Volgen
Ammar Odeh
Titel
Geciteerd door
Geciteerd door
Jaar
Security and privacy of electronic health records: Concerns and challenges
I Keshta, A Odeh
Egyptian Informatics Journal 22 (2), 177-183, 2021
4582021
Analysis of blockchain in the healthcare sector: application and issues
A Odeh, I Keshta, QA Al-Haija
Symmetry 14 (9), 1760, 2022
782022
Machine learningtechniquesfor detection of website phishing: A review for promises and challenges
A Odeh, I Keshta, E Abdelfattah
2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021
742021
PDF malware detection based on optimizable decision trees
Q Abu Al-Haija, A Odeh, H Qattous
Electronics 11 (19), 3142, 2022
552022
Performance evaluation of AODV and DSR routing protocols in MANET networks
A Odeh, E AbdelFattah, M Alshowkan
International Journal of Distributed and Parallel Systems 3 (4), 13, 2012
552012
Detection in adverse weather conditions for autonomous vehicles via deep learning
QA Al-Haija, M Gharaibeh, A Odeh
Ai 3 (2), 303-317, 2022
522022
Steganography by multipoint Arabic letters
A Odeh, A Alzubi, QB Hani, K Elleithy
2012 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2012
522012
Analysis of ping of death DoS and DDoS attacks
F Yihunie, E Abdelfattah, A Odeh
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2018
492018
Steganography in Arabic text using Kashida variation algorithm (KVA)
A Odeh, K Elleithy, M Faezipour
2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2013
422013
Steganography in Arabic text using zero width and kashidha letters
A Odeh, K Elleithy
International Journal of Computer Science & Information Technology 4 (3), 1, 2012
402012
Quantum key distribution by using public key algorithm (RSA)
A Odeh, K Elleithy, M Alshowkan, E Abdelfattah
Third International Conference on Innovative Computing Technology (INTECH …, 2013
372013
PHIBOOST-a novel phishing detection model using Adaptive boosting approach
EA Ammar Odeh, Ismail Keshta
Jordanian Journal of Computers and Information Technology (JJCIT) 7 (01), 2021
332021
Efficient detection of phishing websites using multilayer perceptron
A Odeh, I Keshta, E Abdelfattah
International Association of Online Engineering, 2020
322020
Steganography in text by using MS word symbols
A Odeh, K Elleithy, M Faezipour
Proceedings of the 2014 Zone 1 Conference of the American Society for …, 2014
32*2014
Ensemble-based deep learning models for enhancing IoT intrusion detection
A Odeh, A Abu Taleb
Applied Sciences 13 (21), 11985, 2023
282023
A lightweight double-stage scheme to identify malicious DNS over HTTPS traffic using a hybrid learning approach
Q Abu Al-Haija, M Alohaly, A Odeh
Sensors 23 (7), 3489, 2023
272023
Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal, 22 (2), 177-183
I Keshta, A Odeh
262021
Efficient prediction of phishing websites using multilayer perceptron (MLP)
A Odeh, A Alarbi, I Keshta, E Abdelfattah
Journal of Theoretical and Applied Information Technology 98 (16), 3353-3363, 2020
192020
Novel steganography over HTML code
A Odeh, K Elleithy, M Faezipour, E Abdelfattah
Innovations and Advances in Computing, Informatics, Systems Sciences …, 2015
172015
The effect of trust, IT knowledge, and entrepreneur’s innovativeness to embrace or shun the internet of things
A Abushakra, D Nikbin, A Odeh, R Abdulwahab
Frontiers in Psychology 13, 1035015, 2022
152022
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20