Active e-mail system SMTP protocol monitoring algorithm R Sureswaran, H Al Bazar, O Abouabdalla, AM Manasrah, H El-Taj 2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009 | 35 | 2009 |
False positive reduction in intrusion detection system: A survey O Abouabdalla, H El-Taj, A Manasrah, S Ramadass 2009 2nd IEEE International Conference on Broadband Network & Multimedia …, 2009 | 30 | 2009 |
Neighbor discovery protocol anomaly detection using finite state machine and strict anomaly detection F Najjar, M Kadhum, H El-Taj Proceedings of the 4th International Conference on Internet Applications …, 2015 | 13 | 2015 |
Intrusion detection and prevention response based on signature-based and anomaly-based: Investigation study H El-Taj, F Najjar, H Alsenawi, M Najjar International Journal of Computer Science and Information Security 10 (6), 50, 2012 | 13 | 2012 |
Detecting neighbor discovery protocol-based flooding attack using machine learning techniques F Najjar, MM Kadhum, H El-Taj Advances in Machine Learning and Signal Processing: Proceedings of MALSIP …, 2016 | 10 | 2016 |
IPv6 change threats behavior F Najjar, H El-Taj International Journal of Advanced Computer Science and Applications 6 (1), 2015 | 9 | 2015 |
QRphish: An Automated QR Code Phishing Detection Approach AY Alnajjar, M Anbar, S Manickam, O Elejla, H El-Taj Journal Of Engineering And Applied Sciences 11 (3), 553-560, 2016 | 7 | 2016 |
Applying Mobile Agents on Mobile Grid Computing HR El-Taj, CH Yong Computer Science Postgraduate Colloquium, 2007 | 7 | 2007 |
A Study on Video Conferencing using Overlay Network A Alalousi, A Osman, S Noori, A Hussain, A Munther, H El-Taj European Journal of Scientific Research 59 (3), 284-294, 2011 | 5 | 2011 |
False positive reduction by correlating the intrusion detection system alerts: Investigation study H El-Taj, O Abouabdalla, A Manasrah Journal of Communication and Computer 7 (3), 64, 2010 | 5 | 2010 |
Forthcoming aggregating intrusion detection system alerts framework H El-Taj, O Abouabdalla, A Manasrah, A Al-Madi, MI Sarwar, S Ramadass 2010 Fourth International Conference on Emerging Security Information …, 2010 | 4 | 2010 |
Intrusion detection and prevention systems (IDPS) state of art: IDPS challenges HR El-Taj International Journal of Computer Science and Information Security 13 (9), 28, 2015 | 2 | 2015 |
CryptoQR System based on RSA HR El-Taj, R Alhadhrami Int. J. Comput. Sci. Inf. Secur 18 (6), 2020 | 1 | 2020 |
False Positive Reduction using IDS Alert Correlation Method based on the Apriori Algorithm H El-Taj, O Abouabdalla, A Manasrah, M Anbar, A Al-Madi International Journal of Computer Science & Information Security, 2010 | | 2010 |
Detecting Neighbor Discovery Protocol Flooding Attack using Machine Learning Techniques F Najjar, M Kadum, H El-Taj | | |
CyberSec 2015 Reviewers A Al Mazari, Y Shang, A Yassin, E Pshehotskaya, B Shanmugam, N Azis, ... | | |
A Study to investigate the possibility of using a decision-making model with IPS F Najjar | | |
Aggregating IDS Alerts Based on Time Threshold: Testing and Results HR El-Taj Journal: INTERNATIONAL JORNAL OF COMPUTERS & TECHNOLOGY 11 (2), 0 | | |
Aggregating Intrusion Detection System Alerts Based on Row Echelon Form Concept H El-Taj, O Abouabdalla, A Manasrah, M Mayeh, M Elhalabi | | |