights 3(2): 100183 (2023) - [j23]Rima Shishakly, Mohammed Amin Almaiah, Shaha Al-Otaibi, Abdalwali Lutfi, Mahmaod Alrawad, Almulhem Ahmed:
A New Technological Model on Investigating the Utilization of Mobile Learning Applications: Extending the TAM. Multimodal Technol. Interact. 7(9): 92 (2023) - [c6]Yazan Abu Hammoudeh, Mohammad Qatawneh, Orieb AbuAlghanam, Mohammed Amin Almaiah:
Digital Certificate Validation Using Blockchain: A Survey. ICIT 2023: 506-510 - [c5]Yazeed Alhajjaj, Mohammad Qatawneh, Orieb AbuAlghanam, Mohammed Amin Almaiah:
Using of Blockchain in the Context of Automotive Industry: A Survey. ICIT 2023: 519-523 - 2022
- [j22]Aitizaz Ali, Mohammed Amin Almaiah, Fahima Hajjej, Muhammad Fermi Pasha, Ong Huey Fang, Rahim Khan, Jason Teo, Muhammad Zakarya:
An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. Sensors 22(2): 572 (2022) - [j21]Mohammed Amin Almaiah, Fahima Hajjej, Aitizaz Ali, Muhammad Fermi Pasha, Omar Almomani:
A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS. Sensors 22(4): 1448 (2022) - [j20]Mohammed Amin Almaiah, Aitizaz Ali, Fahima Hajjej, Muhammad Fermi Pasha, Manal Abdullah Alohali:
A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things. Sensors 22(6): 2112 (2022) - 2021
- [j19]Mais Haj Qasem, Nadim Obeid, Amjad Hudaib, Mohammed Amin Almaiah, Ali Al-Zahrani, Ahmad Al-Khasawneh:
Multi-Agent System Combined With Distributed Data Mining for Mutual Collaboration Classification. IEEE Access 9: 70531-70547 (2021) - [j18]Ali I. Siam, Mohammed Amin Almaiah, Ali Al-Zahrani, Atef Abou Elazm, Ghada M. El Banby, Walid El Shafai, Fathi E. Abd El-Samie, Nirmeen A. El-Bahnasawy:
Secure Health Monitoring Communication Systems Based on IoT and Cloud Computing for Medical Emergency Applications. Comput. Intell. Neurosci. 2021: 8016525:1-8016525:23 (2021) - [c4]Omar Almomani, Mohammed Amin Almaiah, Adeeb Alsaaidah, Sami Smadi, Adel Hamdan Mohammad, Ahmad Althunibat:
Machine Learning Classifiers for Network Intrusion Detection System: Comparative Study. ICIT 2021: 440-445 - [c3]Maryam Alamer, Mohammed Amin Almaiah:
Cybersecurity in Smart City: A Systematic Mapping Study. ICIT 2021: 719-724 - [c2]Maryam Abdulaziz Saad Bubukayr, Mohammed Amin Almaiah:
Cybersecurity Concerns in Smart-phones and applications: A survey. ICIT 2021: 725-731 - [c1]Roaa Al Nafea, Mohammed Amin Almaiah:
Cyber Security Threats in Cloud: Literature Review. ICIT 2021: 779-786 - 2020
- [j17]Mohammed Amin Almaiah, Mahdi M. Alamri, Waleed Mugahed Al-Rahmi:
Analysis the Effect of Different Factors on the Development of Mobile Learning Applications at Different Stages of Usage. IEEE Access 8: 16139-16154 (2020) - [j16]Muhammad Adil, Rahim Khan, Mohammed Amin Almaiah, Mohammed Al-Zahrani, Muhammad Zakarya, Muhammad Saeed Amjad, Rehan Ahmed:
MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks. IEEE Access 8: 44459-44469 (2020) - [j15]Muhammad Adil, Rahim Khan, Mohammed Amin Almaiah, Muhammad Binsawad, Jehad Ali, Adeeb Alsaaidah, Qui Thanh Hoai Ta:
An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks. IEEE Access 8: 148510-148527 (2020) - [j14]Mahdi M. Alamri, Mohammed Amin Almaiah, Waleed Mujahed Al-Rahmi:
