Requirements for Enforcing Digital Rights Management in Multicast Content Redistribution | Malek Barhoush and J. William Atwood | Telecommunications Systems, special issue on "Secure Multimedia Services" | vol. 45, no. 1, pp. 3-20 | Springer US | September 2010 |
Non–visual navigation interface for completing tasks with a predefined order using mobile phone: a c | Iyad Abu Doush, Sawsan Alshattnawi, Malek Barhoush | International Journal of Mobile Network Design and Innovation | Vol 6, Issue 1, PP 1-13 | Inderscience Publishers (IEL) | 2015 |
Developing A System For Converting A Numeral Text Into Digit Number: Abacus Application | Faisal Alkhateeb, Malek Barhoush, Elham Al-Abdallah | Journal of Intelligent Systems | Volume 25, DOI: 10.1515/jisys-2015-0029 | De Gruyter | Oct 2016 |
Priority-Based and Optimized Data Center Selection in Cloud Computing | Najib A Kofahi, Tariq Alsmadi, Malek Barhoush, Moy’awiah A Al-Shannaq | Arabian Journal for Science and Engineering | ---- | Springer Nature SharedIt Initiative | 2019/4/12 |
Priority-Based and Optimized Data Center Selection in Cloud Computing | Kofahi, Najib A and Alsmadi, Tariq and Barhoush, Malek and Moy’awiah, A | Arabian Journal for Science and Engineering | ---- | Springer | 2019 |
PERFORMANCE ENHANCEMENT OF THE ADVANCED ENCRYPTION STANDARD VIA PIPELINED IMPLEMENTATION | MALEK M. BARHOUSH, NAJIB A. KOFAHI, KHALID M.O. NAHAR, ANAS M.R. ALSOBEH, AMEERA JARADAT, BAYAN ALOMARI | Journal of Theoretical and Applied Information Technology | 97 | JATIT E-ISSN 1817-3195 / ISSN 1992-8645 | 15/8/2019 |
PERFORMANCE ENHANCEMENT OF THE ADVANCED ENCRYPTION STANDARD VIA PIPELINED IMPLEMENTATION | Malek M. Barhoush, Najib A. Kofahi, Khalid M.O. Nahar, Anas M.R. Alsobeh, Ameera Jaradat and Bayan Alomari | Journal of Theoretical and Applied Informtion Technology | 97 | JATIT | 2019 |
An efficient holy quran recitation recognizer based on svm learning model | Khalid M.O Nahar, Ra'ed M. Al-Khatib, Moy'awiah A. Al-Shannaq , Malek M. Barhoush | Jordanian Journal of Computers and Information Technology (JJCIT) | 6 | The Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT) | 2020 |
Distributed grey wolf optimizer for numerical optimization problems | Abed-alguni, Bilal H and Barhoush, Malek | JORDANIAN JOURNAL OF COMPUTERS AND INFORMATION TECHNOLOGY (JJCIT) | 4 | The Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT) | 2018 |
AN EFFICIENT HOLY QURAN RECITATION RECOGNIZER BASED ON SVM LEARNING MODEL | Khalid M.O. Nahar, Ra'ed M. Al-Khatib, Moy'awiah A. Al-Shannaq and Malek M. Barhoush | Jordanian Journal of Computers and Information Technology (JJCIT) | 6 | ---- | 2020-12-01 00:00:00 |
MPF-LEACH: modified probability function for cluster head election in LEACH protocol | Khalid M.O. Nahar, Ra’ed M. Al-Khatib and Malek Barhoush | International Journal of Computer Applications in Technology | 60 | Inderscience Publishers (IEL) | 2019 |
Network Intrusion Detection System: Machine Learning Approach | Ameera S. jaradat, Malek M. Barhoush and Rawan S. Bani Easa | Indonesian Journal of Electrical Engineering and Computer Science | ؟؟ | Indonesian Journal of Electrical Engineering and Computer Science | 2021 |
Exploratory cuckoo search for solving single-objective optimization problems | Abed-alguni, Bilal H and Alawad, Noor Aldeen and Barhoush, Malek and Hammad, Rafat | Soft Computing | ---- | Springer | 2021 |
A Semantic-Based Approach for Managing Healthcare Big Data: A Survey | Rafat Hammad, Malek Barhoush and Bilal H. Abed-algun | Journal of Healthcare Engineering | 2020 | ---- | 2021 |
Utilizing Genetic Algorithm and Artificial Bee Colony Algorithm to Extend the WSN lifetime | Sawsan Alshattnawi, Lubna Afifi, Amani M. shatnawi, Malek M. Barhoush | International Journal of Computing | xx | Under publication | 2022 |
DES22: DES-BASED ALGORITHM WITH IMPROVED SECURITY | Malek M. Barhoush, Bilal H. Abed-Alguni, Rafat Hammad, Mohammad Al-Fawa'reh, Rana N. Hassan | Jordanian Journal of Computers and Information Technology (JJCIT) | 08 | ---- | 2022/3 |
Enhancеd Analysis Approach to Detect Phishing Attacks During COVID-19 Crisis | Mousa T. Jafar, Mohammad Al-Fawa’reh, Malek M. Barhoush and Mohammad H. Alshira’H, | Cybernetics and Information Technologies | 22 | Institute of Information and Communication Technologies, Bulgarian Academy of Sciences | 2022/3 |
Improved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems | , Malek Barhoush, Bilal H Abed-alguni and Nour Elhuda Al-qudahA | The Journal of Supercomputing | ---- | Springer | 2023 |