Articles by Wesam Bhaya (6)

Dynamic Steganography of Internet Web Pages

Rusul Amer and Wesam Bhaya

Asian Journal of Information Technology 15 ( 16 ): 2770 - 2774 , 2016

A Survey on Association Rule Mining Approaches for Malicious Detection

Nawfal Turki Obeis and Wesam Bhaya

Journal of Engineering and Applied Sciences 12 ( 21 ): 5394 - 5398 , 2017

Balancing between TCP and UDP to Improve Network Performance

Wameed Deyah and Wesam Bhaya

Journal of Engineering and Applied Sciences 12 ( 6 SI ): 7755 - 7758 , 2017

Review of Data Mining Techniques for Malicious Detection

Nawfal Turki Obeis and Wesam Bhaya

Research Journal of Applied Sciences 11 ( 10 ): 942 - 947 , 2016

Text Steganography in Excel Documents Using Color and Type of Fonts

Samraa A. Al-Asadi and Wesam Bhaya

Research Journal of Applied Sciences 11 ( 10 ): 1054 - 1059 , 2016

Influential Nodes Based Alleviation of User Cold-Start Problem in Recommendation System

Mohsin Hasan Hussein, Huda Naji Nawaf and Wesam Bhaya

Research Journal of Applied Sciences 11 ( 10 ): 1107 - 1114 , 2016