Workflow scheduling using hybrid GA‐PSO algorithm in cloud computing AM Manasrah, H Ba Ali Wireless Communications and Mobile Computing 2018 (1), 1934784, 2018 | 219 | 2018 |
A survey of botnet detection based on DNS K Alieyan, A ALmomani, A Manasrah, MM Kadhum Neural Computing and Applications 28, 1541-1558, 2017 | 158 | 2017 |
An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment AM Manasrah, A Aldomi, BB Gupta Cluster Comput, https://doi.org/10.1007/s10586-017-1559-z 22 (1), 1639–1653, 2019 | 103 | 2019 |
A variable service broker routing policy for data center selection in cloud analyst AM Manasrah, T Smadi, A ALmomani Journal of King Saud University-Computer and Information Sciences 29 (3 …, 2017 | 67 | 2017 |
Evolving fuzzy neural network for phishing emails detection A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ... Journal of Computer Science 8 (7), 1099, 2012 | 60 | 2012 |
Bank web sites phishing detection and notification system based on semantic web technologies F Alkhateeb, AM Manasrah, AAR Bsoul International Journal of Security and its Applications 6 (4), 53-66, 2012 | 55 | 2012 |
Detecting botnet activities based on abnormal DNS traffic AM Manasrah, A Hasan, OA Abouabdalla, S Ramadass arXiv preprint arXiv:0911.0487, 2009 | 34 | 2009 |
An online model on evolving phishing e-mail detection and classification method AA Deeb Al-Mo, TC Wan, K Al-Saedi, A Altaher, S Ramadass, ... Journal of Applied Sciences 11 (18), 3301-3307, 2011 | 33 | 2011 |
Active e-mail system SMTP protocol monitoring algorithm R Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj 2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009 | 33 | 2009 |
False positive reduction in intrusion detection system: A survey O Abouabdalla, H El-Taj, A Manasrah, S Ramadass 2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009 | 28 | 2009 |
Delta-multiplexing: A novel technique to improve VoIP bandwidth utilization between VoIP gateways MM Abu-Alhaj, MS Kolhar, LV Chandra, O Abouabdalla, AM Manasrah 2010 10th IEEE International Conference on Computer and Information …, 2010 | 20 | 2010 |
Real time distributed network monitoring and security monitoring platform (RTD-NMS) S Ramadass, AM Manasrah US Patent 9,112,894, 2015 | 19 | 2015 |
A survey of learning based techniques of phishing email filtering A ALmomani, TC Wan, A Manasrah, A Altaher, E Almomani, K Al-Saedi, ... International Journal of Digital Content Technology and its Applications 6 …, 2012 | 19 | 2012 |
A holy quran reader/reciter identification system using support vector machine KMO Nahar, M Al-Shannaq, A Manasrah, R Alshorman, I Alazzam International Journal of Machine Learning and Computing 9 (4), 458-464, 2019 | 18 | 2019 |
Comparative Evaluation and Analysis of IAX and RSW MS Kolhar, MM Abu-Alhaj, O Abouabdalla, TC Wan, AM Manasrah arXiv preprint arXiv:1001.2280, 2010 | 16 | 2010 |
DGA-based botnets detection using DNS traffic mining AM Manasrah, T Khdour, R Freehat Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022 | 15 | 2022 |
Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study AM Manasrah, BN Al‐Din Security and Communication Networks 9 (11), 1450-1461, 2016 | 14 | 2016 |
Examining the Impact of Privacy, Security and Law on Trust in Mobile Computing Q Hammouri, E Abu-Shanab, A Manasrah Saba Journal Of information Technology And Networking (SJITN)-ISSN: 2312 …, 2016 | 14 | 2016 |
ITTP: A new transport protocol for VoIP applications MM Abu-Alhaj, R Sureswaran, TC Wan, IJ Mohamad, AM Manasrah International Journal of Innovative Computing, Information and Control 8 (3 …, 2012 | 14 | 2012 |
Cyber security standards, practices and industrial applications: Systems and methodologies JA Zubairi, A Mahboob Information Science Reference, 2012 | 14 | 2012 |