Abdullah Alhaj
Abdullah Alhaj
Associate Professor of computer science- The University of Jordan
Verified email at - Homepage
Cited by
Cited by
Gene profile classification: A proposed solution for predicting possible diseases and initial results
SA Aljawarneh, R Jaradat, AM Maatuk, A Alhaj
2016 International Conference on Engineering & MIS (ICEMIS), 1-7, 2016
Improving the Smart Cities Traffic Management Systems using VANETs and IoT Features
A Alhaj, N Zanoon, A Alrabea, H Alnatsheh, O Jawabreh, M Abu-Faraj, ...
Journal of Statistics Applications & Probability 12 (2), 405-414, 2023
A secure data transmission mechanism for cloud outsourced data
A Alhaj, S Aljawarneh, S Masadeh, E Abu-Taieh
International Journal of Cloud Applications and Computing (IJCAC) 3 (1), 34-43, 2013
Secure communication: a proposed public key watermark system
SR Masadeh, S Aljawarneh, A Odeh, A Alhaj
International Journal of Information Security and Privacy (IJISP) 7 (4), 1-10, 2013
Building a secure image cryptography system using parallel processing and complicated dynamic length private key
M Abu-Faraj, A Al-Hyari, B Al-Ahmad, Z Alqadi, B Ali, A Alhaj
Applied Mathematics & Information Sciences (AMIS) 16 (6), 1017-1026, 2022
Testing and evaluation of a secure integrity measurement system (SIMS) for remote systems.
SA Aljawarneh, AA Alhaj
Int. Arab J. Inf. Technol. 9 (3), 235-242, 2012
Deploying a web client authentication system using smart card for e-systems
S Aljawarneh, S Masadeh, A Alhaj
Research Journal of Applied Sciences, Engineering and Technology 3 (9), 948-952, 2011
An algorithm for securing hybrid Cloud outsourced data in the banking sector
A Alhaj, SA Aljawarneh
Online Banking Security Measures and Data Protection, 157-171, 2017
Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)
AA Alhaj
International Journal of Cloud Applications and Computing (IJCAC) 4 (1), 45-49, 2014
Secure Communication
A Alhaj, S Aljawarneh
Int. J. Inf. Secur. Priv. 7 (4), 1-10, 2013
How Literacy Rate, GDP (PPP) and Gender Constrain and Effect Social Contagion in Social Networking (Twitter)
A Alhaj
Recent Patents on Computer Science 8 (2), 2015
A Predictive Technique using Random Forest Classifier for Phishing Malicious Attack
MAFBJAA Abdullah Alhaj1,*
Applied Mathematics & Information Sciences 17 (6), 1177-1187, 2023
The Relationship between Big Data and the Cloud :A Study
AAH Nabeel Zanoon1
International Journal of Applied Engineering Research 12 (Number 17 (2017 …, 2018
Cloud Computing and Big Data is there a Relation between the Two: A Study. , pp. .
AAHSMK Nabeel Zanoon
International Journal of Applied Engineering Research 12 (ISSN 0973-4562 …, 2017
A Mechanism for Securing Hybrid Cloud Outsourced Data: Securing Hybrid Cloud
AAS Aljawarneh
IGI, 2015
Aqaba Branch, Aqaba, Jordan
AA Alhaj
International Journal of Information Security and Privacy
A Alhaj, J Aqaba
Human modeling in Information in Information Technology Multimedia Using Human Biometrics Found in Golden Ratio. Vitruvian man and Neufert
JATAAH Evon Abu-Taieh, Minwer El-Maheed, Maha, El-Maheed, Alia Abu-Tayeh
19th International Business-Information Management Association Conference …, 2012
The system can't perform the operation now. Try again later.
Articles 1–18