Personal information

Cybersecurity, Vulnerabilities & Code Injection Analysis, Software Development, Programing languages, Web and Mobile security, Medical security

Biography

Mohammad Qbea'h is currently working as Instructor at Information Systems and Security department, College of IT, UAEU. He has more than 15 years of experience in programming. His ongoing research interest revolves around Cybersecurity, Web and Information Security.

Activities

Employment (1)

United Arab Emirates University: Alain, Abu Dhabi, AE

2018 to present | Lecturer (Information Systems and Security )
Employment
Source: Self-asserted source
Mohammad Qbea'h

Works (8)

Classification of Authentication Approaches to Stop the Next Breaking: Challenges, Benefits, Drawbacks, Awareness, and Recommendations

ICCA 2023 - 2023 5th International Conference on Computer and Applications, Proceedings
2023 | Conference paper
EID:

2-s2.0-85185194716

Part of ISBN: 9798350303254
Contributors: Qbea'h, M.; Alkaabi, J.; Almansouri, S.; Alneyadi, A.; Alderei, M.
Source: Self-asserted source
Mohammad Qbea'h via Scopus - Elsevier

Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review

2022 International Conference on Computer and Applications (ICCA)
2022-12-20 | Conference paper
Contributors: Mohammad Qbea'h; Saed Alrabaee; Mohammad Alshraideh; Khair Eddin Sabri
Source: Self-asserted source
Mohammad Qbea'h
grade
Preferred source (of 2)‎

BinDeep: Binary to Source Code Matching Using Deep Learning

Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021
2021 | Conference paper
EID:

2-s2.0-85127431672

Contributors: Alrabaee, S.; Choo, K.-K.R.; Qbea'h, M.; Khasawneh, M.
Source: Self-asserted source
Mohammad Qbea'h via Scopus - Elsevier

An analytical scanning technique to detect and prevent the transformed SQL injection and XSS attacks

ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy
2020 | Conference paper
EID:

2-s2.0-85083035408

Contributors: Qbea'h, M.; Alrabaee, S.; Mouheb, D.
Source: Self-asserted source
Mohammad Qbea'h via Scopus - Elsevier

An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks

International Conference on Information Systems Security and Privacy
2020 | Conference paper
EID:

2-s2.0-85176349293

Part of ISBN: 9789897583995
Part of ISSN: 21844356
Contributors: Qbeah, M.; Alrabaee, S.; Mouheb, D.
Source: Self-asserted source
Mohammad Qbea'h via Scopus - Elsevier

Discovering Public Wi-Fi Vulnerabilities Using Raspberry pi and Kali Linux

Proceedings - 2020 12th Annual Undergraduate Research Conference on Applied Computing, URC 2020
2020 | Conference paper
EID:

2-s2.0-85086706364

Contributors: Al Neyadi, E.; Al Shehhi, S.; Al Shehhi, A.; Al Hashimi, N.; Qbea'H, M.; Alrabaee, S.
Source: Self-asserted source
Mohammad Qbea'h via Scopus - Elsevier

Security Vulnerabilities Detected in Medical Devices

Proceedings - 2020 12th Annual Undergraduate Research Conference on Applied Computing, URC 2020
2020 | Conference paper
EID:

2-s2.0-85086739407

Contributors: Alsuwaidi, A.; Hassan, A.; Alkhatri, F.; Ali, H.; Qbeaah, M.; Alrabaee, S.
Source: Self-asserted source
Mohammad Qbea'h via Scopus - Elsevier

Detecting and preventing SQL injection attacks: A formal approach

Proceedings - 2016 Cybersecurity and Cyberforensics Conference, CCC 2016
2016 | Conference paper
EID:

2-s2.0-84994853667

Contributors: Qbea'H, M.; Alshraideh, M.; Sabri, K.E.
Source: Self-asserted source
Mohammad Qbea'h via Scopus - Elsevier