Dynamic butterfly optimization algorithm for feature selection M Tubishat, M Alswaitti, S Mirjalili, MA Al-Garadi, TA Rana IEEE Access 8, 194303-194314, 2020 | 80 | 2020 |
A comparative study of applying real-time encryption in cloud computing environments FF Moghaddam, O Karimi, MT Alrashdan 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet), 185-189, 2013 | 52 | 2013 |
A hybrid encryption algorithm based on RSA small-e and efficient-RSA for cloud computing environments FF Moghaddam, MT Alrashdan, O Karimi Journal of advances in Computer Network 1 (3), 2013 | 46 | 2013 |
Applying an agent-based user authentication and access control model for cloud servers M Hajivali, FF Moghaddam, MT Alrashdan, AZM Alothmani 2013 International Conference on ICT Convergence (ICTC), 807-812, 2013 | 31 | 2013 |
Comparison between cloud ERP and traditional ERP M Hadidi, M Al-Rashdan, S Hadidi, Y SOUBHI Journal of Critical Reviews 7 (3), 140-142, 2020 | 24 | 2020 |
Blockchain technology in E-commerce platform TM Xuan, MT Alrashdan, Q Al-Maatouk, MT Alrashdan International Journal of Management 11 (10), 1688-1697, 2020 | 16 | 2020 |
Impact web on decision support systems on the organizations S Hadidi, M Al-Rashdan, M Hadidi Int. J. Sci. Technol. Res 9 (4), 1450-1452, 2020 | 11 | 2020 |
The effect of reliable data transfer and efficient computer network features in Jordanian banks accounting information systems performance based on hardware and software … B Jarah, M Jarrah, S Almomani, E AlJarrah, M Al-Rashdan International Journal of Data and Network Science 7 (1), 357-362, 2023 | 10 | 2023 |
Graphical password strategy YS Chuen, M Al-Rashdan, Q Al-Maatouk Journal of Critical Reviews 7 (3), 102-104, 2020 | 10 | 2020 |
Flowchart-based programming environments aimed at novices D Hooshyar, T Maíen, M Masih International Journal of Innovative Ideas 13 (1), 52-62, 2013 | 10 | 2013 |
Performance Comparison Analysis of SSHMIPv 6 and HMIPv 6 Lost Packets using Network Simulator NS-2 M Alrashdan, M Ismail, K Jumari, GA Abed, S Hassan Information Technology Journal 10 (10), 1989-1993, 2011 | 10 | 2011 |
Cuckoo algorithm with great deluge local-search for feature selection problems. MK Alsmadi, M Alzaqebah, S Jawarneh, S Brini, I Al-Marashdeh, K Briki, ... International Journal of Electrical & Computer Engineering (2088-8708) 12 (4), 2022 | 5 | 2022 |
The effect of using honeypot network on system security W AlZoubi, M Alrashdan International Journal of Data and Network Science 6 (4), 1413-1418, 2022 | 4 | 2022 |
Secure data storage system DC JIANLI, M Al-Rashdan, Q Al-Maatouk Journal of critical reviews 7 (03), 99, 2020 | 4 | 2020 |
A Study on Effective Transfere Rate Over Smart Hierarchical Mobile IPv6 (SHMIPv6) M Alrashdan, M Ismail, K Jumari IJCSNS 7 (5), 235, 2007 | 4 | 2007 |
Macro Based Malware Detection System B Sohail Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (3 …, 2021 | 3 | 2021 |
A General Review on Location Based Services (LBS) Privacy Protection Using Centralized and Decentralized Approaches with Potential of Having a Hybrid Approach BA Adem, M Alrashdan, M Abdulnabi, A Jaradat, M Tubishat, WA Ghanem, ... International Journal of Future Generation Communication and Networking 14 …, 2021 | 3 | 2021 |
Li-Fi Technology for Smart Cities YS Hussein, AS Alabed, M Al Mafrachi, M Alrshdan, Q Al-Maatouk Solid State Technology, 2391-2399, 2020 | 3 | 2020 |
Apu high-speed internet access: A literature review A Sawehli, M Al-Rashdan, Q Al-maatouk Journal of Critical Reviews 7 (3), 2020, 2019 | 3 | 2019 |
Cloud Data Processing Network Via Online Game Users SZ Chuen, M AL-RASHDAN, Q AL-MAATOUK Journal of Critical Reviews 7 (3), 2020, 2019 | 3 | 2019 |