New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value

A Abusukhon, S AlZu'bi - 2020 Seventh International …, 2020 - ieeexplore.ieee.org
Data encryption techniques are important for answering the question: How secure is the
Internet for sending sensitive data. Keeping data secure while they are sent through the …

Security weaknesses and attacks on the internet of things applications

Z Mohammad, TA Qattam… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is a contemporary concept for connecting the existing things in our
environment with the Internet for a sake of making the objects information are accessible …

A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

A Abusukhon, MN Anwar, Z Mohammad… - Journal of Discrete …, 2019 - Taylor & Francis
Nowadays, the rapid growth of Internet applications open the doors for people to
communicate and do business around the world and thus saving time, efforts and money …

[PDF][PDF] Secure key exchange against man-in-the-middle attack: Modified diffie-hellman protocol

M Kara, A Laouid, M AlShaikh… - Jurnal Ilmiah Teknik …, 2021 - researchgate.net
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a
widely used technique on which key exchange systems around the world depend. This …

An indoor localization approach based on deep learning for indoor location-based services

M Elbes, E Almaita, T Alrawashdeh… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
The rapid increase in the demand of location based services (LBS) for indoor environments
has attracted scholars to indoor localization based on fingerprinting due its high accuracy. In …

Toward achieving a balance between the user satisfaction and the power conservation in the internet of things

A Abusukhon - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In the recent era of digital revolution, life has become simple and more comfortable than it
was before. Today, we are witnessing a revolution in the information technology domain …

Arabic light stemming: A comparative study between p-stemmer, khoja stemmer, and light10 stemmer

T Kanan, O Sadaqa, A Almhirat… - 2019 Sixth International …, 2019 - ieeexplore.ieee.org
Arabic is a derived language that has a deep structure and words meaning, one of the
Arabic challenges is its morphology dependency. Arabic Natural Language Processing …

Improving arabic fake news detection using optimized feature selection

B Hawashin, A Althunibat, T Kanan… - 2023 International …, 2023 - ieeexplore.ieee.org
It is of no doubt that the advent of social media has brought several important benefits.
However, there have been also attempts of abusing social media in several ways, one of …

An efficient cold start solution for recommender systems based on machine learning and user interests

B Hawashin, S Alzubi, A Mughaid… - … on software defined …, 2020 - ieeexplore.ieee.org
Recommender Systems are used to provide suggestions to users based on their interests.
One of the well-known problems in recommender systems is the cold start problem, which …

Efficient and secure key exchange protocol based on elliptic curve and security models

A Abusukhon, Z Mohammad… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
nowadays, the success of many online applications relays on keeping the data sent through
the global network secure and far away from hackers. To carry out this task, the two …