Chaos Theory and its Application: An Essential Framework for Image Encryption Arshad, S Shaukat, A Ali, A Eleyan, SA Shah, J Ahmad Chaos Theory and Applications 2 (1), 15-20, 2020 | 58* | 2020 |
A flexible encryption technique for the internet of things environment S Medileh, A Laouid, R Euler, A Bounceur, M Hammoudeh, M AlShaikh, ... Ad Hoc Networks 106, 102240, 2020 | 56 | 2020 |
Enhancing software comments readability using flesch reading ease score D Eleyan, A Othman, A Eleyan Information 11 (9), 430, 2020 | 55 | 2020 |
Optimization water leakage detection using wireless sensor networks (OWLD) M Daadoo, A Eleyan, D Eleyan Proceedings of the international conference on future networks and …, 2017 | 48 | 2017 |
A fully homomorphic encryption based on magic number fragmentation and El‐Gamal encryption: Smart healthcare use case M Kara, A Laouid, MA Yagoub, R Euler, S Medileh, M Hammoudeh, ... Expert Systems 39 (5), e12767, 2022 | 39 | 2022 |
Performance and scalability analysis of ethereum and hyperledger fabric Y Ucbas, A Eleyan, M Hammoudeh, M Alohaly IEEE Access, 2023 | 37 | 2023 |
A novel digital signature scheme for advanced asymmetric encryption techniques F Lalem, A Laouid, M Kara, M Al-Khalidi, A Eleyan Applied Sciences 13 (8), 5172, 2023 | 31 | 2023 |
A Survey Of Social Engineering Attacks: Detection and Prevention Tools NA Odeh, D Eleyan, A Eleyan Journal of Theoretical and Applied Information Technology 99 (18), 4375-4386, 2021 | 26 | 2021 |
IoT-based home automation using android application A Eleyan, J Fallon 2020 international symposium on networks, computers and communications …, 2020 | 23 | 2020 |
A Survey Paper on Credit Card Fraud Detection Techniques AM Fayyomi, D Eleyan, A Eleyan International Journal of Scientific and Technology Research 10 (9), 72-79, 2021 | 22 | 2021 |
Digital Forensic Tools Used in Analyzing Cybercrime M Dweikat, D Eleyan, A Eleyan Journal of University of Shanghai for Science and Technology, ISSN, 1007-6735, 2020 | 22 | 2020 |
An Improved dynamic Load Balancing Algorithm applied to a Cafeteria System in a University Campus E Draghmi, A Eleyan Proceedings of the International Conference on Future Networks and …, 2017 | 22 | 2017 |
Forensic process as a service (FPaaS) for cloud computing A Eleyan, D Eleyan 2015 European Intelligence and Security Informatics Conference, 157-160, 2015 | 20 | 2015 |
A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity S Medileh, A Laouid, M Hammoudeh, M Kara, T Bejaoui, A Eleyan, ... Information 14 (5), 263, 2023 | 19 | 2023 |
CoAP based IoT data transfer from a Raspberry Pi to Cloud TL Scott, A Eleyan 2019 International Symposium on Networks, Computers and Communications …, 2019 | 19 | 2019 |
An enhanced phishing detection tool using deep learning from URL A Dawabsheh, M Jazzar, A Eleyan, T Bejaoui, S Popoola 2022 International Conference on Smart Applications, Communications and …, 2022 | 16 | 2022 |
Coaching, Tutoring and Mentoring in the Higher Education as a solution to retain students in their major and help them achieve success. D Eleyan, A Eleyan | 16 | 2011 |
Extending WSDL and UDDI with Quality Service Selection Criteria AA Eleyan, L Zhao Proceedings of the 3rd International Symposium on Web Services, 2010 | 13 | 2010 |
A machine learning framework & development for insider cyber-crime threats detection R Yousef, M Jazzar, A Eleyan, T Bejaoui 2023 International Conference on Smart Applications, Communications and …, 2023 | 12 | 2023 |
A Prediction Olive Disease Using Machine Learning Models, Decision Tree and Naive Bayes Models J Drdsh, D Eleyan, A Eleyan Journal of Theoretical and Applied Information Technology 99 (18), 4231-4240, 2021 | 10 | 2021 |