Evolving fuzzy neural network for phishing emails detection A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ... Journal of Computer Science 8 (7), 1099, 2012 | 58 | 2012 |
Bank web sites phishing detection and notification system based on semantic web technologies F Alkhateeb, AM Manasrah, AAR Bsoul International Journal of Security and its Applications 6 (4), 53-66, 2012 | 54 | 2012 |
Tight bounds for the identical parallel machine scheduling problem M Haouari, A Gharbi, M Jemmali International Transactions in Operational Research 13 (6), 529-548, 2006 | 53 | 2006 |
Active e-mail system SMTP protocol monitoring algorithm R Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj 2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009 | 35 | 2009 |
An online model on evolving phishing e-mail detection and classification method AA Deeb Al-Mo, TC Wan, K Al-Saedi, A Altaher, S Ramadass, ... Journal of Applied Sciences 11 (18), 3301-3307, 2011 | 33 | 2011 |
Tight bounds for the identical parallel machine‐scheduling problem: Part II M Haouari, M Jemmali International Transactions in Operational Research 15 (1), 19-34, 2008 | 30 | 2008 |
Personal learning environment M Alharbi, A Platt, AH Al-Bayatti International Journal for e-Learning Security (IJeLS), 2013 | 27 | 2013 |
Intelligent decision-making algorithm for supplier evaluation based on multi-criteria preferences M Jemmali, M Alharbi, LKB Melhim 2018 1st international conference on computer applications & information …, 2018 | 23 | 2018 |
Intelligent real-time intervention system applied in smart city LKB Melhim, M Jemmali, M Alharbi 2018 21st Saudi computer society national computer conference (NCC), 1-5, 2018 | 21 | 2018 |
Maximizing the minimum completion time on parallel machines M Haouari, M Jemmali 4OR 6, 375-392, 2008 | 21 | 2008 |
Randomized-variants lower bounds for gas turbines aircraft engines M Jemmali, LKB Melhim, M Alharbi World congress on global optimization, 949-956, 2019 | 19 | 2019 |
A survey of learning based techniques of phishing email filtering A ALmomani, TC Wan, A Manasrah, A Altaher, E Almomani, K Al-Saedi, ... International Journal of Digital Content Technology and its Applications 6 …, 2012 | 19 | 2012 |
A review of peer-to-peer botnet detection techniques MJ Elhalabi, S Manickam, LB Melhim, M Anbar, H Alhalabi Journal of Computer Science 10 (1), 169, 2014 | 17 | 2014 |
Comparative Evaluation and Analysis of IAX and RSW MS Kolhar, MM Abu-Alhaj, O Abouabdalla, TC Wan, AM Manasrah arXiv preprint arXiv:1001.2280, 2010 | 16 | 2010 |
Context-aware personal learning environment MT Alharbi, A Platt, AH Al-Bayatti 2012 International Conference for Internet Technology and Secured …, 2012 | 13 | 2012 |
Network monitoring enhancement based on mathematical modeling LKB Melhim, M Jemmali, M Alharbi 2019 2nd international conference on computer applications & information …, 2019 | 9 | 2019 |
Bounding strategies for scheduling on identical parallel machines M Haouari, A Gharbi, M Jemmali 2006 international conference on service systems and service management 2 …, 2006 | 9 | 2006 |
Tighter lower bounds via dual feasible functions M Haouari, L Hidri, M Jemmali PMS 2008, 112, 2008 | 5 | 2008 |
Multi-criteria intelligent algorithm for supply chain management M Jemmali, LKB Melhim, M Alharbi International Journal of Advanced Computer Science and Applications 10 (4), 2019 | 4 | 2019 |
Context-aware personal learning environment M Alharbi De Montfort University, 2014 | 4 | 2014 |