Chaos Theory and its Application: An Essential Framework for Image Encryption Arshad, S Shaukat, A Ali, A Eleyan, SA Shah, J Ahmad Chaos Theory and Applications 2 (1), 15-20, 2020 | 44* | 2020 |
A flexible encryption technique for the internet of things environment S Medileh, A Laouid, R Euler, A Bounceur, M Hammoudeh, M AlShaikh, ... Ad Hoc Networks 106, 102240, 2020 | 43 | 2020 |
Optimization water leakage detection using wireless sensor networks (OWLD) M Daadoo, A Eleyan, D Eleyan Proceedings of the international conference on future networks and …, 2017 | 42 | 2017 |
Enhancing software comments readability using flesch reading ease score D Eleyan, A Othman, A Eleyan Information 11 (9), 430, 2020 | 37 | 2020 |
A fully homomorphic encryption based on magic number fragmentation and ElGamal encryption: Smart healthcare use case M Kara, A Laouid, MA Yagoub, R Euler, S Medileh, M Hammoudeh, ... Expert Systems 39 (5), e12767, 2022 | 29 | 2022 |
IoT-based home automation using android application A Eleyan, J Fallon 2020 international symposium on networks, computers and communications …, 2020 | 18 | 2020 |
Forensic process as a service (FPaaS) for cloud computing A Eleyan, D Eleyan 2015 European Intelligence and Security Informatics Conference, 157-160, 2015 | 17 | 2015 |
A Survey Paper on Credit Card Fraud Detection Techniques AM Fayyomi, D Eleyan, A Eleyan International Journal of Scientific and Technology Research 10 (9), 72-79, 2021 | 16 | 2021 |
A novel digital signature scheme for advanced asymmetric encryption techniques F Lalem, A Laouid, M Kara, M Al-Khalidi, A Eleyan Applied Sciences 13 (8), 5172, 2023 | 15 | 2023 |
CoAP based IoT data transfer from a Raspberry Pi to Cloud TL Scott, A Eleyan 2019 International Symposium on Networks, Computers and Communications …, 2019 | 15 | 2019 |
A Survey Of Social Engineering Attacks: Detection and Prevention Tools NA Odeh, D Eleyan, A Eleyan Journal of Theoretical and Applied Information Technology 99 (18), 4375-4386, 2021 | 14 | 2021 |
Digital Forensic Tools Used in Analyzing Cybercrime M Dweikat, D Eleyan, A Eleyan Journal of University of Shanghai for Science and Technology, ISSN, 1007-6735, 2020 | 14 | 2020 |
Coaching, Tutoring and Mentoring in the Higher Education as a solution to retain students in their major and help them achieve success. D Eleyan, A Eleyan | 14 | 2011 |
Extending WSDL and UDDI with Quality Service Selection Criteria AA Eleyan, L Zhao Proceedings of the 3rd International Symposium on Web Services, 2010 | 13 | 2010 |
A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity S Medileh, A Laouid, M Hammoudeh, M Kara, T Bejaoui, A Eleyan, ... Information 14 (5), 263, 2023 | 11 | 2023 |
Performance and scalability analysis of ethereum and hyperledger fabric Y Ucbas, A Eleyan, M Hammoudeh, M Alohaly IEEE Access, 2023 | 8 | 2023 |
A Prediction Olive Disease Using Machine Learning Models, Decision Tree and Naive Bayes Models J Drdsh, D Eleyan, A Eleyan Journal of Theoretical and Applied Information Technology 99 (18), 4231-4240, 2021 | 8 | 2021 |
Service selection using quality matchmaking A Eleyan, L Zhao 2011 International Conference on Communications and Information Technology …, 2011 | 8 | 2011 |
Quality-of-Services in Web Services Architecture A Eleyan, L Mikhailov, L Zhao Ingénierie des Systèmes d'Information, Special Issue on Information Systems …, 2004 | 8 | 2004 |
A survey paper on blockchain as a service platforms SM Alshurafa, D Eleyan, A Eleyan International Journal of High Performance Computing and Networking (IJHPCN …, 2021 | 7 | 2021 |