Maximising competitive advantage on e-Business websites : A data mining approach
- Alazab, Ammar, Bevinakoppa, Savitri, Khraisat, Ansam
API based discrimination of ransomware and benign cryptographic programs
- Black, Paul, Sohail, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Vamplew, Peter, Watters, Paul
Efficient utilization of WLAN networks in the next-generation heterogeneous environments
- Haider, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder, Qiu, Bin
Dynamic dwell timer for hybrid vertical handover in 4G coupled networks
- Haider, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder
Crime toolkits: The productisation of cybercrime
- Alazab, Ammar, Abawajy, Jemal, Hobbs, Michael, Layton, Robert, Khraisat, Ansam
Applying genetic alogorithm for optimizing broadcasting process in ad-hoc network
- Elaiwat, Said, Alazab, Ammar, Venkatraman, Sitalakshmi, Alazab, Mamoun
Social-connectivity-aware vertical handover for heterogeneous wireless networks
- Haider, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder
An optimal transportation routing approach using GIS-based dynamic traffic flows
- Alazab, Ammar, Venkatraman, Sitalakshmi, Abawajy, Jemal, Alazab, Mamoun
Malware detection and prevention system based on multi-stage rules
- Alazab, Ammar, Hobbs, Michael, Abawajy, Jemal, Khraisat, Ansam
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
Self static interference mitigation scheme for coexisting wireless networks
- Yaqub, Muhammad, Haider, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder
Trends in Crime Toolkit Development
- Khraisat, Ansam, Alazab, Ammar, Hobbs, Michael, Abawajy, Jemal, Azab, Ahmad
Multi-factor based enhancing students' motivations
- Kbar, Ghassan, Alazab, Ammar, Agbinya, Johnson
Six sigma approach to improve quality in e-services: An empirical study in Jordan
- Alhyari, Salah, Alazab, Moutaz, Venkatraman, Sitalakshmi, Alazab, Mamoun, Alazab, Ammar
A Comprehensive protection method for securing the organization's network against cyberattacks
- Kbar, Ghassan, Alazab, Ammar
Designing security intelligent agent for petrol theft prevention
- Bakkar, Mahmoud, Alazab, Ammar
Information security: Definitions, threats and management in Dubai hospitals context
- Bakkar, Mahmoud, Alazab, Ammar
Energy efficient and delay aware 5g multi-tier network
- Islam, Nahina, Alazab, Ammar, Agbinya, Johnson
A Reinforcement learning based algorithm towards energy efficient 5G Multi-tier network
- Islam, Nahina, Alazab, Ammar, Alazab, Mamoun
A brief guide to multi-objective reinforcement learning and planning JAAMAS track
- Hayes, Conor, Bargiacchi, Eugenio, Källström, Johan, Macfarlane, Matthew, Reymond, Mathieu, Verstraeten, Timothy, Zintgraf, Luisa, Dazeley, Richard, Heintz, Frederik, Howley, Enda, Irissappane, Aathirai, Mannion, Patrick, Nowé, Ann, Ramos, Gabriel, Restelli, Marcello, Vamplew, Peter, Roijers, Diederik
Are you sure you would like to clear your session, including search history and login status?