Staff Profile

Dr Maha Saadeh FHEA

Biography

Dr. Maha Saadeh received her PhD degree in computer science from the University of Jordan in 2018. She worked as adjunct lecturer at the computer science department, The University of Jordan. She is currently working as a Senior lecturer in the school of science and technology, computer engineering and informatics department, Middlesex University Dubai, UAE. Dr. Saadeh has experience in teaching artificial intelligence, machine learning, data science, computer networks and network security for undergraduate and postgraduate students. Dr. Saadeh is a member of the ROBOTECHx Lab under Middlesex university Centre for Innovation In Human Experience. She is also part of the Research committee at the University. She has a number of publications in different reputable international journals and conferences. Her research interests are artificial intelligence, machine learning, data science, and network security.  

Qualifications
  • PGCert in Higher Education, Middlesex University Dubai, UAE, 2021
  • PhD - Computer and Networks Security - University of Jordan, Jordan, 2018
  • Master of Computer Science - University of Jordan, Jordan, 2011
  • Bachelor of Computer Science - University of Jordan, Jordan, 2009 
Membership of Professional Bodies and Associations
  • Member of the IEEE Computing Society 

Research Interests

Dr Maha’s research interests include artificial intelligence, machine learning, data science, and network security. 

Selected Publications
  • C Alex, G Creado, W Almobaideen, OA Alghanam, M Saadeh, “A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms”, May 2023.
  • Orieb Abu Alghanam, Wesam Almobaideen, Maha Saadeh, Omar Adwan, “An improved PIO Feature Selection Algorithm for IoT Network Intrusion Detection System Based on Ensemble Learning”, Expert Systems With Applications, Vol. 213, 2023.
  • Heba Saadeh, Maha Saadeh, Wesam Almobaideen, Marwan Al-Tawi, “Evaluating the optimal number of clusters to identify similar gene expression patterns during erythropoiesis”, 2022 International Conference on Computer, Information and Telecommunication Systems (CITS), IEEE, July 2022, Piraeus, Greece.
  • Orieb AbuAlghanama, Mohammad Qatawnehb, Wesam Almobaideen, Maha Saadeh, “A New Hierarchical Architecture and Protocol for key Distribution in the Context of IoT based Smart Cities”, Journal of Information Security and Applications, Volume 67, June 2022.
  • Heba Saadeh Ϯ, Maha Saadeh Ϯ, Wesam Almobaideen, “Whom Should Be Saved? An Ethical Framework for Assigning Medical Resources To COVID-19 Patients Using Fuzzy Logic”, Frontiers in Medicine Vol.8, 2021.
  • Heba Saadeh Ϯ, Maha Saadeh Ϯ, Wesam Almobaideen, Assem Al Refaei, Nour Shewaikani, Reem Q Al Fayez, Hamzah Khawaldah, Sobuh Moh'D Sobhi Abu-shanab, Maysa Al-Hussaini, “Effect of COVID-19 quarantine on the sleep quality and the depressive symptom levels of university students in Jordan during the spring of 2020”, Frontiers in Psychiatry, Vol.12, Pages: 131. 2021
  • Ayan Sentuna, Abeer Alsadoon, P. W. C. Prasad, Maha Saadeh & Omar Hisham Alsadoon, “A Novel Enhanced Naïve Bayes Posterior Probability (ENBPP) Using Machine Learning: Cyber Threat Analysis”,  Neural Processing Letters, Vol.53, pp.177–209 2020
  • Maha Saadeh, Azzam Sleit, Khair Eddin Sabri, Wesam Almobaideen, “Object Authentication in the Context of the Internet of Things: A Survey”, Journal of Cyber Security and Mobility, Vol. 9_3, pp. 385–448, 2020
  • Maha Saadeh, Azzam Sleit, Khair Eddin Sabri, Wesam Almobaideen, “Hierarchical Architecture and Protocol for Mobile Object Authentication in the Context of IoT Smart Cities”, Journal of Network and Computer Applications Volume 121, 2018, pp. 1-19
  • Maha Saadeh, Azzam Sleit, Khair Eddin Sabri, Wesam Almobaideen, “Lightweight Identity Based Signature For Object Authentication In The Internet Of Things” Journal of Theoretical and Applied Information Technology, JATIT, Vol.96 no.3, 2018
  • Hazem Hiary, Heba Saadeh, Maha Saadeh, Mohammad Yaqub, “Flower Classification using Deep Fully Convolutional Neural Networks” IET Computer Vision, 2018.
  • Iman Almomani, Maha Saadeh, “SFEAR: secure fuzzy based energy awareness routing protocol for WSN”, KSII Transactions On Internet And Information Systems, 2018
  • Wesam Almobaideen, Rand Krayshan, Mamoon Allan, Maha Saadeh, “ Internet of Things: Geographical Routing Based on Healthcare Centers Vicinity for Mobile Smart Tourism Destination”, Technological Forecasting & Social Change, Vol.123, ELSEVIER, 2017
  • Wesam Almobaideen, Mamoon Allan, Maha Saadeh, “Smart Archaeological Tourism: Contention, Convenience And Accessibility In The Context Of Cloud-Centric IoT”, Mediterranean Archaeology and Archaeometry, Vol.16, no.1, 2016
  • Maha Saadeh, Azzam Sleit, Mohammed Qatawneh, Wesam Almobaideen, “Authentication Techniques for the Internet of Things: A Survey“, The 1st International Cybersecurity & Cyberforensics Conference (CCC2016), 2016, Amman, Jordan.
  • Maha Saadeh, Azzam Sleit, Wesam Almobaideen, “ Atwo-Phase Fuzzy System for Edge Detection”, The 2016 International Conferencee on Image Processing, Computer Vision & Pattern Recognition (IPCV’16), 2016, USA
  • Hudaib, F. Al-Zaghoul, M. Saadeh, H. Saadeh, “ADTEM-Architecture Design Testability Evaluation Model to Assess Software Architecture Based on Testability Metrics”, Journal of Software Engineering and Applications, Vol.8, no.4, 2015
  • W. Almobaideen, M. Saadeh, N. Al-Anbaki, R. Zaghloul, A. Aladwan, “Geographical Route Selection Based On User Public Transportation and Service Preferences”, 9th International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST), 2015, Cambridge, UK.
  • Hazem Hiary, Raja S. Alomari, Maha Saadeh, Vipin Chaudhary, “ Automated segmentation of stromal tissue in histology images using a voting Bayesian model”, Signal, Image and Video Processing, Springer-Verlag, Vol.7 no.6, 2013
  • Iman Almomani, Maha Saadeh, “Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation”, KSII Transactions On Internet And Information Systems, Vol.6 no.4, 2012
  • Iman ALMomani, Maha Saadeh, “FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks”, Int. J. Communications, Network and System Sciences, Vol.4 no.6, 2011
  • Mousa T. AL-Akhras, Mohammad O. Salameh, Maha K. Saadeh, Mohammed A. ALAwairdhi, “An Autonomous Fuzzy-controlled Indoor Mobile Robot for Path Following and Obstacle Avoidance”, International Journal Of Computers, Vol.5 no.3, 2011
  • Mousa Al-akhras, Maha Saadeh, “Automatic Valuation of Jordanian Estates Using A Genetically -Optimised Artificial Neural Network Approach”, WSEAS TRANSACTIONS on SYSTEMS, Vol.9, no.8, 2010 

