Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms M Bani Yassein, S Aljawarneh, E Qawasmeh, Y Khamayseh, W Mardini IEEE International Conference on Engineering & Technology 2017 (ICET'17), SCOPUS, 2017 | 200* | 2017 |
Automatic Identification of Fake News Using Deep Learning E Qawasmeh, M Tawalbeh, M Abdullah 2019 Sixth International Conference on Social Networks Analysis, Management …, 2019 | 47 | 2019 |
Towards a Generic Approach for Memory Forensics E Qawasmeh, MI Al-Saleh, ZA Al-Sharif 2019 Sixth HCT Information Technology Trends (ITT), 094-098, 2019 | 12 | 2019 |
Building an image set for modeling image re-targeting using deep learning MA Alsmirat, E Qawasmeh, M Al-Ayyoub, Y Jararweh Simulation Modelling Practice and Theory 126, 102773, 2023 | 3 | 2023 |
On Producing Events Timeline for Memory Forensics: An Experimental Study E Qawasmeh, MI Al-Saleh 2020 Seventh International Conference on Information Technology Trends (ITT …, 2020 | 3 | 2020 |
Utilizing Debugging Information of Applications in Memory Forensics MI Al-Saleh, E Qawasmeh, ZA Al-Sharif Journal of Universal Computer Science 26 (7), 805-826, 2020 | 2 | 2020 |
Building an Image Database for Studying Image Retargeting MA Alsmirat, E Qawasmeh, M Al-Ayyoub, NA Damer, Y Jararweh 2017 IEEE/ACS 14th International Conference on Computer Systems and …, 2017 | 2 | 2017 |