Enhanced method for RSA cryptosystem algorithm AH Al-Hamami, IA Aldariseh 2012 International Conference on Advanced Computer Science Applications and …, 2012 | 65 | 2012 |
Applying Neural Networks for Simplified Data Encryption Standard (SDES) Cipher System Cryptanalysis MAAE Khaled M. Alallayah, Al-Hamami H. Alaa The International Arab Journal of Information Technology (IAJIT) 9 (2), 2012 | 41* | 2012 |
Virus Detection using Clonal Selection Algorithm with Genetic Algorithm (VDC Algorithm) PDAAH Dr. Suha Afanah, Prof. Dr. Raed Abu Zitar Applied Soft Computing Journal 13 (1), 239-246, 2012 | 38* | 2012 |
Attack and Construction of Simulator for Some of Cipher Systems Using Neuro-Identifier MAAE Khaled M. Alallayah, Al-Hamami H. Alaa The International Arab Journal of Information Technology (IAJIT) 7 (4), 2010 | 26* | 2010 |
A new approach for authentication technique AH Al-Hamami, SA Al-Ani Journal of computer Science 1 (1), 103-106, 2005 | 25 | 2005 |
Attack of against simplified data encryption standard cipher system using neural networks KM Alallayah, WFA El-Wahed, M Amin, AH Alhamami Journal of Computer Science 6 (1), 29, 2010 | 24 | 2010 |
Handbook of research on threat detection and countermeasures in network security AH Al-Hamami IGI Global, 2014 | 20 | 2014 |
Novel algorithm in symmetric encryption (NASE): Based on feistel cipher SIB Baker, AH Al-Hamami 2017 international conference on new trends in computing sciences (ICTCS …, 2017 | 18 | 2017 |
Optimal cell towers distribution by using spatial mining and geographic information system AH Al-Hamami, SH Hashem arXiv preprint arXiv:1104.2721, 2011 | 18 | 2011 |
Secure Mobile Cloud Computing Based-On Fingerprint AHAHJY AL-Juneidi World of Computer Science and Information Technology Journal (WCSIT) 5 (2 …, 2015 | 16* | 2015 |
Applying data mining techniques in intrusion detection system on web and analysis of web usage AH Al-Hamami, MA Al-Hamami, SH Hasheem Information Technology Journal 5 (1), 1-4, 2006 | 16 | 2006 |
Development of a network-based: Intrusion Prevention System using a Data Mining approach AH Al-Hamami, GMW Al-Saadoon 2013 Science and Information Conference, 641-644, 2013 | 15 | 2013 |
A proposed modified data encryption standard algorithm by using fusing data technique A Al-Hamami, MA Al-Hamami, SH Hashem World of Computer Science and Information Technology Journal 1 (3), 88-91, 2011 | 13 | 2011 |
Artificial neural network-based algorithm for ARMA model order estimation KE Al-Qawasmi, AM Al-Smadi, A Al-Hamami International Conference on Networked Digital Technologies, 184-192, 2010 | 10 | 2010 |
Query dispatching tool supporting fast access to data warehouse. A Aljanabi, AH Alhamami, B Alhadidi Int. Arab J. Inf. Technol. 10 (3), 269-275, 2013 | 9 | 2013 |
Implementing new approach for enhancing performance and throughput in a distributed database. K Maabreh, A Al-Hamami Int. Arab J. Inf. Technol. 10 (3), 290-296, 2013 | 8 | 2013 |
Using Short Message Service (SMS) to Support Business Continuity AAH Maher Abdel-qader, Ahmed Al-Jaber World of Computer Science and Information Technology Journal (WSCIT), 1 (2 …, 2011 | 8* | 2011 |
Increasing database Concurrency Control Based on Attribute Level Locking AHKSM Al-hamami 2008 International Conference on Electronic Design (ICED 2008), 2008 | 8* | 2008 |
A proposed modifications to improve the performance of blowfish cryptography algorithm AH Al-Hamami, MA Al-Hamami, SH Hashem First National Information Technology Symposium (NITS 2006), 5-7, 2006 | 8 | 2006 |
Implementation of Common Secure Framework for IoT based Arduino Platform PDAHAH Asst. Prof. Dr. Mazin S. Al-Hakeem International Journal of Computer Trends and Technology (IJCTT) 32 (1), 49-53, 2016 | 7* | 2016 |