Gene profile classification: A proposed solution for predicting possible diseases and initial results SA Aljawarneh, R Jaradat, AM Maatuk, A Alhaj 2016 International Conference on Engineering & MIS (ICEMIS), 1-7, 2016 | 21 | 2016 |
A secure data transmission mechanism for cloud outsourced data A Alhaj, S Aljawarneh, S Masadeh, E Abu-Taieh International Journal of Cloud Applications and Computing (IJCAC) 3 (1), 34-43, 2013 | 15 | 2013 |
Improving the Smart Cities Traffic Management Systems using VANETs and IoT Features A Alhaj, N Zanoon, A Alrabea, H Alnatsheh, O Jawabreh, M Abu-Faraj, ... Journal of Statistics Applications & Probability 12 (2), 405-414, 2023 | 13 | 2023 |
Secure communication: A Proposed public key watermark system SR Masadeh, S Aljawarneh, A Odeh, A Alhaj International Journal of Information Security and Privacy (IJISP) 7 (4), 1-10, 2013 | 10 | 2013 |
Building a secure image cryptography system using parallel processing and complicated dynamic length private key M Abu-Faraj, A Al-Hyari, B Al-Ahmad, Z Alqadi, B Ali, A Alhaj Appl. Math. Inf. Sci.(AMIS) 16, 1017-1026, 2022 | 8 | 2022 |
Testing and evaluation of a secure integrity measurement system (SIMS) for remote systems. SA Aljawarneh, AA Alhaj Int. Arab J. Inf. Technol. 9 (3), 235-242, 2012 | 8 | 2012 |
Deploying a web client authentication system using smart card for e-systems S Aljawarneh, S Masadeh, A Alhaj Research Journal of Applied Sciences, Engineering and Technology 3 (9), 948-952, 2011 | 7 | 2011 |
An algorithm for securing hybrid Cloud outsourced data in the banking sector A Alhaj, SA Aljawarneh Online Banking Security Measures and Data Protection, 157-171, 2017 | 5 | 2017 |
Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS) AA Alhaj International Journal of Cloud Applications and Computing (IJCAC) 4 (1), 45-49, 2014 | 3 | 2014 |
Secure Communication A Alhaj, S Aljawarneh Int. J. Inf. Secur. Priv. 7 (4), 1-10, 2013 | 2 | 2013 |
How Literacy Rate, GDP (PPP) and Gender Constrain and Effect Social Contagion in Social Networking (Twitter) A Alhaj Recent Patents on Computer Science 8 (2), 2015 | 1 | 2015 |
A Predictive Technique using Random Forest Classifier for Phishing Malicious Attack MAFBJAA Abdullah Alhaj1,* Applied Mathematics & Information Sciences 17 (6), 1177-1187, 2023 | | 2023 |
The Relationship between Big Data and the Cloud :A Study AAH Nabeel Zanoon1 International Journal of Applied Engineering Research 12 (Number 17 (2017 …, 2018 | | 2018 |
Cloud Computing and Big Data is there a Relation between the Two: A Study. , pp. . AAHSMK Nabeel Zanoon International Journal of Applied Engineering Research 12 (ISSN 0973-4562 …, 2017 | | 2017 |
A Mechanism for Securing Hybrid Cloud Outsourced Data: Securing Hybrid Cloud AAS Aljawarneh IGI, 2015 | | 2015 |
Aqaba Branch, Aqaba, Jordan AA Alhaj | | 2014 |
International Journal of Information Security and Privacy A Alhaj, J Aqaba | | 2013 |
Human modeling in Information in Information Technology Multimedia Using Human Biometrics Found in Golden Ratio. Vitruvian man and Neufert JATAAH Evon Abu-Taieh, Minwer El-Maheed, Maha, El-Maheed, Alia Abu-Tayeh 19th International Business-Information Management Association Conference …, 2012 | | 2012 |