| Requirements for Enforcing Digital Rights Management in Multicast Content Redistribution | Malek Barhoush and J. William Atwood | Telecommunications Systems, special issue on "Secure Multimedia Services" | vol. 45, no. 1, pp. 3-20 | Springer US | September 2010 |
| Non–visual navigation interface for completing tasks with a predefined order using mobile phone: a c | Iyad Abu Doush, Sawsan Alshattnawi, Malek Barhoush | International Journal of Mobile Network Design and Innovation | Vol 6, Issue 1, PP 1-13 | Inderscience Publishers (IEL) | 2015 |
| Developing A System For Converting A Numeral Text Into Digit Number: Abacus Application | Faisal Alkhateeb, Malek Barhoush, Elham Al-Abdallah | Journal of Intelligent Systems | Volume 25, DOI: 10.1515/jisys-2015-0029 | De Gruyter | Oct 2016 |
| Priority-Based and Optimized Data Center Selection in Cloud Computing | Najib A Kofahi, Tariq Alsmadi, Malek Barhoush, Moy’awiah A Al-Shannaq | Arabian Journal for Science and Engineering | ---- | Springer Nature SharedIt Initiative | 2019/4/12 |
| Priority-Based and Optimized Data Center Selection in Cloud Computing | Kofahi, Najib A and Alsmadi, Tariq and Barhoush, Malek and Moy’awiah, A | Arabian Journal for Science and Engineering | ---- | Springer | 2019 |
| PERFORMANCE ENHANCEMENT OF THE ADVANCED ENCRYPTION STANDARD VIA PIPELINED IMPLEMENTATION | MALEK M. BARHOUSH, NAJIB A. KOFAHI, KHALID M.O. NAHAR, ANAS M.R. ALSOBEH, AMEERA JARADAT, BAYAN ALOMARI | Journal of Theoretical and Applied Information Technology | 97 | JATIT E-ISSN 1817-3195 / ISSN 1992-8645 | 15/8/2019 |
| PERFORMANCE ENHANCEMENT OF THE ADVANCED ENCRYPTION STANDARD VIA PIPELINED IMPLEMENTATION | Malek M. Barhoush, Najib A. Kofahi, Khalid M.O. Nahar, Anas M.R. Alsobeh, Ameera Jaradat and Bayan Alomari | Journal of Theoretical and Applied Informtion Technology | 97 | JATIT | 2019 |
| An efficient holy quran recitation recognizer based on svm learning model | Khalid M.O Nahar, Ra'ed M. Al-Khatib, Moy'awiah A. Al-Shannaq , Malek M. Barhoush | Jordanian Journal of Computers and Information Technology (JJCIT) | 6 | The Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT) | 2020 |
| Distributed grey wolf optimizer for numerical optimization problems | Abed-alguni, Bilal H and Barhoush, Malek | JORDANIAN JOURNAL OF COMPUTERS AND INFORMATION TECHNOLOGY (JJCIT) | 4 | The Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT) | 2018 |
| AN EFFICIENT HOLY QURAN RECITATION RECOGNIZER BASED ON SVM LEARNING MODEL | Khalid M.O. Nahar, Ra'ed M. Al-Khatib, Moy'awiah A. Al-Shannaq and Malek M. Barhoush | Jordanian Journal of Computers and Information Technology (JJCIT) | 6 | ---- | 2020-12-01 00:00:00 |
| MPF-LEACH: modified probability function for cluster head election in LEACH protocol | Khalid M.O. Nahar, Ra’ed M. Al-Khatib and Malek Barhoush | International Journal of Computer Applications in Technology | 60 | Inderscience Publishers (IEL) | 2019 |
| Network Intrusion Detection System: Machine Learning Approach | Ameera S. jaradat, Malek M. Barhoush and Rawan S. Bani Easa | Indonesian Journal of Electrical Engineering and Computer Science | ؟؟ | Indonesian Journal of Electrical Engineering and Computer Science | 2021 |
| Exploratory cuckoo search for solving single-objective optimization problems | Abed-alguni, Bilal H and Alawad, Noor Aldeen and Barhoush, Malek and Hammad, Rafat | Soft Computing | ---- | Springer | 2021 |
