default search action
Ammar Almomani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Maali Alabdulhafith, Harshit Batra, Nagwan M. Abdel Samee, Mohammed Azmi Al-Betar, Ammar Almomani, Davut Izci, Serdar Ekinci, Fatma A. Hashim:
A Modified Bonobo Optimizer With Its Application in Solving Engineering Design Problems. IEEE Access 12: 134948-134984 (2024) - [j42]Nadia Alfriehat, Mohammed Anbar, Mohammad Adnan Aladaileh, Iznan Husainy Hasbullah, Tamarah A. Shurbaji, Shankar Karuppayah, Ammar Almomani:
RPL-based attack detection approaches in IoT networks: review and taxonomy. Artif. Intell. Rev. 57(9): 248 (2024) - [j41]Tarun Vats, Sudhakar Kumar, Sunil K. Singh, Uday Madan, Mehak Preet, Varsha Arya, Ritika Bansal, Ammar Almomani:
Navigating the landscape: Safeguarding privacy and security in the era of ambient intelligence within healthcare settings. Cyber Secur. Appl. 2: 100046 (2024) - [c9]Mouhammd Alkasassbeh, Ammar Almomani, Amjad Aldweesh, Ahmad Al-Qerem, Mohammad Alauthman, Khalid M. O. Nahar, Beenu Mago:
Cyberbullying Detection Using Deep Learning: A Comparative Study. ICCR 2024: 1-6 - [c8]Qais Al-Na'amneh, Ammar Almomani, Ahmad Nasayreh, Khalid M. O. Nahar, Hasan Gharaibeh, Rabia Emhamed Al Mamlook, Mohammad Alauthman:
Next Generation Image Watermarking via Combined DWT-SVD Technique. ICCR 2024: 1-10 - [c7]Ali Mohd Ali, Shadi Nashwan, Ahmad Al-Qerem, Amjad Aldweesh, Mohammad Alauthman, Zenab Elgamal, Ammar Almomani:
CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models. ICCR 2024: 1-5 - [c6]Ali Mohd Ali, Shadi Nashwan, Ahmad Al-Qerem, Ammar Almomani, Mahmoud Al Sakhnini, Amjad Aldweesh:
Machine Learning Models for Brain Signal Classification: A Focus on EEG Analysis in Epilepsy Cases. ICCR 2024: 1-8 - 2023
- [j40]Amjad Aldweesh, Mohammad Alauthman, Mohammad Al Khaldy, Abdelraouf Ishtaiwi, Ahmad Al-Qerem, Ammar Almomani, Brij B. Gupta:
The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds. Int. J. Cloud Appl. Comput. 13(1): 1-24 (2023) - [j39]Ala Hamarsheh, Ahmad Alqerem, Iman Akour, Mohammad Alauthman, Amjad Aldweesh, Ali Mohd Ali, Ammar Almomani, Someah Alangari:
Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols. Int. J. Cloud Appl. Comput. 13(1): 1-26 (2023) - [j38]Kamlesh Lakhwani, Gajanand Sharma, Ramandeep Sandhu, Naresh Kumar Nagwani, Sandeep Bhargava, Varsha Arya, Ammar Almomani:
Adaptive and Convex Optimization-Inspired Workflow Scheduling for Cloud Environment. Int. J. Cloud Appl. Comput. 13(1): 1-25 (2023) - [j37]Kwok Tai Chui, Brij B. Gupta, Priyanka Chaurasia, Varsha Arya, Ammar Almomani, Wadee Alhalabi:
Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset. Int. J. Intell. Networks 4: 202-210 (2023) - [j36]Kwok Tai Chui, Brij B. Gupta, Rutvij H. Jhaveri, Hao Ran Chi, Varsha Arya, Ammar Almomani, Ali Nauman:
Multiround Transfer Learning and Modified Generative Adversarial Network for Lung Cancer Detection. Int. J. Intell. Syst. 2023: 1-14 (2023) - [j35]Mohammad Alauthman, Ahmad Al-Qerem, Someah Alangari, Ali Mohd Ali, Ahmad Nabot, Amjad Aldweesh, Issam Jebreen, Ammar Almomani, Brij B. Gupta:
Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments. Int. J. Softw. Sci. Comput. Intell. 15(1): 1-24 (2023) - [j34]Mohammad Al Khaldy, Abdelraouf Ishtaiwi, Ahmad Al-Qerem, Amjad Aldweesh, Mohammad Alauthman, Ammar Almomani, Varsha Arya:
Redefining E-Commerce Experience: An Exploration of Augmented and Virtual Reality Technologies. Int. J. Semantic Web Inf. Syst. 19(1): 1-24 (2023) - [j33]Meena Malik, Chander Prabha, Punit Soni, Varsha Arya, Wadee Al-Halabi, Brij B. Gupta, Aiiad Ahmad Albeshri, Ammar Almomani:
Machine Learning-Based Automatic Litter Detection and Classification Using Neural Networks in Smart Cities. Int. J. Semantic Web Inf. Syst. 19(1): 1-20 (2023) - [j32]Khalid M. O. Nahar, Mustafa Banikhalaf, Firas Ibrahim, Mohammed Said Abual-Rub, Ammar Almomani, Brij B. Gupta:
A Rule-Based Expert Advisory System for Restaurants Using Machine Learning and Knowledge-Based Systems Techniques. Int. J. Semantic Web Inf. Syst. 19(1): 1-25 (2023) - [j31]Kwok Tai Chui, Brij B. Gupta, Jiaqi Liu, Varsha Arya, Nadia Nedjah, Ammar Almomani, Priyanka Chaurasia:
A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions. Inf. 14(7): 388 (2023) - [j30]Waleed Alomoush, Osama Ahmed Khashan, Ayat Alrosan, Hani H. Attar, Ammar Almomani, Fuad Alhosban, Sharif Naser Makhadmeh:
Digital image watermarking using discrete cosine transformation based linear modulation. J. Cloud Comput. 12(1): 96 (2023) - 2022
- [j29]Kwok Tai Chui, Tanveer Singh Kochhar, Amit Chhabra, Sunil K. Singh, Deepinder Singh, Dragan Perakovic, Ammar Almomani, Varsha Arya:
Traffic Accident Prevention in Low Visibility Conditions Using VANETs Cloud Environment. Int. J. Cloud Appl. Comput. 12(1): 1-21 (2022) - [j28]Huthaifa A. Al Issa, Mustafa Hamzeh Al-Jarah, Ammar Almomani, Ahmad Al Nawasrah:
Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm. Int. J. Cloud Appl. Comput. 12(1): 1-10 (2022) - [j27]Deepak Srivastava, Ajay Kumar, Anupama Mishra, Varsha Arya, Ammar Almomani, Ching-Hsien Hsu, Domenico Santaniello:
Performance Optimization of Multi-Hop Routing Protocols With Clustering-Based Hybrid Networking Architecture in Mobile Adhoc Cloud Networks. Int. J. Cloud Appl. Comput. 12(1): 1-15 (2022) - [j26]Ankit Kumar Jain, Brij B. Gupta, Kamaljeet Kaur, Piyush Bhutani, Wadee Alhalabi, Ammar Almomani:
A content and URL analysis-based efficient approach to detect smishing SMS in intelligent systems. Int. J. Intell. Syst. 37(12): 11117-11141 (2022) - [j25]Ammar Almomani, Mohammad Alauthman, Mohd Taib Shatnawi, Mohammed Alweshah, Ayat Alrosan, Waleed Alomoush, Brij B. Gupta:
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study. Int. J. Semantic Web Inf. Syst. 18(1): 1-24 (2022) - [j24]Bin Hu, Akshat Gaurav, Chang Choi, Ammar Almomani:
Evaluation and Comparative Analysis of Semantic Web-Based Strategies for Enhancing Educational System Development. Int. J. Semantic Web Inf. Syst. 18(1): 1-14 (2022) - [j23]Waleed Alomoush, Ayat Alrosan, Yazan M. Alomari, Alaa A. Alomoush, Ammar Almomani, Hammoudeh S. Alamri:
