Dissertation

     Effective Data Mining For Intrusion Detection and WWW Prediction Applications.

 

Publications

 

Refereed Journal Publications

 

  1. Aishah Almusalami, Fatema Alnaqbi, Shamma Alkaabi, Roqayyah Alzeyoudi, and Mamoun Awad, Sustainability Awareness in the UAE: A Case Study, Sustainability 2024, 16(4), 1621

  2. Noor Alkhateeb, Farag Sallabi, Saad Harous and Mamoun Awad, A Study on Predicting the Outbreak of COVID-19 in the United Arab Emirates: A Monte Carlo Simulation Approach, Mathematics 2022, 10(23), 4434

  3. Al-Thawadi M.; Sallabi F.; Awad M.; Shuaib K.; Naqvi M.R.; Ben Elhadj, H. A-SHIP: Ontology-Based Adaptive Sustainable Healthcare Insurance Policy. Sustainability 2022, 14, 1917. https://doi.org/10.3390/su14031917

  4. M. Awad, F. Sallabi, K. Shuaib, and F. Naeem, Artificial Intelligence-Based Fault Prediction Framework for WBAN, Journal of King Saud University, 2021

  5. S. Ouhbi and M. Awad, The Impact of Combining Storytelling with Lecture on Female Students in Software Engineering Education, IEEE EDUCON 21, Australia, April 2021.

  6. A. Sawafi and M. Awad, Citizen Engagement in Smart Government: Content Analysis of Mohammed Bin Rashid Tweets, 14th International Conference on Innovations in Information Technology, Al Ain, 2020.

  7. S. Bouktif, A. Fiaz, and M. Awad, “Augmented Textual Features-Based Stock Market Prediction”, IEEE Access, Vol 8, pp. 40269 – 40282, Feb 2020.

  8. S. Bouktif, A. Fiaz, and M. Awad, Stock Market Movement Prediction using Disparate Text Features with Machine Learning, The 3rd International Conference on Intelligent Computing in Data Sciences ICDS2019, Morocco, 2019.

  9. F. Sallabi, M. Awad, K. Shuaib and M. Al Thawadi, Disruptive IoT-Based Healthcare Insurance Business Model, The 17th IEEE International Conference on Embedded and Ubiquitous Computing (IEEE EUC) 2019.

  10. Mamoun Awad, “GPMS: An Educational Supportive Graduation Project Management System”, Computer Applications in Engineering Education , 2017, 9999: 114 (IF:0.694)

  11. I. Khalil, M. Awad, and A. Khreishah, “CTAC: Control traffic tunneling attacks countermeasures in mobile wireless networks”, Computer Networks: The International Journal of Computer and Telecommunications Networking , Vol. 56, No. 15, pp. 3300-3317, October 2012 (Class A) (IF:1.49)

  12. M. Awad and I. Khalil, “Prediction of User’s Web-Browsing Behavior: Application of Markov Models”, IEEE Transaction on Systems, Man, and Cybernetics Part B, Vol. 42, pp. 1131-1142, August 2012. ( IF 2.65 ), (Class A, CORE Feb 2010)

  13. I. Khalil, M. Awad, S. Bouktif, and F. Awwad, “MSN: Mutual Secure Neighbor Verification in Multi-hop Wireless Networks”, Security and Communication Networks Journal, Vol. 5(2), pp. 186-196, Feb, 2011 (IF 0.356)

  14. M. Awad, L. Khan, and B. Thuraisingham, Policy Enforcement System for Inter-Organizational Data Sharing. International Journal of Information Security and Privacy (IJISP), Vol. 4 (3): 22-39 (2010). ( IF 0.1 ) (Rank C, CORE Feb 2010).

  15. M. Abedin, S. Nessa, L. Khan, E. Al-Shaer, and M. Awad, “Analysis of Firewall Policy Rules Using Traffic Mining Techniques”, International Journal of Internet Protocol Technology, Special Issue on: Recent Advances in Network Security Attacks and Defenses, Inderscience Publisher, V. 5, No. 1-2, April 2010, pp. 3-22(20). ( IF 0.29 ) (Rank C, CORE Feb 2010)

  16. M. Awad and Latifur Khan, "Web Navigation Prediction Using Multiple Evidence Combination and Domain Knowledge". IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, Vol. 37(6),  2007, pp. 1054 - 1062. ( IF 1.84 ) (Rank B, CORE Feb 2010) (citations: 8)

