A survey of phishing email filtering techniques A Almomani, BB Gupta, S Atawneh, A Meulenberg, E Almomani IEEE communications surveys & tutorials 15 (4), 2070-2090, 2013 | 371 | 2013 |
IoT transaction processing through cooperative concurrency control on fog–cloud computing environment AQ Ahmad, A Mohammad, A Ammar, G B. B Soft Computing, 1-17, 2019 | 263* | 2019 |
Machine learning for phishing detection and mitigation M Alauthman, A Almomani, M Alweshah, W Alomoush, K Alieyan Machine Learning for Computer and Cyber Security: Principle, Algorithms, and …, 2019 | 217* | 2019 |
Feature Selection using a Machine Learning to Classify a Malware AA Mouhammd alkasassbeh ,mohammed Safaa ,Mohammad Alauthman Computer Networks and Cyber Security: Principles and Paradigms,, 2019 | 166* | 2019 |
A survey of botnet detection based on DNS K Alieyan, A ALmomani, A Manasrah, MM Kadhum Neural Computing and Applications 28, 1541-1558, 2017 | 161 | 2017 |
Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain S Atawneh, A Almomani, HA Bazar, P Sumar, B Gupta . Multimedia Tools and Applications 76 (18), 18451–18472, 2017 | 154 | 2017 |
Phishing Website Detection with semantic features Based on Machine learning models: A Comparison Study A almomani, M Alauthman, M Taib' shatnawi, M Alweshah, A Alrosan, ... International Journal on Semantic Web and Information Systems (IJSWIS) 18 (1 …, 2022 | 151* | 2022 |
The monarch butterfly optimization algorithm for solving feature selection problems M Alweshah, SA Khalaileh, BB Gupta, A Almomani, AI Hammouri, ... Neural Computing and Applications, 1-15, 2020 | 149 | 2020 |
DNS rule-based schema to botnet detection K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta Enterprise Information Systems 15 (4), 545-564, 2021 | 122 | 2021 |
Phishing dynamic evolving neural fuzzy framework for online detection zero-day phishing email A Almomani, BB Gupta, TC Wan, A Altaher, S Manickam arXiv preprint arXiv:1302.0629, 2013 | 120 | 2013 |
Hadoop based defense solution to handle distributed denial of service (ddos) attacks S Tripathi, B Gupta, A Almomani, A Mishra, S Veluru Scientific Research Publishing, 2013 | 111 | 2013 |
A novel solution to handle DDOS attack in MANET M Chhabra, B Gupta, A Almomani Scientific Research Publishing, 2013 | 97 | 2013 |
Economic load dispatch problems with valve-point loading using natural updated harmony search MA Al-Betar, MA Awadallah, AT Khader, AL Bolaji, A Almomani Neural Computing and Applications 29, 767-781, 2018 | 85 | 2018 |
A variable service broker routing policy for data center selection in cloud analyst AM Manasrah, T Smadi, A ALmomani Journal of King Saud University-Computer and Information Sciences 29 (3 …, 2017 | 67 | 2017 |
Evolving fuzzy neural network for phishing emails detection A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ... Journal of Computer Science 8 (7), 1099, 2012 | 61 | 2012 |
Fast-flux hunter: a system for filtering online fast-flux botnet A Almomani Neural Computing and Applications 29 (7), 483-493, 2018 | 60 | 2018 |
Steganography in digital images: Common approaches and tools S Atawneh, A Almomani, P Sumari IETE Technical Review 30 (4), 344-358, 2013 | 60 | 2013 |
Evaluation and comparative analysis of semantic web-based strategies for enhancing educational system development B Hu, A Gaurav, C Choi, A Almomani International Journal on Semantic Web and Information Systems (IJSWIS) 18 (1 …, 2022 | 58 | 2022 |
Enhancing the security of exchanging and storing DICOM medical images on the cloud O Dorgham, B Al-Rahamneh, A Almomani, KF Khatatneh International Journal of Cloud Applications and Computing (IJCAC) 8 (1), 154-172, 2018 | 56 | 2018 |
An online intrusion detection system to cloud computing based on NeuCube algorithms A ALmomani International Journal of Cloud Applications and Computing (IJCAC) 8 (2), 96–112, 2018 | 44 | 2018 |