Transmitter design and hardware considerations for different space modulation techniques R Mesleh, O Hiari, A Younis, S Alouneh IEEE Transactions on Wireless Communications 16 (11), 7512-7522, 2017 | 82 | 2017 |
An empirical study of cross‐platform mobile development in industry A Biørn-Hansen, TM Grønli, G Ghinea, S Alouneh Wireless Communications and Mobile Computing 2019 (1), 5743892, 2019 | 78 | 2019 |
A novel path protection scheme for MPLS networks using multi-path routing S Alouneh, A Agarwal, A En-Nouaary Computer Networks 53 (9), 1530-1545, 2009 | 55 | 2009 |
Context-Aware Multifaceted Trust Framework for evaluating trustworthiness of Cloud Providers P Bertok, T zahir, S Alouneh Future Generation Computer Systems, 2017 | 51* | 2017 |
Low power Wallace multiplier design based on wide counters S Abed, BJ Mohd, Z Al‐bayati, S Alouneh International Journal of Circuit Theory and Applications 40 (11), 1175-1185, 2012 | 41 | 2012 |
FPGA hardware of the LSB steganography method BJ Mohd, S Abed, T Al-Hayajneh, S Alouneh 2012 International Conference on Computer, Information and Telecommunication …, 2012 | 35 | 2012 |
Performance evaluation of DigiMesh and ZigBee wireless mesh networks H Salah, S Alouneh, A Al-Assaf, K Darabkh 2018 International Conference on Wireless Communications, Signal Processing …, 2018 | 31 | 2018 |
A comprehensive study and analysis on SAT-solvers: advances, usages and achievements S Alouneh, S Abed, MH Al Shayeji, R Mesleh Artificial Intelligence Review 52, 2575-2601, 2019 | 28 | 2019 |
A CSI-based multi-environment human activity recognition framework BA Alsaify, MM Almazari, R Alazrai, S Alouneh, MI Daoud Applied Sciences 12 (2), 930, 2022 | 25 | 2022 |
A Multiple LSPs Approach to Secure Data in MPLS Networks. S Alouneh, A En-Nouaary, A Agarwal J. Networks 2 (4), 51-58, 2007 | 25 | 2007 |
A practical three‐phase ILP approach for solving the examination timetabling problem F Al‐Hawari, M Al‐Ashi, F Abawi, S Alouneh International Transactions in Operational Research 27 (2), 924-944, 2020 | 17 | 2020 |
A multidimension taxonomy of insider threats in cloud computing MJ Alhanahnah, A Jhumka, S Alouneh The Computer Journal 59 (11), 1612-1622, 2016 | 16 | 2016 |
Review on image steganography AS Pandit, SR Khope, F Student .. International Journal of Eng Sci 6115, 2016 | 16 | 2016 |
A novel approach for fault tolerance in MPLS networks S Alouneh, A Agarwal, A En-Nouaary 2006 Innovations in Information Technology, 1-5, 2006 | 15 | 2006 |
MPLS technology in wireless networks S Alouneh, S Abed, M Kharbutli, BJ Mohd Wireless networks 20, 1037-1051, 2014 | 14 | 2014 |
Stack memory buffer overflow protection based on duplication and randomization S Alouneh, M Kharbutli, R AlQurem Procedia Computer Science 21, 250-256, 2013 | 13 | 2013 |
Methods to achieve effective web-based learning management modules: MyGJU versus Moodle F Al-Hawari, H Barham, O Al-Sawaeer, M Alshawabkeh, S Alouneh, ... PeerJ Computer Science 7, e498, 2021 | 12 | 2021 |
LoRaWAN energy optimization with security consideration. AF Khalifeh, K Aldahdouh, S Alouneh Int. Arab J. Inf. Technol. 18 (3A), 476-483, 2021 | 12 | 2021 |
Security of VoIP traffic over low or limited bandwidth networks S Alouneh, S Abed, G Ghinea Security and communication networks 9 (18), 5591-5599, 2016 | 12 | 2016 |
MPLS security: an approach for unicast and multicast environments S Alouneh, A En-Nouaary, A Agarwal annals of telecommunications-annales des télécommunications 64, 391-400, 2009 | 12 | 2009 |