ICMPv6-based DoS and DDoS attacks and defense mechanisms OE Elejla, M Anbar, B Belaton IETE Technical Review 34 (4), 390-407, 2017 | 64 | 2017 |
Intrusion detection systems of ICMPv6-based DDoS attacks OE Elejla, B Belaton, M Anbar, A Alnajjar Neural Computing and Applications 30, 45-56, 2018 | 39 | 2018 |
Flow-based IDS for ICMPv6-based DDoS attacks detection OE Elejla, M Anbar, B Belaton, BO Alijla Arabian Journal for Science and Engineering 43, 7757-7775, 2018 | 37 | 2018 |
ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: a review M Tayyab, B Belaton, M Anbar IEEE Access 8, 170529-170547, 2020 | 36 | 2020 |
False positives reduction via intrusion alert quality framework NA Bakar, B Belaton, A Samsudin 2005 13th IEEE International Conference on Networks Jointly held with the …, 2005 | 29 | 2005 |
IoT adoption and application for smart healthcare: a systematic review M Al-Rawashdeh, P Keikhosrokiani, B Belaton, M Alawida, A Zwiri Sensors 22 (14), 5377, 2022 | 26 | 2022 |
Labeled flow-based dataset of ICMPv6-based DDoS attacks OE Elejla, M Anbar, B Belaton, S Hamouda Neural Computing and Applications 31, 3629-3646, 2019 | 24 | 2019 |
Comparison of classification algorithms on ICMPv6-based DDoS attacks detection OE Elejla, B Belaton, M Anbar, B Alabsi, AK Al-Ani Computational Science and Technology: 5th ICCST 2018, Kota Kinabalu …, 2019 | 23 | 2019 |
Brain image segmentation in recent years: A narrative review A Fawzi, A Achuthan, B Belaton Brain Sciences 11 (8), 1055, 2021 | 22 | 2021 |
Improving accuracy of applications fingerprinting on local networks using NMAP-AMAP-ETTERCAP as a hybrid framework WAHM Ghanem, B Belaton 2013 IEEE international conference on control system, computing and …, 2013 | 21 | 2013 |
A K-means based generic segmentation system AAZ Irani, B Belaton 2009 Sixth International Conference on Computer Graphics, Imaging and …, 2009 | 20 | 2009 |
SBI model for the detection of advanced persistent threat based on strange behavior of using credential dumping technique N Mohamed, B Belaton IEEE Access 9, 42919-42932, 2021 | 18 | 2021 |
A Reference Dataset for ICMPv6 Flooding Attacks* Omar E. Elejla," Bahari Belaton," Mohammed Anbar and “Ahmad Alnajjar" School of Computer Science, Universiti Sains Malaysia … O Elejla J. Eng. Appl. Sci 100, 476-481, 2016 | 18 | 2016 |
Towards implementing intrusion alert quality framework NA Bakar, B Belaton First International Conference on Distributed Frameworks for Multimedia …, 2005 | 17 | 2005 |
A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of Internet of Things TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla, IH Hasbullah, ... Sensors 22 (9), 3400, 2022 | 15 | 2022 |
An improved iterative closest point algorithm for rigid point registration J Chen, B Belaton Machine Learning and Cybernetics: 13th International Conference, Lanzhou …, 2014 | 14 | 2014 |
A new set of features for detecting router advertisement flooding attacks OE Elejla, B Belaton, M Anbar, IM Smadi 2017 Palestinian International Conference on Information and Communication …, 2017 | 13 | 2017 |
A visual analytics framework for the examination timetabling problem JJ Thomas, AT Khader, B Belaton 2008 Fifth International Conference on Computer Graphics, Imaging and …, 2008 | 13 | 2008 |
Credit card fraud detection using a new hybrid machine learning architecture EF Malik, KW Khaw, B Belaton, WP Wong, XY Chew Mathematics 10 (9), 1480, 2022 | 12 | 2022 |
Adaptive face modelling for reconstructing 3D face shapes from single 2D images A Maghari, I Venkat, IY Liao, B Belaton IET Computer Vision 8 (5), 441-454, 2014 | 12 | 2014 |