default search action
Mohammad Al-Shurman
Person information
- affiliation: Jordan University of Science and Technology, Network Engineering and Security Department
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Omar Y. Al-Jarrah, Ahmed S. Shatnawi, Mohammad M. Shurman, Omar A. Ramadan, Sami Muhaidat:
Exploring Deep Learning-Based Visual Localization Techniques for UAVs in GPS-Denied Environments. IEEE Access 12: 113049-113071 (2024) - 2022
- [j13]Amin Jarrah, Mohammad Omar Alshiab, Mohammad M. Shurman:
High Performance Changeable Dynamic Gentle Random Early Detection (CDGRED) for Congestion Control at Router Buffer. Int. J. Grid High Perform. Comput. 14(1): 1-14 (2022) - 2021
- [j12]Rama Al-Share, Mohammad Shurman, Abdallah Y. Alma'aitah:
A Collaborative Learning-Based Algorithm for Task Offloading in UAV-Aided Wireless Sensor Networks. Comput. J. 64(10): 1575-1583 (2021) - 2020
- [j11]Mohammad M. Shurman, Rami M. Khrais, Abdulrahman A. Yateem:
DoS and DDoS attack detection using deep learning and IDS. Int. Arab J. Inf. Technol. 17(4A): 655-661 (2020) - [j10]Huthifh Al-Rushdan, Mohammad Shurman, Sharhabeel H. Alnabelsi:
On detection and prevention of zero-day attack using cuckoo sandbox in software-defined networks. Int. Arab J. Inf. Technol. 17(4A): 662-670 (2020) - [c22]Fatima Abu Akleek, Rawaa Alquraan, Mohammad Shurman:
Enhancement of WSN Network Lifetime. ICM 2020: 1-5 - [c21]Zainab Waleed Hussien, Doaa Sami Qawasmeh, Mohammad Shurman:
MSCLP: Multi-Sinks Cluster-Based Location Privacy Protection scheme in WSNs for IoT. ICM 2020: 1-4 - [c20]Raghad Al-Syouf, Mohammad Shurman, Abdallah Y. Alma'aitah, Sharhabeel H. Alnabelsi:
A Novel Gateway Selection Protocol for Three-layers Integrated Wireless Networks. IoTSMS 2020: 1-5 - [c19]Alaa Mheisn, Mohammad Shurman, Abdallah Y. Alma'aitah:
WSNB: Wearable Sensors with Neural Networks Located in a Base Station for IoT Environment. IoTSMS 2020: 1-4
2010 – 2019
- 2019
- [j9]Khalid A. Darabkh, Saja M. Odetallah, Zouhair Al-qudah, Alá F. Khalifeh, Mohammad M. Shurman:
Energy-Aware and Density-Based Clustering and Relaying Protocol (EA-DB-CRP) for gathering data in wireless sensor networks. Appl. Soft Comput. 80: 154-166 (2019) - [j8]Abdulmughni Y. Hamzah, Mohammad Shurman, Omar M. Al-Jarrah, Eyad Taqieddin:
Energy-Efficient Fuzzy-Logic-Based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks. Sensors 19(3): 561 (2019) - [c18]Mohammad Shurman, Wafaa Alkahla, Haya Hasan:
Priority-Based Channel Access for SAN Protocol in M2M Communication. ACIT 2019: 214-217 - [c17]Mohammad M. Shurman, Rami M. Khrais, Abdulrahman A. Yateem:
IoT Denial-of-Service Attack Detection and Prevention Using Hybrid IDS. ACIT 2019: 252-254 - [c16]Huthifh Al-Rushdan, Mohammad Shurman, Sharhabeel H. Alnabelsi, Qutaibah Althebyan:
Zero-Day Attack Detection and Prevention in Software-Defined Networks. ACIT 2019: 278-282 - 2016
- [j7]Mohammad Al-Shurman, Bilal Al-Shua'b:
N-BEB: New Binary Exponential Back-off Algorithm for IEEE 802.11. Ad Hoc Sens. Wirel. Networks 32(3-4): 301-317 (2016) - [j6]Mohammad M. Al-Shurman, Mamoun F. Al-Mistarihi, Moawiah Alhulayil:
Performance analysis of amplify-and-forward cognitive relay networks with interference power constraints over Nakagami-m fading channels. IET Commun. 10(5): 594-605 (2016) - [c15]Bilal Al-Shua'b, Mohammad Al-Shurman:
DCWI: Dynamic Contention Window Intervals for IEEE 802.11 MAC Protocol. BDAW 2016: 44:1-44:5 - 2015
- [j5]Mamoun F. Al-Mistarihi, Rami Mohaisen, Ashraf Sharaqa, Mohammad Al-Shurman, Khalid A. Darabkh:
