Mamoun Awad
Mamoun Awad
Professor of Computer Science, UAE University
Verified email at - Homepage
Cited by
Cited by
A new intrusion detection system using support vector machines and hierarchical clustering
L Khan, M Awad, B Thuraisingham
The VLDB journal 16, 507-521, 2007
Image annotations by combining multiple evidence & wordnet
Y Jin, L Khan, L Wang, M Awad
Proceedings of the 13th annual ACM international conference on Multimedia …, 2005
Prediction of user's web-browsing behavior: Application of markov model
MA Awad, I Khalil
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42 …, 2012
An effective support vector machines (SVMs) performance using hierarchical clustering
M Awad, L Khan, F Bastani, IL Yen
16th IEEE international conference on tools with artificial intelligence …, 2004
Web navigation prediction using multiple evidence combination and domain knowledge
MA Awad, LR Khan
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2007
Augmented textual features-based stock market prediction
S Bouktif, A Fiaz, M Awad
IEEE Access 8, 40269-40282, 2020
Predicting WWW surfing using multiple evidence combination
M Awad, L Khan, B Thuraisingham
The VLDB Journal 17, 401-417, 2008
Design and implementation of data mining tools
B Thuraisingham, L Khan, M Awad, L Wang
CRC Press, 2009
Managing IoT-based smart healthcare systems traffic with software defined networks
F Sallabi, F Naeem, M Awad, K Shuaib
2018 international symposium on networks, computers and communications …, 2018
Analysis of firewall policy rules using traffic mining techniques
M Abedin, S Nessa, L Khan, E Al-Shaer, M Awad
International Journal of Internet Protocol Technology 5 (1-2), 3-22, 2010
Ant colony based approach to predict stock market movement from mood collected on Twitter
S Bouktif, MA Awad
Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013
Migrating from SQL to NOSQL Database: Practices and Analysis
F Yassine, MA Awad
2018 International Conference on Innovations in Information Technology (IIT …, 2018
CTAC: Control traffic tunneling attacks’ countermeasures in mobile wireless networks
I Khalil, M Awad, A Khreishah
Computer Networks 56 (14), 3300-3317, 2012
Stock market movement prediction using disparate text features with machine learning
S Bouktif, A Fiaz, M Awad
2019 Third International Conference on Intelligent Computing in Data …, 2019
Bayesian networks
A Bashir, L Khan, M Awad
Encyclopedia of Data Warehousing and Mining, 89-93, 2005
Applications and limitations of support vector machines
M Awad, L Khan
Encyclopedia of Data Warehousing and Mining. Idea group Inc, 2004
GPMS: An educational supportive graduation project management system
M Awad
Computer Applications in Engineering Education 25 (6), 881-894, 2017
A framework for image classification
M Awad, L Wang, Y Chin, L Khan, G Chen, F Chebil
2006 IEEE Southwest Symposium on Image Analysis and Interpretation, 134-138, 2006
Policy enforcement system for inter-organizational data sharing
M Awad, L Khan, B Thuraisingham
Optimizing Information Security and Advancing Privacy Assurance: New …, 2012
SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks
I Khalil, M Hayajneh, M Awad
2009 IEEE Symposium on Computers and Communications, 368-373, 2009
The system can't perform the operation now. Try again later.
Articles 1–20