AbuAlghanam, O., Qatawneh, M., Almobaideen, W., & Saadeh, M. (2022). A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities. Journal of Information Security and Applications, 67, 103173.
Saadeh, H., Saadeh, M., Almobaideen, W., & Al-Tawil, M. (2022, July). Evaluating the optimal number of clusters to identify similar gene expression patterns during erythropoiesis. In 2022 International Conference on Computer, Information and Telecommunication Systems (CITS) (pp. 1-5). IEEE.
Alex, C., Creado, G., Almobaideen, W., Alghanam, O. A., & Saadeh, M. (2023). A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms. Computers & Security, 103283. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85164242581&doi=10.1016%2fj.cose.2023.103283&partnerID=40&md5=4b64ac0bb170f62c7609f8e96f9f66ae
AbuAlghanam, O., Qatawneh, M., Almobaideen, W., & Saadeh, M. (2022). A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities. Journal of Information Security and Applications, 67, 103173. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130616533&doi=10.1016%2fj.jisa.2022.103173&partnerID=40&md5=1fcf5d9ceb31346a188d4f7f025ba944
Alghanam, O. A., Almobaideen, W., Saadeh, M., & Adwan, O. (2023). An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning. Expert Systems with Applications, 213, 118745. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85138484430&doi=10.1016%2fj.eswa.2022.118745&partnerID=40&md5=7123cbffeaf5165df458fbe4e4f36b58
Saadeh, H., Saadeh, M., Almobaideen, W., & Al-Tawil, M. (2022, July). Evaluating the optimal number of clusters to identify similar gene expression patterns during erythropoiesis. In 2022 International Conference on Computer, Information and Telecommunication Systems (CITS) (pp. 1-5). IEEE. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85136084762&doi=10.1109%2fCITS55221.2022.9832988&partnerID=40&md5=ab98edce10a82ac0f74da53d3365dbcd