Follow
Ahmad Mansour M. Manasrah
Ahmad Mansour M. Manasrah
Higher Colleges of Technology, Sharjah Women Campus, Sharjah, UAE
Verified email at hct.ac.ae
Title
Cited by
Cited by
Year
Workflow scheduling using hybrid GA-PSO algorithm in cloud computing
AM Manasrah, H Ba Ali
Wireless Communications and Mobile Computing 2018, 1-16, 2018
2132018
A survey of botnet detection based on DNS
K Alieyan, A ALmomani, A Manasrah, MM Kadhum
Neural Computing and Applications 28, 1541-1558, 2017
1532017
An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment
AM Manasrah, A Aldomi, BB Gupta
Cluster Comput, https://doi.org/10.1007/s10586-017-1559-z 22 (1), 1639–1653, 2019
1002019
A variable service broker routing policy for data center selection in cloud analyst
AM Manasrah, T Smadi, A ALmomani
Journal of King Saud University-Computer and Information Sciences 29 (3 …, 2017
612017
Evolving fuzzy neural network for phishing emails detection
A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ...
Journal of Computer Science 8 (7), 1099, 2012
582012
Bank web sites phishing detection and notification system based on semantic web technologies
F Alkhateeb, AM Manasrah, AAR Bsoul
International Journal of Security and its Applications 6 (4), 53-66, 2012
542012
Active e-mail system SMTP protocol monitoring algorithm
R Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
342009
An online model on evolving phishing e-mail detection and classification method
AA Deeb Al-Mo, TC Wan, K Al-Saedi, A Altaher, S Ramadass, ...
Journal of Applied Sciences 11 (18), 3301-3307, 2011
332011
Detecting botnet activities based on abnormal DNS traffic
AM Manasrah, A Hasan, OA Abouabdalla, S Ramadass
arXiv preprint arXiv:0911.0487, 2009
322009
False positive reduction in intrusion detection system: A survey
O Abouabdalla, H El-Taj, A Manasrah, S Ramadass
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
292009
Delta-multiplexing: A novel technique to improve VoIP bandwidth utilization between VoIP gateways
MM Abu-Alhaj, MS Kolhar, LV Chandra, O Abouabdalla, AM Manasrah
2010 10th IEEE International Conference on Computer and Information …, 2010
202010
Real time distributed network monitoring and security monitoring platform (RTD-NMS)
S Ramadass, AM Manasrah
US Patent 9,112,894, 2015
192015
A survey of learning based techniques of phishing email filtering
A ALmomani, TC Wan, A Manasrah, A Altaher, E Almomani, K Al-Saedi, ...
International Journal of Digital Content Technology and its Applications 6 …, 2012
192012
A holy quran reader/reciter identification system using support vector machine
KMO Nahar, M Al-Shannaq, A Manasrah, R Alshorman, I Alazzam
International Journal of Machine Learning and Computing 9 (4), 458-464, 2019
172019
Comparative Evaluation and Analysis of IAX and RSW
MS Kolhar, MM Abu-Alhaj, O Abouabdalla, TC Wan, AM Manasrah
arXiv preprint arXiv:1001.2280, 2010
162010
Examining the Impact of Privacy, Security and Law on Trust in Mobile Computing
Q Hammouri, E Abu-Shanab, A Manasrah
Saba Journal Of information Technology And Networking (SJITN)-ISSN: 2312 …, 2016
142016
ITTP: A new transport protocol for VoIP applications
MM Abu-Alhaj, R Sureswaran, TC Wan, IJ Mohamad, AM Manasrah
International Journal of Innovative Computing, Information and Control 8 (3 …, 2012
142012
DGA-based botnets detection using DNS traffic mining
AM Manasrah, T Khdour, R Freehat
Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022
132022
Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study
AM Manasrah, BN Al‐Din
Security and Communication Networks 9 (11), 1450-1461, 2016
132016
Cyber security standards, practices and industrial applications: Systems and methodologies
JA Zubairi, A Mahboob
Information Science Reference, 2012
132012
The system can't perform the operation now. Try again later.
Articles 1–20