Publications

Dr Ali Mansour

  • Moses Ashawa, Ali Mansour, Jackie Riley, Jude Osamor, Nsikak Pius Owoh. (2023) “Digital Forensics Challenges in Cyberspace: Overcoming Legitimacy and Privacy Issues Through Modularisation”. Cloud Computing and Data Science [Internet], vol. 5, no. 1 (2024), pp 140-156, 2023 Dec. 25 [cited 2024 Mar. 4], Available from: https://ojs.wiserpub.com/index.php/CCDS/article/view/3845
  • Safar, Ghazanfar A.; Mansour, Ali (2023) “Trust in BYOD Networks: Security and Trust Issues in BYOD Networks”, IT Professional Magazine, vol. 25, no. 4, pp. 45-51, July-Aug. 2023, doi: 10.1109/MITP.2023.3293714, IEEE Computer Society.
  • Garner, L.E. and Mansour, A. (2021) "Forensics Analysis of 3D-printer Objects", eForensics Magazine, pp39-44, Vol.10, No.08, Issue 08/2021 (112) August, SSN 2300 6986, Warsaw, Poland.
  • Hamisu, Muhammad; Mansour, Ali (2021), “Detecting Advance Fee Fraud using NLP Bag of word Model”, CyberNigeria 2021: 2nd International Conference on Cyberspace (i2C), 23rd–25th February 2021, Virtual, Nigeria. DOI: 10.1109/CYBERNIGERIA51635.2021.9428793
  • Muhammad, Abubakar Idris; Olalere, Morufu; Hamisu, Muhammad; Mansour, Ali (2021) “Analysis of Cybercrime in Nigeria”, CyberNigeria 2021: 2nd International Conference on Cyberspace (i2C), 23rd–25th February 2021, Virtual, Nigeria. DOI: 10.1109/CYBERNIGERIA51635.2021.9428848
  • Irshad, M., Al-Khateeb, H. M., Mansour, A., Ashawa, M., Hamisu, M. (2018) ‘Effective Methods to Detect Metamorphic Malware: A Systematic Review’, Int. J. of Electronic Security and Digital Forensics, Vol. 10, No. 2, pp. 138-154, ISSN 1751-9128. DOI: 10.1504/IJESDF.2018.090948
  • Ashawa, M., Mansour, A., Al-Khateeb, H.M. (2017) ‘Forensic Data Extraction and Analysis of Left Artifacts on emulated Android Phones: A Case Study of Instant Messaging Applications and social media’, Digital Forensics Magazine, Issue 33, Nov 2017, http://www.digitalforensicsmagazine.com/.
  • Alabbas, Waleed; al-Khateeb, Haider M.; Mansour, Ali; Epiphaniou, Gregory; Frommholz, Ingo (2017), “Classification of Colloquial Arabic Tweets in real-time to detect high-risk floods”, International Conference on Social Media, Wearable and Web Analytics (Social Media 2017), to be held at the Grand Connaught Rooms, London, UK, 19-20 June.
  • Bozed, Kenz A.; Mansour, Ali; and Adjei, Osei (2016) “Face Region Detection Using Skin Region Properties”, 1st IJCTA International Conference on Engineering and Technology, IJCTA 9(38), 2016, pp. 253-260, New Delhi, India 27-28 August, International Science Press.
  • Wajdi Alhakami, Ali Mansour and Ghazanfar A. Safdar, (2016) “Performance Analysis of a Novel Decentralised MAC Protocol for Cognitive Radio Networks”, IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob 2016), 13-15 Sep, Bandung, Indonesia.
  • Abbas, Waleed; Al-Khateeb, Haider M.; Mansour, Ali, (2016) “Arabic Text Classification Methods: Systematic Literature Review of Primary Studies”, IEEE CiSt’16 4th Edition of the International Colloquium on Information Science and Technology, Second Invited Session on Arabic Natural Language Processing: Models, Systems, Data and Applications, 24-26 Oct, Tangier, Assilah, Morocco.
  • Abbas, Waleed; Al-Khateeb, Haider M.; Mansour, Ali, (2016) “Detecting events in real time through Twitter”, The 9th Saudi Student Conference, 9th SSC 14 Feb, UK.
  • Flowers, Cassandra; Mansour, Ali; Al-Khateeb, H.M., (2016) “Web Browser Artefacts in Private and Portable Modes: A Forensic Investigation”, Int. J. Electronic Security and Digital Forensics, Vol. 8, No. 2, pp.99–117.
  • Alkhyeli, Mansour ; Mansour, Ali, (2015) “Using Social Media for Supporting Decision-Making in Managing Public Relations The Case of Abu Dhabi Police”, 2nd European Conference on Social Media ECSM 2015, School of Accounting and Administration at the Polytechnic Institute of Porto, Portugal, 9-10 Jul, (Paper published in the PhD colloquium conference track).
  • Alhakami, Wajdi; Mansour, Ali and Safdar, Ghazanfar A., (2014) "Spectrum Sharing Security and Attacks in CRNs: a Review", (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 5, No. 1.
  • Alhakami, Wajdi; Mansour, Ali; Safdar, Ghazanfar, (2014) “Shared-key Based Secure MAC Protocol for CRNs”, 8th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST), St. Anthony’s College, University of Oxford, Oxford, 11-12 Sep.
  • Alhakami Wajdi. Mansour Ali; Safdar Ghazanfar, (2014) "Abstract No. 483: A Secure MAC Protocol for Cognitive Radio Networks", 7th Saudi Students Conference in the UK.
  • Safdar, G.A.; Albermany, S.; Aslam, N.; Mansour, A.; Epiphaniou, G., (2013) “Prevention against threats to self co-existence - A novel authentication protocol for cognitive radio networks”, Wireless and Mobile Networking Conference (WMNC), 2014 7th IFIP, 20-22 May, DOI:10.1109/WMNC.2014.6878857.
