A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms O Almomani Symmetry 12 (6), 1046, 2020 | 169 | 2020 |
Classification of Cyber Security Threats on Mobile Devices and Applications MA Almaiah, A Al-Zahrani, O Almomani, AK Alhwaitat Artificial Intelligence and Blockchain for Future Cybersecurity Applications …, 2021 | 108* | 2021 |
Arabic text categorization using support vector machine, Naïve Bayes and neural network AH Mohammad, T Alwada ‘n, O Al-Momani GSTF Journal on Computing (JoC) 5, 1-8, 2016 | 105 | 2016 |
A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS MA Almaiah, F Hajjej, A Ali, MF Pasha, O Almomani Sensors 22 (4), 1448, 2022 | 82 | 2022 |
An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks M Adil, MA Almaiah, A Omar Alsayed, O Almomani Sensors 20 (8), 2311, 2020 | 76 | 2020 |
Smart mobile learning success model for higher educational institutions in the context of the COVID-19 pandemic MA Almaiah, S Ayouni, F Hajjej, A Lutfi, O Almomani, AB Awad Electronics 11 (8), 1278, 2022 | 75 | 2022 |
Consensus-based combining method for classifier ensembles. OA Alzubi, JAA Alzubi, S Tedmori, H Rashaideh, O Almomani Int. Arab J. Inf. Technol. 15 (1), 76-86, 2018 | 71 | 2018 |
Employing the TAM model to investigate the readiness of M-learning system usage using SEM technique MA Almaiah, S Al-Otaibi, A Lutfi, O Almomani, A Awajan, A Alsaaidah, ... Electronics 11 (8), 1259, 2022 | 69 | 2022 |
Improving energy efficiency with content-based adaptive and dynamic scheduling in wireless sensor networks MN Khan, HU Rahman, MA Almaiah, MZ Khan, A Khan, M Raza, ... IEEE Access 8, 176495-176520, 2020 | 65 | 2020 |
Secure CoAP Application Layer Protocol for the Internet of Things Using Hermitian Curves R Masadeh, O Almomani, E Masadeh, R Masa’deh The Effect of Information Technology on Business and Marketing Intelligence …, 2023 | 58* | 2023 |
A conceptual framework for determining quality requirements for mobile learning applications using Delphi Method MA Almaiah, F Hajjej, A Lutfi, A Al-Khasawneh, T Alkhdour, O Almomani, ... Electronics 11 (5), 788, 2022 | 58 | 2022 |
Machine learning classifiers for network intrusion detection system: comparative study O Almomani, MA Almaiah, A Alsaaidah, S Smadi, AH Mohammad, ... 2021 International Conference on Information Technology (ICIT), 440-445, 2021 | 57 | 2021 |
Vector space models to classify Arabic text J Ababneh, O Almomani, W Hadi, NKT El-Omari, A Al-Ibrahim International Journal of Computer Trends and Technology (IJCTT) 7 (4), 219-223, 2014 | 56 | 2014 |
Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels MA Almaiah, O Almomani, A Alsaaidah, S Al-Otaibi, N Bani-Hani, ... Electronics 11 (21), 3571, 2022 | 55 | 2022 |
Exploring the main determinants of mobile learning application usage during COVID-19 pandemic in Jordanian universities MA Almaiah, A Al-Khasawneh, A Althunibat, O Almomani Emerging technologies during the era of COVID-19 pandemic, 275-290, 2021 | 50 | 2021 |
A new hybrid text encryption approach over mobile ad hoc network MA Almaiah, Z Dawahdeh, O Almomani, A Alsaaidah, A Al-Khasawneh, ... Int. J. Electr. Comput. Eng.(IJECE) 10 (6), 6461-6471, 2020 | 49 | 2020 |
Sustainable applications of smart-government services: A model to understand smart-government adoption A Althunibat, M Binsawad, MA Almaiah, O Almomani, A Alsaaidah, ... Sustainability 13 (6), 3028, 2021 | 46 | 2021 |
A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System O Almomani Computers,Materials & Continua 68 (1), 409-429, 2021 | 45 | 2021 |
Predicting the acceptance of mobile learning applications during COVID-19 using machine learning prediction algorithms MA Almaiah, O Almomani, A Al-Khasawneh, A Althunibat Emerging technologies during the era of COVID-19 pandemic, 319-332, 2021 | 40* | 2021 |
Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve Cryptography F Albalas, M Al-Soud, O Almomani, A Almomani The International Arab Journal of Information Technology 15 (Special Issue …, 2018 | 40 | 2018 |