Detecting and isolating black-hole attacks in MANET using timer based baited technique A Yasin, M Abu Zant Wireless Communications and Mobile Computing 2018, 2018 | 119 | 2018 |
An intelligent classification model for phishing email detection A Yasin, A Abuhasan arXiv preprint arXiv:1608.02196, 2016 | 94 | 2016 |
Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV) M Abu Zant, A Yasin Security and Communication Networks 2019, 2019 | 37 | 2019 |
Least recently plus five least frequently replacement policy (LR+ 5LF). A AbdelFattah, AA Samra Int. Arab J. Inf. Technol. 9 (1), 16-21, 2012 | 15 | 2012 |
Enhancing wireless sensor network security using artificial neural network based trust model A Yasin, K Sabaneh Int. J. Adv. Comput. Sci. Appl 7 (9), 222-228, 2016 | 10 | 2016 |
An enhanced Steganographic model based on DWT combined with encryption and error correction techniques A Yasin, MN Shehab, M Sabha, M Yasin International Journal of Advanced Computer Science and Applications 6 (12 …, 2015 | 7 | 2015 |
Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT). A Yasin, A Abuhasan Int. Arab J. Inf. Technol. 15 (6), 990-999, 2018 | 5 | 2018 |
Spam Reduction by using E-mail History and Authentication (SREHA) AF Yasin International Journal of Computer Network and Information Security 8 (7), 17, 2016 | 5 | 2016 |
Enhance RFID security against Brute force attack based on password strength and Markov model A Yasin, F AbuAlrub International Journal of Network Security & Its Applications (IJNSA) 8 (5), 2016 | 5 | 2016 |
Dynamic multi levels Java code obfuscation technique (DMLJCOT) A Yasin, I Nasra, A Yasin, I Nasra International Journal of Computer Science and Security (IJCSS) 10 (4), 140, 2016 | 4 | 2016 |
Enhancing the connectivity of Mobile Ad-hoc Networks by considering the Power, mobility, and activity of nodes. P Jenin | 4 | 2014 |
Clustering algorithm for AODV routing protocol based on artificial bee colony in MANET A Rattrout, A Yasin, M Abu-Zant, M Yasin, M Dwaikat Proceedings of the 2nd international conference on future networks and …, 2018 | 3 | 2018 |
SQL injection prevention using query dictionary based mechanism AF Yasin, N Zidan International Journal of Computer Science and Information Security 14 (6), 479, 2016 | 3 | 2016 |
Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks A Yasin, S Jabareen International Journal of Computer Network and Information Security 8 (4), 30, 2016 | 2 | 2016 |
Simple Scalar as an eLearning Mashup web application (eScalar). AA Samra, A Abdelfattah Int. Arab. J. e Technol. 1 (4), 142-146, 2010 | 2 | 2010 |
A Novel Wireless Sensor Networks Anti-jamming Technique Based on a Hybrid DS-CDMA/OFDM/FH M Yasin, A Yasin, AA Jazar, M Hamarsheh International Journal of Applied Engineering Research 13 (14), 11454-11460, 2018 | 1 | 2018 |
An Efficient Scheme for MANET Domain Formation (ESMDF) A AbdelFattah International Journal of Advanced Computer Science and Applications 2 (9), 2011 | 1 | 2011 |
Research Article Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV) MA Zant, A Yasin | | 2019 |
Research Article Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique A Yasin, MA Zant | | 2018 |
Software Obfuscation Technique based on Recurrent Neural Network A Yasin, I Nassra Transylvanian Review 26 (30), 2018 | | 2018 |