Mamoun Awad
Mamoun Awad
Professor of Computer Science, UAE University
Verified email at - Homepage
Cited by
Cited by
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16 (4), 507-521, 2007
Image annotations by combining multiple evidence & wordnet
Y Jin, L Khan, L Wang, M Awad
Proceedings of the 13th annual ACM international conference on Multimedia …, 2005
Prediction of user's web-browsing behavior: Application of markov model
MA Awad, I Khalil
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42 …, 2012
Web navigation prediction using multiple evidence combination and domain knowledge
MA Awad, LR Khan
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2007
An effective support vector machines (SVMs) performance using hierarchical clustering
M Awad, L Khan, F Bastani, IL Yen
16th IEEE international conference on tools with artificial intelligence …, 2004
Predicting WWW surfing using multiple evidence combination
M Awad, L Khan, B Thuraisingham
The VLDB Journal 17 (3), 401-417, 2008
Design and implementation of data mining tools
B Thuraisingham, L Khan, M Awad, L Wang
Auerbach Publications, 2009
Analysis of firewall policy rules using traffic mining techniques
M Abedin, S Nessa, L Khan, E Al-Shaer, M Awad
International Journal of Internet Protocol Technology 5 (1-2), 3-22, 2010
Ant colony based approach to predict stock market movement from mood collected on Twitter
S Bouktif, MA Awad
Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013
Managing IoT-based smart healthcare systems traffic with software defined networks
F Sallabi, F Naeem, M Awad, K Shuaib
2018 international symposium on networks, computers and communications …, 2018
Augmented textual features-based stock market prediction
S Bouktif, A Fiaz, M Awad
IEEE Access 8, 40269-40282, 2020
CTAC: Control traffic tunneling attacks’ countermeasures in mobile wireless networks
I Khalil, M Awad, A Khreishah
Computer Networks 56 (14), 3300-3317, 2012
Bayesian networks
A Bashir, L Khan, M Awad
Encyclopedia of Data Warehousing and Mining, 89-93, 2005
Applications and limitations of support vector machines
M Awad, L Khan
Encyclopedia of Data Warehousing and Mining. Idea group Inc, 2004
SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks
I Khalil, M Hayajneh, M Awad
2009 IEEE Symposium on Computers and Communications, 368-373, 2009
A framework for image classification
M Awad, L Wang, Y Chin, L Khan, G Chen, F Chebil
2006 IEEE Southwest Symposium on Image Analysis and Interpretation, 134-138, 2006
Migrating from SQL to NOSQL Database: Practices and Analysis
F Yassine, MA Awad
2018 International Conference on Innovations in Information Technology (IIT …, 2018
GPMS: An educational supportive graduation project management system
M Awad
Computer Applications in Engineering Education 25 (6), 881-894, 2017
Policy enforcement system for inter-organizational data sharing
M Awad, L Khan, B Thuraisingham
Optimizing Information Security and Advancing Privacy Assurance: New …, 2012
Non-cooperative uplink power control game for CDMA wireless communications systems
M Hayajneh, I Khalil, M Awad
2009 IEEE Symposium on Computers and Communications, 587-592, 2009
The system can't perform the operation now. Try again later.
Articles 1–20