Research Title | MAG. TITLE | RESEARCH AREA | PUBLISH YEAR | DOI | Journal URL |
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things | International Journal of Information Security | Cybersecurity · Cryptography · Cloud computing · Architectural model · Intelligent | 2024 | |
Visit URL
|
A novel machine learning and face recognition technique for fake accounts detection system on cyber social networks | Multimedia Tools and Applications | Social media · Cyber attacks · Social media privacy · Computer vision in social media · Social media security · Face recognition | 2023 | |
Visit URL
|
A novel secure cryptography model for data transmission based on Rotor64 technique | Multimedia Tools and Applications | CYBER SECURITY | 2023 | |
Visit URL
|
Simulation and analysis performance of ad-hoc routing protocols under DDoS attack and proposed solution | International Journal of Data and Network Science | Ad hoc networks DSR AODV OLSR Routing protocols Wireless Networks and DDoS | 2023 | |
Visit URL
|
Towards Data-Driven Network Intrusion Detection Systems: Features Dimensionality Reduction and Machine Learning | International Journal of Interactive Mobile Technologies (iJIM) | Cyberattacks, Machine Learning, Deep Learning | 2022 | |
Visit URL
|
A secure encrypted protocol for clients handshaking in the same network | , International Journal of Interactive Mobile Technologies | Security | 2019 | |
Visit URL
|
Intensive Pre-Processing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques | , International Journal of Interactive Mobile Technologies | Networking | 2019 | |
Visit URL
|
Towards improving the performance of distributed virtual memory based reversal cache approach | IJCAT | network | 2015 | |
Visit URL
|
An energy-efficient threshold-based clustering protocol for wireless sensor networks,” | Journal of wireless personal communications | networking | 2013 | |
Visit URL
|
Computer based clinical decision support system for hepatitis disease diagnosis | Int. J. of Advancements in Computing Technology | AI | 2013 | |
Visit URL
|
Islandsat, | International Journal of Advanced Intelligence Paradigms | software engineering | 2012 | |
Visit URL
|
Investigating the cyberbullying risk in digital media: protecting victims in school teenagers | Social Network Analysis and Mining | Computer Science: Computer Science Applications ,Computer Science: Information Systems,Social Sciences: Communication,Engineering: Media Technology | 2011 | |
Visit URL
|
A Threshold-based Dynamic Data Replication Strategy | The Journal of Superco mputing | netwroking | 2010 | |
Visit URL
|
Technology Fears: study of e-Commerce loyalty perception by Jordanian customers" | International Journal of Information Systems in the Service Sector (IJISSS) | e-learning | 2010 | |
Visit URL
|
Technology Fears: study of e-Commerce loyalty perception by Jo rda nian customers" | Internatio nal Journal of Information Systems in the Service Sector | e-commerece | 2010 | |
Visit URL
|