Fully automatic grayscale image segmentation based fuzzy C-means with firefly mate algorithm. J. Ambient Intell. Humaniz. Comput. 13(9): 4519-4541 (2022) - [j22]Ahmad Al Nawasrah, Ammar Almomani, Huthaifa A. Al Issa, Khalid Alissa, Ayat Alrosan, Abdulellah A. Alaboudi, Brij B. Gupta:
Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System. J. Web Eng. 21(2) (2022) - [j21]Mohammed Alweshah, Saleh Al Khalaileh, Brij B. Gupta, Ammar Almomani, Abdelaziz I. Hammouri, Mohammed Azmi Al-Betar:
The monarch butterfly optimization algorithm for solving feature selection problems. Neural Comput. Appl. 34(14): 11267-11281 (2022) - [c5]Bashar Igried, Ayoub Alsarhan, Mohammad Alauthman, Ammar Almomani:
Machine learning Scheme for Managing Virtual Computing Resources in Cloud Market. ACIT 2022: 1-5 - [c4]Ashraf S. Mashaleh, Noor Farizah Binti Ibrahim, Mohammad Alauthman, Ammar Almomani:
A Proposed Framework for Early Detection IoT Botnet. ACIT 2022: 1-7 - 2021
- [j20]Kamal Alieyan, Ammar Almomani, Mohammed Anbar, Mohammad Alauthman, Rosni Abdullah, Brij B. Gupta:
DNS rule-based schema to botnet detection. Enterp. Inf. Syst. 15(4): 545-564 (2021) - [j19]Ammar Almomani, Ahmad Al Nawasrah, Mohammad Alauthman, Mohammed Azmi Al-Betar, Farid Meziane:
Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm. Int. J. Ad Hoc Ubiquitous Comput. 36(1): 50-65 (2021) - [j18]Ammar Almomani, Ahmad Al Nawasrah, Waleed Alomoush, Mustafa Al-Abweh, Ayat Alrosan, Brij B. Gupta:
Information Management and IoT Technology for Safety and Security of Smart Home and Farm Systems. J. Glob. Inf. Manag. 29(6): 1-23 (2021) - 2020
- [j17]Mohammed Alweshah, Maria Al-Sendah, Osama M. Dorgham, Ammar Almomani, Sara Tedmori:
Improved water cycle algorithm with probabilistic neural network to solve classification problems. Clust. Comput. 23(4): 2703-2718 (2020) - [j16]Ahmad Al Nawasrah, Ammar Ali Almomani, Samer Atawneh, Mohammad Alauthman:
A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing. Int. J. Cloud Appl. Comput. 10(3): 17-53 (2020) - [j15]Thamer A. Alrawashdeh, Mohammad W. Elbes, Ammar Almomani, Fuad Ali El-Qirem, Abdelfatah Aref Tamimi:
User acceptance model of open source software: an integrated model of OSS characteristics and UTAUT. J. Ambient Intell. Humaniz. Comput. 11(8): 3315-3327 (2020) - [j14]Mohammed Alweshah, Aram Al-Daradkeh, Mohammed Azmi Al-Betar, Ammar Almomani, Saleh Oqeili:
β-Hill climbing algorithm with probabilistic neural network for classification problems. J. Ambient Intell. Humaniz. Comput. 11(8): 3405-3416 (2020) - [j13]Waleed Alomoush, Khairuddin Omar, Ayat Alrosan, Yazan M. Alomari, Dheeb Albashish, Ammar Almomani:
Firefly photinus search algorithm. J. King Saud Univ. Comput. Inf. Sci. 32(5): 599-607 (2020) - [j12]Ahmad Al-Qerem, Mohammad Alauthman, Ammar Almomani, Brij B. Gupta:
IoT transaction processing through cooperative concurrency control on fog-cloud computing environment. Soft Comput. 24(8): 5695-5711 (2020) - [p1]Mouhammd Al-Kasassbeh, Safaa Mohammed, Mohammad Alauthman, Ammar Almomani:
