Optimizing the prediction accuracy of concrete compressive strength based on a comparison of data-mining techniques JS Chou, CK Chiu, M Farfoura, I Al-Taharwa Journal of Computing in Civil Engineering 25 (3), 242-253, 2011 | 366 | 2011 |
A mobile robot path planning using genetic algorithm in static environment AT Ismail, A Sheta, M Al-Weshah Journal of Computer Science 4 (4), 341-344, 2008 | 320 | 2008 |
Business analytics in telemarketing: Cost-sensitive analysis of bank campaigns using artificial neural networks N Ghatasheh, H Faris, I AlTaharwa, Y Harb, A Harb Applied Sciences 10 (7), 2581, 2020 | 45 | 2020 |
JSOD: JavaScript obfuscation detector IA AL‐Taharwa, HM Lee, AB Jeng, KP Wu, CS Ho, SM Chen Security and Communication Networks 8 (6), 1092-1107, 2015 | 37 | 2015 |
Modified genetic algorithm for feature selection and hyper parameter optimization: case of XGBoost in spam prediction N Ghatasheh, I Altaharwa, K Aldebei IEEE Access 10, 84365-84383, 2022 | 22 | 2022 |
CASDC: a cryptographically secure data system based on two private key images A Al-Hyari, I Al-Taharwa, B Al-Ahmad, Z Alqadi IEEE Access 10, 126304-126314, 2022 | 15 | 2022 |
Increasing the security of transmitted text messages using chaotic key and image key cryptography M Abu-Faraj, A Al-Hyari, I Altaharwa, Z Alqadi, B Ali International Journal of Data and Network Science 7 (2), 809-820, 2023 | 13 | 2023 |
Obfuscated malicious javascript detection by causal relations finding IA Al-Taharwa, CH Mao, HK Pao, KP Wu, C Faloutsos, HM Lee, SM Chen, ... 13th International Conference on Advanced Communication Technology …, 2011 | 10 | 2011 |
Redjsod: A readable javascript obfuscation detector using semantic-based analysis IA Al-Taharwa, HM Lee, AB Jeng, KP Wu, CH Mao, TE Wei, SM Chen 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 8 | 2012 |
Protecting digital images using keys enhanced by 2D chaotic logistic maps M Abu-Faraj, A Al-Hyari, C Obimbo, K Aldebei, I Altaharwa, Z Alqadi, ... Cryptography 7 (2), 20, 2023 | 6 | 2023 |
Jacoco-Coverage Based Statistical Approach for Ranking and Selecting Key Classes in Object-Oriented Software BI AL-AHMAD, I AL-TAHARWA, RS ALKHAWALDEH, IM ALAZZAM, ... Journal of Engineering Science and Technology 16 (4), 3358-3386, 2021 | 6 | 2021 |
Drive-by disclosure: a large-scale detector of drive-by downloads based on latent behavior prediction IA Al-Taharwa, HM Lee, AB Jeng, CS Ho, KP Wu, SM Chen 2015 IEEE Trustcom/BigDataSE/ISPA 1, 334-343, 2015 | 5 | 2015 |
Cloud-based anti-malware solution IA Al-taharwa, AB Jeng, HM Lee, SM Chen Proceedings of the 2011 International Symposium on Grids and Clouds (ISGC), 2011 | 5 | 2011 |
Teamwork distribution: local vs. global software engineering project development teamwork I Al-Taharwa International Journal of Emerging Technologies in Learning (iJET) 15 (18 …, 2020 | 2 | 2020 |
Dead Sea Starvation: Towards Enhanced Monitoring of Water Resources by Modeling Meteorological Variables and Remote Sensing Data N Ghatasheh, I Al-Taharwa, B Al-Ahmad Journal of Software Engineering and Applications 9 (12), 588-600, 2016 | 2 | 2016 |
Modeling the Telemarketing Process using Genetic Algorithms and Extreme Boosting: Feature Selection and Cost-Sensitive Analytical Approach N Ghatasheh, I Altaharwa, K Aldebei IEEE Access, 2023 | 1 | 2023 |
Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture A Al-Hyari, C Obimbo, I Altaharwa IEEE Access, 2024 | | 2024 |
Meta-Heuristic Guided Feature Optimization for Enhanced Authorship Attribution in Java Source Code B Al-Ahmad, N Al-Madi, A Alzaqebah, RS Alkhawaldeh, K Aldebei, ... IEEE Access, 2023 | | 2023 |
Female Student Participation in Software Engineering Projects: Opportunities to Model Project Evaluation and to Improve Early Prediction of Teamwork Failure I Al-Taharwa Journal of Education and Practice 11 (35), 30-36, 2020 | | 2020 |