Iman M. Almomani
Orcid: 0000-0003-4639-516X
According to our database1,
Iman M. Almomani
authored at least 34 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
SAMA: A Comprehensive Smart Automated Malware Analyzer Empowered by ChatGPT Integration.
Proceedings of the 30th IEEE International Conference on Telecommunications, 2024
Employing Invisible Unicode Characters for Preserving Privacy and Enhancing Communication Security.
Proceedings of the 21st International Multi-Conference on Systems, Signals & Devices, 2024
2023
ICT Express, August, 2023
An optical-based encryption and authentication algorithm for color and grayscale medical images.
Multim. Tools Appl., June, 2023
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.
Sensors, 2023
Comput. Syst. Sci. Eng., 2023
2022
A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks.
Sensors, 2022
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
Sensors, 2022
CoRR, 2022
CBiLSTM: A Hybrid Deep Learning Model for Efficient Reputation Assessment of Cloud Services.
IEEE Access, 2022
An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks.
IEEE Access, 2022
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks.
IEEE Access, 2022
An Effective Detection and Classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting.
Proceedings of the Advances in Computational Collective Intelligence, 2022
Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers.
Proceedings of the Computational Collective Intelligence - 14th International Conference, 2022
2021
Symmetry, 2021
A Multi-Layer Classification Approach for Intrusion Detection in IoT Networks Based on Deep Learning.
Sensors, 2021
Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia.
PeerJ Comput. Sci., 2021
Optical Bit-Plane-Based 3D-JST Cryptography Algorithm With Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication.
IEEE Access, 2021
Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data.
IEEE Access, 2021
Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach.
Proceedings of the International Conference on Information Technology, 2021
2020
Integrating Software Engineering Processes in the Development of Efficient Intrusion Detection Systems in Wireless Sensor Networks.
Sensors, 2020
2018
J. Inf. Sci. Eng., 2018
KSII Trans. Internet Inf. Syst., 2018
2016
J. Sensors, 2016
2013
Int. J. Distributed Sens. Networks, 2013
2012
Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation.
KSII Trans. Internet Inf. Syst., 2012
2011
Int. J. Commun. Netw. Syst. Sci., 2011
2009
Non-intrusive speech quality prediction in VoIP networks using a neural network approach.
Neurocomputing, 2009
2008
Secure Wireless Communication for Mobile Surgical Army Hospitals.
Proceedings of the 2008 International Conference on Wireless Networks, 2008
Statistical Speech Quality Prediction in VoIP Networks.
Proceedings of the 2008 International Conference on Communications in Computing, 2008
2006
Comput. Commun., 2006