A survey of phishing email filtering techniques A Almomani, BB Gupta, S Atawneh, A Meulenberg, E Almomani IEEE communications surveys & tutorials 15 (4), 2070-2090, 2013 | 272 | 2013 |
IoT transaction processing through cooperative concurrency control on fog–cloud computing environment AQ Ahmad, A Mohammad, A Ammar, G B. B Soft Computing, 1-17, 2019 | 142* | 2019 |
Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain S Atawneh, A Almomani, HA Bazar, P Sumar, B Gupta . Multimedia Tools and Applications 76 (18), 18451–18472, 2017 | 110 | 2017 |
A survey of botnet detection based on DNS K Alieyan, A ALmomani, A Manasrah, MM Kadhum Neural Computing and Applications 28 (7), 1541-1558, 2017 | 108 | 2017 |
Hadoop based defense solution to handle distributed denial of service (ddos) attacks S Tripathi, B Gupta, A Almomani, A Mishra, S Veluru Scientific Research Publishing, 2013 | 74 | 2013 |
A novel solution to handle DDOS attack in MANET M Chhabra, B Gupta, A Almomani Scientific Research Publishing, 2013 | 71 | 2013 |
Economic load dispatch problems with valve-point loading using natural updated harmony search MA Al-Betar, MA Awadallah, AT Khader, AL Bolaji, A Almomani Neural Computing and Applications 29 (10), 767-781, 2018 | 69 | 2018 |
Phishing dynamic evolving neural fuzzy framework for online detection zero-day phishing email A Almomani, BB Gupta, TC Wan, A Altaher, S Manickam arXiv preprint arXiv:1302.0629, 2013 | 69 | 2013 |
The monarch butterfly optimization algorithm for solving feature selection problems M Alweshah, SA Khalaileh, BB Gupta, A Almomani, AI Hammouri, ... Neural Computing and Applications, 1-15, 2020 | 68 | 2020 |
Evolving fuzzy neural network for phishing emails detection A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ... Journal of Computer Science 8 (7), 1099, 2012 | 55 | 2012 |
DNS rule-based schema to botnet detection K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta Enterprise Information Systems 15 (4), 545-564, 2021 | 50 | 2021 |
A variable service broker routing policy for data center selection in cloud analyst AM Manasrah, T Smadi, A ALmomani Journal of King Saud University-Computer and Information Sciences 29 (3 …, 2017 | 50 | 2017 |
Steganography in digital images: Common approaches and tools S Atawneh, A Almomani, P Sumari IETE Technical Review 30 (4), 344-358, 2013 | 49 | 2013 |
Enhancing the security of exchanging and storing DICOM medical images on the cloud O Dorgham, B Al-Rahamneh, A Almomani, KF Khatatneh International Journal of Cloud Applications and Computing (IJCAC) 8 (1), 154-172, 2018 | 45 | 2018 |
Fast-flux hunter: a system for filtering online fast-flux botnet A Almomani Neural Computing and Applications 29 (7), 483-493, 2018 | 38 | 2018 |
An online intrusion detection system to cloud computing based on NeuCube algorithms A ALmomani International Journal of Cloud Applications and Computing (IJCAC) 8 (2), 96–112, 2018 | 37 | 2018 |
Feature Selection using a Machine Learning to Classify a Malware AA Mouhammd alkasassbeh ,mohammed Safaa ,Mohammad Alauthman Computer Networks and Cyber Security: Principles and Paradigms,, 2019 | 32* | 2019 |
An Online Model on Evolving Phishing E-mail Detection and Classification Method et al Ammar ALmomani journal of applied science 11 (11), 3301-3307, 2011 | 32* | 2011 |
An enhanced online phishing e-mail detection framework based on “Evolving connectionist system" Ammar ALmomani,et al. International Journal of Innovative Computing, Information and Control …, 2013 | 30 | 2013 |
Mobile game approach to prevent childhood obesity using persuasive technology E Almonani, W Husain, OY San, A Almomani, M Al-Betar 2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014 | 29 | 2014 |