UTSim: A framework and simulator for UAV air traffic integration, control, and communication A Al-Mousa, BH Sababha, N Al-Madi, A Barghouthi, R Younisse International Journal of Advanced Robotic Systems 16 (5), 1729881419870937, 2019 | 76 | 2019 |
Explaining intrusion detection-based convolutional neural networks using shapley additive explanations (shap) R Younisse, A Ahmad, Q Abu Al-Haija Big Data and Cognitive Computing 6 (4), 126, 2022 | 41 | 2022 |
MID-Crypt: a cryptographic algorithm for advanced medical images protection A Ahmad, Y AbuHour, R Younisse, Y Alslman, E Alnagi, Q Abu Al-Haija Journal of Sensor and Actuator Networks 11 (2), 24, 2022 | 19* | 2022 |
Hybrid encryption scheme for medical imaging using autoencoder and advanced encryption standard Y Alslman, E Alnagi, A Ahmad, Y AbuHour, R Younisse, Q Abu Al-haija Electronics 11 (23), 3967, 2022 | 14 | 2022 |
Sampling-based unmanned aerial vehicle air traffic integration, path planning, and collision avoidance BH Sababha, A Al-mousa, R Baniyounisse, J Bdour International Journal of Advanced Robotic Systems 19 (2), 17298806221086431, 2022 | 10 | 2022 |
An early detection model for kerberoasting attacks and dataset labeling R Younisse, M Alkasassbeh, M Almseidin, H Abdi Jordanian Journal of Computers and Information Technology 9 (1), 2023 | 8 | 2023 |
Fine-tuning U-net for medical image segmentation based on activation function, optimizer and pooling layer. R Younisse, R Ghnemat, J Al Saraireh International Journal of Electrical & Computer Engineering (2088-8708) 13 (5), 2023 | 5 | 2023 |
Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge J Al-Sawwa, M Almseidin, M Alkasassbeh, K Alemerien, R Younisse Cluster Computing, 1-16, 2024 | 4 | 2024 |
Application of Natural Language Processing Techniques in Agile Software Project Management: A Survey R Younisse, M Azzeh 2023 14th International Conference on Information and Communication Systems …, 2023 | 3 | 2023 |
An empirical study on utilizing online k-means clustering for intrusion detection purposes R Younisse, QA Al-Haija 2023 International Conference on Smart Applications, Communications and …, 2023 | 2 | 2023 |
SGID: A semi-synthetic dataset for injection attacks in smart grid systems R Younisse, M AlKasassbeh 2024 15th International Conference on Information and Communication Systems …, 2024 | 1 | 2024 |
An Empirical Study of Intrusion Detection by Combining Clustering and Classification Methods R Younisse, Y Alslman, E Alnagi, M Azzeh International Conference on Information, Communication and Computing …, 2023 | 1 | 2023 |
An adaptive JPEG compression-encryption system using optimized local quantization matrices RYB Youniss, A Awajan 2017 International Conference on Electrical and Computing Technologies and …, 2017 | 1 | 2017 |
DDOS ATTACK-DETECTION APPROACH BASED ON ENSEMBLE MODELS USING SPARK. Y Alslman, A Khalil, R Younisse, E Alnagi, J Al-Saraireh, R Ghnemat Jordanian Journal of Computers & Information Technology 10 (2), 2024 | | 2024 |
Homomorphic Encryption Schemes Using Nested Matrices A Khalil, R Younisse, A Ahmad, M Azzeh International Conference on Information, Communication and Computing …, 2023 | | 2023 |
A Partitioning-Based Approach to Improve the Hardware Trojan Detectability Using Side Channel Analysis; a SHA3-Based Study R Younisse PQDT-Global, 2019 | | 2019 |
Batiha, Radwan D Elrushaidat, Z Hussein, A Madain, W Mardini, H Najadat, A Odeh, ... | | |