Follow
Mohammad Shurman, Mohammad Al-Shurman
Mohammad Shurman, Mohammad Al-Shurman
Verified email at just.edu.jo - Homepage
Title
Cited by
Cited by
Year
Black hole attack in mobile ad hoc networks
M Al-Shurman, SM Yoo, S Park
Proceedings of the 42nd annual Southeast regional conference, 96-97, 2004
6192004
Energy-efficient fuzzy-logic-based clustering technique for hierarchical routing protocols in wireless sensor networks
A Hamzah, M Shurman, O Al-Jarrah, E Taqieddin
Sensors 19 (3), 561, 2019
1572019
Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks
KA Darabkh, SS Ismail, M Al-Shurman, IF Jafar, E Alkhader, ...
Journal of Network and Computer Applications 35 (6), 2068-2080, 2012
922012
Energy-aware and density-based clustering and relaying protocol (EA-DB-CRP) for gathering data in wireless sensor networks
KA Darabkh, SM Odetallah, Z Al-qudah, K Ala’F, MM Shurman
Applied Soft Computing 80, 154-166, 2019
832019
DoS and DDoS attack detection using deep learning and IDS
M Shurman, R Khrais, A Yateem
Int. Arab J. Inf. Technol 17 (4A), 655-661, 2020
692020
Hierarchical clustering using genetic algorithm in wireless sensor networks
MM Shurman, MF Al-Mistarihi, AN Mohammad, KA Darabkh, AA Ababnah
2013 36th international convention on information and communication …, 2013
652013
LEACH enhancements for wireless sensor networks based on energy model
M Shurman, N Awad, MF Al-Mistarihi, KA Darabkh
2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices …, 2014
562014
Tree based dynamic address autoconfiguration in mobile ad hoc networks
MF Al-Mistarihi, M Al-Shurman, A Qudaimat
Computer Networks 55 (8), 1894-1908, 2011
522011
IoT denial-of-service attack detection and prevention using hybrid IDS
MM Shurman, RM Khrais, AA Yateem
2019 International Arab Conference on Information Technology (ACIT), 252-254, 2019
512019
Performance evaluation of multiuser diversity in multiuser two‐hop cooperative multi‐relay wireless networks using maximal ratio combining over Rayleigh fading channels
MF Al‐Mistarihi, R Mohaisen, A Sharaqa, MM Shurman, KA Darabkh
International Journal of Communication Systems 28 (1), 71-90, 2015
432015
Merging dynamic address autoconfiguration and security key protocols in mobile ad hoc networks
MM Shurman, MF Al-Mistarihi, KA Darabkh
2013 36th International Convention on Information and Communication …, 2013
302013
Collaborative execution of distributed mobile and IoT applications running at the edge
MM Shurman, MK Aljarah
2017 International Conference on Electrical and Computing Technologies and …, 2017
272017
Closed-form expression of bit error rate in dual-hop dual-branch mixed relaying cooperative networks with best-path selection over Rayleigh fading channels
M Hlayel, AM Hayajneh, MF Al-Mistarihi, M Shurman, KA Darabkh
2014 IEEE 11th International Multi-Conference on Systems, Signals & Devices …, 2014
272014
Dynamic distribution of security keys and IP addresses coalition protocol for mobile ad hoc networks
MM Shurman, MF Al-Mistarihi, KA Darabkh
Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i …, 2016
252016
A performance simulation for route maintenance in wireless ad hoc networks
M Al-Shurman, SM Yoo, S Park
Proceedings of the 42nd annual Southeast regional conference, 25-30, 2004
232004
Zero-day attack detection and prevention in software-defined networks
H Al-Rushdan, M Shurman, SH Alnabelsi, Q Althebyan
2019 international arab conference on information technology (acit), 278-282, 2019
212019
N-BEB: New backoff algorithm for IEEE 802.11 MAC protocol
M Shurman, B Al-Shua'b, M Alsaedeen, MF Al-Mistarihi, KA Darabkh
2014 37th International Convention on Information and Communication …, 2014
212014
Key pre-distribution using mds codes in mobile ad hoc networks
M Al-Shurman, SM Yoo
Third International Conference on Information Technology: New Generations …, 2006
202006
A quantum no-key protocol for secure data communication
Y Kanamori, SM Yoo, M Al-Shurman
Proceedings of the 43rd annual Southeast regional conference-Volume 2, 92-93, 2005
182005
Performance analysis of amplify‐and‐forward cognitive relay networks with interference power constraints over Nakagami‐m fading channels
MM Shurman, MF Al‐Mistarihi, MM Alhulayil
IET Communications 10 (5), 594-605, 2016
152016
The system can't perform the operation now. Try again later.
Articles 1–20