ELBA-IoT: An ensemble learning model for botnet attack detection in IoT networks Q Abu Al-Haija, M Al-Dala’ien Journal of Sensor and Actuator Networks 11 (1), 18, 2022 | 80 | 2022 |
ECG-RNG: A random number generator based on ECG signals and suitable for securing wireless sensor networks C Camara, P Peris-Lopez, H Martín, M Aldalaien Sensors 18 (9), 2747, 2018 | 27 | 2018 |
Design and analysis of a true random number generator based on GSR signals for body sensor networks C Camara, H Martín, P Peris-Lopez, M Aldalaien Sensors 19 (9), 2033, 2019 | 25 | 2019 |
Android spyware detection using machine learning: a novel dataset MK Qabalin, M Naser, M Alkasassbeh sensors 22 (15), 5765, 2022 | 23 | 2022 |
The usage of E-learning instructional technologies in higher education institutions in the United Arab Emirates (UAE). L Daouk, M Aldalaien Turkish Online Journal of Educational Technology-TOJET 18 (3), 97-109, 2019 | 23 | 2019 |
Gender effect on cloud computing services adoption by university students: case study of Saudi Arabia AA Almarazroi, E Kabbar, M Naser, H Shen International Journal of Innovation: IJI Journal 7 (1), 155-177, 2019 | 22 | 2019 |
Powering the internet of things with 5G networks V Mohanan, R Budiarto, I Aldmour IGI Global, 2017 | 21 | 2017 |
Security considerations in embedding RFID in'hajj'system M Naser, M Rafie, R Budiarto, W Alsalihy European Journal of Scientific Research 42 (1), 133-138, 2010 | 21 | 2010 |
Ping flood attack pattern recognition using a K-means algorithm in an Internet of Things (IoT) network D Stiawan, ME Suryani, MY Idris, MN Aldalaien, N Alsharif, R Budiarto IEEE Access 9, 116475-116484, 2021 | 20 | 2021 |
The influence of human resources management processes (HRMPs) to achieving sustainable competitive advantage MAAL Jarrah, L Karadsheh, M Naser, S Alhawari Human performance technology: Concepts, methodologies, tools, and …, 2019 | 12 | 2019 |
Cryptography: Protocols, design, and applications K Lek, N Rajapakse Nova Science Publishers, 2012 | 7 | 2012 |
A Framework for RFID Systems' Security for Human Identification Based on Three-Tier Categorization Model M Al Majaly, M Rafie, R Budiarto 2009 International Conference on Signal Acquisition and Processing, 103-107, 2009 | 7 | 2009 |
Spyware Identification for Android Systems Using Fine Trees M Naser, Q Abu Al-Haija Information 14 (2), 102, 2023 | 4 | 2023 |
Security and Privacy in Communication Networks X Lin, A Ghorbani, K Ren, S Zhu, A Zhang Springer International Publishing, 2018 | 4 | 2018 |
Internet of Things (IoT) security and privacy MN Al Dalaien, A Bensefia, SA Hoshang, ARA Bathaqili Powering the Internet of Things With 5G Networks, 247-267, 2018 | 4 | 2018 |
A Secure Framework for Blockchain Transactions Protection. WN Al-Sharu, MK Qabalin, M Naser, OA Saraerh Comput. Syst. Sci. Eng. 45 (2), 1095-1111, 2023 | 3 | 2023 |
A note on the security of PAP M Naser, P Peris-Lopez, R Budiarto, BR Álvarez Computer communications 34 (18), 2248-2249, 2011 | 3 | 2011 |
A grounded theory of selecting lean and agile practices for software development MK Alqudah, R Razali, MK Alqudah, MN Al Dalaien, HM Alabool, ... Journal of Software: Evolution and Process 36 (4), e2539, 2024 | 2 | 2024 |
Mobile Spyware Identification and Categorization: A Systematic Review M Naser, H Albazar, H Abdel-Jaber Informatica 47 (8), 2023 | 2 | 2023 |
Detecting Spyware in Android Devices Using Random Forest TN AlMasri, MN AlDalaien International Conference on Advances in Computing Research, 294-315, 2023 | 2 | 2023 |