Iman M. Almomani

Orcid: 0000-0003-4639-516X

According to our database1, Iman M. Almomani authored at least 34 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Holistic Intelligent Cryptojacking Malware Detection System.
IEEE Access, 2024

Maloid-DS: Labeled Dataset for Android Malware Forensics.
IEEE Access, 2024

SAMA: A Comprehensive Smart Automated Malware Analyzer Empowered by ChatGPT Integration.
Proceedings of the 30th IEEE International Conference on Telecommunications, 2024

Employing Invisible Unicode Characters for Preserving Privacy and Enhancing Communication Security.
Proceedings of the 21st International Multi-Conference on Systems, Signals & Devices, 2024

2023
Digitization of healthcare sector: A study on privacy and security concerns.
ICT Express, August, 2023

An optical-based encryption and authentication algorithm for color and grayscale medical images.
Multim. Tools Appl., June, 2023

E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.
Sensors, 2023

A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications.
Comput. Syst. Sci. Eng., 2023

2022
A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks.
Sensors, 2022

A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
Sensors, 2022

COVIBOT: A Smart Chatbot for Assistance and E-Awareness during COVID-19 Pandemic.
CoRR, 2022

CBiLSTM: A Hybrid Deep Learning Model for Efficient Reputation Assessment of Cloud Services.
IEEE Access, 2022

An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks.
IEEE Access, 2022

An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks.
IEEE Access, 2022

An Effective Detection and Classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting.
Proceedings of the Advances in Computational Collective Intelligence, 2022

Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers.
Proceedings of the Computational Collective Intelligence - 14th International Conference, 2022

2021
IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model.
Symmetry, 2021

A Multi-Layer Classification Approach for Intrusion Detection in IoT Networks Based on Deep Learning.
Sensors, 2021

Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia.
PeerJ Comput. Sci., 2021

Optical Bit-Plane-Based 3D-JST Cryptography Algorithm With Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication.
IEEE Access, 2021

Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data.
IEEE Access, 2021

Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach.
Proceedings of the International Conference on Information Technology, 2021

2020
Integrating Software Engineering Processes in the Development of Efficient Intrusion Detection Systems in Wireless Sensor Networks.
Sensors, 2020

A Comprehensive Analysis of the Android Permissions System.
IEEE Access, 2020

2018
Efficient Denial of Service Attacks Detection in Wireless Sensor Networks.
J. Inf. Sci. Eng., 2018

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2018

2016
WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks.
J. Sensors, 2016

2013
Logic-Based Security Architecture for Systems Providing Multihop Communication.
Int. J. Distributed Sens. Networks, 2013

2012
Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation.
KSII Trans. Internet Inf. Syst., 2012

2011
FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks.
Int. J. Commun. Netw. Syst. Sci., 2011

2009
Non-intrusive speech quality prediction in VoIP networks using a neural network approach.
Neurocomputing, 2009

2008
Secure Wireless Communication for Mobile Surgical Army Hospitals.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

Statistical Speech Quality Prediction in VoIP Networks.
Proceedings of the 2008 International Conference on Communications in Computing, 2008

2006
Architectural framework for wireless mobile ad hoc networks (AF WMANETs).
Comput. Commun., 2006


  Loading...