| A Robust User Authentication Technique in Online Examination | International Journal of Computing | 2021-12-31 | 
						
							| Smart Traffic Control Using Internet of Things and Geographical Information System | International Journal of Advanced Research in Computer and Communication Engineering | 2022-06-06 | 
						
							| Advances in The Processing And Analysis of Medical Images Using Neural Networks | NeuroQuantology | 2022-05-01 | 
						
							| Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning | International Journal of Interactive Mobile Technologies (iJIM) | 2022-12-20 | 
						
							| Secure E-health Framework in Cloud-Based Environment | International Arab Conference on Information Technology (ACIT2022) | 2022-11-22 | 
						
							| Leveraging Big Data and AI in Mobile Shopping: A Study in the Context of Jordan | International Journal of Advanced Computer Science and Applications | 2023-07-30 | 
						
							| LiFi in Short-Range Wireless Communication of IoT | 2023 3rd International Conference on Computing and Information Technology (ICCIT)   IEEE | 2023-10-10 | 
						
							| Choosing the right MFA method for online systems: A comparative analysis | International Journal of Data and Network Science | 2024-01-01 | 
						
							| Using interface preferences as evidence of user identity: A feasibility study | International Journal of Data and Network Science | 2023-09-01 | 
						
							| Web Attack Intrusion Detection System Using Machine Learning Techniques | International Journal of Online and Biomedical Engineering | 2024-02-27 | 
						
							| A New Double-Switch SEPIC-Buck Topology for Renewable Energy Applications | Energies | 2024-01-02 | 
						
							| Performance comparison of hyper-v and kvm for cryptographic tasks in cloud computing | Computers, Materials and Continua | 2024-08-22 | 
						
							| Online Banking User Authentication Methods: A Systematic Literature Review | IEEE Access | 2024-01-04 | 
						
							| A comparative study of machine learning tools for detecting Trojan horse infections in cloud computing environments | International Journal of Electrical and Computer Engineering | 2024-12-01 |