Malware detection techniques for mobile devices B Amro arXiv preprint arXiv:1801.02837, 2018 | 54 | 2018 |
Phishing techniques in mobile devices B Amro arXiv preprint arXiv:1802.04501, 2018 | 27 | 2018 |
Protecting privacy in VANETs using mix zones with virtual pseudonym change B Amro arXiv preprint arXiv:1801.10294, 2018 | 26 | 2018 |
Enhancing privacy in collaborative traffic‐monitoring systems using autonomous location update B Amro, Y Saygin, A Levi IET Intelligent Transport Systems 7 (4), 388-395, 2013 | 17 | 2013 |
An Intelligent Decision Support System For Recruitment: Resumes Screening and Applicants Ranking A Najjar, B Amro, M Macedo Informatica 45 (4), 617-623, 2022 | 16 | 2022 |
Cybercrime as a Matter of the Art in Palestine and its Effect on Individuals B Amro MECS Press-IJ Wireless and Microwave Technologies, 2018 | 11 | 2018 |
The adoption level of electronic medical records in hebron hospitals based on the electronic medical record adoption model (EMRAM) A Najjar, B Amro, M Macedo Health Policy and Technology 10 (4), 100578, 2021 | 10 | 2021 |
A novel framework for mobile forensics investigation process M Moreb, S Salah, B Amro International Journal of Computing and Digital Systems 16 (1), 125-136, 2024 | 9 | 2024 |
Design and development of case studies in security and privacy for health informatics education BM Amro, MO Al-Jabari, HM Jabareen, YS Khader, A Taweel 2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018 | 8 | 2018 |
Mobile agent systems, recent security threats and counter measures B Amro arXiv preprint arXiv:1410.4147, 2014 | 8 | 2014 |
PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism B Amro, Y Saygin, A Levi Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and …, 2011 | 7 | 2011 |
Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user's preferences B Amro arXiv preprint arXiv:1802.04328, 2018 | 6 | 2018 |
CoRPPS: collusion resistant pseudonym providing system B Amro, A Levi, Y Saygin 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 6 | 2011 |
islEHR, a model for electronic health records interoperability A Najjar, B Amro, M Macedo Bio-Algorithms and Med-Systems 18 (1), 2022 | 5 | 2022 |
P2-CTM: privacy preserving collaborative traffic monitoring B Amro, Y Saygin, A Levi Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and …, 2010 | 4 | 2010 |
A Comprehensive Architectural Framework of Moving Target Defenses Against DDoS Attacks B Amro, S Salah, M Moreb Journal of Cyber Security and Mobility 12 (4), 605-628, 2023 | 3 | 2023 |
Big picture: Analysis of DDoS attacks map-systems and network, cloud computing, SCADA systems, and IoT S Salah, BM Amro International Journal of Internet Technology and Secured Transactions 12 (6 …, 2022 | 3 | 2022 |
User Centric Android Application Permission Manager B Amro, Z Abu Znaid AL-Rafidain Journal of Computer Sciences and Mathematics, 15 (2), 213-223, 2021 | 1 | 2021 |
PAPG--Personalized Anti-Phishing Guard B Amro, AA Sabha, A Qunaibi, I Najjar arXiv preprint arXiv:1910.10025, 2019 | 1 | 2019 |
Towards Secure Interoperability of EHR among Healthcare Organizations in Palestine. M Al-Asafra, B Amro Hebron University Research Journal (Natural Sciences) 11, 2022 | | 2022 |