Dr. Mahran Alzoyud

Assistant Professor

Major: Networks and Cybersecurity

Department: Networks and Cybersecurity Department

Faculty: Faculty of Information Technology


Email:

m.zyoud@ammanu.edu.jo

Extention: 2294

Profiles:



COURSES TAUGHT

  • Introduction to Programming
  • Essentials of Networks and Cybersecurity
  • Digital Forensics
  • Network Operating Systems
  • Protection Using Linux
  • Computer Skills
  • Penetration Testing and Analysis
  • Advanced Topics in Information Systems Auditing
  • Advanced Topics in Digital Forensics Investigation
  • Computer Networks
  • Computer Networks Lab
  • Ethical Hacking
  • Ethical Hacking Lab
  • Advanced Ethical Hacking

ACADEMIC RANKS

Rank University Country Date
Assistant Professor Al-Ahliyya Amman University The Hashemite Kingdom of Jordan 2020

QUALIFICATION

Degree Institute Specialization Country Date
ماجستير The University of Jordan Computer Information Systems الأردن October / 2011
دكتوراة The University of Alabama Cybersecurity الولايات المتحدة الأمريكية December / 2019
بكالوريوس The University of Jordan Computer Science الأردن February / 2004

WORK EXPERIENCE

Job Title Institute Time Period
Vice Dean for Accreditation and Quality Al-Ahliyya Amman University September / 2020 - August / 2021
Research Assistant & Teaching Assistant The University of Alabama January / 2015 - December / 2019

RESEARCH INTERESTS

  • Intrusion Detection Systems (IDS)
  • Applied Cybersecurity
  • AI/ML for Cyber Defense