Feature Selection Using a Machine Learning to Classify a Malware. Handbook of Computer Networks and Cyber Security 2020: 889-904
2010 – 2019
- 2019
- [j11]Ammar Almomani, Mohammad Alauthman, Mohammed Alweshah, Osama M. Dorgham, Firas AlBalas:
A comparative study on spiking neural network encoding schema: implemented with cloud computing. Clust. Comput. 22(2): 419-433 (2019) - [c3]Mohammad Abdelkareem Alarqan, Zarul Fitri Zaaba, Ammar Almomani:
Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A Survey. ACeS 2019: 138-152 - 2018
- [j10]Firas AlBalas, Majd Al-Soud, Omar Almomani, Ammar Almomani:
Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography. Int. Arab J. Inf. Technol. 15(3A): 550-558 (2018) - [j9]Osama M. Dorgham, Banan Al-Rahamneh, Ammar Almomani, Moh'd Rasoul Al-Hadidi, Khalaf Khatatneh:
Enhancing the Security of Exchanging and Storing DICOM Medical Images on the Cloud. Int. J. Cloud Appl. Comput. 8(1): 154-172 (2018) - [j8]Ammar Almomani, Mohammad Alauthman, Firas AlBalas, Osama M. Dorgham, Atef A. Obeidat:
An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms. Int. J. Cloud Appl. Comput. 8(2): 96-112 (2018) - [j7]Ammar Almomani:
Fast-flux hunter: a system for filtering online fast-flux botnet. Neural Comput. Appl. 29(7): 483-493 (2018) - [j6]Mohammed Azmi Al-Betar, Mohammed A. Awadallah, Ahamad Tajudin Khader, Asaju La'aro Bolaji, Ammar Almomani:
Economic load dispatch problems with valve-point loading using natural updated harmony search. Neural Comput. Appl. 29(10): 767-781 (2018) - [c2]Kamal Alieyan, Mohammed Anbar, Ammar Almomani, Rosni Abdullah, Mohammad Alauthman:
Botnets Detecting Attack Based on DNS Features. ACIT 2018: 1-4 - [c1]Osama M. Dorgham, Mohammad Abu Nasser, Mohammad Hashem Ryalat, Ammar Almomani:
Proposed Method for Automatic Segmentation of Medical Images. ACIT 2018: 1-5 - 2017
- [j5]Ahmad M. Manasrah, Tariq Smadi, Ammar Almomani:
A Variable Service Broker Routing Policy for data center selection in cloud analyst. J. King Saud Univ. Comput. Inf. Sci. 29(3): 365-377 (2017) - [j4]Samer Atawneh, Ammar Almomani, Hussein Al Bazar, Putra Sumari, Brij B. Gupta:
Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multim. Tools Appl. 76(18): 18451-18472 (2017) - [j3]Kamal Alieyan, Ammar Almomani, Ahmad M. Manasrah, Mohammad M. Kadhum:
A survey of botnet detection based on DNS. Neural Comput. Appl. 28(7): 1541-1558 (2017) - 2013
- [j2]Ammar Almomani, Brij B. Gupta, Samer Atawneh, Andrew Meulenberg, Eman Almomani:
A Survey of Phishing Email Filtering Techniques. IEEE Commun. Surv. Tutorials 15(4): 2070-2090 (2013) - [j1]Karim Al-Saedi, Selvakumar Manickam, Sureswaran Ramadass, Wafaa A. H. Al-Salihy, Ammar Almomani:
Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining. J. Comput. Sci. 9(4): 421-426 (2013) - [i1]Ammar Almomani, Brij B. Gupta, Tat Chee Wan, Altyeb Altaher, Selvakumar Manickam:
Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email. CoRR abs/1302.0629 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint