Search Results - "Khashan, Osama A"

Refine Results
  1. 1

    Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment by Khashan, Osama A.

    Published in IEEE access (2020)
    “…Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has…”
    Get full text
    Journal Article
  2. 2

    Fuzzy Clustering Algorithm Based on Improved Global Best-Guided Artificial Bee Colony with New Search Probability Model for Image Segmentation by Alomoush, Waleed, Khashan, Osama A, Alrosan, Ayat, Houssein, Essam H, Attar, Hani, Alweshah, Mohammed, Alhosban, Fuad

    Published in Sensors (Basel, Switzerland) (18-11-2022)
    “…Clustering using fuzzy C-means (FCM) is a soft segmentation method that has been extensively investigated and successfully implemented in image segmentation…”
    Get full text
    Journal Article
  3. 3

    Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks by Khashan, Osama A., Khafajah, Nour M., Alomoush, Waleed, Alshinwan, Mohammad

    Published in IEEE access (2024)
    “…In the realm of wireless sensor networks (WSNs), preserving data integrity, privacy, and security against cyberthreats is paramount. Proxy re-encryption (PRE)…”
    Get full text
    Journal Article
  4. 4

    A hybrid dependency-based approach for Urdu sentiment analysis by Sehar, Urooba, Kanwal, Summrina, Allheeib, Nasser I., Almari, Sultan, Khan, Faiza, Dashtipur, Kia, Gogate, Mandar, Khashan, Osama A.

    Published in Scientific reports (12-12-2023)
    “…In the digital age, social media has emerged as a significant platform, generating a vast amount of raw data daily. This data reflects the opinions of…”
    Get full text
    Journal Article
  5. 5

    Digital image watermarking using discrete cosine transformation based linear modulation by Alomoush, Waleed, Khashan, Osama A., Alrosan, Ayat, Attar, Hani H., Almomani, Ammar, Alhosban, Fuad, Makhadmeh, Sharif Naser

    “…The proportion of multimedia traffic in data networks has grown substantially as a result of advancements in IT. As a result, it's become necessary to address…”
    Get full text
    Journal Article
  6. 6

    Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors by Khashan, Osama A., Khafajah, Nour M., Alomoush, Waleed, Alshinwan, Mohammad, Alamri, Sultan, Atawneh, Samer, Alsmadi, Mutasem K.

    Published in Cryptography (01-03-2023)
    “…Securing multimedia data on disk drives is a major concern because of their rapidly increasing volumes over time, as well as the prevalence of security and…”
    Get full text
    Journal Article
  7. 7

    The determinants of reliable smart grid from experts’ perspective by Mashal, Ibrahim, Khashan, Osama A., Hijjawi, Mohammad, Alshinwan, Mohammad

    Published in Energy Informatics (01-12-2023)
    “…A smart grid integrates communication networks with the conventional electrical grid. Due to their potential, smart grids are anticipated to achieve widespread…”
    Get full text
    Journal Article
  8. 8

    Feature Selection Using Hybrid Metaheuristic Algorithm for Email Spam Detection by Al-Rawashdeh, Ghada Hammad, Khashan, Osama A, Al-Rawashde, Jawad, Al-Gasawneh, Jassim Ahmad, Alsokkar, Abdullah, Alshinwa, Mohammad

    “…In the present study, Krill Herd (KH) is proposed as a Feature Selection tool to detect spam email problems. This works by assessing the accuracy and…”
    Get full text
    Journal Article
  9. 9

    Enhanced Prairie Dog Optimization with Differential Evolution for solving engineering design problems and network intrusion detection system by Alshinwan, Mohammad, Khashan, Osama A., Khader, Mohammed, Tarawneh, Omar, Shdefat, Ahmed, Mostafa, Nour, AbdElminaam, Diaa Salama

    Published in Heliyon (15-09-2024)
    “…This paper introduces a novel hybrid optimization algorithm, PDO-DE, which integrates the Prairie Dog Optimization (PDO) algorithm with the Differential…”
    Get full text
    Journal Article
  10. 10

    Smart Energy-Efficient Encryption for Wireless Multimedia Sensor Networks Using Deep Learning by Khashan, Osama A., Khafajah, Nour M., Alomoush, Waleed, Alshinwan, Mohammad, Alomari, Emad

    “…Wireless multimedia sensor networks (WMSNs) have gained considerable attention across various applications due to their capabilities for real-time multimedia…”
    Get full text
    Journal Article
  11. 11

    Performance study of selective encryption in comparison to full encryption for still visual images by Khashan, Osama A, Zin, Abdullah M, Sundararajan, Elankovan A

    “…Securing digital images is becoming an important concern in today’s information security due to the extensive use of secure images that are either transmitted…”
    Get full text
    Journal Article
  12. 12

    Aligning security and energy-efficiency using change detection and partial encryption for wireless camera networks by Khashan, Osama A.

    “…Wireless camera networks (WCNs) have seen widespread deployment in recent years, leading to an upsurge in monitoring and surveillance systems aimed at…”
    Get full text
    Journal Article
  13. 13

    Edge-based lightweight selective encryption scheme for digital medical images by Khashan, Osama A., AlShaikh, Muath

    Published in Multimedia tools and applications (01-09-2020)
    “…Securing digital medical images is increasingly becoming a major concern due to the rapid growth of the amount of medical images transferred over a network and…”
    Get full text
    Journal Article
  14. 14

    ImgFS: a transparent cryptography for stored images using a filesystem in userspace by Khashan, Osama A., Zin, Abdullah M., Sundararajan, Elankovan A.

    “…Real-time encryption and decryption of digital images stored on end-user devices is a challenging task due to the inherent features of the images. Traditional…”
    Get full text
    Journal Article
  15. 15

    Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems by Khashan, Osama A., Khafajah, Nour M.

    “…With the rapid increase in the number of Internet of Things (IoT) devices in recent years, massive amounts of sensitive IoT data are being generated and…”
    Get full text
    Journal Article
  16. 16

    Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models by Almotairi, Ayoob, Atawneh, Samer, Khashan, Osama A., Khafajah, Nour M.

    Published in Systems science & control engineering (31-12-2024)
    “…Internet of Things (IoT) technology has evolved significantly, transitioning from personal devices to powering smart cities and global deployments across…”
    Get full text
    Journal Article
  17. 17

    Improved security of medical images using DWT–SVD watermarking mechanisms based on firefly Photinus search algorithm by Alomoush, Waleed, Khashan, Osama A, Alrosan, Ayat, Damseh, Rafat, Alshinwan, Mohammad, Abd-Alrazaq, Alaa Ali, Deif, Mohanad A

    Published in SN applied sciences (03-07-2024)
    “…Security is the primary concern in the transmission of medical images, as it involves sensitive patient information. This study introduces an optimized…”
    Get full text
    Journal Article
  18. 18

    Improved flat mobile core network architecture for 5G mobile communication systems by Hijjawi, Mohammad, Shinwan, Mohammad Al, Qutqut, Mahmoud H., Alomoush, Waleed, Khashan, Osama A., Alshdaifat, Marah, Alsokkar, Abdullah, Abualigah, Laith

    “…The current mobile network core is built based on a centralized architecture, including the S-GW and P-GW entities to serve as mobility anchors. Nevertheless,…”
    Get full text
    Journal Article
  19. 19

    Blockchain-machine learning fusion for enhanced malicious node detection in wireless sensor networks by Khashan, Osama A.

    Published in Knowledge-based systems (25-11-2024)
    “…In wireless sensor networks (WSNs), the presence of malicious nodes (MNs) poses significant challenges to data integrity, network stability, and system…”
    Get full text
    Journal Article
  20. 20

    Dual-stage machine learning approach for advanced malicious node detection in WSNs by Khashan, Osama A.

    Published in Ad hoc networks (01-01-2025)
    “…Within wireless sensor networks (WSNs), a multitude of vulnerabilities can arise, particularly those originating from malicious nodes (MNs), which lead to…”
    Get full text
    Journal Article