Follow
Remah Bani Younisse
Remah Bani Younisse
Other namesRemah Younisse, Rimah Y. Bani Youniss, Remah Baniyounisse
Verified email at std.psut.edu.jo
Title
Cited by
Cited by
Year
UTSim: A framework and simulator for UAV air traffic integration, control, and communication
A Al-Mousa, BH Sababha, N Al-Madi, A Barghouthi, R Younisse
International Journal of Advanced Robotic Systems 16 (5), 1729881419870937, 2019
572019
Explaining intrusion detection-based convolutional neural networks using shapley additive explanations (shap)
R Younisse, A Ahmad, Q Abu Al-Haija
Big Data and Cognitive Computing 6 (4), 126, 2022
182022
MID-Crypt: a cryptographic algorithm for advanced medical images protection
A Ahmad, Y AbuHour, R Younisse, Y Alslman, E Alnagi, Q Abu Al-Haija
Journal of Sensor and Actuator Networks 11 (2), 24, 2022
152022
Hybrid encryption scheme for medical imaging using autoencoder and advanced encryption standard
Y Alslman, E Alnagi, A Ahmad, Y AbuHour, R Younisse, Q Abu Al-haija
Electronics 11 (23), 3967, 2022
82022
An early detection model for kerberoasting attacks and dataset labeling
R Younisse, M Alkasassbeh, M Almseidin, H Abdi
Jordanian Journal of Computers and Information Technology 9 (1), 2023
72023
Sampling-based unmanned aerial vehicle air traffic integration, path planning, and collision avoidance
BH Sababha, A Al-mousa, R Baniyounisse, J Bdour
International Journal of Advanced Robotic Systems 19 (2), 17298806221086431, 2022
72022
Fine-tuning U-net for medical image segmentation based on activation function, optimizer and pooling layer.
R Younisse, R Ghnemat, J Al Saraireh
International Journal of Electrical & Computer Engineering (2088-8708) 13 (5), 2023
22023
An adaptive JPEG compression-encryption system using optimized local quantization matrices
RYB Youniss, A Awajan
2017 International Conference on Electrical and Computing Technologies and …, 2017
12017
DDOS ATTACK-DETECTION APPROACH BASED ON ENSEMBLE MODELS USING SPARK
Y Alslman, A Khalil, R Younisse, E Alnagi, J Al-Saraireh, R Ghnemat
Jordanian Journal of Computers and Information Technology (JJCIT) 10 (02), 2024
2024
Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge
J Al-Sawwa, M Almseidin, M Alkasassbeh, K Alemerien, R Younisse
Cluster Computing, 1-16, 2024
2024
Application of Natural Language Processing Techniques in Agile Software Project Management: A Survey
R Younisse, M Azzeh
2023 14th International Conference on Information and Communication Systems …, 2023
2023
An empirical study on utilizing online k-means clustering for intrusion detection purposes
R Younisse, QA Al-Haija
2023 International Conference on Smart Applications, Communications and …, 2023
2023
Homomorphic Encryption Schemes Using Nested Matrices
A Khalil, R Younisse, A Ahmad, M Azzeh
International Conference on Information, Communication and Computing …, 2023
2023
An Empirical Study of Intrusion Detection by Combining Clustering and Classification Methods
R Younisse, Y Alslman, E Alnagi, M Azzeh
International Conference on Information, Communication and Computing …, 2023
2023
A Partitioning-Based Approach to Improve the Hardware Trojan Detectability Using Side Channel Analysis; a SHA3-Based Study
R Younisse
PQDT-Global, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–15