Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm TA Alamiedy, M Anbar, ZNM Alqattan, QM Alzubi Journal of Ambient Intelligence and Humanized Computing 11, 3735-3756, 2020 | 51 | 2020 |
Review on feature selection algorithms for anomaly-based intrusion detection system TA Alamiedy, M Anbar, AK Al-Ani, BN Al-Tamimi, N Faleh International Conference of Reliable Information and Communication …, 2018 | 19 | 2018 |
A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of Internet of Things TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla, IH Hasbullah, ... Sensors 22 (9), 3400, 2022 | 13 | 2022 |
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic S Al-Mashhadi, M Anbar, I Hasbullah, TA Alamiedy PeerJ Computer Science 7, e640, 2021 | 12 | 2021 |
Applicability of intrusion detection system on Ethereum attacks: a comprehensive review AHH Kabla, M Anbar, S Manickam, TA Alamiedy, PB Cruspe, AK Al-Ani, ... IEEE Access, 2022 | 9 | 2022 |
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks TA Alamiedy, MFR Anbar, B Belaton, AH Kabla, BH Khudayer International Conference on Advances in Cyber Security 1487, 340-360, 2021 | 8 | 2021 |
Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy ZR Alashhab, M Anbar, MM Singh, IH Hasbullah, P Jain, TA Al-Amiedy Applied Sciences 12 (23), 12441, 2022 | 3 | 2022 |
Deep learning approach for detecting router advertisement flooding-based DDoS attacks AH Hasan, M Anbar, TA Alamiedy Journal of Ambient Intelligence and Humanized Computing, 1-15, 2022 | 3 | 2022 |
Effectiveness of an Entropy-Based Approach for Detecting Low-and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis MA Aladaileh, M Anbar, AJ Hintaw, IH Hasbullah, AA Bahashwan, ... Applied Sciences 13 (2), 775, 2023 | 2 | 2023 |
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things TA Al-Amiedy, M Anbar, B Belaton, AA Bahashwan, IH Hasbullah, ... Internet of Things, 100741, 2023 | 1 | 2023 |
An Intelligent Early Flood Forecasting and Prediction Leveraging Machine and Deep Learning Algorithms with Advanced Alert System IM Hayder, TA Al-Amiedy, W Ghaban, F Saeed, M Nasser, GA Al-Ali, ... Processes 11 (2), 481, 2023 | 1 | 2023 |
An optimizing rebroadcast mechanism for minimizing the control overhead in mobile ad-hoc networks BH KHUDAYER, LR ALZABIN, M ANBAR, RM TAWAFAK, TA ALAMIEDY, ... Journal of Theoretical and Applied Information Technology 100 (8), 2022 | 1 | 2022 |
A Comparative Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks TAAA Baidaa Hamza Khudayer, Lial Raja Alzabin, Mohammed Anbar, Ragad M ... International Journal of Advanced Computer Science and Applications (IJACSA …, 2023 | | 2023 |
A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking AA Bahashwan, M Anbar, S Manickam, TA Al-Amiedy, MA Aladaileh, ... Sensors 23 (9), 4441, 2023 | | 2023 |
An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher HAYIHH Ghofran Kh. Shraida, Hameed A. Younis, Taief Alaa Al-Amiedy, Mohammed ... Computers, Materials and Continua 75 (2), 2641-2654, 2023 | | 2023 |
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection OE Elejla, M Anbar, S Hamouda, B Belaton, TA Al-Amiedy, IH Hasbullah Symmetry 14 (12), 2556, 2022 | | 2022 |
Backoff Algorithms for Embedded Ethernet Model in Real-Time System ATA Nameer Falih Mhaidi, Mohamad Khairi Ishak International Journal of Innovations in Engineering and Technology 11 (3), 15-26, 2018 | | 2018 |