Home  |  Online Registration  |  eLearning  |  Contact Us  |  عربي  

Home >> CV

  CV    Sign In
   
 
Personal Information  
Name :Mohammad Rasmi H. Al Mousa
Academic Rank :Assistant Professor
Office No :1541
Phone :
Department :Software Engineering
Email :mmousa@zu.edu.jo
CV

 
Qualifications
Bachelor : Zarqa Private University Date :
Master : AABFS Date :
Ph.D. : USM Date :
Research - Journals
Mohammad Rasmi , AIA: Attack Intention Analysis Algorithm Based on D-S Theory with Causal Technique for Network Forensics - A Case Study, International Journal of Digital Content Technolog , Vol. 5, No. 9, pp. 230 ~ 237
09/01/2011
In network forensics, attack intention analyses play a major role in accelerating the decision– making process for apprehending the real perpetrator. In fact, attack intention analysis is a prediction factor to help investigators conclude a case with high accuracy. However, current techniques in att

Mohammad rasmi , Attack Intention Analysis Model for Network Forensics, ,
01/01/2011
Abstract In network forensics, attack intentions analyses play a major role to help and accelerate decision-making for apprehending the real perpetrator. In fact, attack intention analysis is a prediction factor to help investigators to conclude a case with high accuracy. However, current techniques in attack intention analysis only focus on recognizing an alert correlation for certain evidence and predicting future attacks. In reality, more prediction factors should be used by the inv

Mohammad rasmi , A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics, , 336-346
01/01/2012
Abstract Attack analysis acts as a center of gravity in network forensics to resolve the cyber crime cases. Nowadays, the cyber crime strategies have increasingly become more complicated in the digital world. This paper proposes a new model to estimate the similar attack strategy with others. The model uses a cosine similarity method, and it depends on the attack of intention analysis as an effected factor to identify the similar attack strategy. The probability values of accuracy dete

Mohammad Rasmi , Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis, International Journal of Security and Its Applicat , Vol. 10, No. 5 (2016) pp.297-308
05/01/2016
The increasing amount of cyber crimes has motivated network forensics researchers to develop new techniques to analyze and investigate these crimes. Reconstructing useful evidence of a cybercrime is difficult due to the vagueness of the analysis phase processes. The analysis phase is challenging because it provides detailed information on the intention and strategy of the attack. This paper aims to show the importance of reconstructing attack intentions in order to improve the analysis phase in

Conferences
Experiences