  • Kenz Amhmed Bozed ; Osei Adjei ; Ali Mansour, (2013), “A new approach of facial features’ localization using a morphological operation in still and sequence images”, Proc. SPIE 9067, Sixth International Conference on Machine Vision (ICMV 2013), 90670P, Dec 24, doi:10.1117/12.2050179, London.
  • Alhakami, Wajdi; Mansour, Ali; Safdar, Ghazanfar; Albermany, Salah, (2013) “A Secure MAC Protocol for Cognitive Radio Networks (SMCRN)”, Science and Information Conference, Oct 7-9, London.
  • Kenz Ahmed Bozed; Osei Adjei; Ali Mansour (2013), “Detection of facial expressions based on Morphological face features and Minimum Distance Classifier”, Sciences and Techniques of Automatic Control and Computer Engineering (STA), 2013 14th International Conference on, Dec 20-22, Sousse, Tunisia.
  • Al-Aulamie, A.; Mansour, A.; Daly, H., (2013) “Investigating The Direct Effect Of Intrinsic Motivation On Learners’ Behavioural Intention”. Proceedings of International Conference Information Systems, Lisbon, Portugal 13-15 Mar, 353-357. IADIS.
  • Alhakami, Wajdi; Mansour, Ali; Zhang, Sijing, (2012) “ESMCRN: An Enhanced Security Mechanism for Cognitive Radio Networks”, 7th International Conference on Broadband Communications & Biomedical Applications (IB2COM'12), 5-8 Nov, Sydney.
  • Al-Aulamie, Abdullah; Mansour, Ali; Daly, Herbert; Adjei, O., (2012) “The Effect Of Intrinsic Motivation On Learners' Behavioural Intention To Use E-Learning Systems”, ITHET 2012, 21-23 Jun, Istanbul, Turkey, DOI: 10.1109/ITHET.2012.6246057.
  • Amusa, E.; Adjei, O.; Jie Zhang; Mansour, A.; Capone, A., (2011) “An efficient RSSI-aware metric for wireless mesh networks”, International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 9-13 May, ISBN: 978-1-61284-822-8.
  • Bozed, K.; Mansour, A.; Adjei, O., (2010) “Face Region Detection using Skin Region Properties”, The 2010 International Arab Conference on Information Technology (ACIT'2010), University of Garyounis, Banghazi, Libya, 14-16 Dec, ID: 634.
  • Bozed, K.; Mansour, A.; Adjei, O., (2010) “An Application of Morphological Operations for Facial Expressions Detection”, Third scientific symposium for Libyan students in the UK, Sheffield Hallam University, 12 Jun.
  • Bozed, K.; Mansour, A.; Adjei, O., (2010) “Facial Features’ Localization using a Morphological Operation”, Proceedings of the 1st International Workshop on Bio-inspired Human-Machine Interfaces and Healthcare Applications (B-Interface 2010) in conjunction with BIOSTEC 2010, 22-23 Jan, Valencia, Spain.
  • Kseibat, D.; Mansour, A.; Adjei, O., (2010) “Domain-Based Intelligent Tutoring System”, in “Innovations and Advances in Computer Sciences and Engineering 2010”, Tarek Sobh (Ed), 13-17, DOI: 10.1007/978-90-481-3658-2_3, Springer Netherlands.
  • Kseibat, D.; Mansour, A.; Adjei, O.; Phillips, P., (2010) “Domain-based Teaching Strategy for Intelligent Tutoring System Based on Generic Rules”, in “Innovations in Computing Sciences and Software Engineering 2010”, Tarek Sobh (Ed), 473-476, DOI: 10.1007/978-90-481-9112-3_80, Springer Netherlands.
  • Kseibat, D.; Mansour, A.; Adjei, O.; Phillips, P., (2010) “Student Model Based on Flexible Fuzzy Inference”, in “Innovations in Computing Sciences and Software Engineering 2010”, Tarek Sobh (Ed), 39-43, DOI: 10.1007/978-90-481-9112-3_7, Springer Netherlands.
  • Kseibat, D.; Mansour, A.; Adjei, O.; Phillips, P., (2009) “Domain-based Teaching Strategy for Intelligent Tutoring System Based on Generic Rules”, International Conference on Systems, Computing Sciences and Software Engineering (SCSS 09) part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 09), 4-12 Dec, University of Bridgeport, USA.
  • Kseibat, D.; Mansour, A.; Adjei, O.; Phillips, P., (2009) “Student model based on flexible fuzzy inference”, International Conference on Systems, Computing Sciences and Software Engineering (SCSS 09) part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 09), 4-12 Dec, University of Bridgeport, USA.
  • Kseibat, D.; Mansour, A.; Adjei, O., (2008) “Domain based Intelligent Tutoring System”, International Conference on Systems, Computing Sciences and Software Engineering (SCSS 08) part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 08), 5-13 Dec, University of Bridgeport, USA.
  • Kseibat, Dawod; Mansour, Ali; Adjei, Osei; Onley, Penny, (2007) “A Prototype for Design of Intelligent Tutoring Systems for Teaching Modern Standard Arabic Language”, IASK International Conference, E-Activity and Leading Technologies, 3-6 Dec, Porto, Portugal, pp188-194.
