Enhanced method for RSA cryptosystem algorithm AH Al-Hamami, IA Aldariseh 2012 International Conference on Advanced Computer Science Applications and …, 2012 | 65 | 2012 |
Virus Detection using Clonal Selection Algorithm with Genetic Algorithm (VDC Algorithm) PDAAH Dr. Suha Afanah, Prof. Dr. Raed Abu Zitar Applied Soft Computing Journal 13 (1), 239-246, 2012 | 37* | 2012 |
Applying Neural Networks for Simplified Data Encryption Standard (SDES) Cipher System Cryptanalysis MAAE Khaled M. Alallayah, Al-Hamami H. Alaa The International Arab Journal of Information Technology (IAJIT) 9 (2), 2012 | 37* | 2012 |
Attack and Construction of Simulator for Some of Cipher Systems Using Neuro-Identifier MAAE Khaled M. Alallayah, Al-Hamami H. Alaa The International Arab Journal of Information Technology (IAJIT) 7 (4), 2010 | 26* | 2010 |
A new approach for authentication technique AH Al-Hamami, SA Al-Ani Journal of computer Science 1 (1), 103-106, 2005 | 25 | 2005 |
Attack of against simplified data encryption standard cipher system using neural networks KM Alallayah, WFA El-Wahed, M Amin, AH Alhamami Journal of Computer Science 6 (1), 29, 2010 | 23 | 2010 |
Optimal cell towers distribution by using spatial mining and geographic information system AH Al-Hamami, SH Hashem arXiv preprint arXiv:1104.2721, 2011 | 17 | 2011 |
Novel algorithm in symmetric encryption (NASE): Based on feistel cipher SIB Baker, AH Al-Hamami 2017 international conference on new trends in computing sciences (ICTCS …, 2017 | 16 | 2017 |
Applying data mining techniques in intrusion detection system on web and analysis of web usage AH Al-Hamami, MA Al-Hamami, SH Hasheem Information Technology Journal 5 (1), 1-4, 2006 | 16 | 2006 |
Secure Mobile Cloud Computing Based-On Fingerprint AHAHJY AL-Juneidi World of Computer Science and Information Technology Journal (WCSIT) 5 (2 …, 2015 | 15* | 2015 |
Development of a network-based: Intrusion Prevention System using a Data Mining approach AH Al-Hamami, GMW Al-Saadoon 2013 Science and Information Conference, 641-644, 2013 | 15 | 2013 |
A proposed modified data encryption standard algorithm by using fusing data technique A Al-Hamami, MA Al-Hamami, SH Hashem World of Computer Science and Information Technology Journal 1 (3), 88-91, 2011 | 13 | 2011 |
Handbook of Research on Threat Detection and Countermeasures in Network Security AH Al-Hamami IGI Global, 2014 | 12 | 2014 |
Artificial neural network-based algorithm for ARMA model order estimation KE Al-Qawasmi, AM Al-Smadi, A Al-Hamami Networked Digital Technologies: Second International Conference, NDT 2010 …, 2010 | 10 | 2010 |
Query dispatching tool supporting fast access to data warehouse. A Aljanabi, AH Alhamami, B Alhadidi Int. Arab J. Inf. Technol. 10 (3), 269-275, 2013 | 9 | 2013 |
Implementing new approach for enhancing performance and throughput in a distributed database. K Maabreh, A Al-Hamami Int. Arab J. Inf. Technol. 10 (3), 290-296, 2013 | 8 | 2013 |
Using Short Message Service (SMS) to Support Business Continuity AAH Maher Abdel-qader, Ahmed Al-Jaber World of Computer Science and Information Technology Journal (WSCIT), 1 (2 …, 2011 | 8* | 2011 |
Increasing database Concurrency Control Based on Attribute Level Locking AHKSM Al-hamami 2008 International Conference on Electronic Design (ICED 2008), 2008 | 8* | 2008 |
A Proposed Modifications to Improve the Performance of Blowfish Cryptography Algorithm AH Al-Hamami, MA Al-Hamami, SH Hashem First National Information Technology Symposium (NITS 2006), 5-7, 2006 | 8 | 2006 |
An Approach for preserving privacy and Knowledge in Data Mining Applications AHAHAS Suhad Journal of Emerging Trends in Computing and Information Sciences, 4 (1), 2013 | 7 | 2013 |