A holistic cyber security implementation framework I Atoum, A Otoom, A Abu Ali Information Management & Computer Security 22 (3), 251-264, 2014 | 113 | 2014 |
Efficient hybrid semantic text similarity using WordNet and a corpus I Atoum, A Otoom International Journal of Advanced Computer Science and Applications 7 (9), 2016 | 40 | 2016 |
Challenges of software requirements quality assurance and validation: A systematic literature review I Atoum, MK Baklizi, I Alsmadi, AA Otoom, T Alhersh, J Ababneh, J Almalki, ... IEEE Access 9, 137613-137634, 2021 | 35 | 2021 |
Holistic cyber security implementation frameworks: a case study of Jordan I Atoum, A Otoom, AA Ali International Journal of Information, Business and Management 9 (1), 108, 2017 | 22 | 2017 |
A comprehensive comparative study of word and sentence similarity measures I Atoum, A Otoom, N Kulathuramaiyer arXiv preprint arXiv:1610.04533, 2016 | 21 | 2016 |
A technical review of SQL injection tools and methods: a case study of SQLMap M Baklizi, I Atoum, N Abdullah, OA Al-Wesabi, AA Otoom, MAS Hasan International Journal of Intelligent Systems and Applications in Engineering …, 2022 | 17 | 2022 |
An implementation framework (IF) for the national information assurance and cyber security strategy (NIACSS) of Jordan A Otoom, I Atoum arXiv preprint arXiv:1412.1141, 2014 | 16 | 2014 |
A classification scheme for cybersecurity models I Atoum, A Otoom, A Otoom International Journal of Security and Its Application 11 (1), 109-120, 2017 | 12 | 2017 |
Mining software quality from software reviews: research trends and open issues I Atoum, A Otoom arXiv preprint arXiv:1602.02133, 2016 | 12 | 2016 |
Effective belief network for cyber security frameworks I Atoum, A Otoom International Journal of Security and Its Applications 10 (4), 221-227, 2016 | 11 | 2016 |
Holistic performance model for cyber security implementation frameworks I Atoum, A Otoom International Journal of Security and Its Applications 10 (3), 111-120, 2016 | 10 | 2016 |
Prevention of website SQL injection using a new query comparison and encryption algorithm M Baklizi, I Atoum, MAS Hasan, N Abdullah, OA Al-Wesabi, AA Otoom International Journal of Intelligent Systems and Applications in Engineering …, 2023 | 8 | 2023 |
A Proposed Implementation Framework (PIF) for the National Information Assurance and Cyber Security Strategy (NIACSS) A Otoom Conference on Security and Saftey in the Cyberspace, 2011 | 3 | 2011 |
Web Attack Intrusion Detection System Using Machine Learning Techniques. MK Baklizi, I Atoum, M Alkhazaleh, H Kanaker, N Abdullah, OA Al-Wesabi, ... International Journal of Online & Biomedical Engineering 20 (3), 2024 | 2 | 2024 |
Enhancing Software Effort Estimation with Pre-Trained Word Embeddings: A Small-Dataset Solution for Accurate Story Point Prediction I Atoum, AA Otoom Electronics 13 (23), 4843, 2024 | | 2024 |
A collaborative cybersecurity framework for higher education AA Otoom, I Atoum, H Al-Harahsheh, M Aljawarneh, MN Al Refai, ... Information & Computer Security, 2024 | | 2024 |
Year of Publication: 2016 I Atoum, A Otoom, N Kulathuramaiyer | | 2016 |
Challenges of Software Requirements Quality Assurance and Validation: A Systematic I Atoum, M Baklizi, I Alsmadi, AA Otoom, T Alhersh, J Ababneh, J Almalki, ... | | |
A Novel Run-Time Memory Leak Detection and Recovery (MLDR) Using Aging in Physical Memory Space A Otoom, M Malkawi, M Alweh | | |