Follow
لؤي ملحم
لؤي ملحم
Loai Bani Melhim
Verified email at mu.edu.sa
Title
Cited by
Cited by
Year
Evolving fuzzy neural network for phishing emails detection
A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ...
Journal of Computer Science 8 (7), 1099, 2012
582012
Bank web sites phishing detection and notification system based on semantic web technologies
F Alkhateeb, AM Manasrah, AAR Bsoul
International Journal of Security and its Applications 6 (4), 53-66, 2012
542012
Tight bounds for the identical parallel machine scheduling problem
M Haouari, A Gharbi, M Jemmali
International Transactions in Operational Research 13 (6), 529-548, 2006
532006
Active e-mail system SMTP protocol monitoring algorithm
R Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj
2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009
352009
An online model on evolving phishing e-mail detection and classification method
AA Deeb Al-Mo, TC Wan, K Al-Saedi, A Altaher, S Ramadass, ...
Journal of Applied Sciences 11 (18), 3301-3307, 2011
332011
Tight bounds for the identical parallel machine‐scheduling problem: Part II
M Haouari, M Jemmali
International Transactions in Operational Research 15 (1), 19-34, 2008
302008
Personal learning environment
M Alharbi, A Platt, AH Al-Bayatti
International Journal for e-Learning Security (IJeLS), 2013
272013
Intelligent decision-making algorithm for supplier evaluation based on multi-criteria preferences
M Jemmali, M Alharbi, LKB Melhim
2018 1st international conference on computer applications & information …, 2018
232018
Intelligent real-time intervention system applied in smart city
LKB Melhim, M Jemmali, M Alharbi
2018 21st Saudi computer society national computer conference (NCC), 1-5, 2018
212018
Maximizing the minimum completion time on parallel machines
M Haouari, M Jemmali
4OR 6, 375-392, 2008
212008
Randomized-variants lower bounds for gas turbines aircraft engines
M Jemmali, LKB Melhim, M Alharbi
World congress on global optimization, 949-956, 2019
192019
A survey of learning based techniques of phishing email filtering
A ALmomani, TC Wan, A Manasrah, A Altaher, E Almomani, K Al-Saedi, ...
International Journal of Digital Content Technology and its Applications 6 …, 2012
192012
A review of peer-to-peer botnet detection techniques
MJ Elhalabi, S Manickam, LB Melhim, M Anbar, H Alhalabi
Journal of Computer Science 10 (1), 169, 2014
172014
Comparative Evaluation and Analysis of IAX and RSW
MS Kolhar, MM Abu-Alhaj, O Abouabdalla, TC Wan, AM Manasrah
arXiv preprint arXiv:1001.2280, 2010
162010
Context-aware personal learning environment
MT Alharbi, A Platt, AH Al-Bayatti
2012 International Conference for Internet Technology and Secured …, 2012
132012
Network monitoring enhancement based on mathematical modeling
LKB Melhim, M Jemmali, M Alharbi
2019 2nd international conference on computer applications & information …, 2019
92019
Bounding strategies for scheduling on identical parallel machines
M Haouari, A Gharbi, M Jemmali
2006 international conference on service systems and service management 2 …, 2006
92006
Tighter lower bounds via dual feasible functions
M Haouari, L Hidri, M Jemmali
PMS 2008, 112, 2008
52008
Multi-criteria intelligent algorithm for supply chain management
M Jemmali, LKB Melhim, M Alharbi
International Journal of Advanced Computer Science and Applications 10 (4), 2019
42019
Context-aware personal learning environment
M Alharbi
De Montfort University, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20