A survey of phishing email filtering techniques A Almomani, BB Gupta, S Atawneh, A Meulenberg, E Almomani IEEE communications surveys & tutorials 15 (4), 2070-2090, 2013 | 398 | 2013 |
IoT transaction processing through cooperative concurrency control on fog–cloud computing environment AQ Ahmad, A Mohammad, A Ammar, G B. B Soft Computing, 1-17, 2019 | 277* | 2019 |
Machine learning for phishing detection and mitigation M Alauthman, A Almomani, M Alweshah, W Alomoush, K Alieyan Machine Learning for Computer and Cyber Security: Principle, Algorithms, and …, 2019 | 223* | 2019 |
Feature Selection using a Machine Learning to Classify a Malware AA Mouhammd alkasassbeh ,mohammed Safaa ,Mohammad Alauthman Computer Networks and Cyber Security: Principles and Paradigms,, 2019 | 197* | 2019 |
Phishing Website Detection with semantic features Based on Machine learning models: A Comparison Study A almomani, M Alauthman, M Taib' shatnawi, M Alweshah, A Alrosan, ... International Journal on Semantic Web and Information Systems (IJSWIS) 18 (1 …, 2022 | 177* | 2022 |
A survey of botnet detection based on DNS K Alieyan, A ALmomani, A Manasrah, MM Kadhum Neural Computing and Applications 28, 1541-1558, 2017 | 171 | 2017 |
The monarch butterfly optimization algorithm for solving feature selection problems M Alweshah, SA Khalaileh, BB Gupta, A Almomani, AI Hammouri, ... Neural Computing and Applications, 1-15, 2020 | 169 | 2020 |
Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain S Atawneh, A Almomani, HA Bazar, P Sumar, B Gupta . Multimedia Tools and Applications 76 (18), 18451–18472, 2017 | 161 | 2017 |
DNS rule-based schema to botnet detection K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta Enterprise Information Systems 15 (4), 545-564, 2021 | 127 | 2021 |
Phishing dynamic evolving neural fuzzy framework for online detection zero-day phishing email A Almomani, BB Gupta, TC Wan, A Altaher, S Manickam arXiv preprint arXiv:1302.0629, 2013 | 124 | 2013 |
Hadoop based defense solution to handle distributed denial of service (ddos) attacks S Tripathi, B Gupta, A Almomani, A Mishra, S Veluru Journal of Information Security 4 (3), 150-164, 2013 | 116 | 2013 |
A novel solution to handle DDOS attack in MANET M Chhabra, B Gupta, A Almomani Scientific Research Publishing, 2013 | 98 | 2013 |
Economic load dispatch problems with valve-point loading using natural updated harmony search MA Al-Betar, MA Awadallah, AT Khader, AL Bolaji, A Almomani Neural Computing and Applications 29, 767-781, 2018 | 89 | 2018 |
Evaluation and comparative analysis of semantic web-based strategies for enhancing educational system development B Hu, A Gaurav, C Choi, A Almomani International Journal on Semantic Web and Information Systems (IJSWIS) 18 (1 …, 2022 | 81 | 2022 |
A variable service broker routing policy for data center selection in cloud analyst AM Manasrah, T Smadi, A ALmomani Journal of King Saud University-Computer and Information Sciences 29 (3 …, 2017 | 70 | 2017 |
Steganography in digital images: Common approaches and tools S Atawneh, A Almomani, P Sumari IETE Technical Review 30 (4), 344-358, 2013 | 62 | 2013 |
Fast-flux hunter: a system for filtering online fast-flux botnet A Almomani Neural Computing and Applications 29 (7), 483-493, 2018 | 61 | 2018 |
Evolving fuzzy neural network for phishing emails detection A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ... Journal of Computer Science 8 (7), 1099, 2012 | 60 | 2012 |
Enhancing the security of exchanging and storing DICOM medical images on the cloud O Dorgham, B Al-Rahamneh, A Almomani, KF Khatatneh International Journal of Cloud Applications and Computing (IJCAC) 8 (1), 154-172, 2018 | 57 | 2018 |
Multiround transfer learning and modified generative adversarial network for lung cancer detection KT Chui, BB Gupta, RH Jhaveri, HR Chi, V Arya, A Almomani, A Nauman International Journal of Intelligent Systems 2023 (1), 6376275, 2023 | 54 | 2023 |