متابعة
لؤي ملحم
لؤي ملحم
Loai Bani Melhim
بريد إلكتروني تم التحقق منه على mu.edu.sa
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Evolving fuzzy neural network for phishing emails detection
A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ...
Journal of Computer Science 8 (7), 1099, 2012
592012
Bank web sites phishing detection and notification system based on semantic web technologies
F Alkhateeb, AM Manasrah, AAR Bsoul
International Journal of Security and its Applications 6 (4), 53-66, 2012
542012
Tight bounds for the identical parallel machine scheduling problem
M Haouari, A Gharbi, M Jemmali
International Transactions in Operational Research 13 (6), 529-548, 2006
532006
Active e-mail system SMTP protocol monitoring algorithm
R Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
352009
An online model on evolving phishing e-mail detection and classification method
AA Deeb Al-Mo, TC Wan, K Al-Saedi, A Altaher, S Ramadass, ...
Journal of Applied Sciences 11 (18), 3301-3307, 2011
332011
Tight bounds for the identical parallel machine‐scheduling problem: Part II
M Haouari, M Jemmali
International Transactions in Operational Research 15 (1), 19-34, 2008
302008
Personal learning environment
M Alharbi, A Platt, AH Al-Bayatti
International Journal for e-Learning Security (IJeLS), 2013
272013
Intelligent decision-making algorithm for supplier evaluation based on multi-criteria preferences
M Jemmali, M Alharbi, LKB Melhim
2018 1st international conference on computer applications & information …, 2018
232018
Intelligent real-time intervention system applied in smart city
LKB Melhim, M Jemmali, M Alharbi
2018 21st Saudi computer society national computer conference (NCC), 1-5, 2018
212018
Maximizing the minimum completion time on parallel machines
M Haouari, M Jemmali
4OR 6, 375-392, 2008
212008
Randomized-variants lower bounds for gas turbines aircraft engines
M Jemmali, LKB Melhim, M Alharbi
World congress on global optimization, 949-956, 2019
192019
A survey of learning based techniques of phishing email filtering
A ALmomani, TC Wan, A Manasrah, A Altaher, E Almomani, K Al-Saedi, ...
International Journal of Digital Content Technology and its Applications 6 …, 2012
192012
A review of peer-to-peer botnet detection techniques
MJ Elhalabi, S Manickam, LB Melhim, M Anbar, H Alhalabi
Journal of Computer Science 10 (1), 169, 2014
172014
Comparative Evaluation and Analysis of IAX and RSW
MS Kolhar, MM Abu-Alhaj, O Abouabdalla, TC Wan, AM Manasrah
arXiv preprint arXiv:1001.2280, 2010
162010
Context-aware personal learning environment
MT Alharbi, A Platt, AH Al-Bayatti
2012 International Conference for Internet Technology and Secured …, 2012
132012
Network monitoring enhancement based on mathematical modeling
LKB Melhim, M Jemmali, M Alharbi
2019 2nd international conference on computer applications & information …, 2019
92019
Bounding strategies for scheduling on identical parallel machines
M Haouari, A Gharbi, M Jemmali
2006 international conference on service systems and service management 2 …, 2006
92006
Tighter lower bounds via dual feasible functions
M Haouari, L Hidri, M Jemmali
PMS 2008, 112, 2008
52008
Multi-criteria intelligent algorithm for supply chain management
M Jemmali, LKB Melhim, M Alharbi
International Journal of Advanced Computer Science and Applications 10 (4), 2019
42019
Context-aware personal learning environment
M Alharbi
De Montfort University, 2014
42014
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20