A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms O Almomani Symmetry 12 (6), 1046, 2020 | 179 | 2020 |
Classification of Cyber Security Threats on Mobile Devices and Applications MA Almaiah, A Al-Zahrani, O Almomani, AK Alhwaitat Artificial Intelligence and Blockchain for Future Cybersecurity Applications …, 2021 | 114* | 2021 |
Arabic text categorization using support vector machine, Naïve Bayes and neural network AH Mohammad, T Alwada ‘n, O Al-Momani GSTF Journal on Computing (JoC) 5, 1-8, 2016 | 109 | 2016 |
A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS MA Almaiah, F Hajjej, A Ali, MF Pasha, O Almomani Sensors 22 (4), 1448, 2022 | 92 | 2022 |
Smart mobile learning success model for higher educational institutions in the context of the COVID-19 pandemic MA Almaiah, S Ayouni, F Hajjej, A Lutfi, O Almomani, AB Awad Electronics 11 (8), 1278, 2022 | 85 | 2022 |
An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks M Adil, MA Almaiah, A Omar Alsayed, O Almomani Sensors 20 (8), 2311, 2020 | 79 | 2020 |
Employing the TAM model to investigate the readiness of M-learning system usage using SEM technique MA Almaiah, S Al-Otaibi, A Lutfi, O Almomani, A Awajan, A Alsaaidah, ... Electronics 11 (8), 1259, 2022 | 78 | 2022 |
Consensus-based combining method for classifier ensembles. OA Alzubi, JAA Alzubi, S Tedmori, H Rashaideh, O Almomani Int. Arab J. Inf. Technol. 15 (1), 76-86, 2018 | 75 | 2018 |
Improving energy efficiency with content-based adaptive and dynamic scheduling in wireless sensor networks MN Khan, HU Rahman, MA Almaiah, MZ Khan, A Khan, M Raza, ... Ieee Access 8, 176495-176520, 2020 | 72 | 2020 |
Secure CoAP Application Layer Protocol for the Internet of Things Using Hermitian Curves R Masadeh, O Almomani, E Masadeh, R Masa’deh The Effect of Information Technology on Business and Marketing Intelligence …, 2023 | 64* | 2023 |
Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels MA Almaiah, O Almomani, A Alsaaidah, S Al-Otaibi, N Bani-Hani, ... Electronics 11 (21), 3571, 2022 | 62 | 2022 |
A conceptual framework for determining quality requirements for mobile learning applications using Delphi Method MA Almaiah, F Hajjej, A Lutfi, A Al-Khasawneh, T Alkhdour, O Almomani, ... Electronics 11 (5), 788, 2022 | 61 | 2022 |
Machine learning classifiers for network intrusion detection system: comparative study O Almomani, MA Almaiah, A Alsaaidah, S Smadi, AH Mohammad, ... 2021 International Conference on Information Technology (ICIT), 440-445, 2021 | 60 | 2021 |
A new hybrid text encryption approach over mobile ad hoc network MA Almaiah, Z Dawahdeh, O Almomani, A Alsaaidah, A Al-Khasawneh, ... Int. J. Electr. Comput. Eng.(IJECE) 10 (6), 6461-6471, 2020 | 57 | 2020 |
Exploring the main determinants of mobile learning application usage during COVID-19 pandemic in Jordanian universities MA Almaiah, A Al-Khasawneh, A Althunibat, O Almomani Emerging technologies during the era of COVID-19 pandemic, 275-290, 2021 | 56 | 2021 |
Vector space models to classify Arabic text J Ababneh, O Almomani, W Hadi, NKT El-Omari, A Al-Ibrahim International Journal of Computer Trends and Technology (IJCTT) 7 (4), 219-223, 2014 | 56 | 2014 |
A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System O Almomani Computers,Materials & Continua 68 (1), 409-429, 2021 | 54 | 2021 |
Sustainable applications of smart-government services: A model to understand smart-government adoption A Althunibat, M Binsawad, MA Almaiah, O Almomani, A Alsaaidah, ... Sustainability 13 (6), 3028, 2021 | 48 | 2021 |
Predicting the acceptance of mobile learning applications during COVID-19 using machine learning prediction algorithms MA Almaiah, O Almomani, A Al-Khasawneh, A Althunibat Emerging technologies during the era of COVID-19 pandemic, 319-332, 2021 | 43* | 2021 |
Improved Security Particle Swarm Optimization (PSO) Algorithm to Detect Radio Jamming Attacks in Mobile Networks AK Al Hwaitat, MA Almaiah, O Almomani, M Al-Zahrani, RM Al-Sayed, ... International Journal of Advanced Computer Science and Applications 11 (4), 2020 | 43 | 2020 |