الأبحاث المنشورة


عنوان البحثاسم المجلةموضوع البحثسنة النشرDOIالرابط الالكتروني
Intelligent cybersecurity approach for data protection in cloud computing based Internet of ThingsInternational Journal of Information SecurityCybersecurity · Cryptography · Cloud computing · Architectural model · Intelligent2024  زيارة الرابط
Simulation and analysis performance of ad-hoc routing protocols under DDoS attack and proposed solutionInternational Journal of Data and Network ScienceAd hoc networks DSR AODV OLSR Routing protocols Wireless Networks and DDoS 2023  زيارة الرابط
A novel machine learning and face recognition technique for fake accounts detection system on cyber social networksMultimedia Tools and ApplicationsSocial media · Cyber attacks · Social media privacy · Computer vision in social media · Social media security · Face recognition2023  زيارة الرابط
A novel secure cryptography model for data transmission based on Rotor64 techniqueMultimedia Tools and ApplicationsCYBER SECURITY2023  زيارة الرابط
Towards Data-Driven Network Intrusion Detection Systems: Features Dimensionality Reduction and Machine LearningInternational Journal of Interactive Mobile Technologies (iJIM)Cyberattacks, Machine Learning, Deep Learning2022  زيارة الرابط
A secure encrypted protocol for clients handshaking in the same network, International Journal of Interactive Mobile TechnologiesSecurity2019  زيارة الرابط
Intensive Pre-Processing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques, International Journal of Interactive Mobile TechnologiesNetworking2019  زيارة الرابط
Towards improving the performance of distributed virtual memory based reversal cache approachIJCATnetwork2015  زيارة الرابط
Computer based clinical decision support system for hepatitis disease diagnosisInt. J. of Advancements in Computing TechnologyAI2013  زيارة الرابط
An energy-efficient threshold-based clustering protocol for wireless sensor networks,”Journal of wireless personal communicationsnetworking 2013  زيارة الرابط
Islandsat,International Journal of Advanced Intelligence Paradigmssoftware engineering 2012  زيارة الرابط
Investigating the cyberbullying risk in digital media: protecting victims in school teenagersSocial Network Analysis and MiningComputer Science: Computer Science Applications ,Computer Science: Information Systems,Social Sciences: Communication,Engineering: Media Technology2011  زيارة الرابط
Technology Fears: study of e-Commerce loyalty perception by Jordanian customers"International Journal of Information Systems in the Service Sector (IJISSS) e-learning 2010  زيارة الرابط
Technology Fears: study of e-Commerce loyalty perception by Jo rda nian customers"Internatio nal Journal of Information Systems in the Service Sector e-commerece 2010  زيارة الرابط
A Threshold-based Dynamic Data Replication StrategyThe Journal of Superco mputingnetwroking 2010  زيارة الرابط