Journal
Research TitleAuthorsJournalVolume & Page NumbersPublisherYear
BankWeb Sites Phishing Detection and Notification System Based on Semantic Web technologiesFaisal Alkhateeb, Ahmed M. Manasrah and Abed Al Raoof BsoulInternational Journal of Security and Its Applications (IJSIA)6SERSC2012
Connecting Mobile Users Through Mobile Social NetworksFaisal Alkhateeb, Ahmed M. Manasrah, Iyad Abu Doush, Eslam Al MaghayreInternational Journal of Interactive Mobile Technologies6 (4): 4-12International Association of Online Engineering2012
Baduw: Behavioural Based Approach for Detecting Udp WormANBAR, M., ABDULLAH, R., MANASRAH, A., MUNTHER, A. & MANICKAM, S.(Indian Journal of Science and Technology.8(35,) pp. 1-112015
A Survey of Botnet Detection Based on DnsALIEYAN, K., ALMOMANI, A., MANASRAH, A. & KADHUM, M. M.Neural Computing and Applications1-18Springer2015
Investigating Study on Network Scanning TechniquesANBAR, M., MANASRAH, A., RAMADASS, S., ALTAHER, A., ALJMMAL, A. & ALMOMANI, A.International Journal of Digital Content Technology and its Applications7 (9),pp. 312-320.2013
An Enhanced Online Phishing E-Mail Detection Framework Based on Evolving Connectionist SystemALMOMANI, A., WAN, T.-C., MANASRAH, A., ALTAHER, A., BAKLIZI, M. & RAMADASS, S.International Journal of Innovative Computing, Information and Control (IJICIC)9 (3),pp. 169-1752013
Statistical Cross-Relation Approach for Detecting TCP and UDP Random and Sequential Network ScanningANBAR, M., MANASRAH, A. & MANICKAM, S.International Journal of Computer Mathematics.89 (15),pp. 1952-1969Taylor 2012
A Privacy-Preserving Multi-Keyword Search Approach in Cloud ComputingAhmed M. Manasrah, Mahmoud Abu Nasir , Maher SalemSoft Computing10.1007/s00500-019-04033-z----28-4-2019
Key Pre-Distribution Approach Using Block LU- Decomposition In Wireless Sensor NetworkAhmed M. Manasrah, Areej R. AL-Rabadi, Najib A. KofahiInternational Journal of Information Security0Springer26/10/2019
The hour glass method for encryption and compressing any encrypted text into a single character, using the fundamentals of power arithmetic function to reduce space complexity--------12----2021-10-01 00:00:00
DGA-based botnets detection using DNS traffic miningManasrah, Ahmed M and Khdour, Thair and Freehat, RaedaJournal of King Saud University-Computer and Information Sciences34Elsevier2022
A Novel Approach by Using a New Algorithm: Wolf Algorithm as a New Technique in Cryptography.Al-Din, Basim Najim and Manasrah, Ahmad M and Noaman, Salam AbdulkhaleqWebology17----2020
An Investigation Study of Privacy Preserving in Cloud ComputingManasrah, Ahmed M and Shannaq, MA and Nasir, MAHandbook of Computer Networks and Cyber Security: Principles and Paradigms----Springer Nature2019
Botnet detection based on DNS traffic similarityManasrah, Ahmad M and Domi, Walaa Bani and Suppiah, Nur NadiyahInternational Journal of Advanced Intelligence Paradigms15Inderscience Publishers (IEL)2020