Dr.Ammar Almomani | Al-Balqa Applied University (original) (raw)

Dr.Ammar Almomani

Uploads

Teaching Documents by Dr.Ammar Almomani

Research paper thumbnail of science journal 2013 (isi&impact factore)

Research paper thumbnail of Web of science 2013

Book Reviews by Dr.Ammar Almomani

Research paper thumbnail of how you can download web of science 2013

to check your isi& IF journal by Dr.Ammar Almomani

Research paper thumbnail of to check your isi& IF journal

Papers by Dr.Ammar Almomani

Research paper thumbnail of Steganography in digital images: Common approaches and tools

IETE Technical Review, 2013

ABSTRACT The art and science of using digital images for secret communication is known as image s... more ABSTRACT The art and science of using digital images for secret communication is known as image steganography. This paper presents a background on key concepts behind it. A representation of steganography area is graphically and mathematically shown. The origin and history of this area, its important properties, and major applications are outlined. An introduction to steganalysis is provided. Distinctions between steganography, cryptography, and watermarking in terms of technique and intent are briefly discussed. Details of the way images are represented are outlined. Benefits and drawbacks of steganography domains are highlighted. Common approaches used for embedding messages into images are discussed in some detail. Methods used for embedding messages into images are also explored. Current steganography tools are highlighted. A demonstration of how secret information is embedded into an image through the use of available steganographic tools is shown. Comparisons between different image steganography algorithms are also provided.

Research paper thumbnail of ICMPv6 Flood Attack Detection using DENFIS Algorithms

This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of ser... more This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of service (DoS) attacks in IPv6 networks. We developed C# application to send the ICMPv6 flood attack packets the flooding packets were generated using different attack rates starting from 1000 Pings to 1500 Pings, and the normal traffic packets were generated using different ping rates starting from 10 Pings to 15 Pings, for each ICMPv6 Packet, RTT was calculated. The dataset consists of 2000 recorded, which divided into two sets: 80% for training and 20% for testing, the proposed proved that we can detect ICMPv6 Flood Attack with low root mean square error which about 0.26.

Research paper thumbnail of Spam E-mail Filtering using ECOS Algorithms

Research paper thumbnail of Mobile Game  Approach to Prevent Childhood Obesity Using Persuasive Technology

Research paper thumbnail of Real Time Network Anomaly  Detection Using   Relative  Entropy

Research paper thumbnail of A dual Stack IPv4/IPv6 Testbed for Malware detection in IPv6 Networks

Research paper thumbnail of A Framework of Childhood Obesity Intervention Using Persuasive Mobile Game Technology

Research paper thumbnail of ICMPv6 Flood Attack Detection using DENFIS algorithms

Research paper thumbnail of A  Survey  of  Phishing  Email  Filtering  Techniques

Research paper thumbnail of An enhanced online phishing e-mail detection framework based on “Evolving  connectionist  system

Research paper thumbnail of Phishing Dynamic Evolving Neural Fuzzy Framework for Online  Detection “Zero-day” Phishing Email

Research paper thumbnail of Investigating  Study  on  Network  Scanning  Techniques

Research paper thumbnail of Steganography  in  Digital  Images: Common  Approaches  and  Tools

Research paper thumbnail of Hadoop based Defence Solution to Handle Distributed Denial of Service (DDoS) Attacks

Research paper thumbnail of A Novel Solution to Handle DDOS  Attack in MANET

Research paper thumbnail of Dynamic  Stochastic  Early Discovery:  A  New  Congestion    Control  Technique    to  Improve  Networks    Performance

Research paper thumbnail of science journal 2013 (isi&impact factore)

Research paper thumbnail of Web of science 2013

Research paper thumbnail of how you can download web of science 2013

Research paper thumbnail of to check your isi& IF journal

Research paper thumbnail of Steganography in digital images: Common approaches and tools

IETE Technical Review, 2013

ABSTRACT The art and science of using digital images for secret communication is known as image s... more ABSTRACT The art and science of using digital images for secret communication is known as image steganography. This paper presents a background on key concepts behind it. A representation of steganography area is graphically and mathematically shown. The origin and history of this area, its important properties, and major applications are outlined. An introduction to steganalysis is provided. Distinctions between steganography, cryptography, and watermarking in terms of technique and intent are briefly discussed. Details of the way images are represented are outlined. Benefits and drawbacks of steganography domains are highlighted. Common approaches used for embedding messages into images are discussed in some detail. Methods used for embedding messages into images are also explored. Current steganography tools are highlighted. A demonstration of how secret information is embedded into an image through the use of available steganographic tools is shown. Comparisons between different image steganography algorithms are also provided.

Research paper thumbnail of ICMPv6 Flood Attack Detection using DENFIS Algorithms

This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of ser... more This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of service (DoS) attacks in IPv6 networks. We developed C# application to send the ICMPv6 flood attack packets the flooding packets were generated using different attack rates starting from 1000 Pings to 1500 Pings, and the normal traffic packets were generated using different ping rates starting from 10 Pings to 15 Pings, for each ICMPv6 Packet, RTT was calculated. The dataset consists of 2000 recorded, which divided into two sets: 80% for training and 20% for testing, the proposed proved that we can detect ICMPv6 Flood Attack with low root mean square error which about 0.26.

Research paper thumbnail of Spam E-mail Filtering using ECOS Algorithms

Research paper thumbnail of Mobile Game  Approach to Prevent Childhood Obesity Using Persuasive Technology

Research paper thumbnail of Real Time Network Anomaly  Detection Using   Relative  Entropy

Research paper thumbnail of A dual Stack IPv4/IPv6 Testbed for Malware detection in IPv6 Networks

Research paper thumbnail of A Framework of Childhood Obesity Intervention Using Persuasive Mobile Game Technology

Research paper thumbnail of ICMPv6 Flood Attack Detection using DENFIS algorithms

Research paper thumbnail of A  Survey  of  Phishing  Email  Filtering  Techniques

Research paper thumbnail of An enhanced online phishing e-mail detection framework based on “Evolving  connectionist  system

Research paper thumbnail of Phishing Dynamic Evolving Neural Fuzzy Framework for Online  Detection “Zero-day” Phishing Email

Research paper thumbnail of Investigating  Study  on  Network  Scanning  Techniques

Research paper thumbnail of Steganography  in  Digital  Images: Common  Approaches  and  Tools

Research paper thumbnail of Hadoop based Defence Solution to Handle Distributed Denial of Service (DDoS) Attacks

Research paper thumbnail of A Novel Solution to Handle DDOS  Attack in MANET

Research paper thumbnail of Dynamic  Stochastic  Early Discovery:  A  New  Congestion    Control  Technique    to  Improve  Networks    Performance

Research paper thumbnail of research proposal: an intrusion detection system   alert reduction   and   assessment  framework  based  on  data  mining

Research paper thumbnail of Evolving Fuzzy Neural Network for Phishing Emails Detection

Research paper thumbnail of A  Survey  of  learning  based  Techniques  of  phishing  email   filtering

Research paper thumbnail of Behaviour Based Worm Detection and Signature automation

Log In