BankWeb Sites Phishing Detection and Notification System Based on Semantic Web technologies | Faisal Alkhateeb, Ahmed M. Manasrah and Abed Al Raoof Bsoul | International Journal of Security and Its Applications (IJSIA) | 6 | SERSC | 2012 |
Connecting Mobile Users Through Mobile Social Networks | Faisal Alkhateeb, Ahmed M. Manasrah, Iyad Abu Doush, Eslam Al Maghayre | International Journal of Interactive Mobile Technologies | 6 (4): 4-12 | International Association of Online Engineering | 2012 |
Baduw: Behavioural Based Approach for Detecting Udp Worm | ANBAR, M., ABDULLAH, R., MANASRAH, A., MUNTHER, A. & MANICKAM, S.( | Indian Journal of Science and Technology. | 8(35,) pp. 1-11 | | 2015 |
A Survey of Botnet Detection Based on Dns | ALIEYAN, K., ALMOMANI, A., MANASRAH, A. & KADHUM, M. M. | Neural Computing and Applications | 1-18 | Springer | 2015 |
Investigating Study on Network Scanning Techniques | ANBAR, M., MANASRAH, A., RAMADASS, S., ALTAHER, A., ALJMMAL, A. & ALMOMANI, A. | International Journal of Digital Content Technology and its Applications | 7 (9),pp. 312-320. | | 2013 |
An Enhanced Online Phishing E-Mail Detection Framework Based on Evolving Connectionist System | ALMOMANI, A., WAN, T.-C., MANASRAH, A., ALTAHER, A., BAKLIZI, M. & RAMADASS, S. | International Journal of Innovative Computing, Information and Control (IJICIC) | 9 (3),pp. 169-175 | | 2013 |
Statistical Cross-Relation Approach for Detecting TCP and UDP Random and Sequential Network Scanning | ANBAR, M., MANASRAH, A. & MANICKAM, S. | International Journal of Computer Mathematics. | 89 (15),pp. 1952-1969 | Taylor | 2012 |
A Privacy-Preserving Multi-Keyword Search Approach in Cloud Computing | Ahmed M. Manasrah, Mahmoud Abu Nasir , Maher Salem | Soft Computing | 10.1007/s00500-019-04033-z | ---- | 28-4-2019 |
Key Pre-Distribution Approach Using Block LU- Decomposition In Wireless Sensor Network | Ahmed M. Manasrah, Areej R. AL-Rabadi, Najib A. Kofahi | International Journal of Information Security | 0 | Springer | 26/10/2019 |
The hour glass method for encryption and compressing any encrypted text into a single character, using the fundamentals of power arithmetic function to reduce space complexity | ---- | ---- | 12 | ---- | 2021-10-01 00:00:00 |
DGA-based botnets detection using DNS traffic mining | Manasrah, Ahmed M and Khdour, Thair and Freehat, Raeda | Journal of King Saud University-Computer and Information Sciences | 34 | Elsevier | 2022 |
A Novel Approach by Using a New Algorithm: Wolf Algorithm as a New Technique in Cryptography. | Al-Din, Basim Najim and Manasrah, Ahmad M and Noaman, Salam Abdulkhaleq | Webology | 17 | ---- | 2020 |
An Investigation Study of Privacy Preserving in Cloud Computing | Manasrah, Ahmed M and Shannaq, MA and Nasir, MA | Handbook of Computer Networks and Cyber Security: Principles and Paradigms | ---- | Springer Nature | 2019 |
Botnet detection based on DNS traffic similarity | Manasrah, Ahmad M and Domi, Walaa Bani and Suppiah, Nur Nadiyah | International Journal of Advanced Intelligence Paradigms | 15 | Inderscience Publishers (IEL) | 2020 |