RESEARCHES AND PUBLICATIONS

  • Mosleh M. Abualhaj; Sumaya N. Al-Khatib; Mahran Al Zyoud; Iyas Qaddara; Mohammed Anbar (2025) Enhancing Intrusion Detection System Performance Using a Hybrid of Harris Hawks and Whale Optimization Algorithms Engineering, Technology & Applied Science Research, No. 4, Vol. 15, 2025, pp. 24354-24361
  • Mosleh M. Abualhaj; Mohammad O. Hiari; Adeeb Alsaaidah; Mahran M. Al-Zyoud (2025) Comparative Analysis of Whale and Harris Hawks Optimization for Feature Selection in Intrusion Detection Indonesian Journal of Electrical Engineering & Computer Science (IJEECS), Vol. 37, 2025, pp. 179-185
  • Mosleh M. Abualhaj, Sumaya N. Al-Khatib, Mahran Al-Zyoud, Iyas Qaddara, Mohammad O. Hiari, and Sultan Mesfer A. Aldossary (2025) Enhanced Network Communication Security Through Hybrid Dragonfly-Bat Feature Selection for Intrusion Detection Journal of Communications (JCM), No. 5, Vol. 20, 2025
  • Qusai Shambour; Mahran Al-Zyoud; Omar Almomani (2025) Quantum-Inspired Hybrid Metaheuristic Feature Selection with SHAP for Optimized and Explainable Spam Detection Symmetry (MDPI), No. 10, Vol. 17, 2025
  • M. M. Abualhaj, A. A. Abu-Shareha, M. O. Hiari, Y. Alrabanah, M. Al-Zyoud, and M. A. Alsharaiah (2024) A Fine-Tuning of Decision Tree Classifier for Ransomware Detection Based on Memory Data International Journal of Data and Network Science, Vol. 8, No. 2, 2024, pp. 733-742
  • Alsharaiah, Mohammad A.; Abu-Shareha, Ahmad Adel; Abualhaj, Mosleh; Baniata, Laith H.; Al-Saaidah, Adeeb; Kharma, Qasem M.; Al-Zyoud, Mahran M. (2024) An Innovative Network Intrusion Detection System (NIDS): Hierarchical Deep Learning Model Based on UNSW-NB15 Dataset International Journal of Data and Network Science, Vol. 8, No. 2, 2024, pp. 709-722
  • Ahmad Adel Abu-Shareha; Mahran Al-Zyoud; Qusai Y. Shambour (2024) Cascaded Spin Shuffle: A Transposition Cipher Using Spin Motion and Grid Cascading International Journal of Intelligent Engineering and Systems, Vol. 17, No. 6, 2024
  • Mosleh M. Abualhaj; Mahran Al-Zyoud; Adeeb Alsaaidah; Ahmad Abu-Shareha; Sumaya Al-Khatib (2024) Enhancing Malware Detection through Self-Union Feature Selection Using Firefly Algorithm with Random Forest Classification International Journal of Intelligent Engineering and Systems (IJIES), No. 4, Vol. 17, 2024
  • M. M. Abualhaj; M. O. Hiari; A. Al-Saaidah; M. Al-Zyoud; S. Al-Khatib (2024) Spam Feature Selection Using Firefly Metaheuristic Algorithm Journal of Applied Data Sciences (JADS), Vol. 5, No. 4, 2024; pages 1692-1700
  • Mosleh M. Abualhaj; Mahran M. Al-Zyoud; Ahmad Adel Abu-Shareha; Mohammad O. Hiari; Qusai Y. Shambour (2023) Tel-MPLS: a new method for maximizing the utilization of IP telephony over MPLS networks Bulletin of Electrical Engineering & Informatics (BEEI), No. 6, Vol. 12, 2023, pp. 3480-3488
  • Qusai Shambour; Mahran Al-Zyoud; Ahmad Abu-Shareha; Mosleh Abualhaj (2023) Medicine Recommender System Based on Semantic and Multi-Criteria Filtering Interdisciplinary Journal of Information, Knowledge, and Management, Vol. 18, 2023, pp. 435-457
  • Qusai Y. Shambour, Mahran M. Al-Zyoud, Abdelrahman H. Hussein, Qasem M. Kharma (2023) A doctor recommender system based on collaborative and content filtering International Journal of Electrical and Computer Engineering (IJECE) , 1, 13, 2023, 884-893
  • Mosleh M. Abualhaj; Ahmad A. Abu-Shareha; Sumaya N. Al-Khatib; Mahran Al-Zyoud; Adeeb Al-Saaidah; Mohammad O. Hiari; Mohammad A. Alsharaiah (2023) Improving VoIP Bandwidth Utilization Using the PldE Technique Transport and Telecommunication, Vol. 24, No. 3, 2023, pp. 288-296
  • Mosleh M. Abualhaj Author, Ahmad Adel Abu-Shareha Author, Mohammad O. Hiari Author, Yousef Alrabanah Author, Mahran Al-Zyoud, Mohammad A. Alsharaiah (2022) A Paradigm for DoS Attack Disclosure Using Machine Learning Techniques International Journal of Advanced Computer Science and Applications, 3,13, 2022,192-200
  • Mosleh Abualhaj, Mayy Al-Tahrawi, Mahran Al-Zyoud (2021) Contracting VoIP Packet Payload Down to Zero Cybernetics and Information Technologies, 1, 21, 2021, 137-150
  • AbdelRahman H. Hussein, Mahran Al-Zyoud, Kholoud Nairoukh, Sumaya N. Al-Khatib (2020) Enhancing VoIP BW Utilization over ITTP Protocol International Journal of Advanced Computer Science and Applications (IJACSA), 10, 11, 2020, 505-510
  • Christopher Theisen; Nuthan Munaiah; Mahran Al-Zyoud; Jeffrey C. Carver; Andrew Meneely; Laurie Williams (2018) Attack Surface Definitions: A Systematic Literature Review Information and Software Technology, Vol. 104, 2018, pp. 94–103
  • Nuthan Munaiah, Mahran Al-Zyoud, Jeffrey C Carver, Andrew Meneely, Laurie Williams (2018) Attack surface definitions: A Systematic Literature Review Information and Software Technology, 104, 94-103
  • Mahran Al-Zyoud, Laurie Williams, Jeffrey C Carver (2017) Step One Towards Science of Security CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, 31-35
  • Morgan Burcham, Mahran Al-Zyoud, Jeffrey C Carver, Mohammed Alsaleh, Hongying Du, Fida Gilani, Jun Jiang, Akond Rahman, Özgür Kafalı, Ehab Al-Shaer, Laurie Williams (2017) Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, 2017, 13-23
  • Mahran Al-Zyoud, Travis Atkison, Jeffery Carver (2016) An overview of emerging privacy issues in the Internet of Things 2016 International Conference on Computational Science and Computational Intelligence (CSCI), 2016, 212-217
  • Mohammed Alawairdhi, Mahran Al-zyoud, Muhammad Ramzan (2014) An investigation to reveal why IT projects succeed or fail in Saudi Arabia Life Science Journal, 8, 11, 2014, 126-134

CONFERENCES AND WORKSHOPS

Conference Title Type of Participation Location Date
CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security Paper/Poster Dallas, Texas, USA November / 2017

AWARDS AND SCHOLARSHIP

Title Location Date
Graduate Council Fellow in the Graduate School جامعة ألاباما 2019

Al-Ahliyya Amman University

Email: Public@ammanu.edu.jo

 

© Copyright Al-Ahliyya Amman University. Amman, Jordan 19111.