Amna Eleyan
Cited by
Cited by
A flexible encryption technique for the internet of things environment
S Medileh, A Laouid, R Euler, A Bounceur, M Hammoudeh, M AlShaikh, ...
Ad Hoc Networks 106, 102240, 2020
Chaos Theory and its Application: An Essential Framework for Image Encryption
Arshad, S Shaukat, A Ali, A Eleyan, SA Shah, J Ahmad
Chaos Theory and Applications 2 (1), 15-20, 2020
Extending WSDL and UDDI with Quality Service Selection Criteria
AA Eleyan, L Zhao
Proceedings of the 3rd International Symposium on Web Services, 2010
A fully homomorphic encryption based on magic number fragmentation and El‐Gamal encryption: Smart healthcare use case
M Kara, A Laouid, MA Yagoub, R Euler, S Medileh, M Hammoudeh, ...
Expert Systems 39 (5), e12767, 2022
Forensic Process as a Service (FPaaS) for cloud computing
A Eleyan, D Eleyan
2015 European Intelligence and Security Informatics Conference, 157-160, 2015
CoAP based IoT data transfer from a Raspberry Pi to Cloud
TL Scott, A Eleyan
2019 International Symposium on Networks, Computers and Communications …, 2019
Service selection using quality matchmaking
A Eleyan, L Zhao
2011 International Conference on Communications and Information Technology …, 2011
Quality-of-service support in web services architecture
A ELEYAN, L Mikhailov, L Zhao
Ingénierie des systèmes d'information (2001) 9 (5-6), 185-203, 2004
Enhancing software comments readability using flesch reading ease score
D Eleyan, A Othman, A Eleyan
Information 11 (9), 430, 2020
Coaching, Tutoring and Mentoring in the Higher Education as a solution to retain students in their major and help them achieve success.
D Eleyan, A Eleyan
Digital forensic tools used in analysing cybercrime
M Dweikat, D Eleyan, A Eleyan
Journal of University of Shanghai for Science and Technology, ISSN, 1007-6735, 2021
Optimization water leakage detection using wireless sensor networks (OWLD)
M Daadoo, A Eleyan, D Eleyan
Proceedings of the International Conference on Future Networks and …, 2017
A Survey Of Social Engineering Attacks: Detection and Prevention Tools
NA Odeh, D Eleyan, A Eleyan
Journal of Theoretical and Applied Information Technology 99 (18), 4375-4386, 2021
A simulation implementation of the LTE-Uu interface datalink layer in OMNeT++
M Arouri, Z Atiyyeh, A Mousa, A Eleyan, H Badr
International Conference on Mobile Networks and Management, 270-284, 2010
IoT-based home automation using android application
A Eleyan, J Fallon
2020 International Symposium on Networks, Computers and Communications …, 2020
Computer Numerical Control-PCB Drilling Machine with Efficient Path Planning–Case Study 2
M Daadoo, D Eleyan, S Tarapiah, S Atalla, A Eleyan
Automatic Control and Computer Sciences 52 (5), 451-463, 2018
A bottom-up approach to automating web service discovery customization and semantic translation
A Eleyan, L Zhao
Proc of the 3rd International Symposium on Web Services, 2010
A Prediction Olive Disease Using Machine Learning Models, Decision Tree and Naive Bayes Models
J Drdsh, D Eleyan, A Eleyan
Journal of Theoretical and Applied Information Technology 99 (18), 4231-4240, 2021
Adopting Continuing Personal and Professional Development to Improve Quality of Teaching (Personal Experience)
D Eleyan, A Eleyan
Arab Journal of Quality in Education 1 (1), 33-55, 2014
Co-Simulation of Multiple Vehicle Routing Problem Models
SS Guia, A Laouid, M Hammoudeh, A Bounceur, M Alfawair, A Eleyan
Future Internet 14 (5), 137, 2022
The system can't perform the operation now. Try again later.
Articles 1–20