default search action
Izzat Alsmadi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j71]Gongbo Liang, Mohammad Salem Atoum, Xin Xing, Izzat Alsmadi:
Benchmark assessment for the DeepSpeed acceleration library on image classification. Clust. Comput. 27(3): 2959-2970 (2024) - [j70]Rasheed Ahmad, Izzat Alsmadi:
Data fusion and network intrusion detection systems. Clust. Comput. 27(6): 7493-7519 (2024) - [j69]Izzat Alsmadi, Natalie Manaeva Rice, Michael J. O'Brien:
Fake or not? Automated detection of COVID-19 misinformation and disinformation in social networks and digital media. Comput. Math. Organ. Theory 30(3): 187-205 (2024) - [c54]Janet Zulu, Bonian Han, Izzat Alsmadi, Gongbo Liang:
Enhancing Machine Learning Based SQL Injection Detection Using Contextualized Word Embedding. ACM Southeast Regional Conference 2024: 211-216 - [c53]Alaa Alhowaide, Izzat Alsmadi, Belal Alsinglawi:
Ensemble-based Cyber Intrusion Detection for Robust Smart City Protection. DCOSS-IoT 2024: 124-129 - [c52]Lucy Tsado, Camille Gibson, Izzat Alsmadi, Janaya Bob:
Cyber Ready Rural: Understanding Law Enforcement Cyber Readiness. ISDFS 2024: 1-5 - [i16]Mohammad Al-Ramahi, Izzat Alsmadi, Abdullah Wahbeh:
Predicting Question Quality on StackOverflow with Neural Networks. CoRR abs/2404.14449 (2024) - [i15]Garrett Crumrine, Izzat Alsmadi, Jesus Guerrero, Yuvaraj Munian:
Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models. CoRR abs/2406.00628 (2024) - [i14]Ramya Jonnala, Gongbo Liang, Jeong Yang, Izzat Alsmadi:
Using Large Language Models in Public Transit Systems, San Antonio as a case study. CoRR abs/2407.11003 (2024) - 2023
- [j68]Ayham Alomari, Ahmad Sami Al-Shamayleh, Norisma Idris, Aznul Qalid Md Sabri, Izzat Alsmadi, Danah Omary:
Warm-Starting for Improving the Novelty of Abstractive Summarization. IEEE Access 11: 112483-112501 (2023) - [j67]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
Zero-day attack detection: a systematic literature review. Artif. Intell. Rev. 56(10): 10733-10811 (2023) - [j66]Alaa Alhowaide, Izzat Alsmadi, Jian Tang:
Towards the design of real-time autonomous IoT NIDS. Clust. Comput. 26(5): 2489-2502 (2023) - [j65]Khalid M. O. Nahar, Izzat Alsmadi, Rabia Emhamed Al Mamlook, Ahmad Nasayreh, Hasan Gharaibeh, Ali Saeed Almuflih, Fahad Alasim:
Recognition of Arabic Air-Written Letters: Machine Learning, Convolutional Neural Networks, and Optical Character Recognition (OCR) Techniques. Sensors 23(23): 9475 (2023) - [j64]Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, Firoj Alam, Ala I. Al-Fuqaha, Abdallah Khreishah, Abdulelah Abdallah Algosaibi:
Adversarial NLP for Social Network Applications: Attacks, Defenses, and Research Directions. IEEE Trans. Comput. Soc. Syst. 10(6): 3089-3108 (2023) - [c51]Izzat Alsmadi, Lucy Tsado, Camille Gibson:
Towards Cyber Readiness Assessment in Rural Areas. ACR 2023: 630-639 - [c50]Yunpeng Zhang, Izzat Alsmadi, Yi Qi, Zhixia Richard Li:
