Mohammed Anbar, PhD
Mohammed Anbar, PhD
Потвърден имейл адрес: usm.my
Internet of Things (IoT) communication protocols
S Al-Sarawi, M Anbar, K Alieyan, M Alzubaidi
2017 8th International conference on information technology (ICIT), 685-690, 2017
Impact of coronavirus pandemic crisis on technologies and cloud computing applications
ZR Alashhab, M Anbar, MM Singh, YB Leau, ZA Al-Sai, SA Alhayja’a
Journal of Electronic Science and Technology 19 (1), 100059, 2021
Internet of things market analysis forecasts, 2020–2030
S Al-Sarawi, M Anbar, R Abdullah, AB Al Hawari
2020 Fourth World Conference on smart trends in systems, security and …, 2020
Survey of authentication and privacy schemes in vehicular ad hoc networks
MA Al-Shareeda, M Anbar, IH Hasbullah, S Manickam
IEEE Sensors Journal 21 (2), 2422-2433, 2021
DNS rule-based schema to botnet detection
K Alieyan, A Almomani, M Anbar, M Alauthman, R Abdullah, BB Gupta
Enterprise Information Systems 15 (4), 545-564, 2019
Intrusion detection system based on a modified binary grey wolf optimisation
QM Alzubi, M Anbar, ZNM Alqattan, MA Al-Betar, R Abdullah
Neural Computing and Applications, 1-13, 2019
Vppcs: Vanet-based privacy-preserving communication scheme
MA Al-Shareeda, M Anbar, S Manickam, AA Yassin
IEEE Access 8, 150914-150928, 2020
Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks
BH Khudayer, M Anbar, SM Hanshi, TC Wan
IEEE Access 8, 24019-24032, 2020
Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm
TA Alamiedy, M Anbar, ZNM Alqattan, QM Alzubi
Journal of Ambient Intelligence and Humanized Computing 11 (9), 3735-3756, 2020
Variants of the Low-Energy Adaptive Clustering Hierarchy Protocol: Survey, Issues and Challenges
AK Mohammed Al-Shalabi Mohammed Anbar , Tat-Chee Wan
Electronics 7 (8), 136, 2018
Detection techniques of distributed denial of service attacks on software-defined networking controller–a review
MA Aladaileh, M Anbar, IH Hasbullah, YW Chong, YK Sanjalawe
IEEE Access 8, 143985-143995, 2020
ICMPv6-based DoS and DDoS attacks and defense mechanisms
OE Elejla, M Anbar, B Belaton
IETE Technical Review 34 (4), 390-407, 2017
Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm
M Al-Shalabi, M Anbar, TC Wan, Z Alqattan
Information Sciences 500, 259-273, 2019
Evolving fuzzy neural network for phishing emails detection
A Almomani, TC Wan, A Altaher, A Manasrah, E ALmomani, M Anbar, ...
Journal of Computer Science 8 (7), 1099, 2012
Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks
MA Al-Shareeda, M Anbar, IH Hasbullah, S Manickam, SM Hanshi
IEEE access 8, 144957-144968, 2020
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah
Sensors 21 (24), 8206, 2021
An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network
RMA Saad, M Anbar, S Manickam, E Alomari
IETE Technical Review 33 (3), 244-255, 2016
Review of prevention schemes for replay attack in vehicular ad hoc networks (vanets)
MA Al-shareeda, M Anbar, IH Hasbullah, S Manickam, N Abdullah, ...
2020 IEEE 3rd International Conference on Information Communication and …, 2020
ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review
M Tayyab, B Belaton, M Anbar
IEEE Access 8, 170529-170547, 2020
A secure pseudonym-based conditional privacy-preservation authentication scheme in vehicular ad hoc networks
MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah
Sensors 22 (5), 1696, 2022
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20