متابعة
Ahmad Al-Ahmad
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Fuzz Test Case Generation for Penetration Testing in Mobile Cloud Computing Applications
AS Al-Ahmad, H Kahtan
International Conference on Intelligent Computing & Optimization 1 (1), 267-276, 2018
115*2018
Combining deep and handcrafted image features for MRI brain scan classification
AM Hasan, HA Jalab, F Meziane, H Kahtan, AS Al-Ahmad
IEEE Access 7, 79959-79967, 2019
982019
Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art
YI Alzoubi, VH Osmanaj, A Jaradat, A Al‐Ahmad
Security and Privacy 4 (2), e145, 2021
782021
Mobile cloud computing models security issues: A systematic review
AS AlAhmad, H Kahtan, YI Alzoubi, O Ali, A Jaradat
Journal of Network and Computer Applications 190, 103152, 2021
552021
Blockchain technology as a Fog computing security and privacy solution: An overview
YI Alzoubi, A Al-Ahmad, H Kahtan
Computer Communications 182, 129-152, 2022
542022
Systematic literature review on penetration testing for mobile cloud computing applications
AS Al-Ahmad, H Kahtan, F Hujainah, HA Jalab
IEEE Access 7, 173524-173540, 2019
412019
Fog computing security and privacy issues, open challenges, and blockchain solution: An overview.
YI Alzoubi, A Al-Ahmad, A Jaradat
International Journal of Electrical & Computer Engineering (2088-8708) 11 (6), 2021
302021
Mobile cloud computing testing review
AS Al-Ahmad, SA Aljunid, ASA Sani
2013 International Conference on Advanced Computer Science Applications and …, 2013
302013
Internet of things and blockchain integration: security, privacy, technical, and design challenges
YI Alzoubi, A Al-Ahmad, H Kahtan, A Jaradat
Future Internet 14 (7), 216, 2022
292022
Cloud computing review: features and issues
AS Al-Ahmad, H Kahtan
2018 International Conference on Smart Computing and Electronic Enterprise …, 2018
172018
Comparison between web accessibility Evaluation tools
A Al-Ahmad, I Ahmaro, M Mustafa
Al-Madinah Technical Studies 1 (4), 2015
112015
The factors influenced by stakeholder identification in E-learning systems: A survey
DAH Elneel, H Kahtan, AS Fakharudin, M Abdulhak, AS Al-Ahmad, ...
Journal of King Saud University-Science 35 (3), 102566, 2023
92023
Mobile cloud computing applications penetration testing model design
AS Al-Ahmad, SA Aljunid, NK Ismail
International Journal of Information and Computer Security 13 (2), 210-226, 2020
92020
E-learning Difficulties in Jordan
A Al-Ahmad, IY Ahmaro, M Mustafa
MEDIU publications 1 (5), 2017
92017
An Evaluation of Key Adoption Factors towards Using the Fog Technology
O Ali, A Shrestha, A Jaradat, A Al-Ahmad
Big Data and Cognitive Computing 6 (3), 81, 2022
82022
Blockchain technology: a fundamental overview
A Jaradat, O Ali, A AlAhmad
Blockchain Technologies for Sustainability, 1-24, 2022
82022
Importance of UML model in the RUP Development lifecycle along with the time and the static aspect of the process
A Al-Ahmad, I Ahmaro, M Mustafa
Al-Madinah Technical Studies| مجلة جامعة المدينة العالمية للعلوم التقنية …, 2017
82017
A review of advanced technologies available to improve the healthcare performance during COVID-19 pandemic
O Ali, A AlAhmad, H Kahtan
Procedia Computer Science 217, 205-216, 2023
72023
TEST CASE SELECTION FOR PENETRATION TESTING IN MOBILE CLOUD COMPUTING APPLICATIONS: A PROPOSED TECHNIQUE.
AS AL-AHMAD, H KAHTAN
Journal of Theoretical & Applied Information Technology 96 (13), 2018
72018
Pen testing for web applications
A Al-Ahmad, BA Ata, A Wahbeh
International Journal of Information Technology and Web Engineering (IJITWE …, 2012
72012
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20