default search action
Qutaibah Althebyan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Dheya Mustafa, Intisar Ghazi Mustafa, Samah Zriqat, Qutaibah Althebyan:
MIRNA: adaptive 3D game to assist children's distance learning difficulties; design and teachers' intention to use. Int. Arab J. Inf. Technol. 20(3A): 527-535 (2023) - [j13]Rami Mohawesh, Sumbal Maqsood, Qutaibah Althebyan:
Multilingual deep learning framework for fake news detection using capsule neural network. J. Intell. Inf. Syst. 60(3): 655-671 (2023) - [c16]Dheya Mustafa, Samah Zriqat, Intisar Ghazi Mustafa, Qutaibah Althebyan:
The Impact of Middle and High School Students Participation in the Innovation Nation Competition on Their Education. ACIT 2023: 1-6 - [c15]Safaa M. Khabour, Dheya Mustafa, Qutaibah Althebyan:
Arabic Sentiment Analysis of Mobile Banking Services Reviews. SNAMS 2023: 1-8 - 2022
- [j12]Ahmad Shatnawi, Abderraouf Drine, Mohammad Al-Zinati, Qutaibah Althebyan:
Analyzing the effect of driving speed on the performance of roundabouts. Int. Arab J. Inf. Technol. 19(3A): 514-522 (2022) - [c14]Dheya Mustafa, Intisar Ghazi Mustafa, Samah Zriqat, Qutaibah Althebyan:
Smart Assistive 3D Tool to Remedy Children's Learning Difficulties for Distance Education. ACIT 2022: 1-5 - [c13]Muzamil Ahmed, Hikmat Ullah Khan, Saqib Iqbal, Qutaibah Althebyan:
Automated Question Answering based on Improved TF-IDF and Cosine Similarity. SNAMS 2022: 1-6 - 2021
- [j11]Raed Shatnawi, Qutaibah Althebyan, Baraq Ghaleb, Mohammed Al-Maolegi:
A Student Advising System Using Association Rule Mining. Int. J. Web Based Learn. Teach. Technol. 16(3): 65-78 (2021) - [c12]Ahmad Shatnawi, Abderraouf Drine, Mohammad Al-Zinati, Qutaibah Althebyan:
Simulation study of speed control at congested arms of roundabouts. ACIT 2021: 1-5 - [c11]Amber Urooj, Hikmat Ullah Khan, Saqib Iqbal, Qutaibah Althebyan:
On Prediction of Research Excellence using Data Mining and Deep Learning Techniques. SNAMS 2021: 1-6 - 2020
- [j10]Qutaibah Althebyan:
Mitigating insider threats on the edge: a knowledgebase approach. Int. Arab J. Inf. Technol. 17(4A): 621-628 (2020) - [j9]Qutaibah Althebyan, Yaser Jararweh, Qussai Yaseen, Rami Mohawesh:
A knowledgebase insider threat mitigation model in the cloud: a proactive approach. Int. J. Adv. Intell. Paradigms 15(4): 417-436 (2020)
2010 – 2019
- 2019
- [j8]Mohammad Al-Zinati, Qutaibah Althebyan, Yaser Jararweh:
An agent-Based self-organizing model for large-scale biosurveillance systems using mobile edge computing. Simul. Model. Pract. Theory 93: 65-86 (2019) - [c10]Hassan Najadat, Qutaibah Althebyan, Yasmin Al-Omary:
Higher Education Units Assessment Based on Data Envelopment Analysis and Clustering Techniques. ACIT 2019: 171-177 - [c9]Qutaibah Althebyan:
A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach. ACIT 2019: 188-192 - [c8]Huthifh Al-Rushdan, Mohammad Shurman, Sharhabeel H. Alnabelsi, Qutaibah Althebyan:
Zero-Day Attack Detection and Prevention in Software-Defined Networks. ACIT 2019: 278-282 - 2018
- [c7]Mohammad Al-Zinati, Qutaibah Althebyan, Yaser Jararweh:
An Agent Based Model for Health Surveillance Systems and Early Biological Threat Detection. FiCloud 2018: 55-62 - 2017
- [j7]Qussai Yaseen, Yaser Jararweh, Brajendra Panda, Qutaibah Althebyan:
An insider threat aware access control for cloud relational databases. Clust. Comput. 20(3): 2669-2685 (2017) - [j6]Qutaibah Althebyan, Omar AlQudah, Yaser Jararweh, Qussai Yaseen:
A scalable Map Reduce tasks scheduling: a threading-based approach. Int. J. Comput. Sci. Eng. 14(1): 44-54 (2017) - 2016
- [j5]Qutaibah Althebyan, Qussai Yaseen, Yaser Jararweh, Mahmoud Al-Ayyoub:
Cloud support for large scale e-healthcare systems. Ann. des Télécommunications 71(9-10): 503-515 (2016) - [j4]Mahmoud Al-Ayyoub, Mustafa Daraghmeh, Yaser Jararweh, Qutaibah Althebyan:
Towards improving resource management in cloud systems using a multi-agent framework. Int. J. Cloud Comput. 5(1/2): 112-133 (2016) - [j3]Qussai Yaseen, Qutaibah Althebyan, Brajendra Panda, Yaser Jararweh:
Mitigating insider threat in cloud relational databases. Secur. Commun. Networks 9(10): 1132-1145 (2016) - 2015
- [j2]Mahmoud Al-Ayyoub, Yaser Jararweh, Mustafa Daraghmeh, Qutaibah Althebyan:
Multi-agent based dynamic resource provisioning and monitoring for cloud computing systems infrastructure. Clust. Comput. 18(2): 919-932 (2015) - [j1]Qutaibah Althebyan, Yaser Jararweh, Qussai Yaseen, Omar AlQudah, Mahmoud Al-Ayyoub:
Evaluating map reduce tasks scheduling algorithms over cloud computing infrastructure. Concurr. Comput. Pract. Exp. 27(18): 5686-5699 (2015) - [c6]Qutaibah Althebyan, Rami Mohawesh, Qussai Yaseen, Yaser Jararweh:
Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability. ICITST 2015: 226-231 - 2014
- [i1]Raed Shatnawi, Qutaibah Althebyan, Baraq Ghalib, Mohammed Al-Maolegi:
Building A Smart Academic Advising System Using Association Rule Mining. CoRR abs/1407.1807 (2014) - 2013
- [c5]Qussai Yaseen, Qutaibah Althebyan, Yaser Jararweh:
PEP-side caching: An insider threat port. IRI 2013: 137-144
2000 – 2009
- 2008
- [c4]Qutaibah Althebyan, Brajendra Panda:
Performance analysis of an insider threat mitigation model. ICDIM 2008: 703-709 - [c3]Qutaibah Althebyan, Brajendra Panda:
A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. SEC 2008: 557-571 - [c2]Qutaibah Althebyan, Brajendra Panda:
Knowledge Extraction and Management for Insider Threat Mitigation. WOSIS 2008: 99-110 - 2005
- [c1]Qutaibah Althebyan, Henry Hexmoor:
A New Parameter for Maintaining Consistency in an Agent's Knowledge Base Using Truth Maintenance Systems. WRAC 2005: 53-64
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint