Predicting phishing websites based on self-structuring neural network RM Mohammad, F Thabtah, L McCluskey Neural Computing and Applications 25, 443-458, 2014 | 409 | 2014 |
An assessment of features related to phishing websites using an automated technique RM Mohammad, F Thabtah, L McCluskey 2012 international conference for internet technology and secured …, 2012 | 309 | 2012 |
Intelligent rule‐based phishing websites classification RM Mohammad, F Thabtah, L McCluskey IET Information Security 8 (3), 153-160, 2014 | 298 | 2014 |
Tutorial and critical analysis of phishing websites methods RM Mohammad, F Thabtah, L McCluskey Computer Science Review 17, 2015 | 211 | 2015 |
Prediction of coronary heart disease using machine learning: an experimental analysis AH Gonsalves, F Thabtah, RMA Mohammad, G Singh Proceedings of the 2019 3rd International Conference on Deep Learning …, 2019 | 164 | 2019 |
Autism AI: a new autism screening system based on artificial intelligence SR Shahamiri, F Thabtah, M RM Cognitive Computation 12 (4), 766-777, 2020 | 111 | 2020 |
Phishing websites features RM Mohammad, F Thabtah, L McCluskey Unpublished. Available via: http://eprints. hud. ac. uk/24330/6 …, 2015 | 102 | 2015 |
Intrusion detection system using feature extraction with machine learning algorithms in IoT D Musleh, M Alotaibi, F Alhaidari, A Rahman, RM Mohammad Journal of Sensor and Actuator Networks 12 (2), 29, 2023 | 93 | 2023 |
Phishing websites dataset R Mohammad, FA Thabtah, TL McCluskey University of Huddersfield, 2015 | 78* | 2015 |
Intelligent techniques for detecting network attacks: review and research directions M Aljabri, SS Aljameel, RMA Mohammad, SH Almotiri, S Mirza, FM Anis, ... Sensors 21 (21), 7070, 2021 | 73 | 2021 |
Predicting phishing websites using neural network trained with back-propagation R Mohammad, TL McCluskey, F Thabtah World Congress in Computer Science, Computer Engineering, and Applied Computing, 2013 | 72 | 2013 |
Detecting malicious URLs using machine learning techniques: review and research directions M Aljabri, HS Altamimi, SA Albelali, M Al-Harbi, HT Alhuraib, NK Alotaibi, ... IEEE Access 10, 121395-121417, 2022 | 66 | 2022 |
Digitalization of learning in Saudi Arabia during the COVID-19 outbreak: A survey MK Alsmadi, I Al-Marashdeh, M Alzaqebah, G Jaradat, FA Alghamdi, ... Informatics in Medicine Unlocked 25, 100632, 2021 | 58 | 2021 |
An Assessment of Lexical, Network, and Content-Based Features for Detecting Malicious URLs Using Machine Learning and Deep Learning Models SMBC Malak Aljabri, Fahd Alhaidari, Rami Mustafa A. Mohammad, Samiha Mirza ... Computational Intelligence and Neuroscience 2022, 1-14, 2022 | 50* | 2022 |
Memory based cuckoo search algorithm for feature selection of gene expression dataset M Alzaqebah, K Briki, N Alrefai, S Brini, S Jawarneh, MK Alsmadi, ... Informatics in Medicine Unlocked 24, 100572, 2021 | 49 | 2021 |
A comparison of machine learning techniques for file system forensics analysis MA Rami Mustafa A.Mohammad Journal of Information Security and Applications 46 (1), 53-61, 2019 | 46 | 2019 |
Hybrid brain storm optimization algorithm and late acceptance hill climbing to solve the flexible job-shop scheduling problem M Alzaqebah, S Jawarneh, M Alwohaibi, MK Alsmadi, I Almarashdeh, ... Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022 | 44 | 2022 |
A dynamic self-structuring neural network model to combat phishing F Thabtah, RM Mohammad, L McCluskey 2016 international joint conference on neural networks (ijcnn), 4221-4226, 2016 | 43 | 2016 |
Hybrid Feature Selection Method based on Particle Swarm Optimization and Adaptive local Search Method M Alzaqebah, S Jawarneh, RMA Mohammad, MK Alsmadi, ... International Journal of Electrical and Computer Engineering (IJECE) 11 (3 …, 2021 | 42* | 2021 |
A lifelong spam emails classification model RMA Mohammad Applied Computing and Informatics, 2020 | 42* | 2020 |