Follow
Alaa Al-hamami
Title
Cited by
Cited by
Year
Enhanced method for RSA cryptosystem algorithm
AH Al-Hamami, IA Aldariseh
2012 International Conference on Advanced Computer Science Applications and …, 2012
642012
Applying Neural Networks for Simplified Data Encryption Standard (SDES) Cipher System Cryptanalysis
MAAE Khaled M. Alallayah, Al-Hamami H. Alaa
The International Arab Journal of Information Technology (IAJIT) 9 (2), 2012
38*2012
Virus Detection using Clonal Selection Algorithm with Genetic Algorithm (VDC Algorithm)
PDAAH Dr. Suha Afanah, Prof. Dr. Raed Abu Zitar
Applied Soft Computing Journal 13 (1), 239-246, 2012
37*2012
Attack and construction of simulator for some cipher systems using neuro-Identifier.
KM Alallayah, M Amin, WF Abd El-Wahed, AH Alhamami
Int. Arab J. Inf. Technol. 7 (4), 365-372, 2010
262010
Attack and Construction of Simulator for Some of Cipher Systems Using Neuro-Identifier
MAAE Khaled M. Alallayah, Al-Hamami H. Alaa
The International Arab Journal of Information Technology (IAJIT) 7 (4), 2010
26*2010
A new approach for authentication technique
AH Al-Hamami, SA Al-Ani
Journal of computer Science 1 (1), 103-106, 2005
252005
Attack of against simplified data encryption standard cipher system using neural networks
KM Alallayah, WFA El-Wahed, M Amin, AH Alhamami
Journal of Computer Science 6 (1), 29, 2010
232010
Optimal cell towers distribution by using spatial mining and geographic information system
AH Al-Hamami, SH Hashem
arXiv preprint arXiv:1104.2721, 2011
182011
Novel algorithm in symmetric encryption (NASE): Based on feistel cipher
SIB Baker, AH Al-Hamami
2017 international conference on new trends in computing sciences (ICTCS …, 2017
162017
Applying data mining techniques in intrusion detection system on web and analysis of web usage
AH Al-Hamami, MA Al-Hamami, SH Hasheem
Information Technology Journal 5 (1), 1-4, 2006
162006
Secure Mobile Cloud Computing Based-On Fingerprint.
AH Al-Hamami, JY AL-Juneidi
World of Computer Science & Information Technology Journal 5 (2), 2015
152015
Secure Mobile Cloud Computing Based-On Fingerprint
AHAHJY AL-Juneidi
World of Computer Science and Information Technology Journal (WCSIT) 5 (2 …, 2015
15*2015
Development of a network-based: Intrusion Prevention System using a Data Mining approach
AH Al-Hamami, GMW Al-Saadoon
2013 Science and Information Conference, 641-644, 2013
152013
A proposed modified data encryption standard algorithm by using fusing data technique
A Al-Hamami, MA Al-Hamami, SH Hashem
World of Computer Science and Information Technology Journal 1 (3), 88-91, 2011
122011
Handbook of Research on Threat Detection and Countermeasures in Network Security
AH Al-Hamami
IGI Global, 2014
112014
Artificial neural network-based algorithm for ARMA model order estimation
KE Al-Qawasmi, AM Al-Smadi, A Al-Hamami
Networked Digital Technologies: Second International Conference, NDT 2010 …, 2010
102010
Query dispatching tool supporting fast access to data warehouse.
A Aljanabi, AH Alhamami, B Alhadidi
Int. Arab J. Inf. Technol. 10 (3), 269-275, 2013
82013
Implementing new approach for enhancing performance and throughput in a distributed database.
K Maabreh, A Al-Hamami
Int. Arab J. Inf. Technol. 10 (3), 290-296, 2013
82013
Using short message service (SMS) to support business continuity
M Abdel-Qader, A Al-Jaber, A Al-Hamami
arXiv preprint arXiv:1103.5881, 2011
82011
Using Short Message Service (SMS) to Support Business Continuity
AAH Maher Abdel-qader, Ahmed Al-Jaber
World of Computer Science and Information Technology Journal (WSCIT), 1 (2 …, 2011
8*2011
The system can't perform the operation now. Try again later.
Articles 1–20