Spremljaj
Ahmad Mansour M. Manasrah
Ahmad Mansour M. Manasrah
Higher Colleges of Technology, Sharjah Women Campus, Sharjah, UAE
Preverjeni e-poštni naslov na hct.ac.ae
Naslov
Navedeno
Navedeno
Leto
Workflow scheduling using hybrid GA‐PSO algorithm in cloud computing
AM Manasrah, H Ba Ali
Wireless Communications and Mobile Computing 2018 (1), 1934784, 2018
2542018
A survey of botnet detection based on DNS
K Alieyan, A ALmomani, A Manasrah, MM Kadhum
Neural Computing and Applications 28, 1541-1558, 2017
1712017
An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment
AM Manasrah, A Aldomi, BB Gupta
Cluster Comput, https://doi.org/10.1007/s10586-017-1559-z 22 (1), 1639–1653, 2019
1112019
A variable service broker routing policy for data center selection in cloud analyst
AM Manasrah, T Smadi, A ALmomani
Journal of King Saud University-Computer and Information Sciences 29 (3 …, 2017
702017
Evolving fuzzy neural network for phishing emails detection
A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ...
Journal of Computer Science 8 (7), 1099, 2012
602012
Bank web sites phishing detection and notification system based on semantic web technologies
F Alkhateeb, AM Manasrah, AAR Bsoul
International Journal of Security and its Applications 6 (4), 53-66, 2012
552012
An online model on evolving phishing e-mail detection and classification method
AA Deeb Al-Mo, TC Wan, K Al-Saedi, A Altaher, S Ramadass, ...
Journal of Applied Sciences 11 (18), 3301-3307, 2011
372011
Active e-mail system SMTP protocol monitoring algorithm
R Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
342009
Detecting botnet activities based on abnormal DNS traffic
AM Manasrah, A Hasan, OA Abouabdalla, S Ramadass
arXiv preprint arXiv:0911.0487, 2009
322009
False positive reduction in intrusion detection system: A survey
O Abouabdalla, H El-Taj, A Manasrah, S Ramadass
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
322009
DGA-based botnets detection using DNS traffic mining
AM Manasrah, T Khdour, R Freehat
Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022
232022
A survey of learning based techniques of phishing email filtering
A ALmomani, TC Wan, A Manasrah, A Altaher, E Almomani, K Al-Saedi, ...
International Journal of Digital Content Technology and its Applications 6 …, 2012
212012
A holy quran reader/reciter identification system using support vector machine
KMO Nahar, M Al-Shannaq, A Manasrah, R Alshorman, I Alazzam
International Journal of Machine Learning and Computing 9 (4), 458-464, 2019
192019
Real time distributed network monitoring and security monitoring platform (RTD-NMS)
S Ramadass, AM Manasrah
US Patent 9,112,894, 2015
192015
Delta-multiplexing: A novel technique to improve VoIP bandwidth utilization between VoIP gateways
MM Abu-Alhaj, MS Kolhar, LV Chandra, O Abouabdalla, AM Manasrah
2010 10th IEEE International Conference on Computer and Information …, 2010
192010
Comparative Evaluation and Analysis of IAX and RSW
MS Kolhar, MM Abu-Alhaj, O Abouabdalla, TC Wan, AM Manasrah
arXiv preprint arXiv:1001.2280, 2010
162010
Examining the Impact of Privacy, Security and Law on Trust in Mobile Computing
Q Hammouri, E Abu-Shanab, A Manasrah
Saba Journal Of information Technology And Networking (SJITN)-ISSN: 2312 …, 2016
152016
Ensemble-based approach for efficient intrusion detection in network traffic.
A Almomani, I Akour, AM Manasrah, O Almomani, M Alauthman, ...
Intelligent Automation & Soft Computing 37 (2), 2023
142023
Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study
AM Manasrah, BN Al‐Din
Security and Communication Networks 9 (11), 1450-1461, 2016
142016
ITTP: A new transport protocol for VoIP applications
MM Abu-Alhaj, SK Manjur, R Sureswaran, TC Wan, IJ Mohamad, ...
International Journal of Innovative Computing, Information and Control …, 2012
142012
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20