  • Mansour, Ali; Adjei, Osei, (2005) “Encouraging Deep Learning In The Teaching of Computer Networking”, 4th RoEduNet International Conference: Education/Training and Information/Communication Technologies - RoEduNet 2005, May 20-22, Sovata, Mures County, Romania.
  • Mrozek Z.; Adjei, O.; Mansour, A., (1997) “Quality Assurance In Higher Education”, Proc. of 4th Int. Conf. Computer Aided Engineering Education, Ed. M. Chrzanowski, E.Nawarecki (CAEE'97), vol.2, pp.156-164, AGH Krakow.
  • Mrozek, Z.; Adjei, O.; Mansour, A., (1997) “Quality Assurance in Higher Education”, Methods and Computer Systems in Scientific Research and Engineering Conference. Nov 25-26, Crakow, Poland.
  • Mansour, A.A.H.; Wilson, K., (1996) “Constructing a Generic Multiple Computer Language Tutoring System”. 4th Annual Conference on the Teaching of Computing, 27-30 August, Dublin City University, Dublin, Ireland, R. O’Connor and S. Alexander (Eds.), p203-206.
  • McGregor, J.J.; Poyser, J.; Franklin, M.E.; Mansour, A., (1996) “A Flexible Multimedia Tutoring System for Medicine”, Proceedings of Ed-Media '96, Boston, USA (J30).
  • Adjei, O.; Mansour, A.; Mrozek, Z.; Sojka, R.; Vafadari, R., (1996) “Computer Aided Management of University on Faculty Level”, TEMPUS CME 1069 Politechnika Krakowska - Luton University, Krakow, Poland, ISBN 83-86547-11-1.
  • Mansour, A.A.H.; Wilson, K., (1995) “Constructing a Generic Multiple Computer Language Tutoring System”. Transferring Computer Ideas into Practical Applications III Conference, 3 Nov, University of Luton.
  • Franklin, M.; Mansour, A.; McGregor, J.; Poyser, J., (1994) “Incorporating Multimedia Material in Intelligent Tutoring System”. Proceedings of the East-West International Conference on Computer Technologies in Education, Crimea, 165-170.
  • Mansour, Ali A. H.; McGregor, Jim; Franklin, Margaret; Poyser, John, (1992) “Intelligent Medical Multimedia-Based Tutoring Systems: Design issues”. The Institution of Electrical Engineers (Computing and Control Division) Colloquium on Intelligent Decision Support Systems and Medicine, 15 Jun, Digest No. 1992/143, 10/1-3.
  • Mansour, A.A.H.; Poyser, J.; McGregor J.; Franklin. M.E., (1992) “Simple Linctus and the Wellcome Trust Videodisc Project’s Challenge Option: Intelligent tutoring systems for teaching medical decision making”. Multimedia Journal, Rona Epstein (Ed), Volume 5, 33-45, Jan, ISBN: 5 (with demo software).
  • Franklin, Margaret E.; Mansour, Ali A.H.; McGregor, James J.; Poyser, John, (1992) “Incorporating Multimedia Material in an Intelligent Tutoring System Dialogue”. The Ninth international Conference on Technology and Education: Education Sans Frontieres, Paris, France, Nolan Estes & Michael Thomas (Eds.), Vol. 1, 55-57, Mar 16-20, Morgan Printing, Austin, Texas.
  • Mansour, Ali A.H.; Poyser, John; McGregor, Jim; Anderson, Margaret, (1992) “Intelligent Medical Tutoring Systems: Design Issues”. CTI Centre for Medicine Conference, 14-16 Sep, Lake District, 53-56.
  • Mansour, Ali A.H., (1991) “Simple Linctus & The Wellcome Trust Videodisc Project’s Challenge Option: Intelligent Tutoring Systems for Teaching Medical Decision Making”. Proceedings of CAL91 Symposium, 8-11 Apr, Lancaster University.
  • Mansour, A.A.H.; Poyser, J.; McGregor, J.J.; Franklin, M.E., (1990) “An Intelligent Tutoring System for the Instruction of Medical Students in Techniques of General Practice”. Computers and Education, Vol. 15, No 1-3, 83-90, Pergamon Press.
  • Franklin, Margaret E.; Mansour, Ali A.H.; McGregor, James J.; Poyser, John, (1990) “Simple Linctus and the Wellcome Challenge Option: The use of multimedia in an intelligent tutoring system for medicine”. Proceedings of the Computer Aided Learning in Medicine Conference, CTI Centre for Medicine, 16-18 Sep, on board the Dana Anglia cruise ship between Harwich (UK) and Esbjerg (Denmark).
  • Poyser, John; Franklin, Margaret E.; McGregor, James J.; Mansour, Ali A.H., (1990) “Simulated Teaching”. The British Journal of Healthcare Computing, 10-14 May.
  • Mansour, A., (1989) “Primary Care Tutor: A Medical Tutoring System for Students of General Practice”. University of Sheffield, Computer Science Department, Research Report CS-89-28.
  • Poyser J.; McGregor, J.J.; Mansour, A.A.H.; Franklin, M.E.; Atkinson, L., (1988) “A Computerised and Intelligent Tutoring System in Primary Care Teaching”. Proceedings of the Medical Informatics 88: Computers in Clinical medicine conference. Nottingham UK, 13-15 Sep.
  • Poyser, J.; McGregor, J.J.; Mansour, A.A.H.; Franklin, M.E., (1988) “A Computer Simulation for Teaching Patient Management in Primary Care”. Proceedings of the Computers in Medical Education conference. Cardiff, UK, 12-14 Dec.

