[go: up one dir, main page]

Follow
eyas odat
eyas odat
Associate Professor , Jarash university
Verified email at jpu.edu.jo
Title
Cited by
Cited by
Year
Hybrid elitist-ant system for nurse-rostering problem
GM Jaradat, A Al-Badareen, M Ayob, M Al-Smadi, I Al-Marashdeh, ...
Journal of King Saud University-Computer and Information Sciences 31 (3 …, 2019
592019
Detection of image malware steganography using deep transfer learning model
I Alodat, M Alodat
Proceedings of International Conference on Data Science and Applications …, 2021
92021
Surveillance rapid detection of signs of traffic services in real time
M Alodat, I Abdullah
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018
82018
Malware: Detection and defense
I Alodat
Malware-Detection and Defense, 2023
42023
Using polygamy technology with FL, GA and NN on traffic lights
M Alodat, I Al-Odat
The International Journal of Engineering and Science 2 (7), 39-45, 2013
42013
Wireless networks encryption by simulation of attacks
I Alodat
International Journal of Electrical and Electronic Engineering …, 2022
32022
Analysing and predicting COVID-19 AI tracking using artificial intelligence
I Alodat
International Journal of Modeling, Simulation, and Scientific Computing, 2021
32021
Protection of Nurse-Sys Platform from Man-In the Middle Attacks
I Alodat
International Conference on Computing and Information Technology, 146-155, 2022
22022
Automating SWOT Analysis Using Machine Learning Methods.
A Abu-Alaish, G Jaradat, M Al-Shugran, I Alodat
International Journal of Advances in Soft Computing & Its Applications 13 (2), 2021
22021
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
I Alodat
International Journal of Network Security & Its Applications (IJNSA) 13 (3), 2021
22021
Monitor Potential Attack Locations in a Specific Area within DTN Network
I Alodat
Computer and Information Science 14 (2), 2021
12021
Improve And Extension Traffic Light At Intersections
M Alodat, I Al-Odat
American Academic & Scholarly Research Journal 5 (3), 2013
12013
Pick up the Best Router Signature to Detect Intrusion by Artificial Intelligence Techniques
I Alodat
2023 IEEE International Conference on Contemporary Computing and …, 2023
2023
Protection of Nurse-Sys Platform from Man-In
I Alodat
12th International Conference on Information Systems and Advanced …, 2023
2023
Examining Wireless Networks Encryption by Simulation of Attacks
I Alodat
2022
Detection of Image Malware Steganography Using Deep Transfer Learning Model
IA Mohammad alodat
Lecture Notes in Networks and Systems 287, 2022
2022
Learning Model
I Alodat, M Alodat
Proceedings of International Conference on Data Science and Applications …, 2021
2021
Computer and Information Sciences
GM Jaradat, A Al-Badareen, M Ayob, M Al-Smadi, I Al-Marashdeh, ...
Journal of King Saud University–Computer and Information Sciences 31, 378-384, 2019
2019
Elicit the Best Ways through Identify congestion places
M Alodat, I Abdullah
2014 3rd International Conference on Advanced Computer Science Applications …, 2014
2014
Data Mining in Equipment of Parked Vehicles
M Alodat, I Al-Odat
American Academic & Scholarly Research Journal 5 (3), 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20