Home  |  Online Registration  |  eLearning  |  Contact Us  |  عربي  

Home >> CV

  CV    Sign In
Personal Information  
Name :Mohammad Rasmi H. Al Mousa
Academic Rank :Assistant Professor
Office No :1541
Phone :
Department :Software Engineering
Email :mmousa@zu.edu.jo

Bachelor : Zarqa Private University Date :
Master : AABFS Date :
Ph.D. : USM Date :
Research - Journals
Mohammad Rasmi , AIA: Attack Intention Analysis Algorithm Based on D-S Theory with Causal Technique for Network Forensics - A Case Study, International Journal of Digital Content Technolog , Vol. 5, No. 9, pp. 230 ~ 237
In network forensics, attack intention analyses play a major role in accelerating the decision– making process for apprehending the real perpetrator. In fact, attack intention analysis is a prediction factor to help investigators conclude a case with high accuracy. However, current techniques in att

Mohammad rasmi , Attack Intention Analysis Model for Network Forensics, ,
Abstract In network forensics, attack intentions analyses play a major role to help and accelerate decision-making for apprehending the real perpetrator. In fact, attack intention analysis is a prediction factor to help investigators to conclude a case with high accuracy. However, current techniques in attack intention analysis only focus on recognizing an alert correlation for certain evidence and predicting future attacks. In reality, more prediction factors should be used by the inv

Mohammad rasmi , A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics, , 336-346
Abstract Attack analysis acts as a center of gravity in network forensics to resolve the cyber crime cases. Nowadays, the cyber crime strategies have increasingly become more complicated in the digital world. This paper proposes a new model to estimate the similar attack strategy with others. The model uses a cosine similarity method, and it depends on the attack of intention analysis as an effected factor to identify the similar attack strategy. The probability values of accuracy dete

Mohammad Rasmi , Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis, International Journal of Security and Its Applicat , Vol. 10, No. 5 (2016) pp.297-308
The increasing amount of cyber crimes has motivated network forensics researchers to develop new techniques to analyze and investigate these crimes. Reconstructing useful evidence of a cybercrime is difficult due to the vagueness of the analysis phase processes. The analysis phase is challenging because it provides detailed information on the intention and strategy of the attack. This paper aims to show the importance of reconstructing attack intentions in order to improve the analysis phase in

- Mohammad Rasmi Al-Mousa , Analyzing Cyber-Attack Intention for Digital Forensics Using Case-Based Reasoning, International Journal of Advanced Trends in Comput , 8(6)
Cyber-attacks are increasing and varying dramatically day by day. It has become challenging to control cyber-attacks and to identify the perpetrators and their intentions. In general, the analysis of the intentions of cyber-attacks is one of the main challenges in digital forensics. In many cases of cyber-attacks, the analysis of the intent of the attacks determines the strategy and tools used in the attack, thus facilitating the process of identifying the perpetrator of the attack with greater
Full Text Paper PDF

- Mohammad Rasmi , Healthcare professionals’ acceptance Electronic Health Records system: Critical literature review (Jordan case study), International Journal of Healthcare Management , ISSN: 2047-9700, doi.org/10.1080/2047970
Recently, the security of digital images becomes an important issue with the rapid growth of digital communication and multimedia application. Recent cryptography algorithms are providing essential techniques to protect information and multimedia data. However, those algorithms are usually suffering from the problem of time-consuming. Encryption algorithms have been growth quickly and many image encryption methods have been used to protect information and multimedia data from unauthorized access
Full Text Paper PDF