[go: up one dir, main page]

Follow
Ahmad Mansour M. Manasrah
Ahmad Mansour M. Manasrah
Higher Colleges of Technology, Sharjah Women Campus, Sharjah, UAE
Verified email at hct.ac.ae
Title
Cited by
Cited by
Year
Workflow scheduling using hybrid GA‐PSO algorithm in cloud computing
AM Manasrah, H Ba Ali
Wireless Communications and Mobile Computing 2018 (1), 1934784, 2018
2742018
A survey of botnet detection based on DNS
K Alieyan, A ALmomani, A Manasrah, MM Kadhum
Neural Computing and Applications 28 (7), 1541-1558, 2017
1912017
An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment
AM Manasrah, A Aldomi, BB Gupta
Cluster Comput, https://doi.org/10.1007/s10586-017-1559-z 22 (1), 1639–1653, 2019
1242019
A variable service broker routing policy for data center selection in cloud analyst
AM Manasrah, T Smadi, A ALmomani
Journal of King Saud University-Computer and Information Sciences 29 (3 …, 2017
742017
Evolving fuzzy neural network for phishing emails detection
A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ...
Journal of Computer Science 8 (7), 1099, 2012
612012
Bank web sites phishing detection and notification system based on semantic web technologies
F Alkhateeb, AM Manasrah, AAR Bsoul
International Journal of Security and its Applications 6 (4), 53-66, 2012
552012
An online model on evolving phishing e-mail detection and classification method
AA Deeb Al-Mo, TC Wan, K Al-Saedi, A Altaher, S Ramadass, ...
Journal of Applied Sciences 11 (18), 3301-3307, 2011
372011
Active e-mail system SMTP protocol monitoring algorithm
R Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
372009
DGA-based botnets detection using DNS traffic mining
AM Manasrah, T Khdour, R Freehat
Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022
342022
False positive reduction in intrusion detection system: A survey
O Abouabdalla, H El-Taj, A Manasrah, S Ramadass
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
332009
Detecting botnet activities based on abnormal DNS traffic
AM Manasrah, A Hasan, OA Abouabdalla, S Ramadass
arXiv preprint arXiv:0911.0487, 2009
322009
Ensemble-based approach for efficient intrusion detection in network traffic.
A Almomani, I Akour, AM Manasrah, O Almomani, M Alauthman, ...
Intelligent Automation & Soft Computing 37 (2), 2023
272023
Identity-based authentication in vanets: A review
A Manasrah, Q Yaseen, H Al-Aqrabi, L Liu
IEEE Transactions on Intelligent Transportation Systems, 2025
232025
A holy quran reader/reciter identification system using support vector machine
KMO Nahar, M Al-Shannaq, A Manasrah, R Alshorman, I Alazzam
International Journal of Machine Learning and Computing 9 (4), 458-464, 2019
222019
A survey of learning based techniques of phishing email filtering
A ALmomani, TC Wan, A Manasrah, A Altaher, E Almomani, K Al-Saedi, ...
International Journal of Digital Content Technology and its Applications 6 …, 2012
202012
Real time distributed network monitoring and security monitoring platform (RTD-NMS)
S Ramadass, AM Manasrah
US Patent 9,112,894, 2015
192015
Delta-multiplexing: A novel technique to improve VoIP bandwidth utilization between VoIP gateways
MM Abu-Alhaj, MS Kolhar, LV Chandra, O Abouabdalla, AM Manasrah
2010 10th IEEE International Conference on Computer and Information …, 2010
192010
Comparative Evaluation and Analysis of IAX and RSW
MS Kolhar, MM Abu-Alhaj, O Abouabdalla, TC Wan, AM Manasrah
arXiv preprint arXiv:1001.2280, 2010
162010
Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study
AM Manasrah, BN Al‐Din
Security and Communication Networks 9 (11), 1450-1461, 2016
152016
Examining the Impact of Privacy, Security and Law on Trust in Mobile Computing
Q Hammouri, E Abu-Shanab, A Manasrah
Saba Journal Of information Technology And Networking (SJITN)-ISSN: 2312 …, 2016
152016
The system can't perform the operation now. Try again later.
Articles 1–20