A Secure Cloud Computing Model based on Data Classification L Tawalbeh, NS Darwazeh, RS Al-Qassas, F AlDosari Procedia Computer Science 52, 1153-1158, 2015 | 112 | 2015 |
A systematic review of detection and prevention techniques of SQL injection attacks M Nasereddin, A ALKhamaiseh, M Qasaimeh, R Al-Qassas Information Security Journal: A Global Perspective 32 (4), 252-265, 2023 | 66 | 2023 |
Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security M Qasaimeh, RS Al-Qassas, S Tedmori Multimedia Tools and Applications 77 (14), 18415-18449, 2018 | 28 | 2018 |
A novel simplified AES algorithm for lightweight real-time applications: testing and discussion M Qasaimeh, RS Al-Qassas, F Mohammad, S Aljawarneh Recent Advances in Computer Science and Communications (Formerly: Recent …, 2020 | 24 | 2020 |
Recent Development in Smart Grid Authentication Approaches: A Systematic Literature Review M Qasaimeh, RS Al-Qassas, S Aljawarneh Cybernetics and Information Technologies 19 (1), 27-52, 2019 | 19 | 2019 |
Secure and efficient cloud computing framework L Tawalbeh, RS Al-Qassas, NS Darwazeh, Y Jararweh, F AlDosari 2015 International Conference on Cloud and Autonomic Computing, 291-295, 2015 | 17 | 2015 |
Software design and experimental evaluation of a reduced AES for IoT applications M Qasaimeh, RS Al-Qassas, M Ababneh Future Internet 13 (11), 273, 2021 | 16 | 2021 |
Performance comparison of end-to-end and on-the-spot traffic-aware techniques RS Al-Qassas, M Ould-Khaoua International Journal of Communication Systems 26 (1), 13-33, 2013 | 16 | 2013 |
Advanced security testing using a cyber‐attack forecasting model: A case study of financial institutions M Qasaimeh, RA Hammour, MB Yassein, RS Al‐Qassas, JAL Torralbo, ... Journal of Software: Evolution and Process 34 (11), e2489, 2022 | 15 | 2022 |
Authentication techniques in smart grid: a systematic review M Qasaimeh, R Turab, RS Al-Qassas TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (3 …, 2019 | 15 | 2019 |
Email Fraud Attack Detection Using Hybrid Machine Learning Approach YA Yaseen, M Qasaimeh, RS Al-Qassas, M Al-Fayoumi Recent Advances in Computer Science and Communications (Formerly: Recent …, 2021 | 12 | 2021 |
Bandwidth-efficient routing protocol for mobile ad hoc networks RS Al-Qassas, A Al-Ayyoub, M Ould-Khaoua IEE Proceedings-Software 150 (4), 230-234, 2003 | 12 | 2003 |
The status of information security systems in banking sector from social engineering perspective RA Hammour, YA Gharaibeh, M Qasaimeh, RS Al-Qassas Proceedings of the Second International Conference on Data Science, E …, 2019 | 10 | 2019 |
Performance evaluation of a new end-to-end traffic-aware routing in MANETs RS Al-Qassas, M Ould-Khaoua, LM Mackenzie 12th International Conference on Parallel and Distributed Systems-(ICPADS'06 …, 2006 | 10 | 2006 |
A Scoring System for Information Security Governance Framework Using Deep Learning Algorithms: A Case Study on the Banking Sector AA Al Batayneh, M Qasaimeh, RS Al-Qassas ACM Journal of Data and Information Quality (JDIQ) 13 (2), 1-34, 2021 | 8 | 2021 |
Systematic Review of E-commerce Security Issues and Customer Satisfaction Impact M Qasaimeh, NA Halemah, R Rawashdeh, RS Al-Qassas, A Qusef 2022 International Conference on Engineering & MIS (ICEMIS), 1-8, 2022 | 7 | 2022 |
Mitigating Evil Twin Attacks in Wireless 802.11 Networks at Jordan SA Noman, M Qasaimeh, R Al-Qassas, HA Noman International Journal of Computer Science Issues (IJCSI) 14 (1), 60, 2017 | 6 | 2017 |
Comparative Study on Sybil Attack Detection Schemes S Hamdan, RS Al-Qassas, S Tedmori International Journal of Computers and Technology 14 (7), 5869-5876, 2015 | 5 | 2015 |
A new approach for detecting process injection attacks using memory analysis M Nasereddin, R Al-Qassas International Journal of Information Security 23 (3), 2099-2121, 2024 | 4 | 2024 |
Comparative Randomness Analysis of DES Variants M Qasaimeh, RS Al-Qassas Recent Patents on Computer Science 10 (3), 230-237, 2017 | 4 | 2017 |