News Coverage on Published Work

  • Bradley, David, (2016) “How private is your browser’s privacy mode?”, News item in Science Spot http://sciencespot.co.uk/how-private-is-your-browsers-privacy-mode.html
  • Bradley, David, (2016) “How private is your browser's privacy mode?”, News item in PhysOrg http://phys.org/news/2016-02-private-browser-privacy-mode.html
  • Bradley, David, (2016) “How private is your browser’s privacy mode?”, News item in Inderscience Blogspot http://inderscience.blogspot.co.uk/

Mini-Paper and Poster

  • Bozed, K.; Mansour, A.; Adjei, O., (2010) “Localization using morphological operations”, University of Bedfordshire, 1st International mini-Conference on Applicable Computer Science and Technology (ICACST), 22 Feb.
  • Bozed, K.; Mansour, A.; Adjei, O., (2010) “Facial Expression Detection”, Research Poster, University of Bedfordshire Conference, Jul.

Books

  • Ali A. H. Mansour and Hassan Khabbazeh, (1999) "Programming in C", Higher Colleges of Technology, U.A.E. (HCT System Textbook)
  • Ali A. H. Mansour and Hassan Khabbazeh, (1999) "Algorithm Design", Higher Colleges of Technology, U.A.E. (HCT System Textbook)

telephone

University switchboard
During office hours
(Monday-Friday 08:30-17:00)
+44 (0)1234 400 400

Outside office hours
(Campus Watch)
+44 (0)1582 74 39 89

email

Admissions
admission@beds.ac.uk

International office
international@beds.ac.uk

Student support
sid@beds.ac.uk

Registration
sid@beds.ac.uk