Enhancing software comments readability using flesch reading ease score D Eleyan, A Othman, A Eleyan Information 11 (9), 430, 2020 | 59 | 2020 |
Chaos Theory and its Application: An Essential Framework for Image Encryption Arshad, S Shaukat, A Ali, A Eleyan, SA Shah, J Ahmad Chaos Theory and Applications 2 (1), 15-20, 2020 | 59* | 2020 |
A flexible encryption technique for the internet of things environment S Medileh, A Laouid, R Euler, A Bounceur, M Hammoudeh, M AlShaikh, ... Ad Hoc Networks 106, 102240, 2020 | 57 | 2020 |
Optimization water leakage detection using wireless sensor networks (OWLD) M Daadoo, A Eleyan, D Eleyan Proceedings of the international conference on future networks and …, 2017 | 50 | 2017 |
Performance and scalability analysis of ethereum and hyperledger fabric Y Ucbas, A Eleyan, M Hammoudeh, M Alohaly IEEE Access 11, 67156-67167, 2023 | 43 | 2023 |
A fully homomorphic encryption based on magic number fragmentation and El‐Gamal encryption: Smart healthcare use case M Kara, A Laouid, MA Yagoub, R Euler, S Medileh, M Hammoudeh, ... Expert Systems 39 (5), e12767, 2022 | 42 | 2022 |
A novel digital signature scheme for advanced asymmetric encryption techniques F Lalem, A Laouid, M Kara, M Al-Khalidi, A Eleyan Applied Sciences 13 (8), 5172, 2023 | 35 | 2023 |
A Survey Of Social Engineering Attacks: Detection and Prevention Tools NA Odeh, D Eleyan, A Eleyan Journal of Theoretical and Applied Information Technology 99 (18), 4375-4386, 2021 | 26 | 2021 |
A Survey Paper on Credit Card Fraud Detection Techniques AM Fayyomi, D Eleyan, A Eleyan International Journal of Scientific and Technology Research 10 (9), 72-79, 2021 | 24 | 2021 |
IoT-based home automation using android application A Eleyan, J Fallon 2020 international symposium on networks, computers and communications …, 2020 | 23 | 2020 |
An Improved dynamic Load Balancing Algorithm applied to a Cafeteria System in a University Campus E Draghmi, A Eleyan Proceedings of the International Conference on Future Networks and …, 2017 | 22 | 2017 |
A multi-key with partially homomorphic encryption scheme for low-end devices ensuring data integrity S Medileh, A Laouid, M Hammoudeh, M Kara, T Bejaoui, A Eleyan, ... Information 14 (5), 263, 2023 | 21 | 2023 |
Digital forensic tools used in analyzing cybercrime M Dweikat, D Eleyan, A Eleyan Journal of University of Shanghai for Science and Technology 23 (3), 367-379, 2021 | 20 | 2021 |
Forensic process as a service (FPaaS) for cloud computing A Eleyan, D Eleyan 2015 European Intelligence and Security Informatics Conference, 157-160, 2015 | 20 | 2015 |
CoAP based IoT data transfer from a Raspberry Pi to Cloud TL Scott, A Eleyan 2019 International Symposium on Networks, Computers and Communications …, 2019 | 19 | 2019 |
An enhanced phishing detection tool using deep learning from URL A Dawabsheh, M Jazzar, A Eleyan, T Bejaoui, S Popoola 2022 International conference on smart applications, communications and …, 2022 | 15 | 2022 |
Coaching, Tutoring and Mentoring in the Higher Education as a solution to retain students in their major and help them achieve success. D Eleyan, A Eleyan | 15 | 2011 |
A machine learning framework & development for insider cyber-crime threats detection R Yousef, M Jazzar, A Eleyan, T Bejaoui 2023 International Conference on Smart Applications, Communications and …, 2023 | 14 | 2023 |
Extending WSDL and UDDI with Quality Service Selection Criteria AA Eleyan, L Zhao Proceedings of the 3rd International Symposium on Web Services, 2010 | 12 | 2010 |
A survey paper on blockchain as a service platforms SM Alshurafa, D Eleyan, A Eleyan International Journal of High Performance Computing and Networking (IJHPCN …, 2021 | 11 | 2021 |