Hybrid chain: Blockchain enabled framework for bi-level intrusion detection and graph-based mitigation for security provisioning in edge assisted IoT environment AAM Sharadqh, HAM Hatamleh, SS Saloum, TA Alawneh IEEE Access 11, 27433-27449, 2023 | 17 | 2023 |
Time Comparing between Java and C++ Software AAMS As’ad Mahmoud Alnaser, Omar AlHeyasat, Ashraf Abdel-Karim Abu-Ein ... Journal of Software Engineering and Applications 5 (8), 630-634, 2012 | 17* | 2012 |
Bipolar Intuitionistic Fuzzy Graphs and its Matrices WAAZMOM Asad M. A. Alnaser Applied Mathematics & Information Sciences 14 (2), 205 - 214, 2020 | 13 | 2020 |
Artificial intelligence in Jordanian education: Assessing acceptance via perceived cybersecurity, novelty value, and perceived trust M Alzyoud, N Al-Shanableh, S Alomar, A AsadAlnaser, A Mustafad, ... International Journal of Data and Network Science 8 (2), 823-834, 2024 | 11 | 2024 |
A METHOD OF MULTIPATH ROUTING IN SDN NETWORKS AMA Alnaser Advances in Computer Science and Engineering 17 (1), 11-17, 2018 | 10 | 2018 |
Some Contributions On Operations And Connectivity Notations In Intuitionistic Fuzzy Soft Graphs AMAA Ahlam Fallatah, Mourad Oqla Massa’deh Advances and Applications in Discrete Mathematics 13 (2), 117-138, 2020 | 6* | 2020 |
A study on connectivity concepts in intuitionistic fuzzy graphs WA Alzoubi, M AS’AD WSEAS Trans. Syst. Control 16, 77-82, 2021 | 5 | 2021 |
Streaming Algorithm For Multi-path Secure Routing in Mobile Networks AMA Alnaser IJCSI International Journal of Computer Science Issues 11 (1), 212-214, 2014 | 4 | 2014 |
Computer simulation to detect the blind spots in automobiles AAM Sharadqeh, O Alheyasat, AAK Abu-Ein International Journal of Computer Science Issues (IJCSI) 10 (1), 453, 2013 | 4 | 2013 |
Certain Contributions in Traffic Engineering Based on Software-Defined Networking Technology AMA Alnaser Journal of Computer Science 15 (7), 944.953, 2019 | 3 | 2019 |
Homomorphism in a Bipolar - Valued Q - Fuzzy Subring AMA Mourad Oqla Massa'deh Global Journal of Pure and Applied Mathematics 12 (5), 4233-4241, 2016 | 3 | 2016 |
Set-theoretic Foundations of the Modern Relational Databases: Representations of Table Algebras Operations AMA Alnaser British Journal of Mathematics & Computer Science 4 (23), 3286-3293, 2014 | 3 | 2014 |
A Method of Forming the Optimal Set of Disjoint Path in Computer Networks AMA ALNASER Journal of Applied Computer Science & Mathematics 11 (23), 9-12, 2017 | 2 | 2017 |
Reliable Multipath Secure Routing In Mobile Computer Networks KYO As'ad Mahmoud As'ad Alnaser Computer Engineering and Intelligent Systems 4 (2), 8-16, 2013 | 2 | 2013 |
Bipolar intuitionistic fuzzy graph over Cayley groups A Fallatah, A Alnaser, MO Massa’deh J. Math. Comput. Sci. 11 (5), 6403-6419, 2021 | 1 | 2021 |
Introduction to Cartesian, Tensor and Lexicographic Product of Bipolar Interval Valued Fuzzy Graph YAWMOM Wael Ahmad Al Zoubi, As’ad Mahmoud As’ad Alnaser, Hazem “Moh’d Said ... Journal of Engineering and Applied Sciences 15 (2), 581-585, 2020 | 1 | 2020 |
Information Security Approach in Open Distributed Multi-Agent Virtual Learning Environment ZAMA Sarhan International Journal of Computer Science & Information Technology 6 (1), 15, 2014 | 1 | 2014 |
Novel Properties for Total Strong - Weak Domination Over Bipolar Intuitionistic Fuzzy Graphs AMA Alnaser International Journal of Advanced Computer Science and Applications (2156 …, 2021 | | 2021 |
Multipath protected routing in distributed computer systems AMA Alnaser International Conferences on High Performance Computing, HPC-UA 2013 …, 2013 | | 2013 |
Distribution Systems Efficiency AMA Omar Al-Heyasat (corresponding author),Ashraf Abdel-Karim Abu-Ein,Hazem ... Computer Engineering and Intelligent Systems 3 (7), 100-105, 2012 | | 2012 |