A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC RJ Mstafa, KM Elleithy, E Abdelfattah IEEE access 5, 5354-5365, 2017 | 152 | 2017 |
Performance Evaluation Of Routing Protocols In Wireless Sensor Networks L Almazaydeh, E Abdelfattah, M Al-Bzoor, AA Al-Rahayfeh AIRCC Publishing, 2010 | 73* | 2010 |
Machine Learning Techniques for Detection of Website Phishing: a Review for Promises and Challenges A Odeh, I Keshta, E Abdelfattah 2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021 | 65 | 2021 |
Video steganography techniques: taxonomy, challenges, and future directions RJ Mstafa, KM Elleithy, E Abdelfattah 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2017 | 57 | 2017 |
Performance evaluation of AODV and DSR routing protocols in MANET networks A Odeh, E AbdelFattah, M Alshowkan International Journal of Distributed and Parallel Systems 3 (4), 13, 2012 | 55 | 2012 |
Applying machine learning to anomaly-based intrusion detection systems F Yihunie, E Abdelfattah, A Regmi 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2019 | 48 | 2019 |
Analysis of ping of death DoS and DDoS attacks F Yihunie, E Abdelfattah, A Odeh 2018 IEEE Long Island Systems, Applications, and Technology Conference (LISAT), 2018 | 42 | 2018 |
Performance Evaluation Of Routing Protocols In Wireless Sensor Networks AAR Laiali Almazaydeh, Eman Abdelfattah, Manal Al-Bzoor International Journal of Computer Science and Information Technology 2 (2), 2010 | 39* | 2010 |
Efficient prediction of phishing websites using multilayer perceptron (MLP) A Odeh, A Alarbi, I Keshta, E Abdelfattah Journal of Theoretical and Applied Information Technology 98 (16), 3353-3363, 2020 | 38* | 2020 |
Efficient detection of phishing websites using multilayer perceptron A Odeh, I Keshta, E Abdelfattah International Association of Online Engineering, 2020 | 38 | 2020 |
Quantum key distribution by using public key algorithm (RSA) A Odeh, K Elleithy, M Alshowkan, E Abdelfattah Third International Conference on Innovative Computing Technology (INTECH …, 2013 | 35 | 2013 |
PHIBOOST-a novel phishing detection model using Adaptive boosting approach A Odeh, I Keshta, E Abdelfattah Jordanian Journal of Computers and Information Technology (JJCIT) 7 (01), 2021 | 27 | 2021 |
Clustering algorithms and RFM analysis performed on retail transactions Y Parikh, E Abdelfattah 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2020 | 22 | 2020 |
Novel steganography over HTML code A Odeh, K Elleithy, M Faezipour, E Abdelfattah Innovations and Advances in Computing, Informatics, Systems Sciences …, 2015 | 18 | 2015 |
Multi-class text classification using machine learning models for online drug reviews S Joshi, E Abdelfattah 2021 IEEE World AI IoT Congress (AIIoT), 0262-0267, 2021 | 15 | 2021 |
Performance analysis of multimedia compression algorithms E Abdelfattah, A Mohiuddin AIRCC Publishing, 2010 | 15 | 2010 |
Performance evaluation of different QAM techniques using Matlab/Simulink T Youssef, E Abdelfattah 2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2013 | 13 | 2013 |
Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet Attacks S Joshi, E Abdelfattah 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2020 | 11 | 2020 |
Performance Evaluation of Mobile Ad-Hoc Routing Protocols E Abdelfattah, G Liu Novel Algorithms and Techniques in Telecommunications, Automation and …, 2008 | 11 | 2008 |
A new algorithm for three-party Quantum key distribution M Alshowkan, K Elleithy, A Odeh, E Abdelfattah Third International Conference on Innovative Computing Technology (INTECH …, 2013 | 10 | 2013 |