Skip navigation
Skip navigation

Browsing by Author Alazab, Mamoun

Or enter first few letters:  
Showing results 14 to 28 of 28
01_Alhyar_Performance_Evaluation_of_2013.pdf.jpg

Performance Evaluation of E-Government Services Using Balanced Scorecard - An Empirical Study in Jordan

Author(s)Alhyar, Salah; Alazab, Moutaz; Venkatraman, Sitalakshmi, et al
TypeJournal article
Date Published2013
Date Created-

Profiling and classifying the behavior of malicious codes

Author(s)Alazab, Mamoun
TypeJournal article
Date Published2014
Date Created-

Quality Approaches for Performance Measurement in Jordanian E-Government Services

Author(s)Venkatraman, Sitalakshmi; Alazab, Mamoun
TypeBook chapter
Date Published2014
Date Created-

Six sigma approach to improve quality in e-services: An empirical study in Jordan

Author(s)Alhyari, Salah; Alazab, Moutaz; Venkatraman, Sitalakshmi, et al
TypeJournal article
Date Published2012
Date Created-

Skype Traffic Classification Using Cost Sensitive Algorithms

Author(s)Azab, Ahmad; Layton, Robert; Alazab, Mamoun, et al
TypeConference paper
Date Published2013
Date CreatedNovember 2013

Smartphone Malware based on synchronization Vulnerabilities

Author(s)Alazab, Mamoun; Alazab, Ammar; Batten, L.
TypeConference paper
Date Published2011
Date CreatedNovember 21-24 2011

Spam and crime

Author(s)Broadhurst, Roderic; Alazab, Mamoun
TypeBook chapter
Date Published2017
Date Created-

Stochastic model based approach for biometric identification

Author(s)Islam, Mofakharul; Venkataraman, Sitalakshimi; Alazab, Mamoun
TypeConference paper
Date Published2010
Date CreatedDecember 4-12 2009

Towards an understanding of the impact of advertising on data leaks

Author(s)Moonsamy, V.; Alazab, Mamoun; Batten, L.
TypeJournal article
Date Published2012
Date Created-

Towards automatic image segmentation using optimised region growing technique

Author(s)Alazab, Mamoun; Islam, Mofakharul; Venkatraman, Sitalakshmi
TypeConference paper
Date Published2009
Date CreatedDecember 1 2009

Towards understanding malware behaviour by the extraction of API calls

Author(s)Alazab, Mamoun; Venkataraman, Sitalakshimi; Watters, Paul
TypeConference paper
Date Published2010
Date CreatedJuly 19-20 2010

Using feature selection for intrusion detection system

Author(s)Alazab, Ammar; Hobbs, Michael; Abawajy, Jemal, et al
TypeConference paper
Date Published2012
Date CreatedOctober 2-5 2012
01_Alazab_Using_Response_Action_with_2014.pdf.jpg

Using Response Action with Intelligent Intrusion Detection and Prevention System against Web Application Malware

Author(s)Alazab, Ammar; Hobbs, Michael; Abawajy, Jemal, et al
TypeJournal article
Date Published2014
Date Created-

Web application protection against SQL injection attack

Author(s)Alazab, Ammar; Alazab, Mamoun; Abawajy, Jemal, et al
TypeConference paper
Date Published2011
Date CreatedNovember 21-24 2011

Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures

Author(s)Alazab, Mamoun; Venkatraman, Sitalakshmi; Watters, Paul, et al
TypeConference paper
Date Published2011
Date Created2011

Updated:  12 April 2016/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator