An online intrusion detection system to cloud computing based on NeuCube algorithms A Almomani, M Alauthman, F Albalas, O Dorgham, A Obeidat Cognitive Analytics: Concepts, Methodologies, Tools, and Applications, 1042-1059, 2020 | 44 | 2020 |
Arabic Text Steganography Using Unicode of Non-Joined to Right Side Letters AA Obeidat Journal of Computer Science 13 (6), 184-191, 2017 | 19 | 2017 |
Spam Email Filtering using ECOS algorithms OMAH Ammar ALmomani, Atef Obeidat Indian Journal of Science and Technology 8, 2015 | 17* | 2015 |
A secure robust gray scale image steganography using image segmentation MJ Bawaneh, AA Obeidat Journal of Information Security 7 (3), 152-164, 2016 | 15 | 2016 |
Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network AA Obeidat International Journal of Communication Networks and Information Security …, 2017 | 8 | 2017 |
Novel Approach for Intrusion Detection Using Simulated Annealing Algorithm Combined with Hopfield Neural Network AA Obeidat International Journal of Communication Networks and Information Security …, 2020 | 6 | 2020 |
Analysis the P2P botnet detection methods AA Obeidat IPASJ International Journal of Computer Science (IIJCS) 4 (3), 2016 | 6 | 2016 |
An Adaptive FLV Steganography Approach Using Simulated Annealing MMA Mohammed J. Bawaneh, Atef Obeidat International Journal of Communication Networks and Information Security …, 2018 | 4* | 2018 |
A Novel Botnet Detection System for P2P Networks MJBESH Atef Ahmed Obeidat, Majd Mahmoud Al-Kofahi Journal of Computer Science 13 (8), 329-336, 2017 | 4* | 2017 |
Survey of the p2p botnet detection methods AA Obeidat, MJ Bawaneh Int J Emerg Trends Technol Comput Sci (IJETTCS), 2016 | 4 | 2016 |
A novel FLV steganography approach using secret message segmentation and packets reordering AA Obeidat, MJ Bawaneh Int. J. Res. Comput. Applic. Robot 4, 44-54, 2016 | 2 | 2016 |
Leader election in Peer-to-Peer systems AA Obeidat, VV Gubarev 2009 International Siberian Conference on Control and Communications, 25-31, 2009 | 2 | 2009 |
Decentralized and fair mutual exclusion protocol in peer-to-peer systems AA Obeidat, VV Gubarev, AA Al-yousef, J Huson The 10Th International Workshop on Computer Science and Information …, 2008 | 2 | 2008 |
Influence of traffic prognostic mechanism on quality of adaptive control of switchboard A Mhamad, S Al-omar, A Obeidat International Journal of Engineering Science (IJES). Bethesda (USA) 7 (33 …, 2014 | 1 | 2014 |
Evaluating and Improving E-Government in Jordan E Hanandeh, A Obiedat INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10 (9), 2021-2026, 2013 | 1 | 2013 |
Burst Error Correction Method Based on Arithmetic Weighted Checksums S Al-Omar, A Obeidat Scientific Research Publishing, 2012 | 1 | 2012 |
An Adaptive Fractal Image Steganography Using Mandelbrot and Linear Congruent Generator ARS Mohammed J. Bawaneh, Atef A. Obeidat , Obaida M. Al-Hazaimeh, Malek M ... International Journal of Communication Networks and Information Security 15 …, 2023 | | 2023 |
Influence of Traffic Prognostic Mechanism on Quality of Adaptive Control of Switchboar AO Alomar Mhamad, Saleh Al-omar Contemporary Engineering Sciences 7 (33), 1763-1776, 2014 | | 2014 |
Tree-based Mutual Exclusion Algorithm in Peer-to-Peer Systems VV Gubarev, AA Obeidat Вестник компьютерных и информационных технологий, 42-50, 2011 | | 2011 |
Noise Stable Feed-Forward Neural Networks MHEA Atef Obeidat Proceedings of the 12th workshop on computer science and information …, 2010 | | 2010 |