Your selections:
A Reinforcement learning based algorithm towards energy efficient 5G Multi-tier network
- Islam, Nahina, Alazab, Ammar, Alazab, Mamoun
GOM: New Genetic Optimizing Model for broadcasting tree in MANET
- Elaiwat, Said, Alazab, Ammar, Venkatraman, Sitalakshmi, Alazab, Mamoun
Maximising competitive advantage on e-Business websites : A data mining approach
- Alazab, Ammar, Bevinakoppa, Savitri, Khraisat, Ansam
Malware detection and prevention system based on multi-stage rules
- Alazab, Ammar, Hobbs, Michael, Abawajy, Jemal, Khraisat, Ansam
Multi-factor based enhancing students' motivations
- Kbar, Ghassan, Alazab, Ammar, Agbinya, Johnson
Applying genetic alogorithm for optimizing broadcasting process in ad-hoc network
- Elaiwat, Said, Alazab, Ammar, Venkatraman, Sitalakshmi, Alazab, Mamoun
Six sigma approach to improve quality in e-services: An empirical study in Jordan
- Alhyari, Salah, Alazab, Moutaz, Venkatraman, Sitalakshmi, Alazab, Mamoun, Alazab, Ammar
Designing security intelligent agent for petrol theft prevention
- Bakkar, Mahmoud, Alazab, Ammar
Cybercrime : The case of obfuscated malware
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz, Alazab, Ammar
A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
- Khraisat, Ansam, Alazab, Ammar
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
A Comprehensive protection method for securing the organization's network against cyberattacks
- Kbar, Ghassan, Alazab, Ammar
An optimal transportation routing approach using GIS-based dynamic traffic flows
- Alazab, Ammar, Venkatraman, Sitalakshmi, Abawajy, Jemal, Alazab, Mamoun
Crime toolkits: The productisation of cybercrime
- Alazab, Ammar, Abawajy, Jemal, Hobbs, Michael, Layton, Robert, Khraisat, Ansam
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
- Khraisat, Ansam, Gondal, Iqbal, Vamplew, Peter, Kamruzzaman, Joarder, Alazab, Ammar
Information security: Definitions, threats and management in Dubai hospitals context
- Bakkar, Mahmoud, Alazab, Ammar
Energy efficient and delay aware 5g multi-tier network
- Islam, Nahina, Alazab, Ammar, Agbinya, Johnson
Trends in Crime Toolkit Development
- Khraisat, Ansam, Alazab, Ammar, Hobbs, Michael, Abawajy, Jemal, Azab, Ahmad
Are you sure you would like to clear your session, including search history and login status?