Security and privacy of electronic health records: Concerns and challenges I Keshta, A Odeh Egyptian Informatics Journal 22 (2), 177-183, 2021 | 460 | 2021 |
Analysis of blockchain in the healthcare sector: application and issues A Odeh, I Keshta, QA Al-Haija Symmetry 14 (9), 1760, 2022 | 78 | 2022 |
Machine learningtechniquesfor detection of website phishing: A review for promises and challenges A Odeh, I Keshta, E Abdelfattah 2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021 | 74 | 2021 |
PDF malware detection based on optimizable decision trees Q Abu Al-Haija, A Odeh, H Qattous Electronics 11 (19), 3142, 2022 | 55 | 2022 |
Performance evaluation of AODV and DSR routing protocols in MANET networks A Odeh, E AbdelFattah, M Alshowkan International Journal of Distributed and Parallel Systems 3 (4), 13, 2012 | 55 | 2012 |
Detection in adverse weather conditions for autonomous vehicles via deep learning QA Al-Haija, M Gharaibeh, A Odeh Ai 3 (2), 303-317, 2022 | 52 | 2022 |
Steganography by multipoint Arabic letters A Odeh, A Alzubi, QB Hani, K Elleithy 2012 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2012 | 52 | 2012 |
Analysis of ping of death DoS and DDoS attacks F Yihunie, E Abdelfattah, A Odeh 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2018 | 49 | 2018 |
Steganography in Arabic text using Kashida variation algorithm (KVA) A Odeh, K Elleithy, M Faezipour 2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2013 | 42 | 2013 |
Steganography in Arabic text using zero width and kashidha letters A Odeh, K Elleithy International Journal of Computer Science & Information Technology 4 (3), 1, 2012 | 40 | 2012 |
Quantum key distribution by using public key algorithm (RSA) A Odeh, K Elleithy, M Alshowkan, E Abdelfattah Third International Conference on Innovative Computing Technology (INTECH …, 2013 | 37 | 2013 |
PHIBOOST-a novel phishing detection model using Adaptive boosting approach EA Ammar Odeh, Ismail Keshta Jordanian Journal of Computers and Information Technology (JJCIT) 7 (01), 2021 | 33 | 2021 |
Efficient detection of phishing websites using multilayer perceptron A Odeh, I Keshta, E Abdelfattah International Association of Online Engineering, 2020 | 32 | 2020 |
Steganography in text by using MS word symbols A Odeh, K Elleithy, M Faezipour Proceedings of the 2014 Zone 1 Conference of the American Society for …, 2014 | 32* | 2014 |
Ensemble-based deep learning models for enhancing IoT intrusion detection A Odeh, A Abu Taleb Applied Sciences 13 (21), 11985, 2023 | 28 | 2023 |
A lightweight double-stage scheme to identify malicious DNS over HTTPS traffic using a hybrid learning approach Q Abu Al-Haija, M Alohaly, A Odeh Sensors 23 (7), 3489, 2023 | 27 | 2023 |
Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal, 22 (2), 177-183 I Keshta, A Odeh | 26 | 2021 |
Efficient prediction of phishing websites using multilayer perceptron (MLP) A Odeh, A Alarbi, I Keshta, E Abdelfattah Journal of Theoretical and Applied Information Technology 98 (16), 3353-3363, 2020 | 19 | 2020 |
Novel steganography over HTML code A Odeh, K Elleithy, M Faezipour, E Abdelfattah Innovations and Advances in Computing, Informatics, Systems Sciences …, 2015 | 17 | 2015 |
The effect of trust, IT knowledge, and entrepreneur’s innovativeness to embrace or shun the internet of things A Abushakra, D Nikbin, A Odeh, R Abdulwahab Frontiers in Psychology 13, 1035015, 2022 | 15 | 2022 |