default search action
Iman M. Almomani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Iman M. Almomani, Tala Almashat, Walid El-Shafai:
Maloid-DS: Labeled Dataset for Android Malware Forensics. IEEE Access 12: 73481-73546 (2024) - [c7]Mahmoud A. Khalifa, Iman M. Almomani, Walid El-Shafai:
Employing Invisible Unicode Characters for Preserving Privacy and Enhancing Communication Security. SSD 2024: 376-383 - [c6]Mahmoud A. Khalifa, Iman M. Almomani, Walid El-Shafai:
SAMA: A Comprehensive Smart Automated Malware Analyzer Empowered by ChatGPT Integration. ICT 2024: 1-6 - 2023
- [j24]Walid El Shafai, Fatma Khallaf, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Iman M. Almomani:
A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications. Comput. Syst. Sci. Eng. 46(3): 3599-3618 (2023) - [j23]Metty Paul, Leandros Maglaras, Mohamed Amine Ferrag, Iman M. Almomani:
Digitization of healthcare sector: A study on privacy and security concerns. ICT Express 9(4): 571-588 (2023) - [j22]Walid El Shafai, Iman M. Almomani, Anees Ara, Aala Alkhayer:
An optical-based encryption and authentication algorithm for color and grayscale medical images. Multim. Tools Appl. 82(15): 23735-23770 (2023) - [j21]Iman M. Almomani, Aala Alkhayer, Walid El Shafai:
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches. Sensors 23(9): 4467 (2023) - 2022
- [j20]Iman M. Almomani, Aala Al Khayer, Walid El Shafai:
An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks. IEEE Access 10: 2700-2720 (2022) - [j19]Reem Al Saleh, Maha Driss, Iman M. Almomani:
CBiLSTM: A Hybrid Deep Learning Model for Efficient Reputation Assessment of Cloud Services. IEEE Access 10: 35321-35335 (2022) - [j18]Iman M. Almomani, Mohanned Ahmed, Dimitrios Kosmanos, Aala Alkhayer, Leandros Maglaras:
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks. IEEE Access 10: 131640-131655 (2022) - [j17]Iman M. Almomani, Aala Al Khayer, Walid El Shafai:
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices. Sensors 22(6): 2281 (2022) - [j16]Safa Ben Atitallah, Maha Driss, Iman M. Almomani:
A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks. Sensors 22(11): 4302 (2022) - [c5]Safa Ben Atitallah, Maha Driss, Wadii Boulila, Iman M. Almomani:
An Effective Detection and Classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting. ICCCI (CCIS Volume) 2022: 180-192 - [c4]Ayyub Alzahem, Wadii Boulila, Maha Driss, Anis Koubaa, Iman M. Almomani:
Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers. ICCCI 2022: 598-610 - [i1]Maha Driss, Iman M. Almomani, Leen Alahmadi, Linah Alhajjam, Raghad Alharbi, Shahad Alanazi:
COVIBOT: A Smart Chatbot for Assistance and E-Awareness during COVID-19 Pandemic. CoRR abs/2204.07851 (2022) - 2021
- [j15]Walid El Shafai, Iman M. Almomani, Aala Al Khayer:
Optical Bit-Plane-Based 3D-JST Cryptography Algorithm With Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication. IEEE Access 9: 35004-35026 (2021) - [j14]Iman M. Almomani, Raneem Qaddoura, Maria Habib, Samah Alsoghyer, Aala Al Khayer, Ibrahim Aljarah, Hossam Faris:
Android Ransomware Detection Based on a Hybrid Evolutionary Approach in the Context of Highly Imbalanced Data. IEEE Access 9: 57674-57691 (2021) - [j13]Iman M. Almomani, Mohanned Ahmed, Leandros Maglaras:
Cybersecurity maturity assessment framework for higher education institutions in Saudi Arabia. PeerJ Comput. Sci. 7: e703 (2021) - [j12]Raneem Qaddoura, Ala' M. Al-Zoubi, Hossam Faris, Iman M. Almomani:
A Multi-Layer Classification Approach for Intrusion Detection in IoT Networks Based on Deep Learning. Sensors 21(9): 2987 (2021) - [j11]Ruba Abu Khurma, Iman M. Almomani, Ibrahim Aljarah:
IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model. Symmetry 13(8): 1377 (2021) - [c3]Raneem Qaddoura, Ala' M. Al-Zoubi, Iman M. Almomani, Hossam Faris:
Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach. ICIT 2021: 858-863 - 2020
- [j10]Iman M. Almomani, Aala Al Khayer:
A Comprehensive Analysis of the Android Permissions System. IEEE Access 8: 216671-216688 (2020) - [j9]Iman M. Almomani, Afnan AlRomi:
Integrating Software Engineering Processes in the Development of Efficient Intrusion Detection Systems in Wireless Sensor Networks. Sensors 20(5): 1375 (2020)
2010 – 2019
- 2018
- [j8]Iman M. Almomani, Maha Saadeh:
S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 12(4): 1436-1457 (2018) - [j7]Iman M. Almomani, Mamdouh Alenezi:
Efficient Denial of Service Attacks Detection in Wireless Sensor Networks. J. Inf. Sci. Eng. 34(4): 977-1000 (2018) - 2016
- [j6]Iman M. Almomani, Bassam Al Kasasbeh, Mousa T. Al-Akhras:
WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks. J. Sensors 2016: 4731953:1-4731953:16 (2016) - 2013
- [j5]Iman M. Almomani, Eman Al-Banna, Mousa T. Al-Akhras:
Logic-Based Security Architecture for Systems Providing Multihop Communication. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [j4]Iman M. Almomani, Maha K. Saadeh:
Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation. KSII Trans. Internet Inf. Syst. 6(4): 1223-1247 (2012) - 2011
- [j3]Iman M. Almomani, Maha K. Saadeh:
FEAR: Fuzzy-Based Energy Aware Routing Protocol for Wireless Sensor Networks. Int. J. Commun. Netw. Syst. Sci. 4(6): 403-415 (2011)
2000 – 2009
- 2009
- [j2]Mousa T. Al-Akhras, H. Zedan, R. John, Iman M. Almomani:
Non-intrusive speech quality prediction in VoIP networks using a neural network approach. Neurocomputing 72(10-12): 2595-2608 (2009) - 2008
- [c2]Iman M. Almomani, Mousa T. Al-Akhras:
Statistical Speech Quality Prediction in VoIP Networks. Communications in Computing 2008: 146-152 - [c1]Iman M. Almomani:
Secure Wireless Communication for Mobile Surgical Army Hospitals. ICWN 2008: 628-633 - 2006
- [j1]Iman M. Almomani, Marwan Al-Akaidi, P. Reynolds, Jon Ivins:
Architectural framework for wireless mobile ad hoc networks (AF WMANETs). Comput. Commun. 30(1): 178-191 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 19:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint