Healthcare professionals’ acceptance Electronic Health Records system: Critical literature review (Jordan case study) M Rasmi, MB Alazzam, MK Alsmadi, IA Almarashdeh, RA Alkhasawneh, ... International Journal of Healthcare Management, 2020 | 131 | 2020 |
Blockchain-based framework for interoperable electronic health record FA Reegu, MO Al-Khateeb, WA Zogaan, MR Al-Mousa, S Alam, ... Annals of the Romanian Society for Cell Biology, 6486-6495, 2021 | 36 | 2021 |
Website phishing detection using machine learning techniques R Alazaidah, A Al-Shaikh, MR Al-Mousa, H Khafajah, G Samara, ... Journal of Statistics Applications & Probability 13 (1), 119-129, 2024 | 35 | 2024 |
A new algorithm to estimate the similarity between the intentions of the cyber crimes for network forensics M Rasmi, A Jantan Procedia technology 11, 540-547, 2013 | 28 | 2013 |
Awareness model for minimizing the effects of social engineering attacks in web applications M Al-Khateeb, M Al-Mousa, A Al-Sherideh, D Almajali, M Asassfeha, ... International Journal of Data and Network Science 7 (2), 791-800, 2023 | 27 | 2023 |
Attack intention analysis model for network forensics M Rasmi, A Jantan Software Engineering and Computer Systems: Second International Conference …, 2011 | 27 | 2011 |
Pnfea: A proposal approach for proactive network forensics evidence analysis to resolve cyber crimes M Rasmi, A Al-Qerem International Journal of Computer Network and Information Security 7 (2), 25-32, 2015 | 20 | 2015 |
A new approach for resolving cyber crime in network forensics based on generic process model M Rasmi, A Jantan, H Al-Mimi The 6th International Conference on Information Technology (ICIT 2013), 2013 | 20 | 2013 |
Assessing the Impact and Effectiveness of Cybersecurity Measures in e-Learning on Students and Educators: A Case Study AS Al-Sherideh, K Maabreh, M Maabreh, MR Al Mousa, M Asassfeh International Journal of Advanced Computer Science and Applications 14 (5), 2023 | 19 | 2023 |
Service violation monitoring model for detecting and tracing bandwidth abuse AA Ahmed, A Jantan, M Rasmi Journal of network and systems management 21, 218-237, 2013 | 18 | 2013 |
Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis M Rasmi, KE Al-Qawasmi International Journal of Security and Its Applications 10 (5), 297-308, 2016 | 17 | 2016 |
AIA: Attack Intention Analysis Algorithm Based on D-S Theory with Causal Technique for Network Forensics- A Case Study M Rasmi, A Jantan International Journal of Digital Content Technology and its Applications 5 (9), 2011 | 17 | 2011 |
Generic Proactive IoT Cybercrime Evidence Analysis Model for Digital Forensics MR Al-Mousa 2021 International Conference on Information Technology (ICIT), 654-659, 2021 | 16 | 2021 |
Two-layer SVM, towards deep statistical learning A Kazemi, R Boostani, M Odeh, MR AL-Mousa 2022 International Engineering Conference on Electrical, Energy, and …, 2022 | 15 | 2022 |
Intelligent security in the era of AI: The key vulnerability of RC4 algorithm A Al-Arjan, M Rasmi, S AlZu’bi 2021 International Conference on Information Technology (ICIT), 691-694, 2021 | 15 | 2021 |
Analyzing cyber-attack intention for digital forensics using case-based reasoning MR Al-Mousa International Journal of Advanced Trends in Computer Science and Engineering …, 2019 | 15 | 2019 |
An Enhanced Intrusion Detection System for Protecting HTTP Services from Attacks. H Al-Mimi, NA Hamad, MM Abualhaj, MS Daoud, A Al-Dahoud, M Rasmi International Journal of Advances in Soft Computing & Its Applications 15 (3), 2023 | 14 | 2023 |
A New Iterative Approach for Designing Passive Harmonic Filters for Variable Frequency Drives T Foqha, S Alsadi, O Omari, M AL-Mousa, S Aljazzar, K Mohammad, ... Applied Mathematics & Information Sciences, 2023 | 14 | 2023 |
The Role of Business Incubators in Promoting Entrepreneurship of Higher Education Institutions F Rifai, H Al-Mimi, M Rasmi, A Aldahoud, BM AlWadi Journal of Namibian Studies: History Politics Culture 33, 906-924, 2023 | 13 | 2023 |
A proposed wireless intrusion detection prevention and attack system JA Nada, MR Al-Mosa 2018 International Arab Conference on Information Technology (ACIT), 1-5, 2018 | 13 | 2018 |