Trust Management and Attribute-Based Access Control Framework for Protecting Maritime Cyber Infrastructure. ICSOFT 2023: 534-539 - [i13]Alaa Alhowaide, Izzat Alsmadi, Jian Tang:
Balanced Datasets for IoT IDS. CoRR abs/2301.04008 (2023) - [i12]Gongbo Liang, Jesus Guerrero, Izzat Alsmadi:
Mutation-Based Adversarial Attacks on Neural Text Detectors. CoRR abs/2302.05794 (2023) - [i11]Brian Kishiyama, Izzat Alsmadi:
A Review on Searchable Encryption Functionality and the Evaluation of Homomorphic Encryption. CoRR abs/2312.14434 (2023) - 2022
- [j63]Izzat Alsmadi, Nura Aljaafari, Mahmoud Nazzal, Shadan Alhamed, Ahmad H. Sawalmeh, Conrado P. Vizcarra, Abdallah Khreishah, Muhammad Anan, Abdulelah Abdallah Algosaibi, Mohammed Abdulaziz Al Naeem, Adel Aldalbahi, Abdulaziz Al-Humam:
Adversarial Machine Learning in Text Processing: A Literature Survey. IEEE Access 10: 17043-17077 (2022) - [j62]Yousef O. Sharrab, Izzat Alsmadi, Nabil J. Sarhan:
Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective function. Clust. Comput. 25(1): 231-247 (2022) - [j61]Izzat Alsmadi, Zyad Dwekat, Ricardo Cantu, Bilal Al-Ahmad:
Vulnerability assessment of industrial systems using Shodan. Clust. Comput. 25(3): 1563-1573 (2022) - [j60]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
Towards building data analytics benchmarks for IoT intrusion detection. Clust. Comput. 25(3): 2125-2141 (2022) - [j59]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
A comprehensive deep learning benchmark for IoT IDS. Comput. Secur. 114: 102588 (2022) - [j58]Sonam Sharma, Izzat Alsmadi, Rami S. Alkhawaldeh, Bilal Al-Ahmad:
Data-driven analysis and predictive modeling on COVID-19. Concurr. Comput. Pract. Exp. 34(28) (2022) - [j57]Ayham Alomari, Norisma Idris, Aznul Qalid Md Sabri, Izzat Alsmadi:
Deep reinforcement and transfer learning for abstractive text summarization: A review. Comput. Speech Lang. 71: 101276 (2022) - [j56]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks. J. Inf. Secur. Appl. 67: 103196 (2022) - [j55]Kevin Martin, Mohamed Rahouti, Moussa Ayyash, Izzat Alsmadi:
Anomaly detection in blockchain using network representation and machine learning. Secur. Priv. 5(2) (2022) - [c49]Mohammad Al-Ramahi, Izzat Alsmadi, Daniel Delgado, Young Lee:
Prediction and Analysis of Bus Adherence to Scheduled Times: San Antonio Transit System. AMCIS 2022 - [c48]Izzat Alsmadi, Lo'ai Tawalbeh:
New Waves of Cyber Attacks in the Time of COVID19. Honoring Professor Mohammad S. Obaidat 2022: 617-630 - [c47]Chuck Easttom, Izzat Alsmadi:
A Comparitive Study of Machine Learning Algorithms for Identifying Mental States from EEG Recordings. CCWC 2022: 644-648 - [c46]Lo'ai Ali Tawalbeh, Michael Alicea, Izzat Alsmadi:
New and Efficient Lightweight Cryptography Algorithm for Mobile and Web Applications. FNC/MobiSPC/SEIT 2022: 111-118 - [c45]Mohammed Ali Kunda, Izzat Alsmadi:
Practical web security testing: Evolution of web application modules and open source testing tools. IDSTA 2022: 152-155 - [c44]Izzat Alsmadi, Bilal Al-Ahmad, Mohammad Alsmadi:
