Follow
Ammar Odeh
Title
Cited by
Cited by
Year
Security and privacy of electronic health records: Concerns and challenges
I Keshta, A Odeh
Egyptian Informatics Journal 22 (2), 177-183, 2021
722021
Performance evaluation of AODV and DSR routing protocols in MANET networks
A Odeh, E AbdelFattah, M Alshowkan
AIRCC Publishing, 2012
492012
Steganography by multipoint Arabic letters
A Odeh, A Alzubi, QB Hani, K Elleithy
2012 IEEE Long Island Systems, Applications and Technology Conference (LISATá…, 2012
452012
Steganography in Arabic text using Kashida variation algorithm (KVA)
A Odeh, K Elleithy, M Faezipour
2013 IEEE Long Island Systems, Applications and Technology Conference (LISATá…, 2013
342013
Steganography in arabic text using zero width and kashidha letters
A Odeh, K Elleithy
International Journal of Computer Science & Information Technology 4 (3), 1, 2012
302012
Quantum key distribution by using public key algorithm (RSA)
A Odeh, K Elleithy, M Alshowkan, E Abdelfattah
Third International Conference on Innovative Computing Technology (INTECHá…, 2013
262013
Analysis of ping of death DoS and DDoS attacks
F Yihunie, E Abdelfattah, A Odeh
2018 IEEE Long Island Systems, Applications and Technology Conference (LISATá…, 2018
232018
Steganography in text by using MS word symbols
A Odeh, K Elleithy, M Faezipour
Proceedings of the 2014 Zone 1 Conference of the American Society forá…, 2014
23*2014
Machine learningtechniquesfor detection of website phishing: a review for promises and challenges
A Odeh, I Keshta, E Abdelfattah
2021 IEEE 11th Annual Computing and Communication Workshop and Conferenceá…, 2021
192021
Efficient detection of phishing websites using multilayer perceptron
A Odeh, I Keshta, E Abdelfattah
International Association of Online Engineering, 2020
142020
Steganography in text by merge zwc and space character
A Odeh, KM Elleithy
International Society for Computers and Their Applications, Inc., 2012
142012
Novel steganography over HTML code
A Odeh, K Elleithy, M Faezipour, E Abdelfattah
Innovations and Advances in Computing, Informatics, Systems Sciencesá…, 2015
122015
PHIBOOST-a novel phishing detection model using Adaptive boosting approach
EA Ammar Odeh, Ismail Keshta
Jordanian Journal of Computers and Information Technology (JJCIT) 7 (01), 2021
112021
Performance evaluation of dymo, aodv and dsr routing protocols in manet
M Alshowkan, EA Fattah, A Odeh
International Journal of Computer Applications 49 (11), 2012
112012
A new algorithm for three-party Quantum key distribution
M Alshowkan, K Elleithy, A Odeh, E Abdelfattah
Third International Conference on Innovative Computing Technology (INTECHá…, 2013
102013
Analysis of Routing Protocols over VANET
RJ Mstafa
ASEE, 2013
102013
Efficient prediction of phishing websites using multilayer perceptron (MLP)
A Odeh, A Alarbi, I Keshta, E Abdelfattah
Journal of Theoretical and Applied Information Technology 98 (16), 2020
92020
Sorting N elements using quantum entanglement sets
A Odeh, K Elleithy, M Almasri, A Alajlan
Third International Conference on Innovative Computing Technology (INTECHá…, 2013
92013
Text steganography using language remarks
A Odeh, KM Elleithy, M Faezipour
ASEE, 2013
92013
Academic use of online social networks.
W Elmannai, A Odeh, C Bach
International Journal of Innovation and Applied Studies 32, 337-345, 2013
82013
The system can't perform the operation now. Try again later.
Articles 1–20