Sentiment analysis of Arabic Jordanian dialect tweets JO Atoum, M Nouman International Journal of Advanced Computer Science and Applications 10 (2), 2019 | 60 | 2019 |
Cyberbullying detection through sentiment analysis JO Atoum 2020 International Conference on Computational Science and Computational …, 2020 | 40 | 2020 |
A model for detecting tor encrypted traffic using supervised machine learning A Almubayed, A Hadi, J Atoum International Journal of Computer Network and Information Security 7 (7), 10-23, 2015 | 38 | 2015 |
A hybrid technique for SQL injection attacks detection and prevention JO Atoum, AJ Qaralleh International Journal of Database Management Systems 6 (1), 21, 2014 | 26 | 2014 |
An enhancement on content-based image retrieval using color and texture features T Mehyar, JO Atoum Journal of Emerging Trends in Computing and Information Sciences 3 (4), 488-496, 2012 | 23 | 2012 |
Mining functional dependency from relational databases using equivalent classes and minimal cover J Atoum, D Bader, A Awajan Journal of Computer Science 4 (6), 421, 2008 | 23 | 2008 |
A framework for improving the performance of ontology matching techniques in semantic Web KH Shafa’amri, JO Atoum International Journal of Advanced Computer Science and Applications 3 (1), 2012 | 15 | 2012 |
Mining approximate functional dependencies from databases based on minimal cover and equivalent classes J Atoum European Journal of Scientific Research 33 (2), 338-346, 2009 | 13 | 2009 |
PDF forensic analysis system using YARA SJ Khitan, A Hadi, J Atoum International Journal of Computer Science and Network Security 17 (5), 77-85, 2017 | 12 | 2017 |
Detecting cyberbullying from tweets through machine learning techniques with sentiment analysis JO Atoum Future of Information and Communication Conference, 25-38, 2023 | 11 | 2023 |
Risk adaptive hybrid RFID access control system M Al‐Zewairi, J Alqatawna, J Atoum Security and Communication Networks 8 (18), 3826-3835, 2015 | 10 | 2015 |
Multiple Warehouses Scheduling Using Steady State. Genetic Algorithms. J Atoum, M Al Rababaa Int. Arab J. Inf. Technol. 7 (3), 310-316, 2010 | 9 | 2010 |
Solving the traveling salesman problem using new operators in genetic algorithms NTA Rahedi, J Atoum American Journal of Applied Sciences 6 (8), 1586, 2009 | 9 | 2009 |
Distributed Black Box and Graveyards Defense Strategies against Distributed Denial of Services J Atoum, OS Faisal 2010 Second International Conference on Computer Engineering and …, 2010 | 7 | 2010 |
A multi-agent experience based e-negotiation system I Serguievskaia, H Al-Sakran, JO Atoum 2006 2nd International Conference on Information & Communication …, 2006 | 7 | 2006 |
A robust algorithm for arabic video text detection AMA Ahmad, A Alqutami, J Atoum Proceedings of the 2011 2nd International Congress on Computer Applications …, 2012 | 6 | 2012 |
Cyberbullying Detection Neural Networks using Sentiment Analysis JO Atoum 2021 International Conference on Computational Science and Computational …, 0 | 5* | |
Cloud Computing: Privacy, Mobility and Resources Utilization JOA Tariq Alwada’n, Omer Al-Zitawi International Journal of Computer Trends and Technology (IJCTT) 41 (1), 29-36, 2016 | 4* | 2016 |
Stream Processing Environmental Applications in Jordan Valley I Aldasouqi, J Atoum International Journal of Computer Science and Security (IJCSS) 5 (1), 1, 2011 | 4 | 2011 |
A framework for real time news recommendations JO Atoum, IM Yakti 2017 International Conference on New Trends in Computing Sciences (ICTCS), 89-93, 2017 | 3 | 2017 |