Malware analysis and multi-label category detection issues: Ensemble-based approaches. IDSTA 2022: 164-169 - [c43]Ahmad Al-Omari, Andrew Allhusen, Abdullah Wahbeh, Mohammad Al-Ramahi, Izzat Alsmadi:
Dark Web Analytics: A Comparative Study of Feature Selection and Prediction Algorithms. IDSTA 2022: 170-175 - [e2]Mohammad A. Alsmirat, Moayad Aloqaily, Yaser Jararweh, Izzat Alsmadi:
Fourth International Conference on Blockchain Computing and Applications, BCCA 2022, San Antonio, TX, USA, September 5-7, 2022. IEEE 2022, ISBN 978-1-6654-9958-3 [contents] - [e1]Mohammad A. Alsmirat, Yaser Jararweh, Moayad Aloqaily, Izzat Alsmadi:
3rd International Conference on Intelligent Data Science Technologies and Applications, IDSTA 2022, San Antonio, TX, USA, September 5-7, 2022. IEEE 2022, ISBN 978-1-6654-9960-6 [contents] - [i10]Gongbo Liang, Izzat Alsmadi:
Benchmark Assessment for DeepSpeed Optimization Library. CoRR abs/2202.12831 (2022) - [i9]Jesus Guerrero, Izzat Alsmadi:
Synthetic Text Detection: Systemic Literature Review. CoRR abs/2210.06336 (2022) - [i8]Jesus Guerrero, Gongbo Liang, Izzat Alsmadi:
A Mutation-based Text Generation for Adversarial Machine Learning Applications. CoRR abs/2212.11808 (2022) - 2021
- [j54]Issa Atoum, Mahmoud Khalid Baklizi, Izzat Alsmadi, Ahmed Ali Otoom, Taha Alhersh, Jafar Ababneh, Jameel Almalki, Saeed Masoud Alshahrani:
Challenges of Software Requirements Quality Assurance and Validation: A Systematic Literature Review. IEEE Access 9: 137613-137634 (2021) - [j53]Michael Alicea, Izzat Alsmadi:
Misconfiguration in Firewalls and Network Access Controls: Literature Review. Future Internet 13(11): 283 (2021) - [j52]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
Models versus Datasets: Reducing Bias through Building a Comprehensive IDS Benchmark. Future Internet 13(12): 318 (2021) - [j51]Izzat Alsmadi, Ahmed Aleroud, Ahmad A. Saifan:
Fault-based testing for discovering SQL injection vulnerabilities in web applications. Int. J. Inf. Comput. Secur. 16(1/2): 51-62 (2021) - [j50]Rasheed Ahmad, Izzat Alsmadi:
Machine learning approaches to IoT security: A systematic literature review. Internet Things 14: 100365 (2021) - [j49]Alaa Alhowaide, Izzat Alsmadi, Jian Tang:
Ensemble Detection Model for IoT IDS. Internet Things 16: 100435 (2021) - [c42]Yousef O. Sharrab, Sana'a Al-shboul, Mohammad A. Alsmirat, Alá F. Khalifeh, Zyad Dwekat, Izzat Alsmadi, Ahmad Al-Khasawneh:
Performance Comparison of Several Deep Learning-Based Object Detection Algorithms Utilizing Thermal Images. IDSTA 2021: 16-22 - [c41]Rayah Al-Qurashi, Ahmed Aleroud, Ahmad A. Saifan, Mohammad Alsmadi, Izzat Alsmadi:
Generating Optimal Attack Paths in Generative Adversarial Phishing. ISI 2021: 1-6 - [c40]Alexander O'Mara, Izzat Alsmadi, Ahmed Aleroud:
Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages. ISPA/BDCloud/SocialCom/SustainCom 2021: 1657-1662 - [i7]Izzat Alsmadi:
Adversarial Machine Learning in Text Analysis and Generation. CoRR abs/2101.08675 (2021) - [i6]Izzat Alsmadi, Iyad Alazzam, Mohammad Aref Al-Ramahi:
