Published Researchs

Research TitleMAG. TITLERESEARCH AREAPUBLISH YEARDOIJournal URL
Intelligent cybersecurity approach for data protection in cloud computing based Internet of ThingsInternational Journal of Information SecurityCybersecurity · Cryptography · Cloud computing · Architectural model · Intelligent2024  Visit URL
Simulation and analysis performance of ad-hoc routing protocols under DDoS attack and proposed solutionInternational Journal of Data and Network ScienceAd hoc networks DSR AODV OLSR Routing protocols Wireless Networks and DDoS 2023  Visit URL
A novel machine learning and face recognition technique for fake accounts detection system on cyber social networksMultimedia Tools and ApplicationsSocial media · Cyber attacks · Social media privacy · Computer vision in social media · Social media security · Face recognition2023  Visit URL
A novel secure cryptography model for data transmission based on Rotor64 techniqueMultimedia Tools and ApplicationsCYBER SECURITY2023  Visit URL
Towards Data-Driven Network Intrusion Detection Systems: Features Dimensionality Reduction and Machine LearningInternational Journal of Interactive Mobile Technologies (iJIM)Cyberattacks, Machine Learning, Deep Learning2022  Visit URL
A secure encrypted protocol for clients handshaking in the same network, International Journal of Interactive Mobile TechnologiesSecurity2019  Visit URL
Intensive Pre-Processing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques, International Journal of Interactive Mobile TechnologiesNetworking2019  Visit URL
Towards improving the performance of distributed virtual memory based reversal cache approachIJCATnetwork2015  Visit URL
Computer based clinical decision support system for hepatitis disease diagnosisInt. J. of Advancements in Computing TechnologyAI2013  Visit URL
An energy-efficient threshold-based clustering protocol for wireless sensor networks,”Journal of wireless personal communicationsnetworking 2013  Visit URL
Islandsat,International Journal of Advanced Intelligence Paradigmssoftware engineering 2012  Visit URL
Investigating the cyberbullying risk in digital media: protecting victims in school teenagersSocial Network Analysis and MiningComputer Science: Computer Science Applications ,Computer Science: Information Systems,Social Sciences: Communication,Engineering: Media Technology2011  Visit URL
Technology Fears: study of e-Commerce loyalty perception by Jordanian customers"International Journal of Information Systems in the Service Sector (IJISSS) e-learning 2010  Visit URL
Technology Fears: study of e-Commerce loyalty perception by Jo rda nian customers"Internatio nal Journal of Information Systems in the Service Sector e-commerece 2010  Visit URL
A Threshold-based Dynamic Data Replication StrategyThe Journal of Superco mputingnetwroking 2010  Visit URL