Fuzz Test Case Generation for Penetration Testing in Mobile Cloud Computing Applications AS Al-Ahmad, H Kahtan International Conference on Intelligent Computing & Optimization 1 (1), 267-276, 2018 | 120* | 2018 |
Combining deep and handcrafted image features for MRI brain scan classification AM Hasan, HA Jalab, F Meziane, H Kahtan, AS Al-Ahmad IEEE Access 7, 79959-79967, 2019 | 105 | 2019 |
Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art YI Alzoubi, VH Osmanaj, A Jaradat, A Al‐Ahmad Security and Privacy 4 (2), e145, 2021 | 90 | 2021 |
Mobile cloud computing models security issues: A systematic review AS AlAhmad, H Kahtan, YI Alzoubi, O Ali, A Jaradat Journal of Network and Computer Applications 190, 103152, 2021 | 64 | 2021 |
Blockchain technology as a Fog computing security and privacy solution: An overview YI Alzoubi, A Al-Ahmad, H Kahtan Computer Communications 182, 129-152, 2022 | 59 | 2022 |
Systematic literature review on penetration testing for mobile cloud computing applications AS Al-Ahmad, H Kahtan, F Hujainah, HA Jalab IEEE Access 7, 173524-173540, 2019 | 43 | 2019 |
Internet of things and blockchain integration: security, privacy, technical, and design challenges YI Alzoubi, A Al-Ahmad, H Kahtan, A Jaradat Future Internet 14 (7), 216, 2022 | 36 | 2022 |
Fog computing security and privacy issues, open challenges, and blockchain solution: An overview. YI Alzoubi, A Al-Ahmad, A Jaradat International Journal of Electrical & Computer Engineering (2088-8708) 11 (6), 2021 | 33 | 2021 |
Mobile cloud computing testing review AS Al-Ahmad, SA Aljunid, ASA Sani 2013 International Conference on Advanced Computer Science Applications and …, 2013 | 30 | 2013 |
Cloud computing review: features and issues AS Al-Ahmad, H Kahtan 2018 International Conference on Smart Computing and Electronic Enterprise …, 2018 | 19 | 2018 |
A review of advanced technologies available to improve the healthcare performance during COVID-19 pandemic O Ali, A AlAhmad, H Kahtan Procedia Computer Science 217, 205-216, 2023 | 12 | 2023 |
Comparison between web accessibility Evaluation tools A Al-Ahmad, I Ahmaro, M Mustafa Al-Madinah Technical Studies 1 (4), 2015 | 11 | 2015 |
Blockchain technology: a fundamental overview A Jaradat, O Ali, A AlAhmad Blockchain Technologies for Sustainability, 1-24, 2022 | 10 | 2022 |
Mobile cloud computing applications penetration testing model design AS Al-Ahmad, SA Aljunid, NK Ismail International Journal of Information and Computer Security 13 (2), 210-226, 2020 | 10 | 2020 |
The factors influenced by stakeholder identification in E-learning systems: A survey DAH Elneel, H Kahtan, AS Fakharudin, M Abdulhak, AS Al-Ahmad, ... Journal of King Saud University-Science 35 (3), 102566, 2023 | 9 | 2023 |
E-learning Difficulties in Jordan A Al-Ahmad, IY Ahmaro, M Mustafa MEDIU publications 1 (5), 2017 | 9 | 2017 |
An Evaluation of Key Adoption Factors towards Using the Fog Technology O Ali, A Shrestha, A Jaradat, A Al-Ahmad Big Data and Cognitive Computing 6 (3), 81, 2022 | 8 | 2022 |
Importance of UML model in the RUP Development lifecycle along with the time and the static aspect of the process A Al-Ahmad, I Ahmaro, M Mustafa Al-Madinah Technical Studies| مجلة جامعة المدينة العالمية للعلوم التقنية …, 2017 | 8 | 2017 |
Pen testing for web applications A Al-Ahmad, BA Ata, A Wahbeh International Journal of Information Technology and Web Engineering (IJITWE …, 2012 | 8 | 2012 |
TEST CASE SELECTION FOR PENETRATION TESTING IN MOBILE CLOUD COMPUTING APPLICATIONS: A PROPOSED TECHNIQUE. AS AL-AHMAD, H KAHTAN Journal of Theoretical & Applied Information Technology 96 (13), 2018 | 7 | 2018 |