Follow
Alaa  Hussein AL hamami
Alaa Hussein AL hamami
Dean and Professor
Verified email at bub.bh
Title
Cited by
Cited by
Year
Enhanced method for RSA cryptosystem algorithm
AH Al-Hamami, IA Aldariseh
2012 International Conference on Advanced Computer Science Applications and …, 2012
642012
Virus detection using clonal selection algorithm with genetic algorithm (VDC algorithm)
S Afaneh, RA Zitar, A Al-Hamami
Applied Soft Computing 13 (1), 239-246, 2013
372013
A new approach for authentication technique
AH Al-Hamami, SA Al-Ani
Journal of computer Science 1 (1), 103-106, 2005
252005
Optimal cell towers distribution by using spatial mining and geographic information system
AH Al-Hamami, SH Hashem
arXiv preprint arXiv:1104.2721, 2011
182011
Novel algorithm in symmetric encryption (NASE): Based on feistel cipher
SIB Baker, AH Al-Hamami
2017 international conference on new trends in computing sciences (ICTCS …, 2017
162017
Applying data mining techniques in intrusion detection system on web and analysis of web usage
AH Al-Hamami, MA Al-Hamami, SH Hasheem
Information Technology Journal 5 (1), 1-4, 2006
162006
Secure Mobile Cloud Computing Based-On Fingerprint.
AH Al-Hamami, JY AL-Juneidi
World of Computer Science & Information Technology Journal 5 (2), 2015
152015
Development of a network-based: Intrusion Prevention System using a Data Mining approach
AH Al-Hamami, GMW Al-Saadoon
2013 Science and Information Conference, 641-644, 2013
152013
A proposed modified data encryption standard algorithm by using fusing data technique
A Al-Hamami, MA Al-Hamami, SH Hashem
World of Computer Science and Information Technology Journal 1 (3), 88-91, 2011
132011
Handbook of Research on Threat Detection and Countermeasures in Network Security
AH Al-Hamami
IGI Global, 2014
112014
Artificial neural network-based algorithm for ARMA model order estimation
KE Al-Qawasmi, AM Al-Smadi, A Al-Hamami
Networked Digital Technologies: Second International Conference, NDT 2010 …, 2010
102010
Implementing new approach for enhancing performance and throughput in a distributed database.
K Maabreh, A Al-Hamami
Int. Arab J. Inf. Technol. 10 (3), 290-296, 2013
82013
Using short message service (SMS) to support business continuity
M Abdel-Qader, A Al-Jaber, A Al-Hamami
arXiv preprint arXiv:1103.5881, 2011
82011
A Proposed Modifications to Improve the Performance of Blowfish Cryptography Algorithm
AH Al-Hamami, MA Al-Hamami, SH Hashem
First National Information Technology Symposium (NITS 2006), 5-7, 2006
82006
An Approach for Preserving Privacy and Knowledge In Data Mining Applications
AH Al-Hamami, SA Shehab
Journal of Emerging Trends in Computing and Information Sciences 4 (1), 2013
72013
Increasing database concurrency control based on attribute level locking
KS Maabreh, A Al-Hamami
2008 International Conference on Electronic Design, 1-4, 2008
72008
Enhancing Big Data analysis by using map-reduce technique
AH Al-Hamami, AA Flayyih
Bulletin of Electrical Engineering and Informatics 7 (1), 113-116, 2018
62018
Development of an opinion blog mining system
AH Al-Hamami, SH Shahrour
2015 4th international conference on advanced computer science applications …, 2015
62015
Developing a host intrusion prevention system by using data mining
A Al-hamami, T Alawneh
2012 International Conference on Advanced Computer Science Applications and …, 2012
62012
A robust ARX and ARMA model order estimation via pivot-neighbors comparisons
KE Al-Qawasmi, AM Al-Smadi, A Al-Hamami
Recent Patents on Computer Science 3 (1), 33-38, 2010
62010
The system can't perform the operation now. Try again later.
Articles 1–20