Android ransomware detection based on a hybrid evolutionary approach in the context of highly imbalanced data I Almomani, R Qaddoura, M Habib, S Alsoghyer, A Al Khayer, I Aljarah, ... IEEE Access 9, 57674-57691, 2021 | 62 | 2021 |
A Comprehensive Analysis of the Android Permissions System IM Almomani, A Al Khayer IEEE Access 8, 216671-216688, 2020 | 59 | 2020 |
Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication W El-Shafai, IM Almomani, A Alkhayer IEEE Access 9, 35004-35026, 2021 | 57 | 2021 |
An automated vision-based deep learning model for efficient detection of android malware attacks I Almomani, A Alkhayer, W El-Shafai IEEE Access 10, 2700-2720, 2022 | 43 | 2022 |
Visualized malware multi-classification framework using fine-tuned CNN-based transfer learning models W El-Shafai, I Almomani, A AlKhayer Applied Sciences 11 (14), 6446, 2021 | 43 | 2021 |
Android applications scanning: The guide I Almomani, A Khayer 2019 International Conference on Computer and Information Sciences (ICCIS), 1-5, 2019 | 22 | 2019 |
Novel Ransomware Hiding Model Using HEVC Steganography Approach. I Almomani, A AlKhayer, W El-Shafai Computers, Materials & Continua 70 (1), 2022 | 21 | 2022 |
An efficient machine learning-based approach for android v. 11 ransomware detection I Almomani, A AlKhayer, M Ahmed 2021 1st international conference on artificial intelligence and data …, 2021 | 21 | 2021 |
Proposed biometric security system based on deep learning and chaos algorithms I Almomani, W El-Shafai, A AlKhayer, A Alsumayt, S Aljameel, K Alissa Comput. Mater. Contin 74 (2), 3515-3537, 2023 | 19 | 2023 |
A crypto-steganography approach for hiding ransomware within HEVC streams in android IoT devices I Almomani, A Alkhayer, W El-Shafai Sensors 22 (6), 2281, 2022 | 19 | 2022 |
Hybrid-based analysis impact on ransomware detection for Android systems R Almohaini, I Almomani, A AlKhayer Applied Sciences 11 (22), 10976, 2021 | 14 | 2021 |
ASAF: Android static analysis framework A Al Khayer, I Almomani, K Elkawlak 2020 First International Conference of Smart Systems and Emerging …, 2020 | 11 | 2020 |
An optical-based encryption and authentication algorithm for color and grayscale medical images W El-Shafai, I Almomani, A Ara, A Alkhayer Multimedia Tools and Applications 82 (15), 23735-23770, 2023 | 9 | 2023 |
E2E-RDS: Efficient End-to-End ransomware detection system based on Static-Based ML and Vision-Based DL approaches I Almomani, A Alkhayer, W El-Shafai Sensors 23 (9), 4467, 2023 | 6 | 2023 |
An efficient localization and avoidance method of jammers in vehicular ad hoc networks I Almomani, M Ahmed, D Kosmanos, A Alkhayer, L Maglaras IEEE Access 10, 131640-131655, 2022 | 5 | 2022 |
Ilung: Interactive Holographic Medical Application for Lung CT Scans Using Hololens A Al Khayer, EI Mansor International Journal of Engineering & Technology 7 (4.31), 408-413, 2018 | | 2018 |
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks D KOSMANOS, A ALKHAYER | | |