An ontological analysis of misinformation in online social networks. CoRR abs/2102.11362 (2021) - [i5]Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, Firoj Alam, Ala I. Al-Fuqaha, Abdallah Khreishah, Abdulelah Abdallah Algosaibi:
Adversarial Attacks and Defenses for Social Network Text Processing Applications: Techniques, Challenges and Future Research Directions. CoRR abs/2110.13980 (2021) - [i4]Izzat Alsmadi, Michael J. O'Brien:
Event Detection in Twitter: A Content and Time-Based Analysis. CoRR abs/2111.05274 (2021) - 2020
- [j48]Izzat Alsmadi, Muhammad Al-Abdullah:
A model for reputation rank in online social networks and its applications. Int. J. Soc. Netw. Min. 3(1): 77-98 (2020) - [j47]Izzat Alsmadi, Michael J. O'Brien:
How Many Bots in Russian Troll Tweets? Inf. Process. Manag. 57(6): 102303 (2020) - [j46]Hassan Najadat, Ahmad Alaiad, Sanaa Abu Alasal, Ghadeer Anwar Mrayyan, Izzat Alsmadi:
Integration of Data Envelopment Analysis and Clustering Methods. J. Inf. Knowl. Manag. 19(1): 2040006:1-2040006:19 (2020) - [j45]Izzat Alsmadi, Z. W. Taylor, Joshua Childs:
U.S. News & World Report Best Colleges rankings: Which institutional metrics contribute to sustained stratification? Scientometrics 124(3): 1851-1869 (2020) - [c39]Hisham Al-Mubaid, Izzat Alsmadi:
Analysis and Prediction of COVID-19 Timeline and Infection Rates. ASONAM 2020: 792-797 - [c38]Kevin Martin, Izzat Alsmadi, Mohamed Rahouti, Moussa Ayyash:
Combining Blockchain and Machine Learning to Forecast Cryptocurrency Prices. BCCA 2020: 52-58 - [c37]Johnathan Tai, Izzat Alsmadi, Yunpeng Zhang, Fengxiang Qiao:
Machine Learning Methods for Anomaly Detection in Industrial Control Systems. IEEE BigData 2020: 2333-2339 - [c36]Julia Thee, Izzat Alsmadi, Samer Al-khateeb:
Pro-ISIS Tweets Analysis Using Machine Learning Techniques. IEEE BigData 2020: 4351-4358 - [c35]Izzat Alsmadi, Zaid Almubaid, Hisham Al-Mubaid:
Disease Outbreak Detection Using Search Keywords Patterns. CATA 2020: 362-371 - [c34]Alaa Alhowaide, Izzat Alsmadi, Jian Tang:
An Ensemble Feature Selection Method for IoT IDS. DependSys 2020: 41-48 - [c33]Mohammad Aref Al-Ramahi, Izzat Alsmadi:
Using Data Analytics to Filter Insincere Posts from Online Social Networks A Case Study: Quora Insincere Questions. HICSS 2020: 1-9 - [c32]Mohammad Aref Al-Ramahi, Izzat Alsmadi, Joshua Davenport:
Exploring hackers assets: topics of interest as indicators of compromise. HotSoS 2020: 5:1-5:4 - [c31]Samer Y. Khamaiseh, Izzat Alsmadi, Abdullah S. Al-Alaj:
Deceiving Machine Learning-Based Saturation Attack Detection Systems in SDN. NFV-SDN 2020: 44-50 - [c30]Izzat Alsmadi, Anis Zarrad, Abdulrahmane Yassine:
Mutation Testing to Validate Networks Protocols. SysCon 2020: 1-8 - [c29]Anis Zarrad, Izzat Alsmadi, Abdulrahmane Yassine:
Mutation Testing Framework for Ad-hoc Networks Protocols. WCNC 2020: 1-8 - [i3]Ramesh Narasimman, Izzat Alsmadi:
RBAC for Healthcare-Infrastructure and data storage. CoRR abs/2010.11096 (2020)
