Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rami M. Mohammad is active.

Publication


Featured researches published by Rami M. Mohammad.


Neural Computing and Applications | 2014

Predicting phishing websites based on self-structuring neural network

Rami M. Mohammad; Fadi Thabtah; Lee McCluskey

AbstractInternet has become an essential component of our everyday social and financial activities. Nevertheless, internet users may be vulnerable to different types of web threats, which may cause financial damages, identity theft, loss of private information, brand reputation damage and loss of customer’s confidence in e-commerce and online banking. Phishing is considered as a form of web threats that is defined as the art of impersonating a website of an honest enterprise aiming to obtain confidential information such as usernames, passwords and social security number. So far, there is no single solution that can capture every phishing attack. In this article, we proposed an intelligent model for predicting phishing attacks based on artificial neural network particularly self-structuring neural networks. Phishing is a continuous problem where features significant in determining the type of web pages are constantly changing. Thus, we need to constantly improve the network structure in order to cope with these changes. Our model solves this problem by automating the process of structuring the network and shows high acceptance for noisy data, fault tolerance and high prediction accuracy. Several experiments were conducted in our research, and the number of epochs differs in each experiment. From the results, we find that all produced structures have high generalization ability.


international joint conference on neural network | 2016

A dynamic self-structuring neural network model to combat phishing

Fadi Thabtah; Rami M. Mohammad; Lee McCluskey

Creating a neural network based classification model is commonly accomplished using the trial and error technique. However, this technique has several difficulties in terms of time wasted and the availability of experts. In this article, an algorithm that simplifies structuring neural network classification models is proposed. The algorithm aims at creating a large enough structure to learn models from the training dataset that can be generalised on the testing dataset. Our algorithm dynamically tunes the structure parameters during the training phase aiming to derive accurate non-overfitting classifiers. The proposed algorithm has been applied to phishing website classification problem and it shows competitive results with respect to various evaluation measures such as harmonic mean (F1-score), precision, and classification accuracy.


2017 8th International Conference on Information and Communication Systems (ICICS) | 2017

An intelligent model for trustworthiness evaluation in semantic web applications

Rami M. Mohammad; Hussein Y. AbuMansour

The development and the advances of the World Wide Web from its first inception resulted in numerous diverse amounts of data and webpages on the web which motivates to greater demand for managing this data in an effective manner. Therefore, novel tools and techniques are required to effectively manage these data. Such tools are assumed to support interoperability and warehousing between the multiple data sources and extracting information from the different trusted databases on the web. Subsequently, the web is evolving into what is now called the Semantic Web aims to alleviate users from the burden of integrating different information sources as well as to perform searches. However, one needs to examine the trust issue of the searching results from any Semantic Web application. This paper investigates trust policies and mechanisms in semantic web applications and introduces an intermediary step to classify the relevant web services via intelligent model based on NN.


Iet Information Security | 2014

Intelligent rule-based phishing websites classification

Rami M. Mohammad; Fadi Thabtah; Lee McCluskey


international conference for internet technology and secured transactions | 2012

An assessment of features related to phishing websites using an automated technique

Rami M. Mohammad; Fadi Thabtah; Lee McCluskey


Computer Science Review | 2015

Tutorial and critical analysis of phishing websites methods

Rami M. Mohammad; Fadi Thabtah; Lee McCluskey


Archive | 2013

Predicting Phishing Websites using Neural Network trained with Back-Propagation

Rami M. Mohammad; T.L. McCluskey; Fadi Thabtah


knowledge discovery and data mining | 2016

An Improved Self-Structuring Neural Network

Rami M. Mohammad; Fadi Thabtah; Lee McCluskey


Archive | 2015

Phishing Websites Dataset

Rami M. Mohammad; Fadi Thabtah; Thomas Leo McCluskey


Archive | 2016

A Dynamic Self-Structuring Neural Network

Rami M. Mohammad; Thomas Leo McCluskey; Fadi Thabtah

Collaboration


Dive into the Rami M. Mohammad's collaboration.

Top Co-Authors

Avatar

Fadi Thabtah

Nelson Marlborough Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Lee McCluskey

University of Huddersfield

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

T.L. McCluskey

Canadian University of Dubai

View shared research outputs
Researchain Logo
Decentralizing Knowledge