متابعة
Remah Bani Younisse
Remah Bani Younisse
أسماء أخرىRemah Younisse, Rimah Y. Bani Youniss, Remah Baniyounisse
بريد إلكتروني تم التحقق منه على std.psut.edu.jo
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
UTSim: A framework and simulator for UAV air traffic integration, control, and communication
A Al-Mousa, BH Sababha, N Al-Madi, A Barghouthi, R Younisse
International Journal of Advanced Robotic Systems 16 (5), 1729881419870937, 2019
552019
Explaining intrusion detection-based convolutional neural networks using shapley additive explanations (shap)
R Younisse, A Ahmad, Q Abu Al-Haija
Big Data and Cognitive Computing 6 (4), 126, 2022
172022
MID-Crypt: a cryptographic algorithm for advanced medical images protection
A Ahmad, Y AbuHour, R Younisse, Y Alslman, E Alnagi, Q Abu Al-Haija
Journal of Sensor and Actuator Networks 11 (2), 24, 2022
152022
An early detection model for kerberoasting attacks and dataset labeling
R Younisse, M Alkasassbeh, M Almseidin, H Abdi
Jordanian Journal of Computers and Information Technology 9 (1), 2023
72023
Hybrid encryption scheme for medical imaging using autoencoder and advanced encryption standard
Y Alslman, E Alnagi, A Ahmad, Y AbuHour, R Younisse, Q Abu Al-haija
Electronics 11 (23), 3967, 2022
72022
Sampling-based unmanned aerial vehicle air traffic integration, path planning, and collision avoidance
BH Sababha, A Al-mousa, R Baniyounisse, J Bdour
International Journal of Advanced Robotic Systems 19 (2), 17298806221086431, 2022
72022
Fine-tuning U-net for medical image segmentation based on activation function, optimizer and pooling layer.
R Younisse, R Ghnemat, J Al Saraireh
International Journal of Electrical & Computer Engineering (2088-8708) 13 (5), 2023
22023
An adaptive JPEG compression-encryption system using optimized local quantization matrices
RYB Youniss, A Awajan
2017 International Conference on Electrical and Computing Technologies and …, 2017
12017
DDOS ATTACK-DETECTION APPROACH BASED ON ENSEMBLE MODELS USING SPARK
Y Alslman, A Khalil, R Younisse, E Alnagi, J Al-Saraireh, R Ghnemat
Jordanian Journal of Computers and Information Technology (JJCIT) 10 (02), 2024
2024
Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge
J Al-Sawwa, M Almseidin, M Alkasassbeh, K Alemerien, R Younisse
Cluster Computing, 1-16, 2024
2024
Application of Natural Language Processing Techniques in Agile Software Project Management: A Survey
R Younisse, M Azzeh
2023 14th International Conference on Information and Communication Systems …, 2023
2023
An empirical study on utilizing online k-means clustering for intrusion detection purposes
R Younisse, QA Al-Haija
2023 International Conference on Smart Applications, Communications and …, 2023
2023
Homomorphic Encryption Schemes Using Nested Matrices
A Khalil, R Younisse, A Ahmad, M Azzeh
International Conference on Information, Communication and Computing …, 2023
2023
An Empirical Study of Intrusion Detection by Combining Clustering and Classification Methods
R Younisse, Y Alslman, E Alnagi, M Azzeh
International Conference on Information, Communication and Computing …, 2023
2023
A Partitioning-Based Approach to Improve the Hardware Trojan Detectability Using Side Channel Analysis; a SHA3-Based Study
R Younisse
PQDT-Global, 2019
2019
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–15