Follow
Jalal Omer Atoum
Jalal Omer Atoum
The University of Texas at Dallas
No verified email
Title
Cited by
Cited by
Year
Sentiment analysis of Arabic Jordanian dialect tweets
JO Atoum, M Nouman
International Journal of Advanced Computer Science and Applications 10 (2), 2019
542019
A model for detecting tor encrypted traffic using supervised machine learning
A Almubayed, A Hadi, J Atoum
International Journal of Computer Network and Information Security 7 (7), 10-23, 2015
362015
A hybrid technique for SQL injection attacks detection and prevention
JO Atoum, AJ Qaralleh
International Journal of Database Management Systems 6 (1), 21, 2014
232014
An enhancement on content-based image retrieval using color and texture features
T Mehyar, JO Atoum
Journal of Emerging Trends in Computing and Information Sciences 3 (4), 488-496, 2012
232012
Cyberbullying detection through sentiment analysis
JO Atoum
2020 International Conference on Computational Science and Computational …, 2020
222020
Mining functional dependency from relational databases using equivalent classes and minimal cover
J Atoum, D Bader, A Awajan
Journal of Computer Science 4 (6), 421, 2008
212008
A framework for improving the performance of ontology matching techniques in semantic Web
KH Shafa’amri, JO Atoum
International Journal of Advanced Computer Science and Applications 3 (1), 2012
152012
PDF forensic analysis system using YARA
SJ Khitan, A Hadi, J Atoum
International Journal of Computer Science and Network Security 17 (5), 77-85, 2017
112017
Risk adaptive hybrid RFID access control system
M Al‐Zewairi, J Alqatawna, J Atoum
Security and Communication Networks 8 (18), 3826-3835, 2015
102015
Mining approximate functional dependencies from databases based on minimal cover and equivalent classes
J Atoum
European Journal of Scientific Research 33 (2), 338-346, 2009
102009
Solving the traveling salesman problem using new operators in genetic algorithms
NTA Rahedi, J Atoum
American Journal of Applied Sciences 6 (8), 1586, 2009
92009
Multiple Warehouses Scheduling Using Steady State. Genetic Algorithms.
J Atoum, M Al Rababaa
Int. Arab J. Inf. Technol. 7 (3), 310-316, 2010
82010
Distributed Black Box and Graveyards Defense Strategies against Distributed Denial of Services
J Atoum, OS Faisal
2010 Second International Conference on Computer Engineering and …, 2010
72010
A multi-agent experience based e-negotiation system
I Serguievskaia, H Al-Sakran, JO Atoum
2006 2nd International Conference on Information & Communication …, 2006
72006
Detecting cyberbullying from tweets through machine learning techniques with sentiment analysis
JO Atoum
Future of Information and Communication Conference, 25-38, 2023
52023
A robust algorithm for arabic video text detection
AMA Ahmad, A Alqutami, J Atoum
Proceedings of the 2011 2nd International Congress on Computer Applications …, 2012
52012
Cloud Computing: Privacy, Mobility and Resources Utilization
JOA Tariq Alwada’n, Omer Al-Zitawi
International Journal of Computer Trends and Technology (IJCTT) 41 (1), 29-36, 2016
4*2016
Stream Processing Environmental Applications in Jordan Valley
I Aldasouqi, J Atoum
International Journal of Computer Science and Security (IJCSS) 5 (1), 1, 2011
42011
Ultrasurf traffic classification: detection and prevention
R Al-Qura’n, A Hadi, J Atoum, M Al-Zewairi
International Journal of Communications, Network and System Sciences 8 (08), 304, 2015
32015
A Novel Approach Covert Channel for Secret Communications
M Khader, A Hadi, J Atoum
International Journal of Computers and Technology 14 (2), 5479-5486, 2014
32014
The system can't perform the operation now. Try again later.
Articles 1–20