The Role of Compatibility and Task-Technology Fit (TTF): On Social Networking Applications (SNAs) Usage as Sustainability in Higher Education. IEEE Access 8: 161668-161681 (2020) - [j13]Muhammad Adil, Rahim Khan, Jehad Ali, Byeong-Hee Roh, Qui Thanh Hoai Ta, Mohammed Amin Almaiah:
An Energy Proficient Load Balancing Routing Scheme for Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment. IEEE Access 8: 163209-163224 (2020) - [j12]Muhammad Nawaz Khan, Haseeb Ur Rahman, Mohammed Amin Almaiah, Muhammad Zahid Khan, Ajab Khan, Mushtaq Raza, Mohammed Al-Zahrani, Omar Almomani, Rahim Khan:
Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks. IEEE Access 8: 176495-176520 (2020) - [j11]Mohammed Amin Almaiah, Ahmad Al-Khasawneh:
Investigating the main determinants of mobile cloud computing adoption in university campus. Educ. Inf. Technol. 25(4): 3087-3107 (2020) - [j10]Mohammed Amin Almaiah, Ahmad Al-Khasawneh, Ahmad Althunibat:
Exploring the critical challenges and factors influencing the E-learning system usage during COVID-19 pandemic. Educ. Inf. Technol. 25(6): 5261-5280 (2020) - [j9]Mohammed Amin Almaiah, Yacoub Nasereddin:
Factors influencing the adoption of e-government services among Jordanian citizens. Electron. Gov. an Int. J. 16(3): 236-259 (2020) - [j8]Mohammed Amin Almaiah, Ahmad Al-Khasawneh, Ahmad Althunibat, Saleh Khawatreh:
Mobile Government Adoption Model Based on Combining GAM and UTAUT to Explain Factors According to Adoption of Mobile Government Services. Int. J. Interact. Mob. Technol. 14(3): 199-225 (2020) - [j7]Muhammad Awais Javed, Mohammed Amin Almaiah, Alhuseen Omar Alsayed, Omar Almomani:
An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks. Sensors 20(8): 2311 (2020)
2010 – 2019
- 2019
- [j6]Mohammed Amin Almaiah, Ibrahim Youssef Alyoussef:
Analysis of the Effect of Course Design, Course Content Support, Course Assessment and Instructor Characteristics on the Actual Use of E-Learning System. IEEE Access 7: 171907-171922 (2019) - [j5]Mohammed Amin Almaiah, Mahdi M. Alamri, Waleed Mugahed Al-Rahmi:
Applying the UTAUT Model to Explain the Students' Acceptance of Mobile Learning System in Higher Education. IEEE Access 7: 174673-174686 (2019) - [j4]Mohammed Amin Almaiah, Omar Abdulwahab Alismaiel:
Examination of factors influencing the use of mobile learning system: An empirical study. Educ. Inf. Technol. 24(1): 885-909 (2019) - [j3]Mohammed Amin Almaiah, Ahmed Al Mulhem:
Analysis of the essential factors affecting of intention to use of mobile learning applications: A comparison between universities adopters and non-adopters. Educ. Inf. Technol. 24(2): 1433-1468 (2019) - [j2]Malek Alksasbeh, Mohammed Abuhelaleh, Mohammed Amin Almaiah, Moha'med Al-Jaafreh, Anas Abu karaka:
Towards a Model of Quality Features for Mobile Social Networks Apps in Learning Environments: An Extended Information System Success Model. Int. J. Interact. Mob. Technol. 13(5): 75-93 (2019) - 2014
- [j1]Mohammed Amin Almaiah, Masita Masila Abdul Jalil:
Investigating Students' Perceptions on Mobile Learning Services. Int. J. Interact. Mob. Technol. 8(4): 31-36 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 01:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint