Dr. Kamal Alieyan is an Assitatant Professer at Amman Arab University and received his PhD degree from Universiti Sains Malaysia (USM) in 2018. He has published about 20 research papers in ISI Journals, Scopus Journals, and International Conferences. From 2018 to 2019, he was Postdoctoral Fellow at Dept. of National Advanced IPv6 Centre of Excellence (NAv6), School of Computer Sciences Building, Universiti Sains Malaysia (USM), Penang, Malaysia. He earned a Bachelor of Computer Science from Mu’tta University, Jordan in 2003. Also, he earned a Master of Science in Computer Information Systems from the Arab Academy for Banking and Financial Science, Jordan in 2005. He has worked in the field IT industry field since 2003 and had over twelve years of experience
Network Security, Machin Learning, Internet of Things (IoT), Botnet
Alieyan, K., Almomani, A., Anbar, M., Alauthman, M., Abdullah, R., & Gupta, B. B. (2021). DNS rule-based schema to botnet detection. Enterprise Information Systems, 15(4), 545-564.
Alrosan, A., Alomoush, W., Alswaitti, M., Alissa, K., Sahran, S., Makhadmeh, S. N., & Alieyan, K. (2021). Automatic Data Clustering Based Mean Best Artificial Bee Colony Algorithm. CMC-COMPUTERS MATERIALS & CONTINUA, 68(2), 1575-1593.
Alieyan, K., Almomani, A., Abdullah, R., Almutairi, B., & Alauthman, M. (2021). Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions. In Research Anthology on Combating Denial-of-Service Attacks (pp. 138-150). IGI Global.
Alauthman, M., Almomani, A., Alweshah, M., Omoush, W., & Alieyan, K. (2019). Machine learning for phishing detection and mitigation. In Machine Learning for Computer and Cyber Security (pp. 48-74). CRC Press.
Al Ashhab, Z. R., Anbar, M., Singh, M. M., Alieyan, K., & Ghazaleh, W. A. (2019). Detection of HTTP flooding DDoS attack using Hadoop with MapReduce: A survey. Int. J. Adv. Trends Comput. Sci. Eng, 8(1), 1609-1620.
Alieyan, K., Anbar, M., Almomani, A., Abdullah, R., & Alauthman, M. (2018, November). Botnets detecting attack based on DNS features. In 2018 International Arab Conference on Information Technology (ACIT) (pp. 1-4). IEEE.
Alieyan, K., Almomani, A., Abdullah, R., & Anbar, M. (2018, November). A rule-based approach to detect botnets based on DNS. In 2018 8th IEEE International Conference on Control System, Computing and Engineering (ICCSCE) (pp. 115-120). IEEE.
Alajmi, N. K., Aliwi, H. S. H., Alieyan, K., & Sarwar, M. I. (2017, September). A Mathematical Model of the Behavior of SIP Signaling and Media Messages. In International Conference on Applied Physics, System Science and Computers (pp. 215-220). Springer, Cham.
Alieyan, K., ALmomani, A., Manasrah, A., & Kadhum, M. M. (2017). A survey of botnet detection based on DNS. Neural Computing and Applications, 28(7), 1541-1558.
Alzubaidi, M., Anbar, M., Al-Saleem, S., Al-Sarawi, S., & Alieyan, K. (2017, May). Review on mechanisms for detecting sinkhole attacks on RPLs. In 2017 8th International Conference on Information Technology (ICIT) (pp. 369-374). IEEE.
Al-Sarawi, S., Anbar, M., Alieyan, K., & Alzubaidi, M. (2017, May). Internet of Things (IoT) communication protocols. In 2017 8th International conference on information technology (ICIT) (pp. 685-690). IEEE.
KA Aljam, N., Saleh Haj, H., & Alieyan, K. (2017). Performance Evaluation of VoIP Protocols within Certain Number of Calls: Jitter. Journal of Applied Sciences, 17(5), 259-263.
Alajmi, N. K., ALIWI, H. S. H., & Alieyan, K. An Analytical Model for the Behavior of SIP, RSW, and H. 323 Messages and Session Time.
Hasbullah, I. H., Kadhum, M. M., Chong, Y. W., Alieyan, K., & Osman, A. (2016, December). Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol. In 2016 14th Annual Conference on Privacy, Security and Trust (PST) (pp. 275-281). IEEE.
Hasbullah, I. H., Kadhum, M. M., Chong, Y. W., Alieyan, K., & Osman, A. (2016, December). Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol. In 2016 14th Annual Conference on Privacy, Security and Trust (PST) (pp. 275-281). IEEE.
Aliwi, H. H., Alajmi, N. K. A., Sumari, P., & Alieyan, K. (2016). A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time. Engineering, Technology & Applied Science Research, 6(4), 1050-1055.
Aliwi, H. S. H., Alajmi, N. K., Sumari, P., & Alieyan, K. (2016). Signaling message time for homogeneous and heterogeneous protocols: a comparative study. INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 3(8), 14-17.
Chicago
Information Systems Security
Internet Applications Programming
Introduction to Cybersecurity
Fundamentals of Encryption
Web Design
Database Programming
Fundamentals of Software Engineering
IEEE Member