Follow
Mustafa Al Fayoumi
Title
Cited by
Cited by
Year
An efficient RSA public key encryption scheme
SJ Aboud, MA AL-Fayoumi, M Al-Fayoumi, HS Jabbar
Fifth International Conference on Information Technology: New Generations …, 2008
572008
Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior
M Al-Fawa'reh, M Al-Fayoumi, S Nashwan, S Fraihat
Egyptian Informatics Journal 23 (2), 173-185, 2022
332022
Fog computing: security challenges and countermeasures
Z Ashi, M Al-Fawa’reh, M Al-Fayoumi
Int. J. Comput. Appl 175 (15), 30-36, 2020
282020
Scalable agile transformation process (SATP) to convert waterfall project management office into agile project management office
RMH Hamad, M Al Fayoumi
2018 international Arab conference on information technology (ACIT), 1-8, 2018
252018
Sentiment analysis-based sexual harassment detection using machine learning techniques
E Alawneh, M Al-Fawa'reh, MT Jafar, M Al Fayoumi
2021 international symposium on electronics and smart devices (ISESD), 1-6, 2021
232021
Achieving data integrity and confidentiality using image steganography and hashing techniques
A Hambouz, Y Shaheen, A Manna, M Al-Fayoumi, S Tedmori
2019 2nd international conference on new trends in computing sciences (ICTCS …, 2019
222019
Peer-mediated intervention through Snapchat: Enhancing social interactions among students with autism
A Shater, A Bani-Rshaid, M Al-Fayoumi, A Al-Shaar, A Bukhamseen, ...
International Journal of Data and Network Science 7 (4), 2083-2088, 2023
212023
A new hybrid approach of symmetric/asymmetric authentication protocol for future mobile networks
M Al-Fayoumi, S Nashwan, S Yousef, AR Alzoubaidi
Third IEEE International Conference on Wireless and Mobile Computing …, 2007
202007
Practical e-payment scheme
M Al-Fayoumi, S Aboud, M Al-Fayoumi
International Journal of Computer Science Issues (IJCSI) 7 (3), 18, 2010
192010
Application of modified ant colony optimization (MACO) for multicast routing problem
SK Sahana, M AL-Fayoumi, PK Mahanti
International Journal of Intelligent Systems and Applications 8 (4), 43, 2016
172016
Analysis of social network using clever ant colony metaphor
M Al-Fayoumi, S Banerjee, PK Mahanti
World Academy of Science, Engineering and Technology 5, 970-974, 2009
172009
Intelligent Association Classification Technique for Phishing Website Detection
M Al-Fayoumi, J Alwidian, M Abusaif
International Arab Journal of Information Technology 17 (4), 2020
152020
Detecting stealth-based attacks in large campus networks
M Al-Fawa'reh, M Al Fayoumi
International Journal 9 (4), 2020
142020
Ontology concepts for requirements engineering process in e-government applications
A Kayed, M Nizar, M Alfayoumi
2010 Fifth International Conference on Internet and Web Applications and …, 2010
142010
An intelligent identification and classification system for malicious uniform resource locators (URLs)
Q Abu Al-Haija, M Al-Fayoumi
Neural Computing and Applications 35 (23), 16995-17011, 2023
132023
Enhancing data protection provided by VPN connections over open WiFi networks
A Karaymeh, M Ababneh, M Qasaimeh, M Al-Fayoumi
2019 2nd International Conference on new Trends in Computing Sciences (ICTCS …, 2019
132019
Performance analysis of SAP-NFC protocol
M Al-Fayoumi, S Nashwan
International Journal of Communication Networks and Information Security 10 …, 2018
132018
Verification and validation of simulation models
SJ Aboud, M Al Fayoumi, M Alnuaimi
Handbook of Research on Discrete Event Simulation Environments: Technologies …, 2010
132010
An enhancement of authentication protocol and key agreement (AKA) for 3G mobile networks
ALF Mustafa, ALS Ja’afer
International Journal of Security (IJS) 5 (1), 35-51, 2011
122011
Intrusion Detection System for Malicious Traffic Using Evolutionary Search Algorithm
S Al-Saqqa, M Al-Fayoumi, M Qasaimeh
Recent Advances in Computer Science and Communications (Formerly: Recent …, 2021
102021
The system can't perform the operation now. Try again later.
Articles 1–20