Awadallah, N. and S.G. Saad, 2018. E-Procurement as a new trend in hospitality industry: A descriptive study in Egyptian otels. Astra Salvensis, 6: 321-332.
Awadallah, N., 2016. Usage of cloud computing in banking system. Int. J. Comput. Sci. Issues, 13: 49-52. Direct Link |
Awadallah, N., 2015. Security threats of cloud computing. Int. J. Recent Innov. Trends Comput. Commun., 3: 2393-2397. Direct Link |
Riad, A.M., I. Elhenawy, A. Hassan and N. Awadallah, 2013. Visualize network anomaly detection by using k-means clustering algorithm. Int. J. Comput. Networks Commun., 5: 195-208. Direct Link |
Riad, A.E.D., I. Elhenawy, A. Hassan and N. Awadallah, 2012. Using jquery with snort to visualize intrusion. Int. J. Comput. Sci. Issues, 9: 486-491. Direct Link |
Riad, A.E.D., I. Elhenawy, A. Hassan and N. Awadallah, 2011. Data visualization technique framework for intrusion detection. Int. J. Comput. Sci. Issues, 8: 440-443. Direct Link |
Elhenawy, I., A.E.D. Riad, A. Hassan and N. Awadallah, 2011. Visualization techniques for intrusion detection-a survey. Int. J. Comput. Sci. Eng. Sur., 2: 107-119. Direct Link |