Mamoun A. Awad

Orcid: 0000-0001-7424-4129

According to our database1, Mamoun A. Awad authored at least 21 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Artificial intelligence-based fault prediction framework for WBAN.
J. King Saud Univ. Comput. Inf. Sci., 2022

2020
Augmented Textual Features-Based Stock Market Prediction.
IEEE Access, 2020

Citizen Engagement in Smart Government: Content Analysis of Mohammed Bin Rashid Tweets.
Proceedings of the 14th International Conference on Innovations in Information Technology, 2020

2019
Disruptive IoT-Based Healthcare Insurance Business Model.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

2018
Managing IoT-Based Smart Healthcare Systems Traffic with Software Defined Networks.
Proceedings of the 2018 International Symposium on Networks, Computers and Communications, 2018

Migrating from SQL to NOSQL Database: Practices and Analysis.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

2017
GPMS: An educational supportive graduation project management system.
Comput. Appl. Eng. Educ., 2017

2015
New 2-Tier Multiclass Prediction Framework.
Proceedings of the 15th International Conference on Computational Science and Its Applications, 2015

Predicting Stock Market Movement: An Evolutionary Approach.
Proceedings of the KDIR 2015, 2015

2013
Ant colony based approach to predict stock market movement from mood collected on Twitter.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Prediction of User's Web-Browsing Behavior: Application of Markov Model.
IEEE Trans. Syst. Man Cybern. Part B, 2012

MSN: mutual secure neighbor verification in multi-hop wireless networks.
Secur. Commun. Networks, 2012

CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks.
Comput. Networks, 2012

2010
Policy Enforcement System for Inter-Organizational Data Sharing.
Int. J. Inf. Secur. Priv., 2010

Analysis of firewall policy rules using traffic mining techniques.
Int. J. Internet Protoc. Technol., 2010

2009
SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Non-cooperative uplink power control game for CDMA wireless communications systems.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2008
Predicting WWW surfing using multiple evidence combination.
VLDB J., 2008

2007
A new intrusion detection system using support vector machines and hierarchical clustering.
VLDB J., 2007

2005
Image annotations by combining multiple evidence & wordNet.
Proceedings of the 13th ACM International Conference on Multimedia, 2005

2004
An Effective Support Vector Machines (SVMs) Performance Using Hierarchical Clustering.
Proceedings of the 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 2004


  Loading...