Ahmad Mansour M. Manasrah
Ahmad Mansour M. Manasrah
Higher Colleges of Technology, Sharjah Women Campus, Sharjah, UAE
Verified email at
Cited by
Cited by
Workflow scheduling using hybrid GA-PSO algorithm in cloud computing
AM Manasrah, H Ba Ali
Wireless Communications and Mobile Computing 2018, 1-16, 2018
A survey of botnet detection based on DNS
K Alieyan, A ALmomani, A Manasrah, MM Kadhum
Neural Computing and Applications 28, 1541-1558, 2017
An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment
AM Manasrah, A Aldomi, BB Gupta
Cluster Comput, 22 (1), 1639–1653, 2019
A variable service broker routing policy for data center selection in cloud analyst
AM Manasrah, T Smadi, A ALmomani
Journal of King Saud University-Computer and Information Sciences 29 (3 …, 2017
Evolving fuzzy neural network for phishing emails detection
A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ...
Journal of Computer Science 8 (7), 1099, 2012
Bank web sites phishing detection and notification system based on semantic web technologies
F Alkhateeb, AM Manasrah, AAR Bsoul
International Journal of Security and its Applications 6 (4), 53-66, 2012
An online model on evolving phishing e-mail detection and classification method
AA Deeb Al-Mo, TC Wan, K Al-Saedi, A Altaher, S Ramadass, ...
Journal of Applied Sciences 11 (18), 3301-3307, 2011
Detecting botnet activities based on abnormal DNS traffic
AM Manasrah, A Hasan, OA Abouabdalla, S Ramadass
arXiv preprint arXiv:0911.0487, 2009
Active e-mail system SMTP protocol monitoring algorithm
R Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
False positive reduction in intrusion detection system: A survey
O Abouabdalla, H El-Taj, A Manasrah, S Ramadass
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
Delta-multiplexing: A novel technique to improve VoIP bandwidth utilization between VoIP gateways
MM Abu-Alhaj, MS Kolhar, LV Chandra, O Abouabdalla, AM Manasrah
2010 10th IEEE International Conference on Computer and Information …, 2010
Real time distributed network monitoring and security monitoring platform (RTD-NMS)
S Ramadass, AM Manasrah
US Patent 9,112,894, 2015
A survey of learning based techniques of phishing email filtering
A ALmomani, TC Wan, A Manasrah, A Altaher, E Almomani, K Al-Saedi, ...
International Journal of Digital Content Technology and its Applications 6 …, 2012
A holy quran reader/reciter identification system using support vector machine
KMO Nahar, M Al-Shannaq, A Manasrah, R Alshorman, I Alazzam
International Journal of Machine Learning and Computing 9 (4), 458-464, 2019
Comparative Evaluation and Analysis of IAX and RSW
MS Kolhar, MM Abu-Alhaj, O Abouabdalla, TC Wan, AM Manasrah
arXiv preprint arXiv:1001.2280, 2010
Examining the Impact of Privacy, Security and Law on Trust in Mobile Computing
Q Hammouri, E Abu-Shanab, A Manasrah
Saba Journal Of information Technology And Networking (SJITN)-ISSN: 2312 …, 2016
ITTP: A new transport protocol for VoIP applications
MM Abu-Alhaj, SK Manjur, R Sureswaran, TC Wan, IJ Mohamad, ...
International Journal of Innovative Computing, Information and Control …, 2012
Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study
AM Manasrah, BN Al‐Din
Security and Communication Networks 9 (11), 1450-1461, 2016
Cyber security standards, practices and industrial applications: Systems and methodologies
JA Zubairi, A Mahboob
Information Science Reference, 2012
Conference gateway for heterogeneous clients: Real time switching clients and interasterisk exchange clients
SK Manjur, M Abu-Alhaj, O Abouabdalla, TC Wan, R Budiarto, ...
International Journal of Innovative Computing Information and Control 7 (1 …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20