关注
Eman Abdelfattah
Eman Abdelfattah
Assistant Professor, Sacred Heart University
在 sacredheart.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC
RJ Mstafa, KM Elleithy, E Abdelfattah
IEEE access 5, 5354-5365, 2017
1522017
Performance Evaluation Of Routing Protocols In Wireless Sensor Networks
L Almazaydeh, E Abdelfattah, M Al-Bzoor, AA Al-Rahayfeh
AIRCC Publishing, 2010
73*2010
Machine Learning Techniques for Detection of Website Phishing: a Review for Promises and Challenges
A Odeh, I Keshta, E Abdelfattah
2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021
652021
Video steganography techniques: taxonomy, challenges, and future directions
RJ Mstafa, KM Elleithy, E Abdelfattah
2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2017
572017
Performance evaluation of AODV and DSR routing protocols in MANET networks
A Odeh, E AbdelFattah, M Alshowkan
International Journal of Distributed and Parallel Systems 3 (4), 13, 2012
552012
Applying machine learning to anomaly-based intrusion detection systems
F Yihunie, E Abdelfattah, A Regmi
2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2019
482019
Analysis of ping of death DoS and DDoS attacks
F Yihunie, E Abdelfattah, A Odeh
2018 IEEE Long Island Systems, Applications, and Technology Conference (LISAT), 2018
422018
Performance Evaluation Of Routing Protocols In Wireless Sensor Networks
AAR Laiali Almazaydeh, Eman Abdelfattah, Manal Al-Bzoor
International Journal of Computer Science and Information Technology 2 (2), 2010
39*2010
Efficient prediction of phishing websites using multilayer perceptron (MLP)
A Odeh, A Alarbi, I Keshta, E Abdelfattah
Journal of Theoretical and Applied Information Technology 98 (16), 3353-3363, 2020
38*2020
Efficient detection of phishing websites using multilayer perceptron
A Odeh, I Keshta, E Abdelfattah
International Association of Online Engineering, 2020
382020
Quantum key distribution by using public key algorithm (RSA)
A Odeh, K Elleithy, M Alshowkan, E Abdelfattah
Third International Conference on Innovative Computing Technology (INTECH …, 2013
352013
PHIBOOST-a novel phishing detection model using Adaptive boosting approach
A Odeh, I Keshta, E Abdelfattah
Jordanian Journal of Computers and Information Technology (JJCIT) 7 (01), 2021
272021
Clustering algorithms and RFM analysis performed on retail transactions
Y Parikh, E Abdelfattah
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2020
222020
Novel steganography over HTML code
A Odeh, K Elleithy, M Faezipour, E Abdelfattah
Innovations and Advances in Computing, Informatics, Systems Sciences …, 2015
182015
Multi-class text classification using machine learning models for online drug reviews
S Joshi, E Abdelfattah
2021 IEEE World AI IoT Congress (AIIoT), 0262-0267, 2021
152021
Performance analysis of multimedia compression algorithms
E Abdelfattah, A Mohiuddin
AIRCC Publishing, 2010
152010
Performance evaluation of different QAM techniques using Matlab/Simulink
T Youssef, E Abdelfattah
2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2013
132013
Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet Attacks
S Joshi, E Abdelfattah
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2020
112020
Performance Evaluation of Mobile Ad-Hoc Routing Protocols
E Abdelfattah, G Liu
Novel Algorithms and Techniques in Telecommunications, Automation and …, 2008
112008
A new algorithm for three-party Quantum key distribution
M Alshowkan, K Elleithy, A Odeh, E Abdelfattah
Third International Conference on Innovative Computing Technology (INTECH …, 2013
102013
系统目前无法执行此操作,请稍后再试。
文章 1–20