Cloud computing security challenges in higher educational institutions-A survey HAK Al-Shqeerat, FM Al-Shrouf, MR Hassan, H Fajraoui International Journal of Computer Applications 161 (6), 22-29, 2017 | 78 | 2017 |
Hierarchical cluster-based routing protocols for wireless sensor networks-a survey A Sabri, K Al-Shqeerat International Journal of Computer Science Issues (IJCSI) 11 (1), 93, 2014 | 39 | 2014 |
A Taxonomy of Virtualization Security Issues in Cloud Computing Environments HAAH Nadiah M. Almutairy, Khalil H. A. Al-Shqeerat Indian Journal of Science and Technology 12 (3), 19, 2019 | 35* | 2019 |
Security Challenges and Limitations in IoT Environments KHAAS Suha Ibrahim Al-Sharekh International Journal of Computer Science and Network Security 19 (2), 193-199, 2019 | 21 | 2019 |
A novel feature-engineered–NGBoost machine-learning framework for fraud detection in electric power consumption data S Hussain, MW Mustafa, KHA Al-Shqeerat, F Saeed, BAS Al-Rimy Sensors 21 (24), 8423, 2021 | 18 | 2021 |
A hybrid graphical user authentication scheme in mobile cloud computing environments KHA Al-Shqeerat, KI Abuzanouneh International Journal of Communication Networks and Information Security 13 …, 2021 | 14 | 2021 |
A survey on security challenges of virtualization technology in cloud computing NM Almutairy, KHA Al-Shqeerat International Journal of Computer Science & Information Technology (IJCSIT …, 2019 | 14 | 2019 |
A multi-criteria assessment of decision support systems in educational environments AA Mohammed Hadwan, Khalil H. A. Al-Shqeerat Indonesian Journal of Electrical Engineering and Computer Science 22 (2 …, 2021 | 10 | 2021 |
A new approach for resolving equations with fuzzy parameters OV Sira, K Al-Shqeerat European Journal of Scientific Research 38 (4), 619-625, 2009 | 10 | 2009 |
Software agents for e-Commerce data workflow management F Al-Shrouf, A Turani, K Al-Shqeerat Software Engineering and Computer Systems: Second International Conference …, 2011 | 7 | 2011 |
Improved linear density technique for segmentation in Arabic handwritten text recognition HA Al Hamad, L Abualigah, M Shehab, KHA Al-Shqeerat, M Otair Multimedia Tools and Applications 81 (20), 28531-28558, 2022 | 6 | 2022 |
Design and Analysis of an Effective Secure Cloud System at Qassim University KHA Al-Shqeerat, MAA Hammoudeh, MI Abbasi International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 6 | 2016 |
Performance Analysis of Intrusion Detection System in the IoT Environment Using Feature Selection Technique. M Alhanaya, KH Ateyeh Al-Shqeerat Intelligent Automation & Soft Computing 36 (3), 2023 | 4 | 2023 |
Evaluating Time Performance Optimization Analysis for Mobile Agent Message Communication Using Assignment Computing Agent F Al Shrouf, H Abusaimeh, K Al Shqeerat, M Omari Journal of Applied Sciences 12 (12), 1290-1296, 2012 | 4 | 2012 |
An Enhanced Graphical Authentication Scheme Using Multiple-Image Steganography. KHA Al-Shqeerat Computer Systems Science & Engineering 44 (3), 2023 | 2 | 2023 |
Blockchain Mobile Wallet with Secure Offline Transactions RS Rasheed, KHA Al-Shqeerat, AS Ghorab, FS AbuOwaimer, ... CMC-COMPUTERS MATERIALS & CONTINUA 75 (2), 2905-2919, 2023 | 2 | 2023 |
Securing a question-based multi-factor authentication system using LSB steganography technique KHA Al-Shqeerat International Conference on Business and Technology, 1118-1128, 2022 | 2 | 2022 |
An overview of privacy issues in iot environments SI Al-Sharekh, KHA Al-Shqeerat 2019 International Conference on Advances in the Emerging Computing …, 2020 | 2 | 2020 |
A hybrid LAR-1 DNDP route discovery algorithm for mobile ad hoc networks A Sabri, K Al-Shqeerat International Lournal of Computer Science and Network Security (IICSNS) 8, 31-40, 2011 | 2 | 2011 |
Developing an integrated framework for securing internet of things traffic in smart cities using machine learning techniques M Alhanaya, K Al-Shqeerat Applied Sciences 13 (16), 9476, 2023 | 1 | 2023 |