| Hybrid elitist-ant system for nurse-rostering problem GM Jaradat, A Al-Badareen, M Ayob, M Al-Smadi, I Al-Marashdeh, ... Journal of King Saud University-Computer and Information Sciences 31 (3 …, 2019 | 59 | 2019 |
| Detection of image malware steganography using deep transfer learning model I Alodat, M Alodat Proceedings of International Conference on Data Science and Applications …, 2021 | 9 | 2021 |
| Surveillance rapid detection of signs of traffic services in real time M Alodat, I Abdullah Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018 | 8 | 2018 |
| Malware: Detection and defense I Alodat Malware-Detection and Defense, 2023 | 4 | 2023 |
| Using polygamy technology with FL, GA and NN on traffic lights M Alodat, I Al-Odat The International Journal of Engineering and Science 2 (7), 39-45, 2013 | 4 | 2013 |
| Wireless networks encryption by simulation of attacks I Alodat International Journal of Electrical and Electronic Engineering …, 2022 | 3 | 2022 |
| Analysing and predicting COVID-19 AI tracking using artificial intelligence I Alodat International Journal of Modeling, Simulation, and Scientific Computing, 2021 | 3 | 2021 |
| Protection of Nurse-Sys Platform from Man-In the Middle Attacks I Alodat International Conference on Computing and Information Technology, 146-155, 2022 | 2 | 2022 |
| Automating SWOT Analysis Using Machine Learning Methods. A Abu-Alaish, G Jaradat, M Al-Shugran, I Alodat International Journal of Advances in Soft Computing & Its Applications 13 (2), 2021 | 2 | 2021 |
| EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES I Alodat International Journal of Network Security & Its Applications (IJNSA) 13 (3), 2021 | 2 | 2021 |
| Monitor Potential Attack Locations in a Specific Area within DTN Network I Alodat Computer and Information Science 14 (2), 2021 | 1 | 2021 |
| Improve And Extension Traffic Light At Intersections M Alodat, I Al-Odat American Academic & Scholarly Research Journal 5 (3), 2013 | 1 | 2013 |
| Pick up the Best Router Signature to Detect Intrusion by Artificial Intelligence Techniques I Alodat 2023 IEEE International Conference on Contemporary Computing and …, 2023 | | 2023 |
| Protection of Nurse-Sys Platform from Man-In I Alodat 12th International Conference on Information Systems and Advanced …, 2023 | | 2023 |
| Examining Wireless Networks Encryption by Simulation of Attacks I Alodat | | 2022 |
| Detection of Image Malware Steganography Using Deep Transfer Learning Model IA Mohammad alodat Lecture Notes in Networks and Systems 287, 2022 | | 2022 |
| Learning Model I Alodat, M Alodat Proceedings of International Conference on Data Science and Applications …, 2021 | | 2021 |
| Computer and Information Sciences GM Jaradat, A Al-Badareen, M Ayob, M Al-Smadi, I Al-Marashdeh, ... Journal of King Saud University–Computer and Information Sciences 31, 378-384, 2019 | | 2019 |
| Elicit the Best Ways through Identify congestion places M Alodat, I Abdullah 2014 3rd International Conference on Advanced Computer Science Applications …, 2014 | | 2014 |
| Data Mining in Equipment of Parked Vehicles M Alodat, I Al-Odat American Academic & Scholarly Research Journal 5 (3), 2013 | | 2013 |