A survey of phishing email filtering techniques A Almomani, BB Gupta, S Atawneh, A Meulenberg, E Almomani IEEE communications surveys & tutorials 15 (4), 2070-2090, 2013 | 398 | 2013 |
Secure and Imperceptible Digital Image Steganographic Algorithm Based on Diamond Encoding In DWT Domain S Atawneh, A Almomani, H Al Bazar, P Sumari, B Gupta Multimedia Tools and Applications 76 (18), 18451-18472, 2017 | 160 | 2017 |
Steganography in digital images: Common approaches and tools S Atawneh, A Almomani, P Sumari IETE Technical Review 30 (4), 344-358, 2013 | 62 | 2013 |
Thermodynamic analysis of MHD Couette–Poiseuille flow of water-based nanofluids in a rotating channel with radiation and Hall effects I Tlili, NN Hamadneh, WA Khan, S Atawneh Journal of Thermal Analysis and Calorimetry, 1-14, 2018 | 58 | 2018 |
An Efficient Boosted C5. 0 Decision-Tree-Based Classification Approach for Detecting Non-Technical Losses in Power Utilities M Salman Saeed, MW Mustafa, UU Sheikh, TA Jumani, I Khan, ... Energies 13 (12), 1-19, 2020 | 57 | 2020 |
Artificial Neural Networks for Prediction of COVID-19 in Saudi Arabia N Hamadneh, W Khan, W Ashraf, S Atawneh, I Khan, B Hamadneh Computers, Materials & Continua 66 (3), 2787–2796, 2020 | 37 | 2020 |
Computational Intelligence-Based Optimization Methods for Power Quality and Dynamic Response Enhancement of ac Microgrids T Jumani, M Mustafa, N Hamadneh, S Atawneh, M Rasid, N Mirjat, ... Energies 13 (16), 1-22, 2020 | 33 | 2020 |
A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing A Al-Nawasrah, A Almomani, S Atawneh, M Alauthman International Journal of Cloud Applications and Computing (IJCAC) 10 (3), 17-53, 2020 | 29 | 2020 |
Phishing Email Detection Model Using Deep Learning S Atawneh, H Aljehani electronics 12 (20), 1-26, 2023 | 28 | 2023 |
Using Artificial Intelligence to Predict Students’ Academic Performance in Blended Learning NN Hamadneh, S Atawneh, WA Khan, KA Almejalli, A Alhomoud Sustainability 14 (18), 1-13, 2022 | 28 | 2022 |
Using Machine Learning to Build a Classification Model for IoT Networks to Detect Attack Signatures M Al-Akhras, M Alawairdhi, A Alkoudari, S Atawneh International Journal of Computer Networks & Communications (IJCNC) 12 (6 …, 2020 | 26 | 2020 |
Collaborative Mobile-Learning Architecture Based on Mobile Agents S Atawneh, M Al-Akhras, I AlMomani, A Liswi, M Alawairdhi Electronics 9 (1), 1-36, 2020 | 24 | 2020 |
Blockchain-Based Decentralized Authentication Model for IoT-Based E-Learning and Educational Environments O Khashan, S Alamri, W Alomoush, M Alsmadi, S Atawneh, U Mir Computers, Materials & Continua 75 (2), 3133-3158, 2023 | 22 | 2023 |
Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map. S Atawneh, P Sumari J. Commun. 8 (11), 690-699, 2013 | 22 | 2013 |
Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models A Almotairi, S Atawneh, O Khashan, N Khafajah Systems Science & Control Engineering 12 (1), 1-18, 2024 | 19 | 2024 |
The Analysis of Current State of Agile Software Development S Atawneh Journal of Theoretical and Applied Information Technology 97 (22), 3197-3208, 2019 | 18 | 2019 |
Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors OA Khashan, NM Khafajah, W Alomoush, M Alshinwan, S Alamri, ... Cryptography 7 (1), 1-17, 2023 | 13 | 2023 |
A new algorithm for hiding gray images using blocks S Atawneh 2006 2nd International Conference on Information & Communication …, 2006 | 12 | 2006 |
An Overview of Frequency-based Digital Image Steganography S Atawneh, P Sumari International Journal of Cryptology Research 5 (2), 15-27, 2015 | 9 | 2015 |
A Successful Framework for the ABET Accreditation of an Information System Program W Rashideh, O Alshathry, S Atawneh, H Al Bazar, M AbualRub Intelligent Automation & Soft Computing 26 (6), 1285–1307, 2020 | 7 | 2020 |