A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla, IH Hasbullah, ... Sensors 22 (9), 3400, 2022 | 62 | 2022 |
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan, IH Hasbullah, ... Internet of Things 22, 100741, 2023 | 32 | 2023 |
A systematic literature review on machine learning and deep learning approaches for detecting DDoS attacks in software-defined networking AA Bahashwan, M Anbar, S Manickam, TA Al-Amiedy, MA Aladaileh, ... Sensors 23 (9), 4441, 2023 | 28 | 2023 |
Review on feature selection algorithms for anomaly-based intrusion detection system TA Alamiedy, M Anbar, AK Al-Ani, BN Al-Tamimi, N Faleh International Conference of Reliable Information and Communication …, 2018 | 28 | 2018 |
Distributed denial of service attacks against cloud computing environment: survey, issues, challenges and coherent taxonomy ZR Alashhab, M Anbar, MM Singh, IH Hasbullah, P Jain, TA Al-Amiedy Applied Sciences 12 (23), 12441, 2022 | 26 | 2022 |
Applicability of intrusion detection system on Ethereum attacks: a comprehensive review AHH Kabla, M Anbar, S Manickam, TA Al-Amiedy, PB Cruspe, AK Al-Ani, ... IEEE Access 10, 71632-71655, 2022 | 22 | 2022 |
Effectiveness of an entropy-based approach for detecting low-and high-rate DDoS attacks against the SDN controller: Experimental analysis MA Aladaileh, M Anbar, AJ Hintaw, IH Hasbullah, AA Bahashwan, ... Applied Sciences 13 (2), 775, 2023 | 19 | 2023 |
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic S Al-Mashhadi, M Anbar, I Hasbullah, TA Alamiedy PeerJ Computer Science 7, e640, 2021 | 19 | 2021 |
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks TA Alamiedy, MFR Anbar, B Belaton, AH Kabla, BH Khudayer International Conference on Advances in Cyber Security 1487, 340-360, 2021 | 15 | 2021 |
A comparative performance evaluation of routing protocols for mobile ad-hoc networks BH Khudayer, LR Alzabin, M Anbar, RM Tawafak, TC Wan, A AlSideiri, ... International Journal of Advanced Computer Science and Applications 14 (4), 2023 | 10 | 2023 |
Deep learning approach for detecting router advertisement flooding-based DDoS attacks AH Hasan, M Anbar, TA Alamiedy Journal of Ambient Intelligence and Humanized Computing 14 (6), 7281-7295, 2023 | 9 | 2023 |
An efficient color-image encryption method using dna sequence and chaos cipher G Shraida, H Younis, T Al-Amiedy, M Anbar, H Younis, I Hasbullah Comput. Mater. Contin 75, 2641-2654, 2023 | 8 | 2023 |
A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks GAL Mukhaini, M Anbar, S Manickam, TA Al-Amiedy, A Al Momani Journal of King Saud University-Computer and Information Sciences, 101866, 2023 | 6 | 2023 |
Advances in cyber security M Anbar, N Abdullah, S Manickam Springer Singapore, 2020 | 5 | 2020 |
Machine and deep learning techniques for detecting internet protocol version six attacks: a review AHH Kabla, M Anbar, S Hamouda, AA Bahashwan, TA Al-Amiedy, ... International Journal of Electrical and Computer Engineering (IJECE) 13 (5 …, 2023 | 4 | 2023 |
An optimizing rebroadcast mechanism for minimizing the control overhead in mobile ad-hoc networks BH Khudayer, LR Alzabin, M Anbar, RM Tawafak, TA Alamiedy, SI Malik, ... Journal of Theoretical and Applied Information Technology 100 (8), 2022 | 4 | 2022 |
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection OE Elejla, M Anbar, S Hamouda, B Belaton, TA Al-Amiedy, IH Hasbullah Symmetry 14 (12), 2556, 2022 | 2 | 2022 |
OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things TA Al-Amiedy, M Anbar, B Belaton Cluster Computing, 1-44, 2024 | 1 | 2024 |
Introduction to the application of service-based blockchain technology in internet of things application ML Khalaf, IM Hayder, TA Al-Amiedy, HA Younis, S Salisu, GA Al-Ali, ... AIP Conference Proceedings 2895 (1), 2024 | 1 | 2024 |
Advances in Cyber Security: Third International Conference, ACeS 2021, Penang, Malaysia, August 24–25, 2021, Revised Selected Papers N Abdullah, S Manickam, M Anbar Springer Nature, 2021 | 1 | 2021 |