Cloud computing challenges and solutions NM Turab, AA Taleb, SR Masadeh International Journal of Computer Networks & Communications 5 (5), 209, 2013 | 41 | 2013 |
A comparison of data encryption algorithms with the proposed algorithm: Wireless security SR Masadeh, S Aljawarneh, N Turab, AM Abuerrub The 6th International Conference on Networked Computing and Advanced …, 2010 | 21 | 2010 |
A performance evaluation of common encryption techniques with secure watermark system (SWS) A Odeh, SR Masadeh, A Azzazi International Journal of Network Security & Its Applications (IJNSA) 7 (3 …, 2015 | 15 | 2015 |
A secure data transmission mechanism for cloud outsourced data A Alhaj, S Aljawarneh, S Masadeh, E Abu-Taieh International Journal of Cloud Applications and Computing (IJCAC) 3 (1), 34-43, 2013 | 15 | 2013 |
Rainfall prediction using machine learning AVS Kumar, SA Roshan, A Dutta, S Ray, SR Masadeh, GP Lakshmi, ... Advancements in Climate and Smart Environment Technology, 100-113, 2024 | 13 | 2024 |
A secure wifi system for wireless networks: an experimental evaluation S Aljawarneh, S Masadeh, F Alkhateeb Network Security 2010 (6), 6-12, 2010 | 13 | 2010 |
A NOVEL AUTHENTICATION AND AUTHORIZATION MODEL BASED ON MULTIPLE ENCRYPTION TECHNIQUES FOR ADOPTING SECURE E-LEARNING SYSTEM. SR Masadeh, JS Zraqou, M Alazab Journal of Theoretical & Applied Information Technology 96 (6), 2018 | 11 | 2018 |
A secure model for building e-learning systems SR Masadeh, N Turab, F Obisat Network Security 2012 (1), 17-20, 2012 | 11 | 2012 |
Lightweight cryptosystem for image encryption using auto-generated key MAF Al-Husainy, HA Al-Sewadi, SR Masadeh Journal of Engineering and Applied Sciences 13 (17), 7418-7425, 2018 | 10 | 2018 |
Secure communication: a proposed public key watermark system SR Masadeh, S Aljawarneh, A Odeh, A Alhaj International Journal of Information Security and Privacy (IJISP) 7 (4), 1-10, 2013 | 10 | 2013 |
Copyright protection of relational database systems A Al-Haj, A Odeh, S Masadeh Networked Digital Technologies: Second International Conference, NDT 2010 …, 2010 | 8 | 2010 |
Deploying a web client authentication system using smart card for e-systems S Aljawarneh, S Masadeh, A Alhaj Research Journal of Applied Sciences, Engineering and Technology 3 (9), 948-952, 2011 | 7 | 2011 |
The impact of web applications on decision-making process in the public sector M Al-Jedaiah, SR Masadeh, AM Abu-Errub, AY Areiqat Proceedings of the 1st International Conference on Intelligent Semantic Web …, 2010 | 7 | 2010 |
Concerns from Cloud Security Issues: Challenges and Open Problems SR Masadeh, FM AlShrouf, AS Kumar International Journal 12 (1), 2023 | 6 | 2023 |
A novel paradigm in authentication system using swifi encryption/decryption approach SR Masadeh, A Azzazi, BAY Alqaralleh, AM Al Sbou International Journal of Network Security & Its Applications 6 (1), 17, 2014 | 5 | 2014 |
A Formal Evaluation of the Security Schemes for Wireless Networks SR Masadeh, N Turab Research Journal of Applied Sciences, Engineering and Technology 3 (9), 910-913, 2011 | 5 | 2011 |
A study of secure deployment of wireless technology in the medical fields N Turab, S Aljawarneh, S Masadeh Proceedings of the 1st International Conference on Intelligent Semantic Web …, 2010 | 4 | 2010 |
Recommendations guide for WLAN Security N Turab, S Masadeh International Journal of ACM Jordan 1, 2010 | 4 | 2010 |
A Framework for the Generation of Class Diagram from Text Requirements using Natural language Processing F Alharbia, SR Masadeh, F Alshrouf International Journal 10 (1), 2021 | 3 | 2021 |
Embedded key cryptosystem for cloud computing applications SR Masadeh, HA Al-Sewadi, MAF Al-Husainy Proceedings of the 2nd International Conference on Future Networks and …, 2018 | 3 | 2018 |