Mamoun Awad
Mamoun Awad
Professor of Computer Science, UAE University
Verified email at uaeu.ac.ae - Homepage
Title
Cited by
Cited by
Year
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16 (4), 507-521, 2007
4422007
Image annotations by combining multiple evidence & wordnet
Y Jin, L Khan, L Wang, M Awad
Proceedings of the 13th annual ACM international conference on Multimedia …, 2005
3222005
Prediction of user's web-browsing behavior: Application of markov model
MA Awad, I Khalil
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42 …, 2012
1202012
Predicting WWW surfing using multiple evidence combination
M Awad, L Khan, B Thuraisingham
The VLDB Journal 17 (3), 401-417, 2008
582008
Web navigation prediction using multiple evidence combination and domain knowledge
MA Awad, LR Khan
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2007
582007
An effective support vector machines (SVMs) performance using hierarchical clustering
M Awad, L Khan, F Bastani, IL Yen
16th IEEE international conference on tools with artificial intelligence …, 2004
572004
Design and implementation of data mining tools
B Thuraisingham, L Khan, M Awad, L Wang
CRC Press, 2009
272009
Analysis of firewall policy rules using traffic mining techniques
M Abedin, S Nessa, L Khan, E Al-Shaer, M Awad
International Journal of Internet Protocol Technology 5 (1-2), 3-22, 2010
242010
Ant colony based approach to predict stock market movement from mood collected on Twitter
S Bouktif, MA Awad
Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013
182013
CTAC: Control traffic tunneling attacks’ countermeasures in mobile wireless networks
I Khalil, M Awad, A Khreishah
Computer Networks 56 (14), 3300-3317, 2012
112012
Bayesian networks
A Bashir, L Khan, M Awad
Encyclopedia of Data Warehousing and Mining, 89-93, 2005
92005
Applications and limitations of support vector machines
M Awad, L Khan
Encyclopedia of Data Warehousing and Mining. Idea group Inc, 2004
82004
Managing IoT-based smart healthcare systems traffic with software defined networks
F Sallabi, F Naeem, M Awad, K Shuaib
2018 International Symposium on Networks, Computers and Communications …, 2018
62018
SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks
I Khalil, M Hayajneh, M Awad
2009 IEEE Symposium on Computers and Communications, 368-373, 2009
62009
A framework for image classification
M Awad, L Wang, Y Chin, L Khan, G Chen, F Chebil
2006 IEEE Southwest Symposium on Image Analysis and Interpretation, 134-138, 2006
62006
Policy enforcement system for inter-organizational data sharing
M Awad, L Khan, B Thuraisingham
Optimizing Information Security and Advancing Privacy Assurance: New …, 2012
42012
Non-cooperative uplink power control game for CDMA wireless communications systems
M Hayajneh, I Khalil, M Awad
2009 IEEE Symposium on Computers and Communications, 587-592, 2009
42009
MSN: mutual secure neighbor verification in multi‐hop wireless networks
IM Khalil, M Awad, S Bouktif, F Awwad
Security and Communication Networks 5 (2), 186-196, 2012
32012
GPMS: An educational supportive graduation project management system
M Awad
Computer Applications in Engineering Education 25 (6), 881-894, 2017
22017
Predicting stock market movement: An evolutionary approach
S Bouktif, MA Awad
2015 7th International Joint Conference on Knowledge Discovery, Knowledge …, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20