  17. M. Awad, L. Khan, and B. Thuraisingham, "Predicting WWW Surfing Using Multiple Evidence Combination", VLDB Journal, Vol. 17(3), Dec., 2005, pp. 401 - 417.( IF 3.29 ) (Rank A*, CORE Feb 2010) (citations: 12)

  18. L. Khan, M. Awad, and B. Thuraisingham, "A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering", VLDB Journal , Vol. 16(4), pp. 507 – 521, 2005. ( IF 3.29 )  (Rank A*, CORE Feb 2010) (citations: 65)

     

Refereed Conference Publications

 

  1. Mamoun Awad "New 2-Tier Multiclass Prediction Framework." In the 15th International Conference on Computational Science and Its Applications (ICCSA), 2015. pp.77-81.
  2. S. Bouktif and Mamoun Awad "Ant colony based approach to predict stock market movement from mood collected on Twitter." ASONAM '13 Proceedings of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 837-845 .
  3. Non-Cooperative Uplink Power Control Game for CDME Wireless Communications Systems" Mohammad Hayajneh, Issa Khalil, and Mamoun Awad, IEEE Symposium on Computers and Communications (ISCC'09), Soussa,Tounisia, 2009.
  4. "SVNM: Secure Verification of Neighborhood Membership in Static Multi-hop wireless networks" Issa Khalil, Mohammad Hayajneh, and Mamoun Awad, IEEE Symposium on Computers and Communications (ISCC'09), Soussa,Tounisia, 2009.
  5. "A Framework for Image Classification" Mamoun Awad, Yohan Jin, Latiur Khan, George Chen, and Fehmi Chebil In Proc. of IEEE 2006 Southwest Symposium on Image Analysis and Interpretation, March 2006 (2006), Page 134-138, Denver, Colorado, USA.
  6. "Image Annotations By Combining Multiple Evidence & WordNet" Yohan Chin, Latifur Khan, Lei Wang, and Mamoun Awad In Proc. of 13th Annual ACM International Conference on Multimedia (MM 2005), Singapore, November 2005 (2005), Page 706-715. [PDF]
  7. "An Effective Support Vector Machines (SVM) Performance using Hierarchical Clustering" Mamoun Awad, Latifur Khan, Farokh Bastani, and I-Ling Yen In Proc. of the 16th IEEE International Conference on Tools with Artificial Intelligence, Boca Raton, Florida, November 2004 (2004), Page 663-667. [PDF]
  8. "Effective Intrusion Detection Using Support Vector Machines" Latifur Khan, Mamoun Awad, and Qing Chen In Proc. of 2004 South Central Information Security Symposium (SCISS), Rice University, Houston, Texas, April 2004 (2004), Page 8.
  9. "Hybrid DNA Sequence Similarity Scheme for Training Support Vector Machines" Mamoun Awad and Latifur Khan In Proc. of the International Conference on Computer and Information Technology, Dhaka, Bangladesh, December 2003 (2003), Page 247-251. [PDF]

Books

  1. Design and Implementation of Data Mining Tools Mamoun Awad, Latifur Khan, Bhavani Thuraisingham and Lei Wang (Hardcover - April 20, 2009), 272 page, Auerbach Publications; June 18, 2009, CRC Press.

 

Book Chapters

 

  1. "Classification Problems using Support Vector Machine in Data Mining" Latifur Khan, and Mamoun Awad In Encyclopedia of Data Warehousing and Mining, Editor John Wang, Information Science Publishing, ISBN 1-59140-557-2, (April 2005).
     

  2. "Bayesian Networks" Ahmed Bashir, Latifur Khan, and Mamoun Awad In Encyclopedia of Data Warehousing and Mining, Editor John Wang Information Science Publishing, ISBN 1-59140-557-2, (April 2005).
     

Technical Reports

  1. Detecting New Malicious Executables Using Data Mining, UTDCS-27-06, July 2006 (With M. Masud, L. Khan, B. Thuraisingham)

  2. Design and Implementation of Policy Enforcement, Data Sharing, and Mining Components for Trustworthy Coalition, UTDCS-44-06, October 2006 ( with D. Cavus, L. Khan, M. Reddy, and B. Thuraisingham)

  3. Information Operation Across Inforspheres: Volume 1, UTDCS-48-06, October 2006 (with L. Khan, B. Thuraisingham, M. Kantarcioglu, D. Calvus, R. Layfield, M. Masud, and S. Iyer)