| A Semantic-Based Approach for Managing Healthcare Big Data: A Survey | Rafat Hammad, Malek Barhoush and Bilal H. Abed-algun | Journal of Healthcare Engineering | 2020 | ---- | 2021 |
| Utilizing Genetic Algorithm and Artificial Bee Colony Algorithm to Extend the WSN lifetime | Sawsan Alshattnawi, Lubna Afifi, Amani M. shatnawi, Malek M. Barhoush | International Journal of Computing | xx | Under publication | 2022 |
| DES22: DES-BASED ALGORITHM WITH IMPROVED SECURITY | Malek M. Barhoush, Bilal H. Abed-Alguni, Rafat Hammad, Mohammad Al-Fawa'reh, Rana N. Hassan | Jordanian Journal of Computers and Information Technology (JJCIT) | 08 | ---- | 2022/3 |
| Enhancеd Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis | Mousa T. Jafar, Mohammad Al-Fawa’reh, Malek M. Barhoush and Mohammad H. Alshira’H, | Cybernetics and Information Technologies | 22 | Institute of Information and Communication Technologies, Bulgarian Academy of Sciences | 2022/3 |
| Improved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems | , Malek Barhoush, Bilal H Abed-alguni and Nour Elhuda Al-qudahA | The Journal of Supercomputing | ---- | Springer | 2023 |
| mproved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems | Malek Barhoush, Bilal Abed-Alguni, Nour Elhuda | The Journal of Supercomputing | 79 | Springer | 19/6/2023 |
| Optimizing Cyber Threat Detection in IoT: A Study of Artificial Bee Colony (ABC)-Based Hyperparameter Tuning for Machine Learning | Ayoub Alsarhan, Mahmoud AlJamal, Osama Harfoushi, Mohammad Aljaidi, Malek Barhoush, Noureddin Mansour, Saif Okour, Sarah Abu Ghazalah, and Dimah Al-Fraihat | Technologies | 12 | MDPI | 30/9/2024 |
| A Semantic-Based Approach for Managing Healthcare Big Data: A Survey | ---- | ---- | ---- | Journal of Healthcare Engineering | 2020-11-23 00:00:00 |
| Exploratory Cuckoo Search for Solving Single-objective Optimization Problems
| ---- | ---- | ---- | Soft Computing | 2021-06-12 00:00:00 |
| Network Intrusion Detection System: Machine Learning Approach | ---- | ---- | 25 | Indonesian Journal of Electrical Engineering and C | 2022-02-01 00:00:00 |
| DES22: DES-BASED ALGORITHM WITH
IMPROVED SECURITY
| ---- | ---- | 8 | Jordanian Journal of Computers and Information Tec | 2022-03-01 00:00:00 |
| Utilizing Genetic Algorithm and Artificial Bee Colony Algorithm to Extend the WSN lifetime | ---- | ---- | 21 | International Journal of Computing | 2022-03-30 00:00:00 |
| Enhanced Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis
| ---- | ---- | 22 | Cybernetics and Information Technologies | 2022-04-10 00:00:00 |
| Improved Discrete Salp Swarm Algorithm Using Exploration and Exploitation Techniques for Feature Selection in Intrusion Detection Systems
| ---- | ---- | ---- | Journal of Supercomputing | 2023-06-19 00:00:00 |
| Optimizing Cyber Threat Detection in IoT: A Study of Artificial Bee Colony (ABC)-Based Hyperparameter Tuning for Machine Learning | ---- | ---- | 12 | Technologies | 2024-09-30 00:00:00 |
| Bi-objective feature selection in high-dimensional datasets using improved binary chimp optimization algorithm
| ---- | ---- | 15 | International Journal of Machine Learning and Cybe | 2024-08-10 00:00:00 |
| Using Machine Learning to Diagnose Autism Based on Eye Tracking Technology | ---- | ---- | 15 | Diagnostics | 2024-12-30 00:00:00 |
| Traffic Sign Detection and Recognition in Jordan Based on Machine Learning and Deep Learning | ---- | ---- | 31 | Egyptian Informatics Journal | 2025-09-04 00:00:00 |