フォロー
Amna Eleyan
タイトル
引用先
引用先
Enhancing software comments readability using flesch reading ease score
D Eleyan, A Othman, A Eleyan
Information 11 (9), 430, 2020
592020
Chaos Theory and its Application: An Essential Framework for Image Encryption
Arshad, S Shaukat, A Ali, A Eleyan, SA Shah, J Ahmad
Chaos Theory and Applications 2 (1), 15-20, 2020
59*2020
A flexible encryption technique for the internet of things environment
S Medileh, A Laouid, R Euler, A Bounceur, M Hammoudeh, M AlShaikh, ...
Ad Hoc Networks 106, 102240, 2020
572020
Optimization water leakage detection using wireless sensor networks (OWLD)
M Daadoo, A Eleyan, D Eleyan
Proceedings of the international conference on future networks and …, 2017
502017
Performance and scalability analysis of ethereum and hyperledger fabric
Y Ucbas, A Eleyan, M Hammoudeh, M Alohaly
IEEE Access 11, 67156-67167, 2023
432023
A fully homomorphic encryption based on magic number fragmentation and El‐Gamal encryption: Smart healthcare use case
M Kara, A Laouid, MA Yagoub, R Euler, S Medileh, M Hammoudeh, ...
Expert Systems 39 (5), e12767, 2022
422022
A novel digital signature scheme for advanced asymmetric encryption techniques
F Lalem, A Laouid, M Kara, M Al-Khalidi, A Eleyan
Applied Sciences 13 (8), 5172, 2023
352023
A Survey Of Social Engineering Attacks: Detection and Prevention Tools
NA Odeh, D Eleyan, A Eleyan
Journal of Theoretical and Applied Information Technology 99 (18), 4375-4386, 2021
262021
A Survey Paper on Credit Card Fraud Detection Techniques
AM Fayyomi, D Eleyan, A Eleyan
International Journal of Scientific and Technology Research 10 (9), 72-79, 2021
242021
IoT-based home automation using android application
A Eleyan, J Fallon
2020 international symposium on networks, computers and communications …, 2020
232020
An Improved dynamic Load Balancing Algorithm applied to a Cafeteria System in a University Campus
E Draghmi, A Eleyan
Proceedings of the International Conference on Future Networks and …, 2017
222017
A multi-key with partially homomorphic encryption scheme for low-end devices ensuring data integrity
S Medileh, A Laouid, M Hammoudeh, M Kara, T Bejaoui, A Eleyan, ...
Information 14 (5), 263, 2023
212023
Digital forensic tools used in analyzing cybercrime
M Dweikat, D Eleyan, A Eleyan
Journal of University of Shanghai for Science and Technology 23 (3), 367-379, 2021
202021
Forensic process as a service (FPaaS) for cloud computing
A Eleyan, D Eleyan
2015 European Intelligence and Security Informatics Conference, 157-160, 2015
202015
CoAP based IoT data transfer from a Raspberry Pi to Cloud
TL Scott, A Eleyan
2019 International Symposium on Networks, Computers and Communications …, 2019
192019
An enhanced phishing detection tool using deep learning from URL
A Dawabsheh, M Jazzar, A Eleyan, T Bejaoui, S Popoola
2022 International conference on smart applications, communications and …, 2022
152022
Coaching, Tutoring and Mentoring in the Higher Education as a solution‎ to retain students in their major and help them achieve success.
D Eleyan, A Eleyan
152011
A machine learning framework & development for insider cyber-crime threats detection
R Yousef, M Jazzar, A Eleyan, T Bejaoui
2023 International Conference on Smart Applications, Communications and …, 2023
142023
Extending WSDL and UDDI with Quality Service Selection Criteria
AA Eleyan, L Zhao
Proceedings of the 3rd International Symposium on Web Services, 2010
122010
A survey paper on blockchain as a service platforms
SM Alshurafa, D Eleyan, A Eleyan
International Journal of High Performance Computing and Networking (IJHPCN …, 2021
112021
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20