Fingerprint
Dive into the research topics where Mohammad Mesbah Qbea'h is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
Research output
- 9 Conference contribution
-
From Challenges to Future Directions: A Metaverse Analysis
Al Falahi, A., Alnuaimi, H., Alqaydi, M., Al Shateri, N., Al Ameri, S., Qbea'h, M. & Alrabaee, S., 2024, 2024 2nd International Conference on Intelligent Metaverse Technologies and Applications, iMETA 2024. Institute of Electrical and Electronics Engineers Inc., p. 34-43 10 p. (2024 2nd International Conference on Intelligent Metaverse Technologies and Applications, iMETA 2024).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Link opens in a new tab Citations (Scopus) -
Classification of Authentication Approaches to Stop the Next Breaking: Challenges, Benefits, Drawbacks, Awareness, and Recommendations
Qbea'h, M., Alkaabi, J., Almansouri, S., Alneyadi, A. M. & Alderei, M., 2023, ICCA 2023 - 2023 5th International Conference on Computer and Applications, Proceedings. Alja'Am, J. M., Alja'Am, J. M., Elseoud, S. A. & Karam, O. (eds.). Institute of Electrical and Electronics Engineers Inc., (ICCA 2023 - 2023 5th International Conference on Computer and Applications, Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Link opens in a new tab Citation (Scopus) -
Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review
Qbea'h, M., Alrabaee, S., Alshraideh, M. & Sabri, K. E., 2022, Proceedings of the International Conference on Computer and Applications, ICCA 2022 - Proceedings. Alja'Am, J. M., AlMaadeed, S., Elseoud, S. A. & Karam, O. (eds.). Institute of Electrical and Electronics Engineers Inc., (Proceedings of the International Conference on Computer and Applications, ICCA 2022 - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
8 Link opens in a new tab Citations (Scopus) -
BinDeep: Binary to Source Code Matching Using Deep Learning
Alrabaee, S., Choo, K. K. R., Qbea'h, M. & Khasawneh, M., 2021, Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021. Zhao, L., Kumar, N., Hsu, R. C. & Zou, D. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1100-1107 8 p. (Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
5 Link opens in a new tab Citations (Scopus) -
An analytical scanning technique to detect and prevent the transformed SQL injection and XSS attacks
Qbea'h, M., Alrabaee, S. & Mouheb, D., 2020, ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy. Furnell, S., Mori, P., Weippl, E. & Camp, O. (eds.). SciTePress, p. 603-610 8 p. (ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Link opens in a new tab Citations (Scopus)