A new intrusion detection system using support vector machines and hierarchical clustering L Khan, M Awad, B Thuraisingham The VLDB journal 16, 507-521, 2007 | 544 | 2007 |
Image annotations by combining multiple evidence & wordnet Y Jin, L Khan, L Wang, M Awad Proceedings of the 13th annual ACM international conference on Multimedia …, 2005 | 354 | 2005 |
Prediction of user's web-browsing behavior: Application of markov model MA Awad, I Khalil IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42 …, 2012 | 147 | 2012 |
An effective support vector machines (SVMs) performance using hierarchical clustering M Awad, L Khan, F Bastani, IL Yen 16th IEEE international conference on tools with artificial intelligence …, 2004 | 80 | 2004 |
Web navigation prediction using multiple evidence combination and domain knowledge MA Awad, LR Khan IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2007 | 68 | 2007 |
Augmented textual features-based stock market prediction S Bouktif, A Fiaz, M Awad IEEE Access 8, 40269-40282, 2020 | 60 | 2020 |
Predicting WWW surfing using multiple evidence combination M Awad, L Khan, B Thuraisingham The VLDB Journal 17, 401-417, 2008 | 60 | 2008 |
Design and implementation of data mining tools B Thuraisingham, L Khan, M Awad, L Wang CRC Press, 2009 | 37 | 2009 |
Managing IoT-based smart healthcare systems traffic with software defined networks F Sallabi, F Naeem, M Awad, K Shuaib 2018 international symposium on networks, computers and communications …, 2018 | 34 | 2018 |
Analysis of firewall policy rules using traffic mining techniques M Abedin, S Nessa, L Khan, E Al-Shaer, M Awad International Journal of Internet Protocol Technology 5 (1-2), 3-22, 2010 | 27 | 2010 |
Ant colony based approach to predict stock market movement from mood collected on Twitter S Bouktif, MA Awad Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013 | 20 | 2013 |
Migrating from SQL to NOSQL Database: Practices and Analysis F Yassine, MA Awad 2018 International Conference on Innovations in Information Technology (IIT …, 2018 | 12 | 2018 |
CTAC: Control traffic tunneling attacks’ countermeasures in mobile wireless networks I Khalil, M Awad, A Khreishah Computer Networks 56 (14), 3300-3317, 2012 | 12 | 2012 |
Stock market movement prediction using disparate text features with machine learning S Bouktif, A Fiaz, M Awad 2019 Third International Conference on Intelligent Computing in Data …, 2019 | 9 | 2019 |
Bayesian networks A Bashir, L Khan, M Awad Encyclopedia of Data Warehousing and Mining, 89-93, 2005 | 9 | 2005 |
Applications and limitations of support vector machines M Awad, L Khan Encyclopedia of Data Warehousing and Mining. Idea group Inc, 2004 | 8 | 2004 |
GPMS: An educational supportive graduation project management system M Awad Computer Applications in Engineering Education 25 (6), 881-894, 2017 | 7 | 2017 |
A framework for image classification M Awad, L Wang, Y Chin, L Khan, G Chen, F Chebil 2006 IEEE Southwest Symposium on Image Analysis and Interpretation, 134-138, 2006 | 7 | 2006 |
Policy enforcement system for inter-organizational data sharing M Awad, L Khan, B Thuraisingham Optimizing Information Security and Advancing Privacy Assurance: New …, 2012 | 6 | 2012 |
SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks I Khalil, M Hayajneh, M Awad 2009 IEEE Symposium on Computers and Communications, 368-373, 2009 | 6 | 2009 |