Internet of Things (IoT) communication protocols S Al-Sarawi, M Anbar, K Alieyan, M Alzubaidi 2017 8th International conference on information technology (ICIT), 685-690, 2017 | 655 | 2017 |
A survey of botnet detection based on DNS K Alieyan, A ALmomani, A Manasrah, MM Kadhum Neural Computing and Applications 28, 1541-1558, 2017 | 153 | 2017 |
DNS rule-based schema to botnet detection K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta Enterprise Information Systems 15 (4), 545-564, 2021 | 99 | 2021 |
An overview of DDoS attacks based on DNS K Alieyan, MM Kadhum, M Anbar, SU Rehman, NKA Alajmi 2016 International Conference on Information and Communication Technology …, 2016 | 37 | 2016 |
Detection and Mitigation M Alauthman, A Almomani, M Alweshah, W Omoushd, K Alieyane Machine learning for computer and cyber security: principle, algorithms, and …, 2019 | 27 | 2019 |
Review on mechanisms for detecting sinkhole attacks on RPLs M Alzubaidi, M Anbar, S Al-Saleem, S Al-Sarawi, K Alieyan 2017 8th International Conference on Information Technology (ICIT), 369-374, 2017 | 22 | 2017 |
Botnet and Internet of Things (IoTs): A definition, taxonomy, challenges, and future directions K Alieyan, A Almomani, R Abdullah, B Almutairi, M Alauthman Research Anthology on Combating Denial-of-Service Attacks, 138-150, 2021 | 21 | 2021 |
Botnets detecting attack based on DNS features K Alieyan, M Anbar, A Almomani, R Abdullah, M Alauthman 2018 International Arab conference on information technology (ACIT), 1-4, 2018 | 18 | 2018 |
Detection of HTTP flooding DDoS attack using Hadoop with MapReduce: a survey ZR Al Ashhab, M Anbar, MM Singh, K Alieyan, WIA Ghazaleh Int. J. Adv. Trends Comput. Sci. Eng 8 (1), 71-77, 2019 | 14 | 2019 |
Automatic data clustering based mean best artificial bee colony algorithm A Alrosan, W Alomoush, M Alswaitti, K Alissa, S Sahran, SN Makhadmeh, ... Computers, Materials & Continua 68 (2), 1575-1593, 2021 | 10 | 2021 |
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions K Keshkeh, A Jantan, K Alieyan, UM Gana Advances in Cyber Security: Third International Conference, ACeS 2021 …, 2021 | 4 | 2021 |
A rule-based approach to detect botnets based on DNS K Alieyan, A Almomani, R Abdullah, M Anbar 2018 8th IEEE International Conference on Control System, Computing and …, 2018 | 4 | 2018 |
Timestamp utilization in trust-nd mechanism for securing neighbor discovery protocol IH Hasbullah, MM Kadhum, YW Chong, K Alieyan, A Osman 2016 14th Annual Conference on Privacy, Security and Trust (PST), 275-281, 2016 | 3 | 2016 |
Hybrid Newton–Sperm Swarm Optimization Algorithm for Nonlinear Systems O Said Solaiman, R Sihwail, H Shehadeh, I Hashim, K Alieyan Mathematics 11 (6), 1473, 2023 | 2 | 2023 |
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features K Keshkeh, A Jantan, K Alieyan Journal of Information and Communication Technology 21 (03), 279-313, 2022 | 2 | 2022 |
VoIP Protocols’ Bandwidth Based-Mini/RTP Header Using Different Codecs: A Comparison KA Naser Alajmi, Hadeel Saleh Haj Aliwi Asian J. Sci. Res 10, 110-115, 2017 | 2 | 2017 |
A hybrid facial recognition approach based on grasshopper optimization method DR Ibrahim, HA Shehadeh, MA Aladaileh, K Alieyan, GM Jaradat, ... AIP Conference Proceedings 2979 (1), 2023 | | 2023 |
E-health security in big data of cloud computing in Jordanian healthcare sector R Shahin, B Irtahi, R Al-Sayyed, K Alieyan AIP Conference Proceedings 2979 (1), 2023 | | 2023 |
A Mathematical Model of the Behavior of SIP Signaling and Media Messages NKA Alajmi, HSH Aliwi, K Alieyan, MI Sarwar Applied Physics, System Science and Computers: Proceedings of the 1st …, 2018 | | 2018 |
Performance Evaluation of VoIP Protocols within Certain Number of Calls: Jitter N KA Aljam, H Saleh Haj, K Alieyan Journal of Applied Sciences 17 (5), 259-263, 2017 | | 2017 |