2010 – 2019
- 2019
- [j44]Anis Zarrad, Izzat Alsmadi, Abdulaziz Aljaloud:
A Near Real-Time Approach for Sentiment Analysis Approach Using Arabic Tweets. J. Comput. 14(10): 596-614 (2019) - [c28]Izzat Alsmadi, Muhammad Al-Abdullah, Hisham Alsmadi:
Popular Search Terms and Stock Price Prediction. IEEE BigData 2019: 2107-2112 - [c27]Izzat Alsmadi, Rand Obeidat:
Users' Internet Searches as Proxies for Disease Escalation Trends. CHASE 2019: 64-68 - [c26]Izzat Alsmadi, Mahmoud Al-Ayyoub, Mohammad A. Alsmirat, Yaser Jararweh:
Using Popular Search Terms in Stock Price Prediction. SNAMS 2019: 279-285 - [c25]Areej Albataineh, Izzat Alsmadi:
IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries. WOWMOM 2019: 1-5 - 2018
- [j43]Izzat Alsmadi, Abdallah Khreishah, Dianxiang Xu:
Network slicing to improve multicasting in HPC clusters. Clust. Comput. 21(3): 1493-1506 (2018) - [j42]Majdi Maabreh, Hafez Irshid, Ajay Gupta, Izzat Alsmadi:
A multithreading and hashing technique for indexing Target-Decoy peptides databases. Concurr. Comput. Pract. Exp. 30(9) (2018) - [j41]Izzat Alsmadi, Mohammad Zarour:
Google n-gram viewer does not include arabic corpus! towards n-gram viewer for arabic corpus. Int. Arab J. Inf. Technol. 15(5): 785-794 (2018) - [j40]Mohammed Al-Kabi, Izzat Alsmadi, Rawan T. Khasawneh, Heider Wahsheh:
Evaluating social context in arabic opinion mining. Int. Arab J. Inf. Technol. 15(6): 974-982 (2018) - [j39]Abdulrahman Al-Molegi, Izzat Alsmadi, Antoni Martínez-Ballesté:
Regions-of-interest discovering and predicting in smartphone environments. Pervasive Mob. Comput. 47: 31-53 (2018) - [c24]Yunpeng Zhang, Fengxiang Qiao, Izzat Alsmadi, Qing Li:
Interactive based Access Control Framework for Connected Vehicle Communication. ICCA 2018: 393-398 - [c23]Izzat Alsmadi, Zachary Taylor:
Examining University Ranking Metrics: Articulating Issues of Size and Web Dependency. ICCBD 2018: 73-77 - 2017
- [j38]Izzat Alsmadi, Saïd Bettayeb:
Protein interaction based features' extraction. Int. J. Bioinform. Res. Appl. 13(3): 200-213 (2017) - [j37]Mohammed Akour, Izzat Alsmadi, Iyad Alazzam:
Software fault proneness prediction: a comparative study between bagging, boosting, and stacking ensemble and base learner methods. Int. J. Data Anal. Tech. Strateg. 9(1): 1-16 (2017) - [j36]Anis Zarrad, Izzat Alsmadi:
Evaluating network test scenarios for network simulators systems. Int. J. Distributed Sens. Networks 13(10) (2017) - [j35]Ahmed Aleroud, Izzat Alsmadi:
Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach. J. Netw. Comput. Appl. 80: 152-164 (2017) - [c22]Majdi Maabreh, Ajay Gupta, Izzat Alsmadi:
Towards Centralized MS/MS Spectra Preprocessing: An Empirical Evaluation of Peptides Search Engines using Ground Truth Datasets. BIBE 2017: 194-199 - [c21]Majdi Maabreh, Basheer Qolomany, James R. Springstead, Izzat Alsmadi, Ajay Gupta:
Deep vs. shallow learning-based filters of MS/MS spectra in support of protein search engines. BIBM 2017: 1175-1182 - [c20]Majdi Maabreh, Basheer Qolomany, Izzat Alsmadi, Ajay Gupta:
Deep learning-based MSMS spectra reduction in support of running multiple protein search engines on cloud. BIBM 2017: 1909-1914 - 2016
- [j34]Izzat Alsmadi, Emad Abu-Shanab:
E-government website security concerns and citizens' adoption. Electron. Gov. an Int. J. 12(3): 243-255 (2016) - [j33]Mohammed Al-Kabi, Mahmoud Al-Ayyoub, Izzat Alsmadi, Heider Wahsheh:
A prototype for a standard arabic sentiment analysis corpus. Int. Arab J. Inf. Technol. 13(1A): 163-170 (2016) - [j32]Feras Hanandeh, Mohammed Akour, Essam Al-Daoud, Izzat Alsmadi:
KP-Trie algorithm for update and search operations. Int. Arab J. Inf. Technol. 13(6) (2016) - [j31]Izzat Alsmadi:
The integration of access control levels based on SDN. Int. J. High Perform. Comput. Netw. 9(4): 281-290 (2016) - [j30]Mohammed Al-Kabi, Heider Wahsheh, Izzat Mahmoud Alsmadi:
Polarity Classification of Arabic Sentiments. Int. J. Inf. Technol. Web Eng. 11(3): 32-49 (2016) - [c19]Mohammed Naji Al-Kabi, Areej A. Al-Qwaqenah, Amal H. Gigieh, Kholoud Alsmearat, Mahmoud Al-Ayyoub, Izzat Mahmoud Alsmadi:
Building a standard dataset for Arabie sentiment analysis: Identifying potential annotation pitfalls. AICCSA 2016: 1-6 - [c18]Izzat Alsmadi, Iyad Alazzam:
Websites' Input Validation and Input-Misuse-Based Attacks. CCC 2016: 113-116 - [c17]Jin-Hee Cho, Izzat Alsmadi, Dianxiang Xu:
Privacy and Social Capital in Online Social Networks. GLOBECOM 2016: 1-7 - [c16]Izzat Alsmadi, Dianxiang Xu, Jin-Hee Cho:
Interaction-based Reputation Model in Online Social Networks. ICISSP 2016: 265-272 - [c15]Ahmad AlEroud, Izzat Alsmadi:
Identifying DoS attacks on software defined networks: A relation context approach. NOMS 2016: 853-857 - 2015
- [j29]Izzat Alsmadi, Dianxiang Xu:
Security of Software Defined Networks: A survey. Comput. Secur. 53: 79-108 (2015) - [j28]Feras Ahmad Hanandeh, Izzat Alsmadi, Majdi Yousef Al-Shannag, Essam Al-Daoud:
Mobile agents modelling using UML. Int. J. Bus. Inf. Syst. 19(4): 419-432 (2015) - [j27]Mahmoud Al-Ayyoub, Safa Bani Essa, Izzat Alsmadi:
Lexicon-based sentiment analysis of Arabic tweets. Int. J. Soc. Netw. Min. 2(2): 101-114 (2015) - [j26]Izzat Alsmadi, Ikdam Alhami:
Clustering and classification of email contents. J. King Saud Univ. Comput. Inf. Sci. 27(1): 46-57 (2015) - [j25]Mohammed Naji Al-Kabi, Saif A. Kazakzeh, Belal Abu Ata, Saif A. Ahmad Alrababah, Izzat Mahmoud Alsmadi:
A novel root based Arabic stemmer. J. King Saud Univ. Comput. Inf. Sci. 27(2): 94-103 (2015) - [j24]Mohammed Naji Al-Kabi, Izzat Mahmoud Alsmadi, Heider A. Wahsheh:
Evaluation of Spam Impact on Arabic Websites Popularity. J. King Saud Univ. Comput. Inf. Sci. 27(2): 222-229 (2015) - [j23]Izzat Alsmadi, Mohammad Zarour:
Building an Islamic financial information system based on policy managements. J. King Saud Univ. Comput. Inf. Sci. 27(4): 364-375 (2015) - [c14]Izzat Alsmadi, Milson Munakami, Dianxiang Xu:
Model-Based Testing of SDN Firewalls: A Case Study. TSA 2015: 81-88 - 2014
- [j22]Arwa Abu Asad, Izzat Alsmadi:
Evaluating the impact of software metrics on defects prediction. Part 2. Comput. Sci. J. Moldova 22(1): 127-144 (2014) - [c13]Yaser Jararweh, Izzat Alsmadi, Mahmoud Al-Ayyoub, Darrel Jenerette:
The analysis of large-scale climate data: Jordan case study. AICCSA 2014: 288-294 - [c12]Bassam Arkok, Mahmoud Al-Ayyoub, Yaser Jararweh, Izzat Alsmadi, Elhadj Benkhelifa:
Collaboration Networks of Levantine Biomedical Researchers. UCC 2014: 658-663 - [c11]Anis Zarrad, Abdulaziz Jaloud, Izzat Alsmadi:
The Evaluation of the Public Opinion - A Case Study: MERS-CoV Infection Virus in KSA. UCC 2014: 664-670 - 2013
- [j21]Izzat Alsmadi, Maryam S. Nuser:
Evaluation of Cost Estimation Metrics: Towards a Unified Terminology. J. Comput. Inf. Technol. 21(1): 25-36 (2013) - [j20]Arwa Abu Asad, Izzat Alsmadi:
Design and code coupling assessment based on defects prediction. Part 1. Comput. Sci. J. Moldova 21(2): 204-224 (2013) - [j19]Izzat Alsmadi, Saqib Saeed:
A software development process for open source and open competition projects. Int. J. Bus. Inf. Syst. 12(1): 110-122 (2013) - [j18]Yahya M. Tashtoush, Derar Darwish, Motasim Albdarneh, Izzat Alsmadi, Khalid Alkhatib:
A Business Classifier to Detect Readability Metrics on Software Games and Their Types. Int. J. E Entrepreneurship Innov. 4(4): 47-57 (2013) - [j17]Sawsan Nusir, Izzat Alsmadi, Mohammed Al-Kabi, Fatima Sharadgah:
The use of educational games for learning basic math skills in early classes. Int. J. Soc. Media Interact. Learn. Environ. 1(2): 213-220 (2013) - [j16]Izzat Alsmadi, Mohammed Naji Al-Kabi, Heider Wahsheh, Bassima Bassam:
Video spam and public opinion in current Middle Eastern conflicts. Int. J. Soc. Netw. Min. 1(3/4): 318-333 (2013) - [j15]Izzat Mahmoud Alsmadi:
Using Mutation to Enhance GUI Testing Coverage. IEEE Softw. 30(1): 67-73 (2013) - [c10]Rawan T. Khasawneh, Heider Wahsheh, Mohammed Al-Kabi, Izzat Mahmoud Alsmadi:
Sentiment analysis of arabic social media content: a comparative study. ICITST 2013: 101-106 - 2012
- [j14]Izzat Alsmadi:
Using Test Case Mutation to Evaluate the Model of the User Interface. Comput. Sci. J. Moldova 20(1): 82-106 (2012) - [j13]Feras Hanandeh, Emad E. Abdallah, Sahar Idwan, Izzat Alsmadi:
Checking the efficiency of integrity tests in distributed and parallel database. Int. J. Bus. Inf. Syst. 11(2): 235-252 (2012) - [j12]Yahya M. Tashtoush, Aisha Zaidan, Izzat Alsmadi:
Implications for Website Trust and Credibility Assessment. Int. J. E Entrepreneurship Innov. 3(4): 17-33 (2012) - [j11]Izzat Alsmadi, Mohammed Al-Kabi, Abdullah Wahbeh:
A Conceptual Organization for Websites Metrics and E-Government Websites: A Case Study. Int. J. Inf. Commun. Technol. Hum. Dev. 4(1): 93-117 (2012) - [j10]Mohammed Al-Kabi, Heider Wahsheh, Izzat Alsmadi, Emad Al-Shawakfa, Abdullah Wahbeh, Ahmed Al-Hmoud:
Content-based analysis to detect Arabic web spam. J. Inf. Sci. 38(3): 284-296 (2012) - [j9]Majdi Maabreh, Mohammed Al-Kabi, Izzat Mahmoud Alsmadi:
Query classification and study of university students' search trends. Program 46(2): 220-241 (2012) - [c9]Ahmad Eyadat, Izzat Alsmadi:
Automatic Coverage Evaluation for a Medical Expert System. ITNG 2012: 867-872 - [i2]Abdulrahman Al Molijy, Ismail Hmeidi, Izzat Alsmadi:
Indexing of Arabic documents automatically based on lexical analysis. CoRR abs/1205.1602 (2012) - [i1]Iyad Abu Doush, Faisal Alkhateeb, Eslam Al Maghayreh, Izzat Alsmadi, Samer Samarah:
Annotations, Collaborative Tagging, and Searching Mathematics in E-Learning. CoRR abs/1211.1780 (2012) - 2011
- [j8]Izzat Alsmadi, Hassan Najadat:
Evaluating the change of software fault behavior with dataset attributes based on categorical correlation. Adv. Eng. Softw. 42(8): 535-546 (2011) - [j7]Izzat Alsmadi, Mohammed Al-Kabi:
GUI structural metrics. Int. Arab J. Inf. Technol. 8(2): 124-129 (2011) - [j6]Abdullah Wahbeh, Mohammed Al-Kabi, Qasem A. Al-Radaideh, Emad Al-Shawakfa, Izzat Alsmadi:
The Effect of Stemming on Arabic Text Classification: An Empirical Study. Int. J. Inf. Retr. Res. 1(3): 54-70 (2011) - [j5]Ahmed F. Al-Eroud, Mohammad Aref Al-Ramahi, Mohammed Al-Kabi, Izzat Mahmoud Alsmadi, Emad Al-Shawakfa:
Evaluating Google queries based on language preferences. J. Inf. Sci. 37(3): 282-292 (2011) - 2010
- [j4]Muhannad Anwar Al-Shboul, Izzat Alsmadi:
Jordan E-Government Challenges and Progresses. Int. J. Adv. Corp. Learn. 3(1): 37-41 (2010) - [j3]Muhannad Anwar Al-Shboul, Izzat Alsmadi:
Challenges of Utilizing E-Learning Systems in Public Universities in Jordan. Int. J. Emerg. Technol. Learn. 5(1): 4-10 (2010) - [j2]Muhannad Anwar Al-Shboul, Izzat Mahmoud Alsmadi:
Building an e-Commerce Infrastructure in Jordan: Challenges and Requirements. Int. J. Interact. Mob. Technol. 4(4): 18-24 (2010) - [j1]Izzat Alsmadi:
The Automatic Evaluation of Website Metrics and State. Int. J. Web Based Learn. Teach. Technol. 5(4): 1-17 (2010) - [c8]Izzat Alsmadi:
Using genetic algorithms for test case generation and selection optimization. CCECE 2010: 1-4
2000 – 2009
- 2009
- [c7]Izzat Mahmoud Alsmadi, Mahmoud Dieri:
Separation of Concerns in Teaching Software Engineering. SCSS 2009: 29-38 - 2008
- [c6]Izzat Alsmadi:
The Utilization of User Sessions in Testing. ACIS-ICIS 2008: 581-585 - [c5]Izzat Alsmadi, Hassan Najadat:
Using XML Trees to Represent GUI States. Software Engineering Research and Practice 2008: 714-717 - 2007
- [c4]Dianxiang Xu, Izzat Alsmadi, Weifeng Xu:
Model Checking Aspect-Oriented Design Specification. COMPSAC (1) 2007: 491-500 - [c3]Izzat Alsmadi, Kenneth Magel:
GUI Test Automation Framework. Software Engineering Research and Practice 2007: 354-359 - [c2]Izzat Alsmadi, Kenneth Magel:
GUI Path Oriented Test Case Generation. SETP 2007: 21-28 - 2006
- [c1]Izzat Alsmadi, Kenneth Magel:
Open Source Evolution Analysis. ICSM 2006: 276-278
Coauthor Index
aka: Mohammed Naji Al-Kabi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint