Detecting saturation attacks based on self-similarity of OpenFlow traffic Z Li, W Xing, S Khamaiseh, D Xu IEEE Transactions on Network and Service Management 17 (1), 607-621, 2019 | 38 | 2019 |
Adversarial deep learning: A survey on adversarial attacks and defense mechanisms on image classification SY Khamaiseh, D Bagagem, A Al-Alaj, M Mancino, HW Alomari IEEE Access 10, 102266-102291, 2022 | 35 | 2022 |
Detecting saturation attacks in sdn via machine learning S Khamaiseh, E Serra, Z Li, D Xu 2019 4th International Conference on Computing, Communications and Security …, 2019 | 29 | 2019 |
Deceiving Machine Learning-Based Saturation Attack Detection Systems in SDN SY Khamaiseh, I Alsmadi, Abdull 2020 IEEE Conference on Network Function Virtualization and Software Defined …, 2020 | 23 | 2020 |
vswitchguard: Defending openflow switches against saturation attacks S Khamaiseh, E Serra, D Xu 2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020 | 21 | 2020 |
Model-based testing of obligatory ABAC systems S Khamaiseh, P Chapman, D Xu 2018 IEEE International Conference on Software Quality, Reliability and …, 2018 | 13 | 2018 |
Software security testing via misuse case modeling S Khamaiseh, D Xu 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th …, 2017 | 13 | 2017 |
Network parallelization in HPC clusters I Alsmadi, S Khamaiseh, D Xu 2016 International Conference on Computational Science and Computational …, 2016 | 7 | 2016 |
The Robustness of Detecting Known and Unknown DDoS Saturation Attacks in SDN via the Integration of Supervised and Semi-Supervised Classifiers S Khamaiseh, A Al-Alaj, M Adnan, HW Alomari Future Internet 14 (6), 164, 2022 | 6 | 2022 |
FloodDetector: Detecting unknown DoS flooding attacks in SDN SY Khamaiseh, A Al-Alaj, A Warner 2020 International Conference on Internet of Things and Intelligent …, 2020 | 6 | 2020 |
A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data A Aleroud, M Shariah, R Malkawi, SY Khamaiseh, A Al-Alaj Cluster Computing 27 (2), 2117-2132, 2024 | 3 | 2024 |
Constraining Adversarial Attacks On Network Intrusion Detection Systems: Transferability and Defense Analysis N Alhussien, A Aleroud, A Melhem, SY Khamaiseh IEEE Transactions on Network and Service Management, 2024 | 1 | 2024 |
Target-X: An Efficient Algorithm for Generating Targeted Adversarial Images to Fool Neural Networks SY Khamaiseh, D Bagagem, A Al-Alaj, M Mancino, H Alomari, A Aleroud 2023 IEEE 47th Annual Computers, Software, and Applications Conference …, 2023 | 1 | 2023 |
Enhanced approach for agglomerative clustering using topological relations HW Alomari, AF Al-Badarneh, A Al-Alaj, SY Khamaiseh IEEE Access 11, 21945-21967, 2023 | 1 | 2023 |
Detection and countermeasure of saturation attacks in software-defined networks SY Khamaiseh | 1 | 2019 |
Collaborative Motion Planning Based on the Improved Ant Colony Algorithm for Multiple Autonomous Vehicles HW Alomari, AF Al-Badarneh, A Al-Alaj, SY Khamaiseh IEEE ACCESS 11, 21945-21967, 2023 | | 2023 |
Securing a Grant Proposal Workflow Management System P Chapman, S Khamaiseh | | 2017 |
Security Testing with Misuse Case Modeling SY Khamaiseh | | 2016 |
QRS 2017 Additional Reviewers EG AbdAllah, L Li, A Alavi, X Li, EH Alikacem, Y Li, F Avellaneda, Z Li, ... | | |