Personal information

Activities

Works (5)

On Phishing: Proposing a Traffic Behavior-Based Model to Detect, Prevent, and Classify Webpage Suspicious and Malicious Activities

2023 IEEE 2nd International Conference on AI in Cybersecurity, ICAIC 2023
2023 | Conference paper
EID:

2-s2.0-85149426915

Contributors: Fadheel, W.; Carr, S.; Al-Mawee, W.
Source: Self-asserted source
Wassnaa Al-Mawee via Scopus - Elsevier

On Phishing: URL Lexical and Network Traffic Features Analysis and Knowledge Extraction using Machine Learning Algorithms (A Comparison Study)

2022 5th International Conference on Data Science and Information Technology, DSIT 2022 - Proceedings
2022 | Conference paper
EID:

2-s2.0-85143167122

Contributors: Fadheel, W.; Al-Mawee, W.; Carr, S.
Source: Self-asserted source
Wassnaa Al-Mawee via Scopus - Elsevier

Admonita: A recommendation-based trust model for dynamic data integrity

ICISSP 2021 - Proceedings of the 7th International Conference on Information Systems Security and Privacy
2021 | Conference paper
EID:

2-s2.0-85103050030

Contributors: Al-Mawee, W.; Carr, S.; Mayo, J.
Source: Self-asserted source
Wassnaa Al-Mawee via Scopus - Elsevier

Student's perspective on distance learning during COVID-19 pandemic: A case study of Western Michigan University, United States

International Journal of Educational Research Open
2021 | Journal article
EID:

2-s2.0-85125034604

Part of ISSN: 26663740
Contributors: Al-Mawee, W.; Kwayu, K.M.; Gharaibeh, T.
Source: Self-asserted source
Wassnaa Al-Mawee via Scopus - Elsevier

Maia: A language for mandatory integrity controls of structured data

ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy
2019 | Conference paper
EID:

2-s2.0-85064639673

Contributors: Al-Mawee, W.; Bonamy, P.J.; Carr, S.; Mayo, J.
Source: Self-asserted source
Wassnaa Al-Mawee via Scopus - Elsevier