An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks OA Khashan, R Ahmad, NM Khafajah Ad Hoc Networks 115, 102448, 2021 | 111 | 2021 |
Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment OA Khashan IEEE Access 8, 66878-66887, 2020 | 68 | 2020 |
A flexible encryption technique for the internet of things environment S Medileh, A Laouid, R Euler, A Bounceur, M Hammoudeh, M AlShaikh, ... Ad Hoc Networks 106, 102240, 2020 | 55 | 2020 |
Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems OA Khashan, NM Khafajah Journal of King Saud University-Computer and Information Sciences 35 (2 …, 2023 | 52 | 2023 |
Performance study of selective encryption in comparison to full encryption for still visual images OA Khashan, AM Zin, EA Sundararajan Journal of Zhejiang University SCIENCE C 15 (6), 435-444, 2014 | 49 | 2014 |
From 5G to beyond 5G: A comprehensive survey of wireless network evolution, challenges, and promising technologies A Sufyan, KB Khan, OA Khashan, T Mir, U Mir Electronics 12 (10), 2200, 2023 | 45 | 2023 |
Edge-based lightweight selective encryption scheme for digital medical images OA Khashan, M AlShaikh Multimedia Tools and Applications 79 (35), 26369-26388, 2020 | 41 | 2020 |
Secure outsourcing and sharing of cloud data using a user-side encrypted file system OA Khashan IEEE Access 8, 210855-210867, 2020 | 31 | 2020 |
Digital image watermarking using discrete cosine transformation based linear modulation W Alomoush, OA Khashan, A Alrosan, HH Attar, A Almomani, F Alhosban, ... Journal of Cloud Computing 12 (1), 96, 2023 | 22 | 2023 |
An efficient adaptive of transparent spatial digital image encryption OA Khashan, AM Zin Procedia technology 11, 288-297, 2013 | 22 | 2013 |
Blockchain-Based Decentralized Authentication Model for IoT-Based E-Learning and Educational Environments OA Khashan, S Alamri, W Alomoush, MK Alsmadi, S Atawneh, U Mir Computers, Materials and Continua 75 (2), 3133-3158, 2023 | 21 | 2023 |
Parallel proxy re-encryption workload distribution for efficient big data sharing in cloud computing OA Khashan 2021 IEEE 11th annual Computing and communication workshop and conference …, 2021 | 21 | 2021 |
Spatial information of fuzzy clustering based mean best artificial bee colony algorithm for phantom brain image segmentation W Alomoush, A Alrosan, A Almomani, K Alissa, OA Khashan, ... International Journal of Electrical and Computer Engineering (IJECE) 11 (5 …, 2021 | 19 | 2021 |
ImgFS: a transparent cryptography for stored images using a filesystem in userspace OA Khashan, AM Zin, EA Sundararajan Frontiers of Information Technology & Electronic Engineering 16 (1), 28-42, 2015 | 19 | 2015 |
The determinants of reliable smart grid from experts’ perspective I Mashal, OA Khashan, M Hijjawi, M Alshinwan Energy Informatics 6 (1), 10, 2023 | 18 | 2023 |
Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models A Almotairi, S Atawneh, OA Khashan, NM Khafajah Systems Science & Control Engineering 12 (1), 2321381, 2024 | 16 | 2024 |
Accelerated arithmetic optimization algorithm by cuckoo search for solving engineering design problems M Hijjawi, M Alshinwan, OA Khashan, M Alshdaifat, W Almanaseer, ... Processes 11 (5), 1380, 2023 | 16 | 2023 |
Secure Stored Images Using Transparent Crypto Filter Driver O Khashan, N Khafajah International Journal of Network Security 20 (6), 1053-1060, 2018 | 16 | 2018 |
Dynamic multimedia encryption using a parallel file system based on multi-core processors OA Khashan, NM Khafajah, W Alomoush, M Alshinwan, S Alamri, ... Cryptography 7 (1), 12, 2023 | 14 | 2023 |
Fuzzy clustering algorithm based on improved global best-guided artificial bee colony with new search probability model for image segmentation W Alomoush, OA Khashan, A Alrosan, EH Houssein, H Attar, M Alweshah, ... Sensors 22 (22), 8956, 2022 | 13 | 2022 |