State-of-the-art in artificial neural network applications: A survey OI Abiodun, A Jantan, AE Omolara, KV Dada, NAE Mohamed, H Arshad Heliyon 4 (11), 2018 | 2710 | 2018 |
Comprehensive review of artificial neural network applications to pattern recognition OI Abiodun, A Jantan, AE Omolara, KV Dada, AM Umar, OU Linus, ... IEEE access 7, 158820-158846, 2019 | 527 | 2019 |
Image encryption using block-based transformation algorithm MA Bani, A Jantan IJCSNS International Journal of Computer Science and Network Security 8 (4 …, 2008 | 316 | 2008 |
Kemi Victoria Dada, Nachaat AbdElatif Mohamed, and Humaira Arshad OI Abiodun, A Jantan, AE Omolara State-of-the-art in artificial neural network applications: A survey …, 2018 | 214 | 2018 |
Digital forensics: review of issues in scientific validation of digital evidence H Arshad, AB Jantan, OI Abiodun Journal of Information Processing Systems 14 (2), 346-376, 2018 | 142 | 2018 |
A new steganography approach for images encryption exchange by using the least significant bit insertion MAB Younes, A Jantan International Journal of Computer Science and Network Security 8 (6), 247-257, 2008 | 128 | 2008 |
An image encryption approach using a combination of permutation technique followed by encryption MAB Younes, A Jantan International journal of computer science and network security 8 (4), 191-197, 2008 | 115 | 2008 |
State-of-the-art in artificial neural network applications: A survey. Heliyon, 4 (11), e00938 OI Abiodun, A Jantan, AE Omolara, KV Dada, NA Mohamed, H Arshad URL: https://www. sciencedirect. com/science/article/pii S, 2018 | 114 | 2018 |
An approach for malware behavior identification and classification MF Zolkipli, A Jantan 2011 3rd international conference on computer research and development 1 …, 2011 | 75 | 2011 |
A framework for malware detection using combination technique and signature generation MF Zolkipli, A Jantan 2010 Second International Conference on Computer Research and Development …, 2010 | 72 | 2010 |
Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems WAHM Ghanem, A Jantan Neural computing and applications 30, 163-181, 2018 | 69 | 2018 |
Evidence collection and forensics on social networks: Research challenges and directions H Arshad, A Jantan, E Omolara Digital Investigation 28, 126-138, 2019 | 67 | 2019 |
A cognitively inspired hybridization of artificial bee colony and dragonfly algorithms for training multi-layer perceptrons WAHM Ghanem, A Jantan Cognitive Computation 10, 1096-1134, 2018 | 58 | 2018 |
Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural networks WAHM Ghanem, SAA Ghaleb, A Jantan, AB Nasser, SAM Saleh, A Ngah, ... IEEE Access 10, 76318-76339, 2022 | 54 | 2022 |
A new approach for intrusion detection system based on training multilayer perceptron by using enhanced Bat algorithm WAHM Ghanem, A Jantan Neural Computing and Applications 32 (15), 11665-11698, 2020 | 51 | 2020 |
An intelligent traffic light monitor system using an adaptive associative memory EIA Kareem, A Jantan IJIPM: International Journal of Information Processing and Management 2 (2 …, 2011 | 51 | 2011 |
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons WAHM Ghanem, A Jantan, SAA Ghaleb, AB Nasser IEEE Access 8, 130452-130475, 2020 | 49 | 2020 |
Novel multi-objective artificial bee colony optimization for wrapper based feature selection in intrusion detection W Ghanem, A Jantan Int. J. Adv. Soft Comput. Appl 8 (1), 70-81, 2016 | 45 | 2016 |
Malware behavior analysis: Learning and understanding current malware threats MF Zolkipli, A Jantan 2010 Second International Conference on Network Applications, Protocols and …, 2010 | 45 | 2010 |
An enhanced bat algorithm with mutation operator for numerical optimization problems WAHM Ghanem, A Jantan Neural Computing and Applications 31, 617-651, 2019 | 41 | 2019 |