State-of-the-art in artificial neural network applications: A survey OI Abiodun, A Jantan, AE Omolara, KV Dada, NAE Mohamed, H Arshad Heliyon 4 (11), 2018 | 3107 | 2018 |
Comprehensive review of artificial neural network applications to pattern recognition OI Abiodun, A Jantan, AE Omolara, KV Dada, AM Umar, OU Linus, ... IEEE access 7, 158820-158846, 2019 | 620 | 2019 |
Image Encryption Using Block-Based Transformation Algorithm. MAB Younes, A Jantan IAENG International Journal of Computer Science 35 (1), 2008 | 315 | 2008 |
Kemi Victoria Dada, Nachaat AbdElatif Mohamed, and Humaira Arshad OI Abiodun, A Jantan, AE Omolara State-of-the-art in artificial neural network applications: A survey …, 2018 | 242 | 2018 |
Digital forensics: review of issues in scientific validation of digital evidence H Arshad, AB Jantan, OI Abiodun Journal of Information Processing Systems 14 (2), 346-376, 2018 | 155 | 2018 |
A new steganography approach for images encryption exchange by using the least significant bit insertion MAB Younes, A Jantan International Journal of Computer Science and Network Security 8 (6), 247-257, 2008 | 128 | 2008 |
An image encryption approach using a combination of permutation technique followed by encryption MAB Younes, A Jantan International journal of computer science and network security 8 (4), 191-197, 2008 | 116 | 2008 |
An approach for malware behavior identification and classification MF Zolkipli, A Jantan 2011 3rd international conference on computer research and development 1 …, 2011 | 80 | 2011 |
A framework for malware detection using combination technique and signature generation MF Zolkipli, A Jantan 2010 Second International Conference on Computer Research and Development …, 2010 | 78 | 2010 |
Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems WAHM Ghanem, A Jantan Neural computing and applications 30, 163-181, 2018 | 73 | 2018 |
Evidence collection and forensics on social networks: Research challenges and directions H Arshad, A Jantan, E Omolara Digital Investigation 28, 126-138, 2019 | 72 | 2019 |
Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural networks WAHM Ghanem, SAA Ghaleb, A Jantan, AB Nasser, SAM Saleh, A Ngah, ... IEEE Access 10, 76318-76339, 2022 | 60 | 2022 |
A cognitively inspired hybridization of artificial bee colony and dragonfly algorithms for training multi-layer perceptrons WAHM Ghanem, A Jantan Cognitive Computation 10, 1096-1134, 2018 | 58 | 2018 |
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons WAHM Ghanem, A Jantan, SAA Ghaleb, AB Nasser IEEE Access 8, 130452-130475, 2020 | 56 | 2020 |
A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm WAHM Ghanem, A Jantan Neural Computing and Applications 32 (15), 11665-11698, 2020 | 55 | 2020 |
An intelligent traffic light monitor system using an adaptive associative memory EIA Kareem, A Jantan IJIPM: International Journal of Information Processing and Management 2 (2 …, 2011 | 52 | 2011 |
Novel multi-objective artificial bee colony optimization for wrapper based feature selection in intrusion detection W Ghanem, A Jantan Int. J. Adv. Soft Comput. Appl 8 (1), 70-81, 2016 | 48 | 2016 |
Malware behavior analysis: Learning and understanding current malware threats MF Zolkipli, A Jantan 2010 Second International Conference on Network Applications, Protocols and …, 2010 | 47 | 2010 |
An enhanced bat algorithm with mutation operator for numerical optimization problems WAHM Ghanem, A Jantan Neural Computing and Applications 31, 617-651, 2019 | 43 | 2019 |
Training a neural network for cyberattack classification applications using hybridization of an artificial bee colony and monarch butterfly optimization WAHM Ghanem, A Jantan Neural Processing Letters 51 (1), 905-946, 2020 | 39 | 2020 |