Mohammad Almseidin

712 total citations
27 papers, 378 citations indexed

About

Mohammad Almseidin is a scholar working on Computer Networks and Communications, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Mohammad Almseidin has authored 27 papers receiving a total of 378 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Computer Networks and Communications, 17 papers in Artificial Intelligence and 15 papers in Signal Processing. Recurrent topics in Mohammad Almseidin's work include Network Security and Intrusion Detection (19 papers), Advanced Malware Detection Techniques (15 papers) and Anomaly Detection Techniques and Applications (7 papers). Mohammad Almseidin is often cited by papers focused on Network Security and Intrusion Detection (19 papers), Advanced Malware Detection Techniques (15 papers) and Anomaly Detection Techniques and Applications (7 papers). Mohammad Almseidin collaborates with scholars based in Jordan, Hungary and United Arab Emirates. Mohammad Almseidin's co-authors include Mouhammd Alkasassbeh, Ghazi Al‐Naymat, Szilveszter Kovács, Mohammed Alweshah, Sofian Kassaymeh, Amjad Gawanmeh, Noor Farizah Ibrahim, Mohammad Alauthman, Issa Qiqieh and Amjad Aldweesh and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and Arabian Journal for Science and Engineering.

In The Last Decade

Mohammad Almseidin

22 papers receiving 355 citations

Peers

Mohammad Almseidin
Michael D. Iannacone United States
Faheem Ullah Australia
Vera Rimmer Belgium
Pubali Datta United States
Mohammad Almseidin
Citations per year, relative to Mohammad Almseidin Mohammad Almseidin (= 1×) peers Gözde Karataş

Countries citing papers authored by Mohammad Almseidin

Since Specialization
Citations

This map shows the geographic impact of Mohammad Almseidin's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mohammad Almseidin with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mohammad Almseidin more than expected).

Fields of papers citing papers by Mohammad Almseidin

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Mohammad Almseidin. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mohammad Almseidin. The network helps show where Mohammad Almseidin may publish in the future.

Co-authorship network of co-authors of Mohammad Almseidin

This figure shows the co-authorship network connecting the top 25 collaborators of Mohammad Almseidin. A scholar is included among the top collaborators of Mohammad Almseidin based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Mohammad Almseidin. Mohammad Almseidin is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Almseidin, Mohammad, et al.. (2025). Hybrid Deep Neural Network Optimization with Particle Swarm and Grey Wolf Algorithms for Sunburst Attack Detection. Computers. 14(3). 107–107. 2 indexed citations
2.
Alkasassbeh, Mouhammd, et al.. (2025). A Self-Adaptive Intrusion Detection System for Zero-Day Attacks Using Deep Q-Networks. IEEE Access. 13. 174280–174296.
3.
Almseidin, Mohammad, et al.. (2025). Adaptive Intrusion Detection for IoT Networks using Artificial Immune System Techniques: A Comparative Study. Journal of Robotics and Control (JRC). 6(2). 570–582.
4.
Almseidin, Mohammad, et al.. (2025). A Hybrid Approach for Anomaly Detection with PCA-Driven CNNs. 1–6.
5.
Almseidin, Mohammad, et al.. (2024). Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge. Cluster Computing. 27(5). 5799–5814. 4 indexed citations
6.
Almseidin, Mohammad, et al.. (2024). Comparative Analysis of Fuzzy Rule Interpolation Techniques Across Various Scenarios Using a Set of Benchmarks. IEEE Access. 12. 33140–33153. 2 indexed citations
8.
Ibrahim, Noor Farizah, et al.. (2024). IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO. Computers, materials & continua/Computers, materials & continua (Print). 78(2). 2245–2267. 7 indexed citations
9.
Almseidin, Mohammad, et al.. (2024). EI-FRI: Extended Incircle Fuzzy Rule Interpolation for Multidimensional Antecedents, Multiple Fuzzy Rules, and Extrapolation Using Total Weight Measurement and Shift Ratio. Journal of Robotics and Control (JRC). 5(1). 217–227. 3 indexed citations
10.
Alkasassbeh, Mouhammd, et al.. (2023). A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks. Arabian Journal for Science and Engineering. 49(3). 4179–4195. 6 indexed citations
11.
Alweshah, Mohammed, et al.. (2023). An Efficient Hybrid Mine Blast Algorithm for Tackling Software Fault Prediction Problem. Neural Processing Letters. 55(8). 10925–10950. 13 indexed citations
12.
Almseidin, Mohammad, et al.. (2023). DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation. Journal of Network and Systems Management. 32(1). 7 indexed citations
13.
Almseidin, Mohammad, et al.. (2022). Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation. Cryptography. 6(2). 24–24. 6 indexed citations
14.
Alkasassbeh, Mouhammd, et al.. (2022). Diabetic retinopathy detection method using artificial neural network. International Journal of Bioinformatics Research and Applications. 18(4). 300–300. 1 indexed citations
15.
Almseidin, Mohammad, et al.. (2022). Generating a benchmark cyber multi-step attacks dataset for intrusion detection. Journal of Intelligent & Fuzzy Systems. 43(3). 3679–3694. 16 indexed citations
16.
Almseidin, Mohammad, et al.. (2021). Anomaly-based Intrusion Detection System Using Fuzzy Logic. 290–295. 14 indexed citations
17.
Alkasassbeh, Mouhammd, et al.. (2020). Detection of IoT-botnet attacks using fuzzy rule interpolation. Journal of Intelligent & Fuzzy Systems. 39(1). 421–431. 36 indexed citations
18.
Almseidin, Mohammad, Mouhammd Alkasassbeh, & Szilveszter Kovács. (2019). Fuzzy Rule Interpolation and SNMP-MIB for Emerging Network Abnormality. International Journal on Advanced Science Engineering and Information Technology. 9(3). 735–744. 9 indexed citations
19.
Almseidin, Mohammad, Mouhammd Alkasassbeh, & Szilveszter Kovács. (2019). Detecting Slow Port Scan Using Fuzzy Rule Interpolation. 1–6. 19 indexed citations
20.
Almseidin, Mohammad, et al.. (2019). Applying Intrusion Detection Algorithms on the KDD-99 Dataset. 8. 51–67. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026