Maha Saadeh

719 total citations
23 papers, 500 citations indexed

About

Maha Saadeh is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Maha Saadeh has authored 23 papers receiving a total of 500 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Computer Networks and Communications, 6 papers in Information Systems and 6 papers in Artificial Intelligence. Recurrent topics in Maha Saadeh's work include Advanced Authentication Protocols Security (5 papers), User Authentication and Security Systems (4 papers) and Network Security and Intrusion Detection (3 papers). Maha Saadeh is often cited by papers focused on Advanced Authentication Protocols Security (5 papers), User Authentication and Security Systems (4 papers) and Network Security and Intrusion Detection (3 papers). Maha Saadeh collaborates with scholars based in Jordan, United Arab Emirates and Australia. Maha Saadeh's co-authors include Wesam Almobaideen, Heba Saadeh, Mamoon Allan, Azzam Sleit, Omar Adwan, Mohammad Yaqub, Hazem Hiary, Iman Almomani, Khair Eddin Sabri and Mohammad Qatawneh and has published in prestigious journals such as Expert Systems with Applications, Sensors and Technological Forecasting and Social Change.

In The Last Decade

Maha Saadeh

21 papers receiving 481 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Maha Saadeh Jordan 12 268 119 117 85 51 23 500
Sajjad Ali South Korea 12 175 0.7× 75 0.6× 141 1.2× 13 0.2× 17 0.3× 31 349
Garima Verma India 13 95 0.4× 140 1.2× 176 1.5× 13 0.2× 19 0.4× 63 485
Shiyu Wang China 15 89 0.3× 234 2.0× 68 0.6× 22 0.3× 57 1.1× 77 656
Nedal Ababneh United Arab Emirates 12 251 0.9× 66 0.6× 61 0.5× 46 0.5× 29 0.6× 41 391
Abidemi Emmanuel Adeniyi Nigeria 12 209 0.8× 196 1.6× 123 1.1× 111 1.3× 8 0.2× 52 474
Umesh Kumar Singh India 11 206 0.8× 121 1.0× 206 1.8× 118 1.4× 69 1.4× 58 520
Gulshan Shrivastava India 10 141 0.5× 85 0.7× 223 1.9× 135 1.6× 42 0.8× 35 444
Ajit Kumar India 11 201 0.8× 157 1.3× 109 0.9× 179 2.1× 23 0.5× 30 390
Muhammad Azam Zia Pakistan 11 157 0.6× 66 0.6× 92 0.8× 21 0.2× 43 0.8× 35 416
Komal Kumar Bhatia India 11 107 0.4× 133 1.1× 206 1.8× 62 0.7× 34 0.7× 58 397

Countries citing papers authored by Maha Saadeh

Since Specialization
Citations

This map shows the geographic impact of Maha Saadeh's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Maha Saadeh with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Maha Saadeh more than expected).

Fields of papers citing papers by Maha Saadeh

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Maha Saadeh. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Maha Saadeh. The network helps show where Maha Saadeh may publish in the future.

Co-authorship network of co-authors of Maha Saadeh

This figure shows the co-authorship network connecting the top 25 collaborators of Maha Saadeh. A scholar is included among the top collaborators of Maha Saadeh based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Maha Saadeh. Maha Saadeh is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Almobaideen, Wesam, et al.. (2023). A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms. Computers & Security. 132. 103283–103283. 28 indexed citations
3.
Almobaideen, Wesam, et al.. (2022). An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning. Expert Systems with Applications. 213. 118745–118745. 78 indexed citations
4.
Qatawneh, Mohammad, et al.. (2022). A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities. Journal of Information Security and Applications. 67. 103173–103173. 17 indexed citations
5.
Saadeh, Heba, et al.. (2021). Effect of COVID-19 Quarantine on the Sleep Quality and the Depressive Symptom Levels of University Students in Jordan During the Spring of 2020. Frontiers in Psychiatry. 12. 605676–605676. 43 indexed citations
6.
Saadeh, Heba, Maha Saadeh, & Wesam Almobaideen. (2021). Whom Should Be Saved? A Proposed Ethical Framework for Allocating Scarce Medical Resources to COVID-19 Patients Using Fuzzy Logic. Frontiers in Medicine. 8. 600415–600415. 1 indexed citations
7.
Saadeh, Maha, Azzam Sleit, Khair Eddin Sabri, & Wesam Almobaideen. (2020). Object Authentication in the Context of the Internet of Things: A Survey. Journal of Cyber Security and Mobility. 5 indexed citations
8.
Alsadoon, Abeer, et al.. (2020). A Novel Enhanced Naïve Bayes Posterior Probability (ENBPP) Using Machine Learning: Cyber Threat Analysis. Neural Processing Letters. 53(1). 177–209. 15 indexed citations
9.
Saadeh, Maha, et al.. (2020). Artificial Intelligence Platform for Low-Cost Robotics. 1–4. 3 indexed citations
10.
Hiary, Hazem, Heba Saadeh, Maha Saadeh, & Mohammad Yaqub. (2018). Flower classification using deep convolutional neural networks. IET Computer Vision. 12(6). 855–862. 75 indexed citations
11.
Saadeh, Maha, Azzam Sleit, Khair Eddin Sabri, & Wesam Almobaideen. (2018). Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities. Journal of Network and Computer Applications. 121. 1–19. 30 indexed citations
12.
Saadeh, Maha, et al.. (2016). Performance Evaluation of Parallel Sorting Algorithms on IMAN1 Supercomputer. International Journal of Advanced Science and Technology. 95. 57–72. 14 indexed citations
13.
Saadeh, Maha, et al.. (2016). Authentication Techniques for the Internet of Things: A Survey. 28–34. 49 indexed citations
14.
Sleit, Azzam, et al.. (2016). An Edge Detection Technique for Grayscale Images Based on Fuzzy Logic. British Journal of Applied Science & Technology. 17(6). 1–13.
15.
Almobaideen, Wesam, Mamoon Allan, & Maha Saadeh. (2015). Smart Archaeological Tourism: Contention, Convenience And Accessibility In The Context Of Cloud-Centric Iot. Zenodo (CERN European Organization for Nuclear Research). 18 indexed citations
16.
Hudaib, Amjad, et al.. (2015). ADTEM-Architecture Design Testability Evaluation Model to Assess Software Architecture Based on Testability Metrics. Journal of Software Engineering and Applications. 8(4). 201–210. 6 indexed citations
17.
Almobaideen, Wesam, et al.. (2015). Geographical Route Selection Based on User Public Transportation and Service Preferences. 10. 144–149. 6 indexed citations
18.
Almomani, Iman, et al.. (2011). Energy awareness tree-based routing protocol for wireless sensor networks. 26–30. 1 indexed citations
19.
Almomani, Iman & Maha Saadeh. (2011). FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks. International Journal of Communications Network and System Sciences. 4(6). 403–415. 21 indexed citations
20.
Al-Akhras, Mousa & Maha Saadeh. (2010). Automatic valuation of Jordanian estates using a genetically-optimised artificial neural network approach. WSEAS TRANSACTIONS on SYSTEMS archive. 9(8). 905–916. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026