Professor.Ammar Almomani
Professor.Ammar Almomani
Verified email at
Cited by
Cited by
A survey of phishing email filtering techniques
A Almomani, BB Gupta, S Atawneh, A Meulenberg, E Almomani
IEEE communications surveys & tutorials 15 (4), 2070-2090, 2013
IoT transaction processing through cooperative concurrency control on fog–cloud computing environment
AQ Ahmad, A Mohammad, A Ammar, G B. B
Soft Computing, 1-17, 2019
Machine learning for phishing detection and mitigation
M Alauthman, A Almomani, M Alweshah, W Alomoush, K Alieyan
Machine Learning for Computer and Cyber Security: Principle, Algorithms, and …, 2019
Feature Selection using a Machine Learning to Classify a Malware
AA Mouhammd alkasassbeh ,mohammed Safaa ,Mohammad Alauthman
Computer Networks and Cyber Security: Principles and Paradigms,, 2019
A survey of botnet detection based on DNS
K Alieyan, A ALmomani, A Manasrah, MM Kadhum
Neural Computing and Applications 28, 1541-1558, 2017
Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain
S Atawneh, A Almomani, HA Bazar, P Sumar, B Gupta .
Multimedia Tools and Applications 76 (18), 18451–18472, 2017
The monarch butterfly optimization algorithm for solving feature selection problems
M Alweshah, SA Khalaileh, BB Gupta, A Almomani, AI Hammouri, ...
Neural Computing and Applications, 1-15, 2020
Phishing Website Detection with semantic features Based on Machine learning models: A Comparison Study
A almomani, M Alauthman, M Taib' shatnawi, M Alweshah, A Alrosan, ...
International Journal on Semantic Web and Information Systems (IJSWIS) 18 (1 …, 2022
DNS rule-based schema to botnet detection
K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta
Enterprise Information Systems 15 (4), 545-564, 2021
Phishing dynamic evolving neural fuzzy framework for online detection zero-day phishing email
A Almomani, BB Gupta, T Wan, A Altaher, S Manickam
arXiv preprint arXiv:1302.0629, 2013
Hadoop based defense solution to handle distributed denial of service (ddos) attacks
S Tripathi, B Gupta, A Almomani, A Mishra, S Veluru
Scientific Research Publishing, 2013
A novel solution to handle DDOS attack in MANET
M Chhabra, B Gupta, A Almomani
Scientific Research Publishing, 2013
Economic load dispatch problems with valve-point loading using natural updated harmony search
MA Al-Betar, MA Awadallah, AT Khader, AL Bolaji, A Almomani
Neural Computing and Applications 29, 767-781, 2018
A variable service broker routing policy for data center selection in cloud analyst
AM Manasrah, T Smadi, A ALmomani
Journal of King Saud University-Computer and Information Sciences 29 (3 …, 2017
Evolving fuzzy neural network for phishing emails detection
A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ...
Journal of Computer Science 8 (7), 1099, 2012
Fast-flux hunter: a system for filtering online fast-flux botnet
A Almomani
Neural Computing and Applications 29 (7), 483-493, 2018
Steganography in digital images: Common approaches and tools
S Atawneh, A Almomani, P Sumari
IETE Technical Review 30 (4), 344-358, 2013
Enhancing the security of exchanging and storing DICOM medical images on the cloud
O Dorgham, B Al-Rahamneh, A Almomani, KF Khatatneh
International Journal of Cloud Applications and Computing (IJCAC) 8 (1), 154-172, 2018
Mobile game approach to prevent childhood obesity using persuasive technology
E Almonani, W Husain, OY San, A Almomani, M Al-Betar
2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014
An online intrusion detection system to cloud computing based on NeuCube algorithms
A ALmomani
International Journal of Cloud Applications and Computing (IJCAC) 8 (2), 96–112, 2018
The system can't perform the operation now. Try again later.
Articles 1–20