Ammar Almomani

Orcid: 0000-0002-8808-6114

According to our database1, Ammar Almomani authored at least 54 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RPL-based attack detection approaches in IoT networks: review and taxonomy.
Artif. Intell. Rev., September, 2024

Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings.
Cyber Secur. Appl., 2024

A Modified Bonobo Optimizer With Its Application in Solving Engineering Design Problems.
IEEE Access, 2024

Machine Learning Models for Brain Signal Classification: A Focus on EEG Analysis in Epilepsy Cases.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Next Generation Image Watermarking via Combined DWT-SVD Technique.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

Cyberbullying Detection Using Deep Learning: A Comparative Study.
Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR), 2024

2023
Digital image watermarking using discrete cosine transformation based linear modulation.
J. Cloud Comput., December, 2023

A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions.
Inf., 2023

A Rule-Based Expert Advisory System for Restaurants Using Machine Learning and Knowledge-Based Systems Techniques.
Int. J. Semantic Web Inf. Syst., 2023

Machine Learning-Based Automatic Litter Detection and Classification Using Neural Networks in Smart Cities.
Int. J. Semantic Web Inf. Syst., 2023

Redefining E-Commerce Experience: An Exploration of Augmented and Virtual Reality Technologies.
Int. J. Semantic Web Inf. Syst., 2023

Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments.
Int. J. Softw. Sci. Comput. Intell., 2023

Multiround Transfer Learning and Modified Generative Adversarial Network for Lung Cancer Detection.
Int. J. Intell. Syst., 2023

Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset.
Int. J. Intell. Networks, 2023

Adaptive and Convex Optimization-Inspired Workflow Scheduling for Cloud Environment.
Int. J. Cloud Appl. Comput., 2023

Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols.
Int. J. Cloud Appl. Comput., 2023

The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds.
Int. J. Cloud Appl. Comput., 2023

2022
A content and URL analysis-based efficient approach to detect smishing SMS in intelligent systems.
Int. J. Intell. Syst., December, 2022

The monarch butterfly optimization algorithm for solving feature selection problems.
Neural Comput. Appl., 2022

Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System.
J. Web Eng., 2022

Fully automatic grayscale image segmentation based fuzzy C-means with firefly mate algorithm.
J. Ambient Intell. Humaniz. Comput., 2022

Evaluation and Comparative Analysis of Semantic Web-Based Strategies for Enhancing Educational System Development.
Int. J. Semantic Web Inf. Syst., 2022

Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study.
Int. J. Semantic Web Inf. Syst., 2022

Performance Optimization of Multi-Hop Routing Protocols With Clustering-Based Hybrid Networking Architecture in Mobile Adhoc Cloud Networks.
Int. J. Cloud Appl. Comput., 2022

Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm.
Int. J. Cloud Appl. Comput., 2022

Traffic Accident Prevention in Low Visibility Conditions Using VANETs Cloud Environment.
Int. J. Cloud Appl. Comput., 2022

A Proposed Framework for Early Detection IoT Botnet.
Proceedings of the International Arab Conference on Information Technology, 2022

Machine learning Scheme for Managing Virtual Computing Resources in Cloud Market.
Proceedings of the International Arab Conference on Information Technology, 2022

2021
Information Management and IoT Technology for Safety and Security of Smart Home and Farm Systems.
J. Glob. Inf. Manag., 2021

Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm.
Int. J. Ad Hoc Ubiquitous Comput., 2021

DNS rule-based schema to botnet detection.
Enterp. Inf. Syst., 2021

2020
IoT transaction processing through cooperative concurrency control on fog-cloud computing environment.
Soft Comput., 2020

Firefly photinus search algorithm.
J. King Saud Univ. Comput. Inf. Sci., 2020

β-Hill climbing algorithm with probabilistic neural network for classification problems.
J. Ambient Intell. Humaniz. Comput., 2020

User acceptance model of open source software: an integrated model of OSS characteristics and UTAUT.
J. Ambient Intell. Humaniz. Comput., 2020

A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing.
Int. J. Cloud Appl. Comput., 2020

Improved water cycle algorithm with probabilistic neural network to solve classification problems.
Clust. Comput., 2020

Feature Selection Using a Machine Learning to Classify a Malware.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
A comparative study on spiking neural network encoding schema: implemented with cloud computing.
Clust. Comput., 2019

Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A Survey.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

2018
Fast-flux hunter: a system for filtering online fast-flux botnet.
Neural Comput. Appl., 2018

Economic load dispatch problems with valve-point loading using natural updated harmony search.
Neural Comput. Appl., 2018

Enhancing the Security of Exchanging and Storing DICOM Medical Images on the Cloud.
Int. J. Cloud Appl. Comput., 2018

An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms.
Int. J. Cloud Appl. Comput., 2018

Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography.
Int. Arab J. Inf. Technol., 2018

Proposed Method for Automatic Segmentation of Medical Images.
Proceedings of the International Arab Conference on Information Technology, 2018

Botnets Detecting Attack Based on DNS Features.
Proceedings of the International Arab Conference on Information Technology, 2018

2017
A survey of botnet detection based on DNS.
Neural Comput. Appl., 2017

Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain.
Multim. Tools Appl., 2017

A Variable Service Broker Routing Policy for data center selection in cloud analyst.
J. King Saud Univ. Comput. Inf. Sci., 2017

2013
Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining.
J. Comput. Sci., 2013

Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email
CoRR, 2013

A Survey of Phishing Email Filtering Techniques.
IEEE Commun. Surv. Tutorials, 2013


  Loading...