Performance evaluation of multiuser diversity in multiuser two-hop cooperative multi-relay wireless networks using maximal ratio combining over Rayleigh fading channels. Int. J. Commun. Syst. 28(1): 71-90 (2015) - [c14]Mohammad Al-Shurman, Mamoun F. Al-Mistarihi, Moawiah Alhulayil:
Outage probability of dual-hop amplify-and-forward cognitive relay networks under interference power constraints over Nakagami-m fading channels. MIPRO 2015: 516-520 - [c13]Moawiah Alhulayil, Mamoun F. Al-Mistarihi, Mohammad Al-Shurman:
Outage probability of amplify-and-forward underlay cognitive relay networks with selection diversity over Nakagami-m fading channels. MIPRO 2015: 521-525 - [c12]Muath A. Wahdan, Mamoun F. Al-Mistarihi, Mohammad Al-Shurman:
Static cluster and dynamic cluster head (SCDCH) adaptive prediction-based algorithm for target tracking in wireless sensor networks. MIPRO 2015: 596-600 - 2014
- [c11]Mohammad Al-Shurman, Mohammad G. Alfawares, Mamoun F. Al-Mistarihi, Khalid A. Darabkh:
A collaborative reputation approach to avoid misbehaving nodes in MANETs. SSD 2014: 1-4 - [c10]Muawiah Hlayel, Ali Mohammad Hayajneh, Mamoun F. Al-Mistarihi, Mohammad Shurman, Khalid A. Darabkh:
Closed-form expression of bit error rate in dual-hop dual-branch mixed relaying cooperative networks with best-path selection over Rayleigh fading channels. SSD 2014: 1-4 - [c9]Mohammad M. Shurman, Noor M. Awad, Mamoun F. Al-Mistarihi, Khalid A. Darabkh:
LEACH enhancements for wireless sensor networks based on energy model. SSD 2014: 1-4 - [c8]Mohammad Al-Shurman, Bilal Al-Shua'b, Mohammad Alsaedeen, Mamoun F. Al-Mistarihi, Khalid A. Darabkh:
N-BEB: New backoff algorithm for IEEE 802.11 MAC protocol. MIPRO 2014: 540-544 - 2012
- [j4]Khalid A. Darabkh, Shereen Ismail, Mohammad Al-Shurman, Iyad F. Jafar, Eman Alkhader, Mamoun F. Al-Mistarihi:
Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks. J. Netw. Comput. Appl. 35(6): 2068-2080 (2012) - 2011
- [j3]Mamoun F. Al-Mistarihi, Mohammad Al-Shurman, Ahmad Qudaimat:
Tree based dynamic address autoconfiguration in mobile ad hoc networks. Comput. Networks 55(8): 1894-1908 (2011) - 2010
- [j2]Mohammad Al-Shurman, Seong-Moo Yoo, Bonam Kim, Seungjin Park:
Two Distributive Key Management Schemes In Mobile Ad Hoc Networks. Intell. Autom. Soft Comput. 16(4): 593-605 (2010) - [c7]Mohammad Al-Shurman, Mamoun F. Al-Mistarihi, Ahmad Qudaimat:
Network Address Assignment In Mobile Ad-Hoc networks. ICUMT 2010: 287-294
2000 – 2009
- 2008
- [c6]Mohammad Al-Shurman, Seong-Moo Yoo, Bonam Kim:
Distributive Key Management for Mobile Ad Hoc Networks. MUE 2008: 533-536 - 2006
- [c5]Mohammad Al-Shurman, Seong-Moo Yoo:
Key Pre-Distribution Using MDS Codes in Mobile Ad Hoc Networks. ITNG 2006: 566-567 - 2005
- [j1]Seungjin Park, Seong-Moo Yoo, Mohammad Al-Shurman, Brian Van Voorst, Chang-Hyun Jo:
ARM: Anticipated route maintenance scheme in location-aided mobile ad hoc networks. J. Commun. Networks 7(3): 325-336 (2005) - [c4]Yoshito Kanamori, Seong-Moo Yoo, Mohammad Al-Shurman:
A quantum no-key protocol for secure data communication. ACM Southeast Regional Conference (2) 2005: 92-93 - [c3]Mohammad Al-Shurman, Seong-Moo Yoo, Yoshito Kanamori:
Decreasing broadcast in route discovery using vectors in mobile ad hoc networks. ACM Southeast Regional Conference (2) 2005: 103-104 - 2004
- [c2]Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park:
A performance simulation for route maintenance in wireless ad hoc networks. ACM Southeast Regional Conference 2004: 25-30 - [c1]Mohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park:
Black hole attack in mobile Ad Hoc networks. ACM Southeast Regional Conference 2004: 96-97
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint