A flexible encryption technique for the internet of things environment S Medileh, A Laouid, R Euler, A Bounceur, M Hammoudeh, M AlShaikh, ... Ad Hoc Networks 106, 102240, 2020 | 19 | 2020 |
Chaos Theory and its Application: An Essential Framework for Image Encryption Arshad, S Shaukat, A Ali, A Eleyan, SA Shah, J Ahmad Chaos Theory and Applications 2 (1), 15-20, 2020 | 17* | 2020 |
Extending WSDL and UDDI with Quality Service Selection Criteria AA Eleyan, L Zhao Proceedings of the 3rd International Symposium on Web Services, 2010 | 13 | 2010 |
A fully homomorphic encryption based on magic number fragmentation and El‐Gamal encryption: Smart healthcare use case M Kara, A Laouid, MA Yagoub, R Euler, S Medileh, M Hammoudeh, ... Expert Systems 39 (5), e12767, 2022 | 10 | 2022 |
Forensic Process as a Service (FPaaS) for cloud computing A Eleyan, D Eleyan 2015 European Intelligence and Security Informatics Conference, 157-160, 2015 | 10 | 2015 |
CoAP based IoT data transfer from a Raspberry Pi to Cloud TL Scott, A Eleyan 2019 International Symposium on Networks, Computers and Communications …, 2019 | 9 | 2019 |
Service selection using quality matchmaking A Eleyan, L Zhao 2011 International Conference on Communications and Information Technology …, 2011 | 9 | 2011 |
Quality-of-service support in web services architecture A ELEYAN, L Mikhailov, L Zhao Ingénierie des systèmes d'information (2001) 9 (5-6), 185-203, 2004 | 9 | 2004 |
Enhancing software comments readability using flesch reading ease score D Eleyan, A Othman, A Eleyan Information 11 (9), 430, 2020 | 6 | 2020 |
Coaching, Tutoring and Mentoring in the Higher Education as a solution to retain students in their major and help them achieve success. D Eleyan, A Eleyan | 5 | 2011 |
Digital forensic tools used in analysing cybercrime M Dweikat, D Eleyan, A Eleyan Journal of University of Shanghai for Science and Technology, ISSN, 1007-6735, 2021 | 4 | 2021 |
Optimization water leakage detection using wireless sensor networks (OWLD) M Daadoo, A Eleyan, D Eleyan Proceedings of the International Conference on Future Networks and …, 2017 | 4 | 2017 |
A Survey Of Social Engineering Attacks: Detection and Prevention Tools NA Odeh, D Eleyan, A Eleyan Journal of Theoretical and Applied Information Technology 99 (18), 4375-4386, 2021 | 3 | 2021 |
A simulation implementation of the LTE-Uu interface datalink layer in OMNeT++ M Arouri, Z Atiyyeh, A Mousa, A Eleyan, H Badr International Conference on Mobile Networks and Management, 270-284, 2010 | 3 | 2010 |
IoT-based home automation using android application A Eleyan, J Fallon 2020 International Symposium on Networks, Computers and Communications …, 2020 | 2 | 2020 |
Computer Numerical Control-PCB Drilling Machine with Efficient Path Planning–Case Study 2 M Daadoo, D Eleyan, S Tarapiah, S Atalla, A Eleyan Automatic Control and Computer Sciences 52 (5), 451-463, 2018 | 2 | 2018 |
A bottom-up approach to automating web service discovery customization and semantic translation A Eleyan, L Zhao Proc of the 3rd International Symposium on Web Services, 2010 | 2 | 2010 |
A Prediction Olive Disease Using Machine Learning Models, Decision Tree and Naive Bayes Models J Drdsh, D Eleyan, A Eleyan Journal of Theoretical and Applied Information Technology 99 (18), 4231-4240, 2021 | 1 | 2021 |
Adopting Continuing Personal and Professional Development to Improve Quality of Teaching (Personal Experience) D Eleyan, A Eleyan Arab Journal of Quality in Education 1 (1), 33-55, 2014 | 1 | 2014 |
Co-Simulation of Multiple Vehicle Routing Problem Models SS Guia, A Laouid, M Hammoudeh, A Bounceur, M Alfawair, A Eleyan Future Internet 14 (5), 137, 2022 | | 2022 |