A new authentication protocol for UMTS mobile networks J Al-Saraireh, S Yousef EURASIP Journal on wireless communications and networking 2006, 1-10, 2006 | 50 | 2006 |
A novel approach for detecting advanced persistent threats J Al-Saraireh Egyptian Informatics Journal 23 (4), 45-55, 2022 | 30 | 2022 |
Extension of authentication and key agreement protocol (AKA) for universal mobile telecommunication system (UMTS) ALS Jaafer, Y Sufian International Journal of Theoretical and Applied Computer Sciences 1 (1 …, 2006 | 30 | 2006 |
Asymmetric Identification Model for Human-Robot Contacts via Supervised Learning AAH Qasem, J Al-Saraireh Symmetry 14 (3), 1-19, 2022 | 24* | 2022 |
Keystroke and swipe biometrics fusion to enhance smartphones authentication J Al-Saraireh, MR AlJa'afreh Computers & Security 125, 103022, 2023 | 22 | 2023 |
Analytical model for authentication transmission overhead between entities in mobile networks S Yousef Computer communications 30 (8), 1713-1720, 2007 | 18 | 2007 |
An enhancement of authentication protocol and key agreement (AKA) for 3G mobile networks ALF Mustafa, ALS Ja’afer International Journal of Security (IJS) 5 (1), 35-51, 2011 | 13 | 2011 |
Efficient detection of hacker community based on twitter data using complex networks and machine learning algorithm A Al-Tarawneh, J Al-Saraireh Journal of Intelligent & Fuzzy Systems 40 (6), 12321-12337, 2021 | 12 | 2021 |
An Efficient Approach for Query Processing Over Encrypted Database AEAQPOE Database Journal of Computer Science 13 (10), 548-557, 2017 | 12* | 2017 |
Image encryption scheme based on filter bank and lifting S Saraireh, Y Al-Sbou, O Alsmadi Int'l J. of Communications, Network and System Sciences 2014, 2014 | 11 | 2014 |
Enhancement mobile security and user confidentiality for umts J Al-Saraireh, S Yousef, M Al Nabhan Second European Conference on Mobile Governement, 2006 | 11 | 2006 |
Analysis and enhancement of authentication algorithms in mobile networks J AL-Saraireh, S Justus Yousef, MAL Nabhan Journal of Applied Sciences 6 (4), 872-877, 2006 | 8 | 2006 |
Threat led advanced persistent threat penetration test A Masarweh, J Al-Saraireh International Journal of Security and Networks 17 (3), 203-219, 2022 | 7 | 2022 |
Fine-tuning U-net for medical image segmentation based on activation function, optimizer and pooling layer. R Younisse, R Ghnemat, J Al Saraireh International Journal of Electrical & Computer Engineering (2088-8708) 13 (5), 2023 | 6 | 2023 |
Passive DNS Analysis Using Bro-IDS D Hadi, A., AL-Saraireh, J., Dakhgan, A. and Rababh The International Conference on New Trends in Computing Sciences (ICTCS …, 2017 | 5* | 2017 |
A Novel Adaptive Contention Window Scheme for IEEE 802.11 MAC Protocol M Saraireh, ALS Ja'afer, S Saraireh Trends in Applied Sciences Research 9 (6), 275, 2014 | 5 | 2014 |
TCP protocol and red gateway supporting the QoS of multimedia transmission over wireless networks M Al-Nabhan, S Yousef, J Al-Saraireh Inform. Technol. J 5, 689-697, 2006 | 5 | 2006 |
Asymmetric Identification Model for Human-Robot Contacts via Supervised Learning. Symmetry 2022, 14, 591 Q Abu Al-Haija, J Al-Saraireh | 5 | |
Integration of Hash -Crypto- Steganography for Efficient Security Technique MS Saleh Saraireh, Jaafer Al-Saraireh International Journal of Circuits, Systems and Signal Processing 12, 274-278, 2018 | 4 | 2018 |
Factors analysis for e-services adoption in jordan: A technology acceptance study AL Ja’afer, M Alnabhan Modern Applied Science 8 (3), 192, 2014 | 4 | 2014 |