An efficient RSA public key encryption scheme SJ Aboud, MA AL-Fayoumi, M Al-Fayoumi, HS Jabbar Fifth International Conference on Information Technology: New Generations …, 2008 | 57 | 2008 |
Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior M Al-Fawa'reh, M Al-Fayoumi, S Nashwan, S Fraihat Egyptian Informatics Journal 23 (2), 173-185, 2022 | 33 | 2022 |
Fog computing: security challenges and countermeasures Z Ashi, M Al-Fawa’reh, M Al-Fayoumi Int. J. Comput. Appl 175 (15), 30-36, 2020 | 28 | 2020 |
Scalable agile transformation process (SATP) to convert waterfall project management office into agile project management office RMH Hamad, M Al Fayoumi 2018 international Arab conference on information technology (ACIT), 1-8, 2018 | 25 | 2018 |
Sentiment analysis-based sexual harassment detection using machine learning techniques E Alawneh, M Al-Fawa'reh, MT Jafar, M Al Fayoumi 2021 international symposium on electronics and smart devices (ISESD), 1-6, 2021 | 23 | 2021 |
Achieving data integrity and confidentiality using image steganography and hashing techniques A Hambouz, Y Shaheen, A Manna, M Al-Fayoumi, S Tedmori 2019 2nd international conference on new trends in computing sciences (ICTCS …, 2019 | 22 | 2019 |
Peer-mediated intervention through Snapchat: Enhancing social interactions among students with autism A Shater, A Bani-Rshaid, M Al-Fayoumi, A Al-Shaar, A Bukhamseen, ... International Journal of Data and Network Science 7 (4), 2083-2088, 2023 | 21 | 2023 |
A new hybrid approach of symmetric/asymmetric authentication protocol for future mobile networks M Al-Fayoumi, S Nashwan, S Yousef, AR Alzoubaidi Third IEEE International Conference on Wireless and Mobile Computing …, 2007 | 20 | 2007 |
Practical e-payment scheme M Al-Fayoumi, S Aboud, M Al-Fayoumi International Journal of Computer Science Issues (IJCSI) 7 (3), 18, 2010 | 19 | 2010 |
Application of modified ant colony optimization (MACO) for multicast routing problem SK Sahana, M AL-Fayoumi, PK Mahanti International Journal of Intelligent Systems and Applications 8 (4), 43, 2016 | 17 | 2016 |
Analysis of social network using clever ant colony metaphor M Al-Fayoumi, S Banerjee, PK Mahanti World Academy of Science, Engineering and Technology 5, 970-974, 2009 | 17 | 2009 |
Intelligent Association Classification Technique for Phishing Website Detection M Al-Fayoumi, J Alwidian, M Abusaif International Arab Journal of Information Technology 17 (4), 2020 | 15 | 2020 |
Detecting stealth-based attacks in large campus networks M Al-Fawa'reh, M Al Fayoumi International Journal 9 (4), 2020 | 14 | 2020 |
Ontology concepts for requirements engineering process in e-government applications A Kayed, M Nizar, M Alfayoumi 2010 Fifth International Conference on Internet and Web Applications and …, 2010 | 14 | 2010 |
An intelligent identification and classification system for malicious uniform resource locators (URLs) Q Abu Al-Haija, M Al-Fayoumi Neural Computing and Applications 35 (23), 16995-17011, 2023 | 13 | 2023 |
Enhancing data protection provided by VPN connections over open WiFi networks A Karaymeh, M Ababneh, M Qasaimeh, M Al-Fayoumi 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS …, 2019 | 13 | 2019 |
Performance analysis of SAP-NFC protocol M Al-Fayoumi, S Nashwan International Journal of Communication Networks and Information Security 10 …, 2018 | 13 | 2018 |
Verification and validation of simulation models SJ Aboud, M Al Fayoumi, M Alnuaimi Handbook of Research on Discrete Event Simulation Environments: Technologies …, 2010 | 13 | 2010 |
An enhancement of authentication protocol and key agreement (AKA) for 3G mobile networks ALF Mustafa, ALS Ja’afer International Journal of Security (IJS) 5 (1), 35-51, 2011 | 12 | 2011 |
Intrusion Detection System for Malicious Traffic Using Evolutionary Search Algorithm S Al-Saqqa, M Al-Fayoumi, M Qasaimeh Recent Advances in Computer Science and Communications (Formerly: Recent …, 2021 | 10 | 2021 |