| Version control system: A review NN Zolkifli, A Ngah, A Deraman Procedia Computer Science 135, 408-415, 2018 | 186 | 2018 |
| Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural networks WAHM Ghanem, SAA Ghaleb, A Jantan, AB Nasser, SAM Saleh, A Ngah, ... IEEE Access 10, 76318-76339, 2022 | 89 | 2022 |
| An overview of regression testing A Ngah, M Munro, M Abdallah Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 32 | 2017 |
| An adoption model of mobile knowledge sharing based on the theory of planned behavior AM Hawamleh, A Ngah Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 11 | 2017 |
| Towards offshore software maintenance outsourcing process model A Ikram, MA Jalil, AB Ngah, AS Khan International Journal of Computer Science and Network Security 20 (4), 6-14, 2020 | 10 | 2020 |
| Knowledge sharing among jordanian academicians: A case study of tafila technical university (TTU) and mutah university (MU) AM Alhawamleh, A Ngah 2017 8th International Conference on Information Technology (ICIT), 262-270, 2017 | 10 | 2017 |
| Offshore software maintenance outsourcing predicting clients proposal using supervised learning A Ikram, MA Jalil, AB Ngah, AS Khan, T Iqbal arXiv preprint arXiv:2103.01223, 2021 | 8 | 2021 |
| Regression test selection by exclusion using decomposition slicing A Ngah, K Gallagher Proceedings of the doctoral symposium for ESEC/FSE on Doctoral symposium, 23-24, 2009 | 8 | 2009 |
| Integrating computer-based method into dietary intervention in children at Setiu Wetland: A pilot study M Shukri, ZM Zin, MK Zainol, S Said, A Ngah, SS Abdullah Journal of Sustainability Science and Management 12 (2), 176-182, 2017 | 7 | 2017 |
| Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines A Ikram, MA Jalil, AB Ngah, S Raza, AS Khan, Y Mahmood, N Kama, ... Computers, Materials & Continua 74 (1), 2023 | 6 | 2023 |
| A proposed forward clause slicing application K Awad, M Abdallah, A Tamimi, A Ngah, H Tamimi Indonesian Journal of Electrical Engineering and Computer Science 13 (1 …, 2019 | 6 | 2019 |
| A model for people-centric software configuration management S Fahmy, A Deraman, JH Yahaya, A Ngah, FA Salman Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 6 | 2017 |
| IncSPADE: An incremental sequential pattern mining algorithm based on SPADE property O Adam, Z Abdullah, A Ngah, K Mokhtar, WMAW Ahmad, T Herawan, ... Advances in Machine Learning and Signal Processing: Proceedings of MALSIP …, 2016 | 6 | 2016 |
| A Brief Survey of Program Slicing A Ngah, SA Selamat International Symposium on Research in Innovation and Sustainability 2014 …, 2014 | 6 | 2014 |
| An empirical investigation of vendor readiness to assess offshore software maintenance outsourcing project A Ikram, MA Jalil, AB Ngah, AS Khan, Y Mahmood International Journal of Computer Science & Network Security 22 (3), 229-235, 2022 | 5 | 2022 |
| A proposed java forward slicing approach R Bader, B Alukosh, M Abdallah, K Awad, A Ngah TELKOMNIKA (Telecommunication Computing Electronics and Control) 18 (1), 311-316, 2020 | 5 | 2020 |
| Slicing for Java Program: A Preliminary Study SA Selamat, A Ngah Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 5 | 2017 |
| Encryption algorithm for securing non-disclosure agreements in outsourcing offshore software maintenance A Ikram, MA Jalil, AB Ngah, N Iqbal, N Kama, A Azmi, AS Khan, ... Comput., Mater. Continua 73 (2), 3827-3860, 2022 | 4 | 2022 |
| Regression test selection model: a comparison between ReTSE and pythia A Ngah, M Munro, Z Abdullah, MA Jalil, M Abdallah TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 (2), 844-851, 2019 | 4 | 2019 |
| Using object to slice java program A Ngah, SA Selamat Journal of Engineering and Applied Sciences 13 (6), 1320-1325, 2018 | 4 | 2018 |