Ikuti
Alaa Al-hamami
Alaa Al-hamami
Professor of Database Security, Princess Sumaya University for Technology
Email yang diverifikasi di psut.edu.jo - Beranda
Judul
Dikutip oleh
Dikutip oleh
Tahun
Enhanced method for RSA cryptosystem algorithm
AH Al-Hamami, IA Aldariseh
2012 International Conference on Advanced Computer Science Applications and …, 2012
652012
Applying Neural Networks for Simplified Data Encryption Standard (SDES) Cipher System Cryptanalysis
MAAE Khaled M. Alallayah, Al-Hamami H. Alaa
The International Arab Journal of Information Technology (IAJIT) 9 (2), 2012
41*2012
Virus Detection using Clonal Selection Algorithm with Genetic Algorithm (VDC Algorithm)
PDAAH Dr. Suha Afanah, Prof. Dr. Raed Abu Zitar
Applied Soft Computing Journal 13 (1), 239-246, 2012
38*2012
Attack and Construction of Simulator for Some of Cipher Systems Using Neuro-Identifier
MAAE Khaled M. Alallayah, Al-Hamami H. Alaa
The International Arab Journal of Information Technology (IAJIT) 7 (4), 2010
26*2010
A new approach for authentication technique
AH Al-Hamami, SA Al-Ani
Journal of computer Science 1 (1), 103-106, 2005
252005
Attack of against simplified data encryption standard cipher system using neural networks
KM Alallayah, WFA El-Wahed, M Amin, AH Alhamami
Journal of Computer Science 6 (1), 29, 2010
242010
Handbook of research on threat detection and countermeasures in network security
AH Al-Hamami
IGI Global, 2014
202014
Novel algorithm in symmetric encryption (NASE): Based on feistel cipher
SIB Baker, AH Al-Hamami
2017 international conference on new trends in computing sciences (ICTCS …, 2017
182017
Optimal cell towers distribution by using spatial mining and geographic information system
AH Al-Hamami, SH Hashem
arXiv preprint arXiv:1104.2721, 2011
182011
Secure Mobile Cloud Computing Based-On Fingerprint
AHAHJY AL-Juneidi
World of Computer Science and Information Technology Journal (WCSIT) 5 (2 …, 2015
16*2015
Applying data mining techniques in intrusion detection system on web and analysis of web usage
AH Al-Hamami, MA Al-Hamami, SH Hasheem
Information Technology Journal 5 (1), 1-4, 2006
162006
Development of a network-based: Intrusion Prevention System using a Data Mining approach
AH Al-Hamami, GMW Al-Saadoon
2013 Science and Information Conference, 641-644, 2013
152013
A proposed modified data encryption standard algorithm by using fusing data technique
A Al-Hamami, MA Al-Hamami, SH Hashem
World of Computer Science and Information Technology Journal 1 (3), 88-91, 2011
132011
Artificial neural network-based algorithm for ARMA model order estimation
KE Al-Qawasmi, AM Al-Smadi, A Al-Hamami
International Conference on Networked Digital Technologies, 184-192, 2010
102010
Query dispatching tool supporting fast access to data warehouse.
A Aljanabi, AH Alhamami, B Alhadidi
Int. Arab J. Inf. Technol. 10 (3), 269-275, 2013
92013
Implementing new approach for enhancing performance and throughput in a distributed database.
K Maabreh, A Al-Hamami
Int. Arab J. Inf. Technol. 10 (3), 290-296, 2013
82013
Using Short Message Service (SMS) to Support Business Continuity
AAH Maher Abdel-qader, Ahmed Al-Jaber
World of Computer Science and Information Technology Journal (WSCIT), 1 (2 …, 2011
8*2011
Increasing database Concurrency Control Based on Attribute Level Locking
AHKSM Al-hamami
2008 International Conference on Electronic Design (ICED 2008), 2008
8*2008
A proposed modifications to improve the performance of blowfish cryptography algorithm
AH Al-Hamami, MA Al-Hamami, SH Hashem
First National Information Technology Symposium (NITS 2006), 5-7, 2006
82006
Implementation of Common Secure Framework for IoT based Arduino Platform
PDAHAH Asst. Prof. Dr. Mazin S. Al-Hakeem
International Journal of Computer Trends and Technology (IJCTT) 32 (1), 49-53, 2016
7*2016
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20