Enhanced method for RSA cryptosystem algorithm AH Al-Hamami, IA Aldariseh 2012 International Conference on Advanced Computer Science Applications and …, 2012 | 64 | 2012 |
Virus detection using clonal selection algorithm with genetic algorithm (VDC algorithm) S Afaneh, RA Zitar, A Al-Hamami Applied Soft Computing 13 (1), 239-246, 2013 | 37 | 2013 |
A new approach for authentication technique AH Al-Hamami, SA Al-Ani Journal of computer Science 1 (1), 103-106, 2005 | 25 | 2005 |
Optimal cell towers distribution by using spatial mining and geographic information system AH Al-Hamami, SH Hashem arXiv preprint arXiv:1104.2721, 2011 | 18 | 2011 |
Novel algorithm in symmetric encryption (NASE): Based on feistel cipher SIB Baker, AH Al-Hamami 2017 international conference on new trends in computing sciences (ICTCS …, 2017 | 16 | 2017 |
Applying data mining techniques in intrusion detection system on web and analysis of web usage AH Al-Hamami, MA Al-Hamami, SH Hasheem Information Technology Journal 5 (1), 1-4, 2006 | 16 | 2006 |
Secure Mobile Cloud Computing Based-On Fingerprint. AH Al-Hamami, JY AL-Juneidi World of Computer Science & Information Technology Journal 5 (2), 2015 | 15 | 2015 |
Development of a network-based: Intrusion Prevention System using a Data Mining approach AH Al-Hamami, GMW Al-Saadoon 2013 Science and Information Conference, 641-644, 2013 | 15 | 2013 |
A proposed modified data encryption standard algorithm by using fusing data technique A Al-Hamami, MA Al-Hamami, SH Hashem World of Computer Science and Information Technology Journal 1 (3), 88-91, 2011 | 13 | 2011 |
Handbook of Research on Threat Detection and Countermeasures in Network Security AH Al-Hamami IGI Global, 2014 | 11 | 2014 |
Artificial neural network-based algorithm for ARMA model order estimation KE Al-Qawasmi, AM Al-Smadi, A Al-Hamami Networked Digital Technologies: Second International Conference, NDT 2010 …, 2010 | 10 | 2010 |
Implementing new approach for enhancing performance and throughput in a distributed database. K Maabreh, A Al-Hamami Int. Arab J. Inf. Technol. 10 (3), 290-296, 2013 | 8 | 2013 |
Using short message service (SMS) to support business continuity M Abdel-Qader, A Al-Jaber, A Al-Hamami arXiv preprint arXiv:1103.5881, 2011 | 8 | 2011 |
A Proposed Modifications to Improve the Performance of Blowfish Cryptography Algorithm AH Al-Hamami, MA Al-Hamami, SH Hashem First National Information Technology Symposium (NITS 2006), 5-7, 2006 | 8 | 2006 |
An Approach for Preserving Privacy and Knowledge In Data Mining Applications AH Al-Hamami, SA Shehab Journal of Emerging Trends in Computing and Information Sciences 4 (1), 2013 | 7 | 2013 |
Increasing database concurrency control based on attribute level locking KS Maabreh, A Al-Hamami 2008 International Conference on Electronic Design, 1-4, 2008 | 7 | 2008 |
Enhancing Big Data analysis by using map-reduce technique AH Al-Hamami, AA Flayyih Bulletin of Electrical Engineering and Informatics 7 (1), 113-116, 2018 | 6 | 2018 |
Development of an opinion blog mining system AH Al-Hamami, SH Shahrour 2015 4th international conference on advanced computer science applications …, 2015 | 6 | 2015 |
Developing a host intrusion prevention system by using data mining A Al-hamami, T Alawneh 2012 International Conference on Advanced Computer Science Applications and …, 2012 | 6 | 2012 |
A robust ARX and ARMA model order estimation via pivot-neighbors comparisons KE Al-Qawasmi, AM Al-Smadi, A Al-Hamami Recent Patents on Computer Science 3 (1), 33-38, 2010 | 6 | 2010 |