Journal
Research TitleAuthorsJournalVolume & Page NumbersPublisherYear
BankWeb Sites Phishing Detection and Notification System Based on Semantic Web technologiesFaisal Alkhateeb, Ahmed M. Manasrah and Abed Al Raoof BsoulInternational Journal of Security and Its Applications (IJSIA)6SERSC2012
Connecting Mobile Users Through Mobile Social NetworksFaisal Alkhateeb, Ahmed M. Manasrah, Iyad Abu Doush, Eslam Al MaghayreInternational Journal of Interactive Mobile Technologies6 (4): 4-12International Association of Online Engineering2012
Baduw: Behavioural Based Approach for Detecting Udp WormANBAR, M., ABDULLAH, R., MANASRAH, A., MUNTHER, A. & MANICKAM, S.(Indian Journal of Science and Technology.8(35,) pp. 1-112015
A Survey of Botnet Detection Based on DnsALIEYAN, K., ALMOMANI, A., MANASRAH, A. & KADHUM, M. M.Neural Computing and Applications1-18Springer2015
Investigating Study on Network Scanning TechniquesANBAR, M., MANASRAH, A., RAMADASS, S., ALTAHER, A., ALJMMAL, A. & ALMOMANI, A.International Journal of Digital Content Technology and its Applications7 (9),pp. 312-320.2013
An Enhanced Online Phishing E-Mail Detection Framework Based on Evolving Connectionist SystemALMOMANI, A., WAN, T.-C., MANASRAH, A., ALTAHER, A., BAKLIZI, M. & RAMADASS, S.International Journal of Innovative Computing, Information and Control (IJICIC)9 (3),pp. 169-1752013
Statistical Cross-Relation Approach for Detecting TCP and UDP Random and Sequential Network ScanningANBAR, M., MANASRAH, A. & MANICKAM, S.International Journal of Computer Mathematics.89 (15),pp. 1952-1969Taylor 2012
A Privacy-Preserving Multi-Keyword Search Approach in Cloud ComputingAhmed M. Manasrah, Mahmoud Abu Nasir , Maher SalemSoft Computing10.1007/s00500-019-04033-z----28-4-2019
Key Pre-Distribution Approach Using Block LU- Decomposition In Wireless Sensor NetworkAhmed M. Manasrah, Areej R. AL-Rabadi, Najib A. KofahiInternational Journal of Information Security0Springer26/10/2019
The hour glass method for encryption and compressing any encrypted text into a single character, using the fundamentals of power arithmetic function to reduce space complexity--------12----2021-10-01 00:00:00
DGA-based botnets detection using DNS traffic miningManasrah, Ahmed M and Khdour, Thair and Freehat, RaedaJournal of King Saud University-Computer and Information Sciences34Elsevier2022
A Novel Approach by Using a New Algorithm: Wolf Algorithm as a New Technique in Cryptography.Al-Din, Basim Najim and Manasrah, Ahmad M and Noaman, Salam AbdulkhaleqWebology17----2020
An Investigation Study of Privacy Preserving in Cloud ComputingManasrah, Ahmed M and Shannaq, MA and Nasir, MAHandbook of Computer Networks and Cyber Security: Principles and Paradigms----Springer Nature2019
Botnet detection based on DNS traffic similarityManasrah, Ahmad M and Domi, Walaa Bani and Suppiah, Nur NadiyahInternational Journal of Advanced Intelligence Paradigms15Inderscience Publishers (IEL)2020
Identity-Based Authentication in VANETs: A ReviewManasrah, Ahmed and Yaseen, Qussai and Al-Aqrabi, Hussain and Liu, LuIEEE Transactions on Intelligent Transportation Systems----IEEE2025
Dynamic authentication for intelligent sensor clouds in the Internet of ThingsAl-Aqrabi, Hussain and Manasrah, Ahmed M and Hill, Richard and Shatnawi, Mohammed Q and Daoud, Mohammad Sh and Alkhzaimi, HodaInternational Journal of Information Security23Springer2024
Time Series Forecasting Model for the Stock Market using LSTM and SVR.Abuein, Qusai Q and Shatnawi, Mohammed Q and Aljawarneh, Emran Y and Manasrah, AhmedInternational Journal of Advances in Soft Computing \& Its Applications16----2024
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and AvoidanceYaseen, Qussai M and Aldwairi, Monther and Manasrah, AhmadComputers, Materials and Continua80Tech Science Press2024
Ensemble-based approach for efficient intrusion detection in network traffic.Almomani, Ammar and Akour, Iman and Manasrah, Ahmed M and Almomani, Omar and Alauthman, Mohammad and Abdullah, Esra' and Al Shwait, Amaal and Al Sharaa, RazanIntelligent Automation \& Soft Computing37Tech Science Press2023